Lookup for vulnerable packages by Package URL.

Purlpkg:alpm/archlinux/binutils@2.29.1-3
Typealpm
Namespacearchlinux
Namebinutils
Version2.29.1-3
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version2.30-1
Latest_non_vulnerable_version2.38-1
Affected_by_vulnerabilities
0
url VCID-3aht-pk4j-b3h5
vulnerability_id VCID-3aht-pk4j-b3h5
summary binutils: NULL pointer dereference in dwarf2.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15022.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15022.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-15022
reference_id
reference_type
scores
0
value 0.00261
scoring_system epss
scoring_elements 0.49383
published_at 2026-04-01T12:55:00Z
1
value 0.00261
scoring_system epss
scoring_elements 0.49433
published_at 2026-04-13T12:55:00Z
2
value 0.00261
scoring_system epss
scoring_elements 0.49392
published_at 2026-04-07T12:55:00Z
3
value 0.00261
scoring_system epss
scoring_elements 0.49447
published_at 2026-04-08T12:55:00Z
4
value 0.00261
scoring_system epss
scoring_elements 0.49442
published_at 2026-04-09T12:55:00Z
5
value 0.00261
scoring_system epss
scoring_elements 0.49459
published_at 2026-04-11T12:55:00Z
6
value 0.00261
scoring_system epss
scoring_elements 0.4943
published_at 2026-04-12T12:55:00Z
7
value 0.00261
scoring_system epss
scoring_elements 0.49412
published_at 2026-04-02T12:55:00Z
8
value 0.00261
scoring_system epss
scoring_elements 0.49439
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-15022
2
reference_url https://blogs.gentoo.org/ago/2017/10/03/binutils-null-pointer-dereference-in-bfd_hash_hash-hash-c/
reference_id
reference_type
scores
url https://blogs.gentoo.org/ago/2017/10/03/binutils-null-pointer-dereference-in-bfd_hash_hash-hash-c/
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15022
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15022
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=22201
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=22201
6
reference_url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=11855d8a1f11b102a702ab76e95b22082cccf2f8
reference_id
reference_type
scores
url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=11855d8a1f11b102a702ab76e95b22082cccf2f8
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1500376
reference_id 1500376
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1500376
8
reference_url https://security.archlinux.org/AVG-435
reference_id AVG-435
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-435
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:binutils:2.29:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-15022
reference_id CVE-2017-15022
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-15022
11
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:alpm/archlinux/binutils@2.30-1
purl pkg:alpm/archlinux/binutils@2.30-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/binutils@2.30-1
aliases CVE-2017-15022
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3aht-pk4j-b3h5
1
url VCID-3az2-jj9s-7ffj
vulnerability_id VCID-3az2-jj9s-7ffj
summary binutils: Infinite recursion in find_abstract_instance_name
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15024.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15024.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-15024
reference_id
reference_type
scores
0
value 0.00425
scoring_system epss
scoring_elements 0.62103
published_at 2026-04-01T12:55:00Z
1
value 0.00425
scoring_system epss
scoring_elements 0.62216
published_at 2026-04-13T12:55:00Z
2
value 0.00425
scoring_system epss
scoring_elements 0.62162
published_at 2026-04-07T12:55:00Z
3
value 0.00425
scoring_system epss
scoring_elements 0.62212
published_at 2026-04-08T12:55:00Z
4
value 0.00425
scoring_system epss
scoring_elements 0.62229
published_at 2026-04-09T12:55:00Z
5
value 0.00425
scoring_system epss
scoring_elements 0.62247
published_at 2026-04-11T12:55:00Z
6
value 0.00425
scoring_system epss
scoring_elements 0.62237
published_at 2026-04-12T12:55:00Z
7
value 0.00425
scoring_system epss
scoring_elements 0.62163
published_at 2026-04-02T12:55:00Z
8
value 0.00425
scoring_system epss
scoring_elements 0.62194
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-15024
2
reference_url https://blogs.gentoo.org/ago/2017/10/03/binutils-infinite-loop-in-find_abstract_instance_name-dwarf2-c/
reference_id
reference_type
scores
url https://blogs.gentoo.org/ago/2017/10/03/binutils-infinite-loop-in-find_abstract_instance_name-dwarf2-c/
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15024
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15024
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=22187
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=22187
6
reference_url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=52a93b95ec0771c97e26f0bb28630a271a667bd2
reference_id
reference_type
scores
url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=52a93b95ec0771c97e26f0bb28630a271a667bd2
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1500378
reference_id 1500378
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1500378
8
reference_url https://security.archlinux.org/AVG-435
reference_id AVG-435
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-435
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:binutils:2.29:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-15024
reference_id CVE-2017-15024
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-15024
11
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:alpm/archlinux/binutils@2.30-1
purl pkg:alpm/archlinux/binutils@2.30-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/binutils@2.30-1
aliases CVE-2017-15024
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3az2-jj9s-7ffj
2
url VCID-6atd-3q2h-vfd5
vulnerability_id VCID-6atd-3q2h-vfd5
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17123.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17123.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-17123
reference_id
reference_type
scores
0
value 0.00442
scoring_system epss
scoring_elements 0.63166
published_at 2026-04-01T12:55:00Z
1
value 0.00442
scoring_system epss
scoring_elements 0.63254
published_at 2026-04-13T12:55:00Z
2
value 0.00442
scoring_system epss
scoring_elements 0.6322
published_at 2026-04-07T12:55:00Z
3
value 0.00442
scoring_system epss
scoring_elements 0.63272
published_at 2026-04-08T12:55:00Z
4
value 0.00442
scoring_system epss
scoring_elements 0.63289
published_at 2026-04-09T12:55:00Z
5
value 0.00442
scoring_system epss
scoring_elements 0.63306
published_at 2026-04-11T12:55:00Z
6
value 0.00442
scoring_system epss
scoring_elements 0.6329
published_at 2026-04-12T12:55:00Z
7
value 0.00442
scoring_system epss
scoring_elements 0.63225
published_at 2026-04-02T12:55:00Z
8
value 0.00442
scoring_system epss
scoring_elements 0.63255
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-17123
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17123
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17123
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=22509
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=22509
5
reference_url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=4581a1c7d304ce14e714b27522ebf3d0188d6543
reference_id
reference_type
scores
url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=4581a1c7d304ce14e714b27522ebf3d0188d6543
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1524509
reference_id 1524509
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1524509
7
reference_url https://security.archlinux.org/AVG-538
reference_id AVG-538
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-538
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-17123
reference_id CVE-2017-17123
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-17123
10
reference_url https://security.gentoo.org/glsa/201811-17
reference_id GLSA-201811-17
reference_type
scores
url https://security.gentoo.org/glsa/201811-17
11
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:alpm/archlinux/binutils@2.30-1
purl pkg:alpm/archlinux/binutils@2.30-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/binutils@2.30-1
aliases CVE-2017-17123
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6atd-3q2h-vfd5
3
url VCID-92ag-7zjf-qfhj
vulnerability_id VCID-92ag-7zjf-qfhj
summary binutils: Divide-by-zero in decode_line_info
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15025.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15025.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-15025
reference_id
reference_type
scores
0
value 0.00261
scoring_system epss
scoring_elements 0.49383
published_at 2026-04-01T12:55:00Z
1
value 0.00261
scoring_system epss
scoring_elements 0.49433
published_at 2026-04-13T12:55:00Z
2
value 0.00261
scoring_system epss
scoring_elements 0.49392
published_at 2026-04-07T12:55:00Z
3
value 0.00261
scoring_system epss
scoring_elements 0.49447
published_at 2026-04-08T12:55:00Z
4
value 0.00261
scoring_system epss
scoring_elements 0.49442
published_at 2026-04-09T12:55:00Z
5
value 0.00261
scoring_system epss
scoring_elements 0.49459
published_at 2026-04-11T12:55:00Z
6
value 0.00261
scoring_system epss
scoring_elements 0.4943
published_at 2026-04-12T12:55:00Z
7
value 0.00261
scoring_system epss
scoring_elements 0.49412
published_at 2026-04-02T12:55:00Z
8
value 0.00261
scoring_system epss
scoring_elements 0.49439
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-15025
2
reference_url https://blogs.gentoo.org/ago/2017/10/03/binutils-divide-by-zero-in-decode_line_info-dwarf2-c/
reference_id
reference_type
scores
url https://blogs.gentoo.org/ago/2017/10/03/binutils-divide-by-zero-in-decode_line_info-dwarf2-c/
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15025
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15025
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=22186
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=22186
6
reference_url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=d8010d3e75ec7194a4703774090b27486b742d48
reference_id
reference_type
scores
url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=d8010d3e75ec7194a4703774090b27486b742d48
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1500375
reference_id 1500375
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1500375
8
reference_url https://security.archlinux.org/AVG-435
reference_id AVG-435
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-435
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:binutils:2.29:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-15025
reference_id CVE-2017-15025
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-15025
11
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:alpm/archlinux/binutils@2.30-1
purl pkg:alpm/archlinux/binutils@2.30-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/binutils@2.30-1
aliases CVE-2017-15025
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-92ag-7zjf-qfhj
4
url VCID-b7ed-5vy7-8yb8
vulnerability_id VCID-b7ed-5vy7-8yb8
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17124.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17124.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-17124
reference_id
reference_type
scores
0
value 0.00387
scoring_system epss
scoring_elements 0.5971
published_at 2026-04-01T12:55:00Z
1
value 0.00387
scoring_system epss
scoring_elements 0.59846
published_at 2026-04-12T12:55:00Z
2
value 0.00387
scoring_system epss
scoring_elements 0.59807
published_at 2026-04-04T12:55:00Z
3
value 0.00387
scoring_system epss
scoring_elements 0.59777
published_at 2026-04-07T12:55:00Z
4
value 0.00387
scoring_system epss
scoring_elements 0.59828
published_at 2026-04-13T12:55:00Z
5
value 0.00387
scoring_system epss
scoring_elements 0.59842
published_at 2026-04-09T12:55:00Z
6
value 0.00387
scoring_system epss
scoring_elements 0.59862
published_at 2026-04-11T12:55:00Z
7
value 0.00387
scoring_system epss
scoring_elements 0.59783
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-17124
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17124
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17124
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=22507
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=22507
5
reference_url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=b0029dce6867de1a2828293177b0e030d2f0f03c
reference_id
reference_type
scores
url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=b0029dce6867de1a2828293177b0e030d2f0f03c
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1524510
reference_id 1524510
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1524510
7
reference_url https://security.archlinux.org/AVG-538
reference_id AVG-538
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-538
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-17124
reference_id CVE-2017-17124
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-17124
10
reference_url https://security.gentoo.org/glsa/201811-17
reference_id GLSA-201811-17
reference_type
scores
url https://security.gentoo.org/glsa/201811-17
11
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:alpm/archlinux/binutils@2.30-1
purl pkg:alpm/archlinux/binutils@2.30-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/binutils@2.30-1
aliases CVE-2017-17124
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b7ed-5vy7-8yb8
5
url VCID-bah7-vbh3-7ueg
vulnerability_id VCID-bah7-vbh3-7ueg
summary binutils: Heap-based buffer over-read in bfd_get_debug_link_info_1
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15021.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15021.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-15021
reference_id
reference_type
scores
0
value 0.00261
scoring_system epss
scoring_elements 0.49383
published_at 2026-04-01T12:55:00Z
1
value 0.00261
scoring_system epss
scoring_elements 0.49433
published_at 2026-04-13T12:55:00Z
2
value 0.00261
scoring_system epss
scoring_elements 0.49392
published_at 2026-04-07T12:55:00Z
3
value 0.00261
scoring_system epss
scoring_elements 0.49447
published_at 2026-04-08T12:55:00Z
4
value 0.00261
scoring_system epss
scoring_elements 0.49442
published_at 2026-04-09T12:55:00Z
5
value 0.00261
scoring_system epss
scoring_elements 0.49459
published_at 2026-04-11T12:55:00Z
6
value 0.00261
scoring_system epss
scoring_elements 0.4943
published_at 2026-04-12T12:55:00Z
7
value 0.00261
scoring_system epss
scoring_elements 0.49412
published_at 2026-04-02T12:55:00Z
8
value 0.00261
scoring_system epss
scoring_elements 0.49439
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-15021
2
reference_url https://blogs.gentoo.org/ago/2017/10/03/binutils-heap-based-buffer-overflow-in-bfd_getl32-opncls-c/
reference_id
reference_type
scores
url https://blogs.gentoo.org/ago/2017/10/03/binutils-heap-based-buffer-overflow-in-bfd_getl32-opncls-c/
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15021
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15021
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=22197
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=22197
6
reference_url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=52b36c51e5bf6d7600fdc6ba115b170b0e78e31d
reference_id
reference_type
scores
url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=52b36c51e5bf6d7600fdc6ba115b170b0e78e31d
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1500377
reference_id 1500377
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1500377
8
reference_url https://security.archlinux.org/AVG-435
reference_id AVG-435
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-435
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:binutils:2.29:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-15021
reference_id CVE-2017-15021
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-15021
11
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:alpm/archlinux/binutils@2.30-1
purl pkg:alpm/archlinux/binutils@2.30-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/binutils@2.30-1
aliases CVE-2017-15021
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bah7-vbh3-7ueg
6
url VCID-csfh-sngk-qfga
vulnerability_id VCID-csfh-sngk-qfga
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17126.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17126.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-17126
reference_id
reference_type
scores
0
value 0.00377
scoring_system epss
scoring_elements 0.59129
published_at 2026-04-01T12:55:00Z
1
value 0.00377
scoring_system epss
scoring_elements 0.59241
published_at 2026-04-13T12:55:00Z
2
value 0.00377
scoring_system epss
scoring_elements 0.59192
published_at 2026-04-07T12:55:00Z
3
value 0.00377
scoring_system epss
scoring_elements 0.59244
published_at 2026-04-08T12:55:00Z
4
value 0.00377
scoring_system epss
scoring_elements 0.59257
published_at 2026-04-09T12:55:00Z
5
value 0.00377
scoring_system epss
scoring_elements 0.59277
published_at 2026-04-11T12:55:00Z
6
value 0.00377
scoring_system epss
scoring_elements 0.5926
published_at 2026-04-12T12:55:00Z
7
value 0.00377
scoring_system epss
scoring_elements 0.59203
published_at 2026-04-02T12:55:00Z
8
value 0.00377
scoring_system epss
scoring_elements 0.59227
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-17126
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17126
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17126
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=22510
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=22510
5
reference_url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=f425ec6600b69e39eb605f3128806ff688137ea8
reference_id
reference_type
scores
url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=f425ec6600b69e39eb605f3128806ff688137ea8
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1524498
reference_id 1524498
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1524498
7
reference_url https://security.archlinux.org/AVG-538
reference_id AVG-538
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-538
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-17126
reference_id CVE-2017-17126
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-17126
10
reference_url https://security.gentoo.org/glsa/201811-17
reference_id GLSA-201811-17
reference_type
scores
url https://security.gentoo.org/glsa/201811-17
fixed_packages
0
url pkg:alpm/archlinux/binutils@2.30-1
purl pkg:alpm/archlinux/binutils@2.30-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/binutils@2.30-1
aliases CVE-2017-17126
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-csfh-sngk-qfga
7
url VCID-e2yq-7v8c-z7hk
vulnerability_id VCID-e2yq-7v8c-z7hk
summary binutils: Heap-based buffer overflow in parse_die
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15020.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15020.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-15020
reference_id
reference_type
scores
0
value 0.00144
scoring_system epss
scoring_elements 0.34608
published_at 2026-04-01T12:55:00Z
1
value 0.00144
scoring_system epss
scoring_elements 0.34737
published_at 2026-04-13T12:55:00Z
2
value 0.00144
scoring_system epss
scoring_elements 0.34726
published_at 2026-04-07T12:55:00Z
3
value 0.00144
scoring_system epss
scoring_elements 0.34769
published_at 2026-04-08T12:55:00Z
4
value 0.00144
scoring_system epss
scoring_elements 0.34797
published_at 2026-04-09T12:55:00Z
5
value 0.00144
scoring_system epss
scoring_elements 0.34801
published_at 2026-04-11T12:55:00Z
6
value 0.00144
scoring_system epss
scoring_elements 0.34762
published_at 2026-04-12T12:55:00Z
7
value 0.00144
scoring_system epss
scoring_elements 0.34823
published_at 2026-04-02T12:55:00Z
8
value 0.00144
scoring_system epss
scoring_elements 0.3485
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-15020
2
reference_url https://blogs.gentoo.org/ago/2017/10/03/binutils-heap-based-buffer-overflow-in-parse_die-dwarf1-c/
reference_id
reference_type
scores
url https://blogs.gentoo.org/ago/2017/10/03/binutils-heap-based-buffer-overflow-in-parse_die-dwarf1-c/
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15020
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15020
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=22202
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=22202
6
reference_url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=1da5c9a485f3dcac4c45e96ef4b7dae5948314b5
reference_id
reference_type
scores
url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=1da5c9a485f3dcac4c45e96ef4b7dae5948314b5
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1500372
reference_id 1500372
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1500372
8
reference_url https://security.archlinux.org/AVG-435
reference_id AVG-435
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-435
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:binutils:2.29:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-15020
reference_id CVE-2017-15020
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-15020
11
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:alpm/archlinux/binutils@2.30-1
purl pkg:alpm/archlinux/binutils@2.30-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/binutils@2.30-1
aliases CVE-2017-15020
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e2yq-7v8c-z7hk
8
url VCID-ftnk-2drc-jkdw
vulnerability_id VCID-ftnk-2drc-jkdw
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17122.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17122.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-17122
reference_id
reference_type
scores
0
value 0.00426
scoring_system epss
scoring_elements 0.62141
published_at 2026-04-01T12:55:00Z
1
value 0.00426
scoring_system epss
scoring_elements 0.62251
published_at 2026-04-13T12:55:00Z
2
value 0.00426
scoring_system epss
scoring_elements 0.62198
published_at 2026-04-07T12:55:00Z
3
value 0.00426
scoring_system epss
scoring_elements 0.62247
published_at 2026-04-08T12:55:00Z
4
value 0.00426
scoring_system epss
scoring_elements 0.62265
published_at 2026-04-09T12:55:00Z
5
value 0.00426
scoring_system epss
scoring_elements 0.62283
published_at 2026-04-11T12:55:00Z
6
value 0.00426
scoring_system epss
scoring_elements 0.62273
published_at 2026-04-12T12:55:00Z
7
value 0.00426
scoring_system epss
scoring_elements 0.62201
published_at 2026-04-02T12:55:00Z
8
value 0.00426
scoring_system epss
scoring_elements 0.62231
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-17122
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17122
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17122
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=22508
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=22508
5
reference_url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=d785b7d4b877ed465d04072e17ca19d0f47d840f
reference_id
reference_type
scores
url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=d785b7d4b877ed465d04072e17ca19d0f47d840f
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1524505
reference_id 1524505
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1524505
7
reference_url https://security.archlinux.org/AVG-538
reference_id AVG-538
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-538
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-17122
reference_id CVE-2017-17122
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-17122
10
reference_url https://security.gentoo.org/glsa/201811-17
reference_id GLSA-201811-17
reference_type
scores
url https://security.gentoo.org/glsa/201811-17
11
reference_url https://usn.ubuntu.com/5341-1/
reference_id USN-5341-1
reference_type
scores
url https://usn.ubuntu.com/5341-1/
12
reference_url https://usn.ubuntu.com/6413-1/
reference_id USN-6413-1
reference_type
scores
url https://usn.ubuntu.com/6413-1/
fixed_packages
0
url pkg:alpm/archlinux/binutils@2.30-1
purl pkg:alpm/archlinux/binutils@2.30-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/binutils@2.30-1
aliases CVE-2017-17122
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ftnk-2drc-jkdw
9
url VCID-mann-686a-8bec
vulnerability_id VCID-mann-686a-8bec
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15023.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15023.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-15023
reference_id
reference_type
scores
0
value 0.00489
scoring_system epss
scoring_elements 0.65455
published_at 2026-04-01T12:55:00Z
1
value 0.00489
scoring_system epss
scoring_elements 0.65538
published_at 2026-04-13T12:55:00Z
2
value 0.00489
scoring_system epss
scoring_elements 0.65496
published_at 2026-04-07T12:55:00Z
3
value 0.00489
scoring_system epss
scoring_elements 0.65549
published_at 2026-04-08T12:55:00Z
4
value 0.00489
scoring_system epss
scoring_elements 0.6556
published_at 2026-04-09T12:55:00Z
5
value 0.00489
scoring_system epss
scoring_elements 0.65579
published_at 2026-04-11T12:55:00Z
6
value 0.00489
scoring_system epss
scoring_elements 0.65566
published_at 2026-04-12T12:55:00Z
7
value 0.00489
scoring_system epss
scoring_elements 0.65504
published_at 2026-04-02T12:55:00Z
8
value 0.00489
scoring_system epss
scoring_elements 0.65532
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-15023
2
reference_url https://blogs.gentoo.org/ago/2017/10/03/binutils-null-pointer-dereference-in-concat_filename-dwarf2-c/
reference_id
reference_type
scores
url https://blogs.gentoo.org/ago/2017/10/03/binutils-null-pointer-dereference-in-concat_filename-dwarf2-c/
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15023
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15023
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=22200
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=22200
6
reference_url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=c361faae8d964db951b7100cada4dcdc983df1bf
reference_id
reference_type
scores
url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=c361faae8d964db951b7100cada4dcdc983df1bf
7
reference_url http://www.securityfocus.com/bid/101611
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101611
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1500374
reference_id 1500374
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1500374
9
reference_url https://security.archlinux.org/AVG-435
reference_id AVG-435
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-435
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:binutils:2.29:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-15023
reference_id CVE-2017-15023
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-15023
12
reference_url https://security.gentoo.org/glsa/201801-01
reference_id GLSA-201801-01
reference_type
scores
url https://security.gentoo.org/glsa/201801-01
fixed_packages
0
url pkg:alpm/archlinux/binutils@2.30-1
purl pkg:alpm/archlinux/binutils@2.30-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/binutils@2.30-1
aliases CVE-2017-15023
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mann-686a-8bec
10
url VCID-stn9-gqqb-7kae
vulnerability_id VCID-stn9-gqqb-7kae
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17125.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17125.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-17125
reference_id
reference_type
scores
0
value 0.00377
scoring_system epss
scoring_elements 0.59129
published_at 2026-04-01T12:55:00Z
1
value 0.00377
scoring_system epss
scoring_elements 0.59241
published_at 2026-04-13T12:55:00Z
2
value 0.00377
scoring_system epss
scoring_elements 0.59192
published_at 2026-04-07T12:55:00Z
3
value 0.00377
scoring_system epss
scoring_elements 0.59244
published_at 2026-04-08T12:55:00Z
4
value 0.00377
scoring_system epss
scoring_elements 0.59257
published_at 2026-04-09T12:55:00Z
5
value 0.00377
scoring_system epss
scoring_elements 0.59277
published_at 2026-04-11T12:55:00Z
6
value 0.00377
scoring_system epss
scoring_elements 0.5926
published_at 2026-04-12T12:55:00Z
7
value 0.00377
scoring_system epss
scoring_elements 0.59203
published_at 2026-04-02T12:55:00Z
8
value 0.00377
scoring_system epss
scoring_elements 0.59227
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-17125
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17125
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=22443
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=22443
5
reference_url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=160b1a618ad94988410dc81fce9189fcda5b7ff4
reference_id
reference_type
scores
url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=160b1a618ad94988410dc81fce9189fcda5b7ff4
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1524511
reference_id 1524511
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1524511
7
reference_url https://security.archlinux.org/AVG-538
reference_id AVG-538
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-538
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-17125
reference_id CVE-2017-17125
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-17125
10
reference_url https://security.gentoo.org/glsa/201811-17
reference_id GLSA-201811-17
reference_type
scores
url https://security.gentoo.org/glsa/201811-17
11
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:alpm/archlinux/binutils@2.30-1
purl pkg:alpm/archlinux/binutils@2.30-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/binutils@2.30-1
aliases CVE-2017-17125
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-stn9-gqqb-7kae
11
url VCID-yqbv-z58c-dycr
vulnerability_id VCID-yqbv-z58c-dycr
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15996.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15996.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-15996
reference_id
reference_type
scores
0
value 0.00314
scoring_system epss
scoring_elements 0.54475
published_at 2026-04-01T12:55:00Z
1
value 0.00314
scoring_system epss
scoring_elements 0.54561
published_at 2026-04-13T12:55:00Z
2
value 0.00314
scoring_system epss
scoring_elements 0.54594
published_at 2026-04-08T12:55:00Z
3
value 0.00314
scoring_system epss
scoring_elements 0.54589
published_at 2026-04-09T12:55:00Z
4
value 0.00314
scoring_system epss
scoring_elements 0.54601
published_at 2026-04-11T12:55:00Z
5
value 0.00314
scoring_system epss
scoring_elements 0.54583
published_at 2026-04-12T12:55:00Z
6
value 0.00314
scoring_system epss
scoring_elements 0.5455
published_at 2026-04-02T12:55:00Z
7
value 0.00314
scoring_system epss
scoring_elements 0.54574
published_at 2026-04-04T12:55:00Z
8
value 0.00314
scoring_system epss
scoring_elements 0.54543
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-15996
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15996
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15996
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=22361
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=22361
5
reference_url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=d91f0b20e561e326ee91a09a76206257bde8438b
reference_id
reference_type
scores
url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=d91f0b20e561e326ee91a09a76206257bde8438b
6
reference_url http://www.securityfocus.com/bid/101608
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101608
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1515742
reference_id 1515742
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1515742
8
reference_url https://security.archlinux.org/AVG-435
reference_id AVG-435
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-435
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:binutils:2.29:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-15996
reference_id CVE-2017-15996
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-15996
11
reference_url https://security.gentoo.org/glsa/201801-01
reference_id GLSA-201801-01
reference_type
scores
url https://security.gentoo.org/glsa/201801-01
12
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:alpm/archlinux/binutils@2.30-1
purl pkg:alpm/archlinux/binutils@2.30-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/binutils@2.30-1
aliases CVE-2017-15996
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yqbv-z58c-dycr
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/binutils@2.29.1-3