Lookup for vulnerable packages by Package URL.
| Purl | pkg:apk/alpine/radare2@5.7.0-r0?arch=armhf&distroversion=v3.22&reponame=community |
| Type | apk |
| Namespace | alpine |
| Name | radare2 |
| Version | 5.7.0-r0 |
| Qualifiers |
| arch |
armhf |
| distroversion |
v3.22 |
| reponame |
community |
|
| Subpath | |
| Is_vulnerable | false |
| Next_non_vulnerable_version | 5.7.2-r0 |
| Latest_non_vulnerable_version | 5.8.2-r0 |
| Affected_by_vulnerabilities |
|
| Fixing_vulnerabilities |
| 0 |
| url |
VCID-8xen-g6z6-hfcs |
| vulnerability_id |
VCID-8xen-g6z6-hfcs |
| summary |
Null pointer dereference in libr/bin/format/mach0/mach0.c in radareorg/radare2 in GitHub repository radareorg/radare2 prior to 5.7.0. It is likely to be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/476.html). |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1649 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.4807 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.48107 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.48128 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.48077 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.4813 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.48125 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.48149 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.48122 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.48133 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.48186 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.4818 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.48137 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.48116 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1649 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-1649
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8xen-g6z6-hfcs |
|
| 1 |
| url |
VCID-aupe-75b8-fbff |
| vulnerability_id |
VCID-aupe-75b8-fbff |
| summary |
heap-use-after-free in GitHub repository radareorg/radare2 prior to 5.7.0. This vulnerability is capable of inducing denial of service. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1444 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.51996 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52043 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52069 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52035 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52089 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52086 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52138 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52121 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52107 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52147 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.5215 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52132 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52079 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1444 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-1444
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-aupe-75b8-fbff |
|
| 2 |
| url |
VCID-hkwf-9xsj-xqct |
| vulnerability_id |
VCID-hkwf-9xsj-xqct |
| summary |
Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end of the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1437 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00251 |
| scoring_system |
epss |
| scoring_elements |
0.48361 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00251 |
| scoring_system |
epss |
| scoring_elements |
0.48397 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00251 |
| scoring_system |
epss |
| scoring_elements |
0.48418 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00251 |
| scoring_system |
epss |
| scoring_elements |
0.48371 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00251 |
| scoring_system |
epss |
| scoring_elements |
0.48426 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00251 |
| scoring_system |
epss |
| scoring_elements |
0.4842 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00251 |
| scoring_system |
epss |
| scoring_elements |
0.48444 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00251 |
| scoring_system |
epss |
| scoring_elements |
0.48419 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00251 |
| scoring_system |
epss |
| scoring_elements |
0.48431 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00251 |
| scoring_system |
epss |
| scoring_elements |
0.48481 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00251 |
| scoring_system |
epss |
| scoring_elements |
0.48476 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00251 |
| scoring_system |
epss |
| scoring_elements |
0.48417 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1437 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-1437
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hkwf-9xsj-xqct |
|
| 3 |
| url |
VCID-tdq4-q57q-ufht |
| vulnerability_id |
VCID-tdq4-q57q-ufht |
| summary |
Out-of-bounds Read in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end of the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1714 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00133 |
| scoring_system |
epss |
| scoring_elements |
0.32832 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00133 |
| scoring_system |
epss |
| scoring_elements |
0.32684 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00146 |
| scoring_system |
epss |
| scoring_elements |
0.35083 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00146 |
| scoring_system |
epss |
| scoring_elements |
0.34963 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00146 |
| scoring_system |
epss |
| scoring_elements |
0.35008 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00146 |
| scoring_system |
epss |
| scoring_elements |
0.35037 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00146 |
| scoring_system |
epss |
| scoring_elements |
0.34858 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.00146 |
| scoring_system |
epss |
| scoring_elements |
0.35005 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00146 |
| scoring_system |
epss |
| scoring_elements |
0.34981 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00146 |
| scoring_system |
epss |
| scoring_elements |
0.35021 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00146 |
| scoring_system |
epss |
| scoring_elements |
0.35006 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00146 |
| scoring_system |
epss |
| scoring_elements |
0.35041 |
| published_at |
2026-04-11T12:55:00Z |
|
| 12 |
| value |
0.00146 |
| scoring_system |
epss |
| scoring_elements |
0.35056 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1714 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-1714
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-tdq4-q57q-ufht |
|
| 4 |
| url |
VCID-tqf6-xzpu-37d9 |
| vulnerability_id |
VCID-tqf6-xzpu-37d9 |
| summary |
Out-of-bounds Read in r_bin_java_constant_value_attr_new function in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end 2f the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash. More details see [CWE-125: Out-of-bounds read](https://cwe.mitre.org/data/definitions/125.html). |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1451 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.5095 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.51003 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.51028 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.50985 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.51042 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.51039 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.51082 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.5106 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.51043 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.51081 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.51087 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.51064 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.51013 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1451 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-1451
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-tqf6-xzpu-37d9 |
|
| 5 |
| url |
VCID-x1ew-h8tp-67c2 |
| vulnerability_id |
VCID-x1ew-h8tp-67c2 |
| summary |
Out-of-bounds Read in GitHub repository radareorg/radare2 prior to 5.7.0. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1899 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00454 |
| scoring_system |
epss |
| scoring_elements |
0.6371 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00454 |
| scoring_system |
epss |
| scoring_elements |
0.63771 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00454 |
| scoring_system |
epss |
| scoring_elements |
0.63798 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00454 |
| scoring_system |
epss |
| scoring_elements |
0.63754 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00454 |
| scoring_system |
epss |
| scoring_elements |
0.63806 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00454 |
| scoring_system |
epss |
| scoring_elements |
0.63823 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00454 |
| scoring_system |
epss |
| scoring_elements |
0.63836 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00454 |
| scoring_system |
epss |
| scoring_elements |
0.63822 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00454 |
| scoring_system |
epss |
| scoring_elements |
0.63789 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00454 |
| scoring_system |
epss |
| scoring_elements |
0.63824 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00454 |
| scoring_system |
epss |
| scoring_elements |
0.63833 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00454 |
| scoring_system |
epss |
| scoring_elements |
0.63821 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00454 |
| scoring_system |
epss |
| scoring_elements |
0.63837 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1899 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-1899
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-x1ew-h8tp-67c2 |
|
| 6 |
| url |
VCID-yycm-mx2c-tkae |
| vulnerability_id |
VCID-yycm-mx2c-tkae |
| summary |
Access of Uninitialized Pointer in GitHub repository radareorg/radare2 prior to 5.7.0. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1809 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.50647 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.507 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.50726 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.50682 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.50737 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.50734 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.50776 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.50752 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.50777 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.50783 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.50763 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.50712 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1809 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-1809
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-yycm-mx2c-tkae |
|
| 7 |
| url |
VCID-z1c6-6naw-byeg |
| vulnerability_id |
VCID-z1c6-6naw-byeg |
| summary |
Out-of-bounds Read in r_bin_java_bootstrap_methods_attr_new function in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end 2f the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash. More details see [CWE-125: Out-of-bounds read](https://cwe.mitre.org/data/definitions/125.html). |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1452 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.5095 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.51003 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.51028 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.50985 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.51042 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.51039 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.51082 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.5106 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.51043 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.51081 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.51087 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.51064 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.51013 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1452 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-1452
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-z1c6-6naw-byeg |
|
|
| Risk_score | null |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:apk/alpine/radare2@5.7.0-r0%3Farch=armhf&distroversion=v3.22&reponame=community |