Lookup for vulnerable packages by Package URL.
| Purl | pkg:apk/alpine/radare2@5.6.8-r0?arch=s390x&distroversion=v3.18&reponame=community |
| Type | apk |
| Namespace | alpine |
| Name | radare2 |
| Version | 5.6.8-r0 |
| Qualifiers |
| arch |
s390x |
| distroversion |
v3.18 |
| reponame |
community |
|
| Subpath | |
| Is_vulnerable | false |
| Next_non_vulnerable_version | 5.7.0-r0 |
| Latest_non_vulnerable_version | 5.8.2-r0 |
| Affected_by_vulnerabilities |
|
| Fixing_vulnerabilities |
| 0 |
| url |
VCID-5rv8-9w1a-9yag |
| vulnerability_id |
VCID-5rv8-9w1a-9yag |
| summary |
heap-use-after-free in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is capable of inducing denial of service. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1284 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.51996 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52043 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52069 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52035 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52089 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52086 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52138 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52121 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52107 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52147 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.5215 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52132 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52079 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1284 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-1284
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5rv8-9w1a-9yag |
|
| 1 |
| url |
VCID-5xy5-6f5d-83c7 |
| vulnerability_id |
VCID-5xy5-6f5d-83c7 |
| summary |
Out-of-bounds Read in r_bin_ne_get_entrypoints function in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability may allow attackers to read sensitive information or cause a crash. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1297 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00297 |
| scoring_system |
epss |
| scoring_elements |
0.52944 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00297 |
| scoring_system |
epss |
| scoring_elements |
0.52969 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00297 |
| scoring_system |
epss |
| scoring_elements |
0.52994 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00297 |
| scoring_system |
epss |
| scoring_elements |
0.52961 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00297 |
| scoring_system |
epss |
| scoring_elements |
0.53012 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00297 |
| scoring_system |
epss |
| scoring_elements |
0.53006 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00297 |
| scoring_system |
epss |
| scoring_elements |
0.53055 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00297 |
| scoring_system |
epss |
| scoring_elements |
0.5304 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00297 |
| scoring_system |
epss |
| scoring_elements |
0.53023 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00297 |
| scoring_system |
epss |
| scoring_elements |
0.53061 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00297 |
| scoring_system |
epss |
| scoring_elements |
0.53068 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00297 |
| scoring_system |
epss |
| scoring_elements |
0.5305 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00297 |
| scoring_system |
epss |
| scoring_elements |
0.53016 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1297 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-1297
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5xy5-6f5d-83c7 |
|
| 2 |
| url |
VCID-6zbf-v2qf-kudb |
| vulnerability_id |
VCID-6zbf-v2qf-kudb |
| summary |
Out-of-bounds read in `r_bin_ne_get_relocs` function in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability may allow attackers to read sensitive information or cause a crash. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1296 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00283 |
| scoring_system |
epss |
| scoring_elements |
0.51594 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00283 |
| scoring_system |
epss |
| scoring_elements |
0.51645 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00283 |
| scoring_system |
epss |
| scoring_elements |
0.5167 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00283 |
| scoring_system |
epss |
| scoring_elements |
0.51631 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00283 |
| scoring_system |
epss |
| scoring_elements |
0.51685 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00283 |
| scoring_system |
epss |
| scoring_elements |
0.51681 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00283 |
| scoring_system |
epss |
| scoring_elements |
0.5173 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00283 |
| scoring_system |
epss |
| scoring_elements |
0.51708 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00283 |
| scoring_system |
epss |
| scoring_elements |
0.51692 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00283 |
| scoring_system |
epss |
| scoring_elements |
0.51733 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00283 |
| scoring_system |
epss |
| scoring_elements |
0.5174 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00283 |
| scoring_system |
epss |
| scoring_elements |
0.5172 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00283 |
| scoring_system |
epss |
| scoring_elements |
0.51672 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1296 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-1296
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6zbf-v2qf-kudb |
|
| 3 |
| url |
VCID-7hzf-vk9r-dfh1 |
| vulnerability_id |
VCID-7hzf-vk9r-dfh1 |
| summary |
heap-buffer-overflow in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is capable of inducing denial of service. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1244 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.51996 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52043 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52069 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52035 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52089 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52086 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52138 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52121 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52107 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52147 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.5215 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52132 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52079 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1244 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-1244
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7hzf-vk9r-dfh1 |
|
| 4 |
| url |
VCID-e4sm-emrh-qkc9 |
| vulnerability_id |
VCID-e4sm-emrh-qkc9 |
| summary |
Out-of-bounds read in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability allows attackers to read sensitive information from outside the allocated buffer boundary. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1207 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00106 |
| scoring_system |
epss |
| scoring_elements |
0.28699 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00106 |
| scoring_system |
epss |
| scoring_elements |
0.28781 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00106 |
| scoring_system |
epss |
| scoring_elements |
0.2883 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00106 |
| scoring_system |
epss |
| scoring_elements |
0.28635 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00106 |
| scoring_system |
epss |
| scoring_elements |
0.28701 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00106 |
| scoring_system |
epss |
| scoring_elements |
0.2874 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00106 |
| scoring_system |
epss |
| scoring_elements |
0.28744 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00106 |
| scoring_system |
epss |
| scoring_elements |
0.287 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00106 |
| scoring_system |
epss |
| scoring_elements |
0.28651 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00106 |
| scoring_system |
epss |
| scoring_elements |
0.28671 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00106 |
| scoring_system |
epss |
| scoring_elements |
0.28646 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00106 |
| scoring_system |
epss |
| scoring_elements |
0.28599 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00106 |
| scoring_system |
epss |
| scoring_elements |
0.28485 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1207 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-1207
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-e4sm-emrh-qkc9 |
|
| 5 |
| url |
VCID-h43t-cy2h-jfdv |
| vulnerability_id |
VCID-h43t-cy2h-jfdv |
| summary |
Heap Buffer Overflow in parseDragons in GitHub repository radareorg/radare2 prior to 5.6.8. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1061 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0027 |
| scoring_system |
epss |
| scoring_elements |
0.50418 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.0027 |
| scoring_system |
epss |
| scoring_elements |
0.50474 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.0027 |
| scoring_system |
epss |
| scoring_elements |
0.50502 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.0027 |
| scoring_system |
epss |
| scoring_elements |
0.50456 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.0027 |
| scoring_system |
epss |
| scoring_elements |
0.5051 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.0027 |
| scoring_system |
epss |
| scoring_elements |
0.50506 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.0027 |
| scoring_system |
epss |
| scoring_elements |
0.50548 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.0027 |
| scoring_system |
epss |
| scoring_elements |
0.50525 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.0027 |
| scoring_system |
epss |
| scoring_elements |
0.50553 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.0027 |
| scoring_system |
epss |
| scoring_elements |
0.50558 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.0027 |
| scoring_system |
epss |
| scoring_elements |
0.50535 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.0027 |
| scoring_system |
epss |
| scoring_elements |
0.50482 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1061 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-1061
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-h43t-cy2h-jfdv |
|
| 6 |
| url |
VCID-n5c5-p9qk-zkgz |
| vulnerability_id |
VCID-n5c5-p9qk-zkgz |
| summary |
NULL Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is capable of making the radare2 crash, thus affecting the availability of the system. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1382 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.48146 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.48183 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.48202 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.48154 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.48208 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.48201 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.48225 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.48199 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.48211 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.48262 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.48258 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.48213 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.48195 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1382 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-1382
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-n5c5-p9qk-zkgz |
|
| 7 |
| url |
VCID-nuzb-2zqv-wbgf |
| vulnerability_id |
VCID-nuzb-2zqv-wbgf |
| summary |
NULL Pointer Dereference in r_bin_ne_get_entrypoints function in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability allows attackers to cause a denial of service (application crash). |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1283 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.50624 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.50677 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.50703 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.50659 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.50714 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.5071 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.50752 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.50729 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.50754 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.5076 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.5074 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.50689 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1283 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-1283
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-nuzb-2zqv-wbgf |
|
| 8 |
| url |
VCID-pt1y-cpch-1qfn |
| vulnerability_id |
VCID-pt1y-cpch-1qfn |
| summary |
Out-of-bounds Write in libr/bin/format/ne/ne.c in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is heap overflow and may be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/122.html). |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1238 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00269 |
| scoring_system |
epss |
| scoring_elements |
0.50334 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00269 |
| scoring_system |
epss |
| scoring_elements |
0.5039 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00269 |
| scoring_system |
epss |
| scoring_elements |
0.5042 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00269 |
| scoring_system |
epss |
| scoring_elements |
0.50372 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00269 |
| scoring_system |
epss |
| scoring_elements |
0.50425 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00269 |
| scoring_system |
epss |
| scoring_elements |
0.50419 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00269 |
| scoring_system |
epss |
| scoring_elements |
0.5046 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00269 |
| scoring_system |
epss |
| scoring_elements |
0.50437 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00269 |
| scoring_system |
epss |
| scoring_elements |
0.50422 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00269 |
| scoring_system |
epss |
| scoring_elements |
0.50465 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00269 |
| scoring_system |
epss |
| scoring_elements |
0.50469 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00269 |
| scoring_system |
epss |
| scoring_elements |
0.50445 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00269 |
| scoring_system |
epss |
| scoring_elements |
0.50391 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1238 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-1238
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-pt1y-cpch-1qfn |
|
| 9 |
| url |
VCID-w5bc-f4gs-aqa6 |
| vulnerability_id |
VCID-w5bc-f4gs-aqa6 |
| summary |
Improper Validation of Array Index in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is heap overflow and may be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/122.html). |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1237 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00258 |
| scoring_system |
epss |
| scoring_elements |
0.49093 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00258 |
| scoring_system |
epss |
| scoring_elements |
0.49126 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00258 |
| scoring_system |
epss |
| scoring_elements |
0.49156 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00258 |
| scoring_system |
epss |
| scoring_elements |
0.49108 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00258 |
| scoring_system |
epss |
| scoring_elements |
0.49162 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00258 |
| scoring_system |
epss |
| scoring_elements |
0.49159 |
| published_at |
2026-04-24T12:55:00Z |
|
| 6 |
| value |
0.00258 |
| scoring_system |
epss |
| scoring_elements |
0.49176 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00258 |
| scoring_system |
epss |
| scoring_elements |
0.4915 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00258 |
| scoring_system |
epss |
| scoring_elements |
0.49202 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00258 |
| scoring_system |
epss |
| scoring_elements |
0.492 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00258 |
| scoring_system |
epss |
| scoring_elements |
0.49169 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1237 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-1237
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-w5bc-f4gs-aqa6 |
|
| 10 |
| url |
VCID-y9b9-yzvm-e3df |
| vulnerability_id |
VCID-y9b9-yzvm-e3df |
| summary |
Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.6.8. The bug causes the program reads data past the end of the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1383 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00242 |
| scoring_system |
epss |
| scoring_elements |
0.47401 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00242 |
| scoring_system |
epss |
| scoring_elements |
0.47435 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00242 |
| scoring_system |
epss |
| scoring_elements |
0.47456 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00242 |
| scoring_system |
epss |
| scoring_elements |
0.47406 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00242 |
| scoring_system |
epss |
| scoring_elements |
0.4746 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00242 |
| scoring_system |
epss |
| scoring_elements |
0.47457 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00242 |
| scoring_system |
epss |
| scoring_elements |
0.4748 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00242 |
| scoring_system |
epss |
| scoring_elements |
0.47455 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00242 |
| scoring_system |
epss |
| scoring_elements |
0.47462 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00242 |
| scoring_system |
epss |
| scoring_elements |
0.47521 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00242 |
| scoring_system |
epss |
| scoring_elements |
0.47513 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00242 |
| scoring_system |
epss |
| scoring_elements |
0.47466 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00242 |
| scoring_system |
epss |
| scoring_elements |
0.47452 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1383 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-1383
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-y9b9-yzvm-e3df |
|
|
| Risk_score | null |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:apk/alpine/radare2@5.6.8-r0%3Farch=s390x&distroversion=v3.18&reponame=community |