Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/radare2@5.7.0-r0?arch=armhf&distroversion=v3.22&reponame=community
Typeapk
Namespacealpine
Nameradare2
Version5.7.0-r0
Qualifiers
arch armhf
distroversion v3.22
reponame community
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version5.7.2-r0
Latest_non_vulnerable_version5.8.2-r0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-8xen-g6z6-hfcs
vulnerability_id VCID-8xen-g6z6-hfcs
summary Null pointer dereference in libr/bin/format/mach0/mach0.c in radareorg/radare2 in GitHub repository radareorg/radare2 prior to 5.7.0. It is likely to be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/476.html).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-1649
reference_id
reference_type
scores
0
value 0.00249
scoring_system epss
scoring_elements 0.4807
published_at 2026-04-01T12:55:00Z
1
value 0.00249
scoring_system epss
scoring_elements 0.48107
published_at 2026-04-02T12:55:00Z
2
value 0.00249
scoring_system epss
scoring_elements 0.48128
published_at 2026-04-04T12:55:00Z
3
value 0.00249
scoring_system epss
scoring_elements 0.48077
published_at 2026-04-07T12:55:00Z
4
value 0.00249
scoring_system epss
scoring_elements 0.4813
published_at 2026-04-08T12:55:00Z
5
value 0.00249
scoring_system epss
scoring_elements 0.48125
published_at 2026-04-09T12:55:00Z
6
value 0.00249
scoring_system epss
scoring_elements 0.48149
published_at 2026-04-11T12:55:00Z
7
value 0.00249
scoring_system epss
scoring_elements 0.48122
published_at 2026-04-12T12:55:00Z
8
value 0.00249
scoring_system epss
scoring_elements 0.48133
published_at 2026-04-13T12:55:00Z
9
value 0.00249
scoring_system epss
scoring_elements 0.48186
published_at 2026-04-16T12:55:00Z
10
value 0.00249
scoring_system epss
scoring_elements 0.4818
published_at 2026-04-18T12:55:00Z
11
value 0.00249
scoring_system epss
scoring_elements 0.48137
published_at 2026-04-21T12:55:00Z
12
value 0.00249
scoring_system epss
scoring_elements 0.48116
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-1649
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014478
reference_id 1014478
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014478
fixed_packages
0
url pkg:apk/alpine/radare2@5.7.0-r0?arch=armhf&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/radare2@5.7.0-r0?arch=armhf&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/radare2@5.7.0-r0%3Farch=armhf&distroversion=v3.22&reponame=community
aliases CVE-2022-1649
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8xen-g6z6-hfcs
1
url VCID-aupe-75b8-fbff
vulnerability_id VCID-aupe-75b8-fbff
summary heap-use-after-free in GitHub repository radareorg/radare2 prior to 5.7.0. This vulnerability is capable of inducing denial of service.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-1444
reference_id
reference_type
scores
0
value 0.00286
scoring_system epss
scoring_elements 0.51996
published_at 2026-04-01T12:55:00Z
1
value 0.00286
scoring_system epss
scoring_elements 0.52043
published_at 2026-04-02T12:55:00Z
2
value 0.00286
scoring_system epss
scoring_elements 0.52069
published_at 2026-04-04T12:55:00Z
3
value 0.00286
scoring_system epss
scoring_elements 0.52035
published_at 2026-04-07T12:55:00Z
4
value 0.00286
scoring_system epss
scoring_elements 0.52089
published_at 2026-04-08T12:55:00Z
5
value 0.00286
scoring_system epss
scoring_elements 0.52086
published_at 2026-04-09T12:55:00Z
6
value 0.00286
scoring_system epss
scoring_elements 0.52138
published_at 2026-04-11T12:55:00Z
7
value 0.00286
scoring_system epss
scoring_elements 0.52121
published_at 2026-04-12T12:55:00Z
8
value 0.00286
scoring_system epss
scoring_elements 0.52107
published_at 2026-04-13T12:55:00Z
9
value 0.00286
scoring_system epss
scoring_elements 0.52147
published_at 2026-04-16T12:55:00Z
10
value 0.00286
scoring_system epss
scoring_elements 0.5215
published_at 2026-04-18T12:55:00Z
11
value 0.00286
scoring_system epss
scoring_elements 0.52132
published_at 2026-04-21T12:55:00Z
12
value 0.00286
scoring_system epss
scoring_elements 0.52079
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-1444
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014478
reference_id 1014478
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014478
fixed_packages
0
url pkg:apk/alpine/radare2@5.7.0-r0?arch=armhf&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/radare2@5.7.0-r0?arch=armhf&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/radare2@5.7.0-r0%3Farch=armhf&distroversion=v3.22&reponame=community
aliases CVE-2022-1444
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-aupe-75b8-fbff
2
url VCID-hkwf-9xsj-xqct
vulnerability_id VCID-hkwf-9xsj-xqct
summary Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end of the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-1437
reference_id
reference_type
scores
0
value 0.00251
scoring_system epss
scoring_elements 0.48361
published_at 2026-04-01T12:55:00Z
1
value 0.00251
scoring_system epss
scoring_elements 0.48397
published_at 2026-04-02T12:55:00Z
2
value 0.00251
scoring_system epss
scoring_elements 0.48418
published_at 2026-04-04T12:55:00Z
3
value 0.00251
scoring_system epss
scoring_elements 0.48371
published_at 2026-04-07T12:55:00Z
4
value 0.00251
scoring_system epss
scoring_elements 0.48426
published_at 2026-04-08T12:55:00Z
5
value 0.00251
scoring_system epss
scoring_elements 0.4842
published_at 2026-04-09T12:55:00Z
6
value 0.00251
scoring_system epss
scoring_elements 0.48444
published_at 2026-04-11T12:55:00Z
7
value 0.00251
scoring_system epss
scoring_elements 0.48419
published_at 2026-04-12T12:55:00Z
8
value 0.00251
scoring_system epss
scoring_elements 0.48431
published_at 2026-04-21T12:55:00Z
9
value 0.00251
scoring_system epss
scoring_elements 0.48481
published_at 2026-04-16T12:55:00Z
10
value 0.00251
scoring_system epss
scoring_elements 0.48476
published_at 2026-04-18T12:55:00Z
11
value 0.00251
scoring_system epss
scoring_elements 0.48417
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-1437
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014478
reference_id 1014478
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014478
fixed_packages
0
url pkg:apk/alpine/radare2@5.7.0-r0?arch=armhf&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/radare2@5.7.0-r0?arch=armhf&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/radare2@5.7.0-r0%3Farch=armhf&distroversion=v3.22&reponame=community
aliases CVE-2022-1437
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hkwf-9xsj-xqct
3
url VCID-tdq4-q57q-ufht
vulnerability_id VCID-tdq4-q57q-ufht
summary Out-of-bounds Read in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end of the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-1714
reference_id
reference_type
scores
0
value 0.00133
scoring_system epss
scoring_elements 0.32832
published_at 2026-04-21T12:55:00Z
1
value 0.00133
scoring_system epss
scoring_elements 0.32684
published_at 2026-04-24T12:55:00Z
2
value 0.00146
scoring_system epss
scoring_elements 0.35083
published_at 2026-04-04T12:55:00Z
3
value 0.00146
scoring_system epss
scoring_elements 0.34963
published_at 2026-04-07T12:55:00Z
4
value 0.00146
scoring_system epss
scoring_elements 0.35008
published_at 2026-04-08T12:55:00Z
5
value 0.00146
scoring_system epss
scoring_elements 0.35037
published_at 2026-04-09T12:55:00Z
6
value 0.00146
scoring_system epss
scoring_elements 0.34858
published_at 2026-04-01T12:55:00Z
7
value 0.00146
scoring_system epss
scoring_elements 0.35005
published_at 2026-04-12T12:55:00Z
8
value 0.00146
scoring_system epss
scoring_elements 0.34981
published_at 2026-04-13T12:55:00Z
9
value 0.00146
scoring_system epss
scoring_elements 0.35021
published_at 2026-04-16T12:55:00Z
10
value 0.00146
scoring_system epss
scoring_elements 0.35006
published_at 2026-04-18T12:55:00Z
11
value 0.00146
scoring_system epss
scoring_elements 0.35041
published_at 2026-04-11T12:55:00Z
12
value 0.00146
scoring_system epss
scoring_elements 0.35056
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-1714
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014478
reference_id 1014478
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014478
fixed_packages
0
url pkg:apk/alpine/radare2@5.7.0-r0?arch=armhf&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/radare2@5.7.0-r0?arch=armhf&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/radare2@5.7.0-r0%3Farch=armhf&distroversion=v3.22&reponame=community
aliases CVE-2022-1714
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tdq4-q57q-ufht
4
url VCID-tqf6-xzpu-37d9
vulnerability_id VCID-tqf6-xzpu-37d9
summary Out-of-bounds Read in r_bin_java_constant_value_attr_new function in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end 2f the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash. More details see [CWE-125: Out-of-bounds read](https://cwe.mitre.org/data/definitions/125.html).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-1451
reference_id
reference_type
scores
0
value 0.00276
scoring_system epss
scoring_elements 0.5095
published_at 2026-04-01T12:55:00Z
1
value 0.00276
scoring_system epss
scoring_elements 0.51003
published_at 2026-04-02T12:55:00Z
2
value 0.00276
scoring_system epss
scoring_elements 0.51028
published_at 2026-04-04T12:55:00Z
3
value 0.00276
scoring_system epss
scoring_elements 0.50985
published_at 2026-04-07T12:55:00Z
4
value 0.00276
scoring_system epss
scoring_elements 0.51042
published_at 2026-04-08T12:55:00Z
5
value 0.00276
scoring_system epss
scoring_elements 0.51039
published_at 2026-04-09T12:55:00Z
6
value 0.00276
scoring_system epss
scoring_elements 0.51082
published_at 2026-04-11T12:55:00Z
7
value 0.00276
scoring_system epss
scoring_elements 0.5106
published_at 2026-04-12T12:55:00Z
8
value 0.00276
scoring_system epss
scoring_elements 0.51043
published_at 2026-04-13T12:55:00Z
9
value 0.00276
scoring_system epss
scoring_elements 0.51081
published_at 2026-04-16T12:55:00Z
10
value 0.00276
scoring_system epss
scoring_elements 0.51087
published_at 2026-04-18T12:55:00Z
11
value 0.00276
scoring_system epss
scoring_elements 0.51064
published_at 2026-04-21T12:55:00Z
12
value 0.00276
scoring_system epss
scoring_elements 0.51013
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-1451
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014478
reference_id 1014478
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014478
fixed_packages
0
url pkg:apk/alpine/radare2@5.7.0-r0?arch=armhf&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/radare2@5.7.0-r0?arch=armhf&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/radare2@5.7.0-r0%3Farch=armhf&distroversion=v3.22&reponame=community
aliases CVE-2022-1451
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tqf6-xzpu-37d9
5
url VCID-x1ew-h8tp-67c2
vulnerability_id VCID-x1ew-h8tp-67c2
summary Out-of-bounds Read in GitHub repository radareorg/radare2 prior to 5.7.0.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-1899
reference_id
reference_type
scores
0
value 0.00454
scoring_system epss
scoring_elements 0.6371
published_at 2026-04-01T12:55:00Z
1
value 0.00454
scoring_system epss
scoring_elements 0.63771
published_at 2026-04-02T12:55:00Z
2
value 0.00454
scoring_system epss
scoring_elements 0.63798
published_at 2026-04-04T12:55:00Z
3
value 0.00454
scoring_system epss
scoring_elements 0.63754
published_at 2026-04-07T12:55:00Z
4
value 0.00454
scoring_system epss
scoring_elements 0.63806
published_at 2026-04-08T12:55:00Z
5
value 0.00454
scoring_system epss
scoring_elements 0.63823
published_at 2026-04-09T12:55:00Z
6
value 0.00454
scoring_system epss
scoring_elements 0.63836
published_at 2026-04-11T12:55:00Z
7
value 0.00454
scoring_system epss
scoring_elements 0.63822
published_at 2026-04-12T12:55:00Z
8
value 0.00454
scoring_system epss
scoring_elements 0.63789
published_at 2026-04-13T12:55:00Z
9
value 0.00454
scoring_system epss
scoring_elements 0.63824
published_at 2026-04-16T12:55:00Z
10
value 0.00454
scoring_system epss
scoring_elements 0.63833
published_at 2026-04-18T12:55:00Z
11
value 0.00454
scoring_system epss
scoring_elements 0.63821
published_at 2026-04-21T12:55:00Z
12
value 0.00454
scoring_system epss
scoring_elements 0.63837
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-1899
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014478
reference_id 1014478
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014478
fixed_packages
0
url pkg:apk/alpine/radare2@5.7.0-r0?arch=armhf&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/radare2@5.7.0-r0?arch=armhf&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/radare2@5.7.0-r0%3Farch=armhf&distroversion=v3.22&reponame=community
aliases CVE-2022-1899
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x1ew-h8tp-67c2
6
url VCID-yycm-mx2c-tkae
vulnerability_id VCID-yycm-mx2c-tkae
summary Access of Uninitialized Pointer in GitHub repository radareorg/radare2 prior to 5.7.0.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-1809
reference_id
reference_type
scores
0
value 0.00273
scoring_system epss
scoring_elements 0.50647
published_at 2026-04-01T12:55:00Z
1
value 0.00273
scoring_system epss
scoring_elements 0.507
published_at 2026-04-02T12:55:00Z
2
value 0.00273
scoring_system epss
scoring_elements 0.50726
published_at 2026-04-04T12:55:00Z
3
value 0.00273
scoring_system epss
scoring_elements 0.50682
published_at 2026-04-07T12:55:00Z
4
value 0.00273
scoring_system epss
scoring_elements 0.50737
published_at 2026-04-13T12:55:00Z
5
value 0.00273
scoring_system epss
scoring_elements 0.50734
published_at 2026-04-09T12:55:00Z
6
value 0.00273
scoring_system epss
scoring_elements 0.50776
published_at 2026-04-11T12:55:00Z
7
value 0.00273
scoring_system epss
scoring_elements 0.50752
published_at 2026-04-12T12:55:00Z
8
value 0.00273
scoring_system epss
scoring_elements 0.50777
published_at 2026-04-16T12:55:00Z
9
value 0.00273
scoring_system epss
scoring_elements 0.50783
published_at 2026-04-18T12:55:00Z
10
value 0.00273
scoring_system epss
scoring_elements 0.50763
published_at 2026-04-21T12:55:00Z
11
value 0.00273
scoring_system epss
scoring_elements 0.50712
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-1809
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014478
reference_id 1014478
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014478
fixed_packages
0
url pkg:apk/alpine/radare2@5.7.0-r0?arch=armhf&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/radare2@5.7.0-r0?arch=armhf&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/radare2@5.7.0-r0%3Farch=armhf&distroversion=v3.22&reponame=community
aliases CVE-2022-1809
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yycm-mx2c-tkae
7
url VCID-z1c6-6naw-byeg
vulnerability_id VCID-z1c6-6naw-byeg
summary Out-of-bounds Read in r_bin_java_bootstrap_methods_attr_new function in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end 2f the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash. More details see [CWE-125: Out-of-bounds read](https://cwe.mitre.org/data/definitions/125.html).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-1452
reference_id
reference_type
scores
0
value 0.00276
scoring_system epss
scoring_elements 0.5095
published_at 2026-04-01T12:55:00Z
1
value 0.00276
scoring_system epss
scoring_elements 0.51003
published_at 2026-04-02T12:55:00Z
2
value 0.00276
scoring_system epss
scoring_elements 0.51028
published_at 2026-04-04T12:55:00Z
3
value 0.00276
scoring_system epss
scoring_elements 0.50985
published_at 2026-04-07T12:55:00Z
4
value 0.00276
scoring_system epss
scoring_elements 0.51042
published_at 2026-04-08T12:55:00Z
5
value 0.00276
scoring_system epss
scoring_elements 0.51039
published_at 2026-04-09T12:55:00Z
6
value 0.00276
scoring_system epss
scoring_elements 0.51082
published_at 2026-04-11T12:55:00Z
7
value 0.00276
scoring_system epss
scoring_elements 0.5106
published_at 2026-04-12T12:55:00Z
8
value 0.00276
scoring_system epss
scoring_elements 0.51043
published_at 2026-04-13T12:55:00Z
9
value 0.00276
scoring_system epss
scoring_elements 0.51081
published_at 2026-04-16T12:55:00Z
10
value 0.00276
scoring_system epss
scoring_elements 0.51087
published_at 2026-04-18T12:55:00Z
11
value 0.00276
scoring_system epss
scoring_elements 0.51064
published_at 2026-04-21T12:55:00Z
12
value 0.00276
scoring_system epss
scoring_elements 0.51013
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-1452
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014478
reference_id 1014478
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014478
fixed_packages
0
url pkg:apk/alpine/radare2@5.7.0-r0?arch=armhf&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/radare2@5.7.0-r0?arch=armhf&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/radare2@5.7.0-r0%3Farch=armhf&distroversion=v3.22&reponame=community
aliases CVE-2022-1452
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z1c6-6naw-byeg
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/radare2@5.7.0-r0%3Farch=armhf&distroversion=v3.22&reponame=community