Lookup for vulnerable packages by Package URL.
| Purl | pkg:deb/debian/radare2@1.6.0%2Bdfsg-1?distro=sid |
| Type | deb |
| Namespace | debian |
| Name | radare2 |
| Version | 1.6.0+dfsg-1 |
| Qualifiers |
|
| Subpath | |
| Is_vulnerable | false |
| Next_non_vulnerable_version | 2.1.0+dfsg-1 |
| Latest_non_vulnerable_version | 6.0.7+ds-1 |
| Affected_by_vulnerabilities |
|
| Fixing_vulnerabilities |
| 0 |
| url |
VCID-27ek-n7rv-1fdw |
| vulnerability_id |
VCID-27ek-n7rv-1fdw |
| summary |
The cmd_info function in libr/core/cmd_info.c in radare2 1.5.0 allows remote attackers to cause a denial of service (use-after-free and application crash) via a crafted binary file. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-9762 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00203 |
| scoring_system |
epss |
| scoring_elements |
0.42314 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00203 |
| scoring_system |
epss |
| scoring_elements |
0.42387 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00203 |
| scoring_system |
epss |
| scoring_elements |
0.42417 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00203 |
| scoring_system |
epss |
| scoring_elements |
0.42357 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00203 |
| scoring_system |
epss |
| scoring_elements |
0.42405 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00203 |
| scoring_system |
epss |
| scoring_elements |
0.42413 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00203 |
| scoring_system |
epss |
| scoring_elements |
0.42436 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00203 |
| scoring_system |
epss |
| scoring_elements |
0.42399 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00203 |
| scoring_system |
epss |
| scoring_elements |
0.4237 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00203 |
| scoring_system |
epss |
| scoring_elements |
0.42419 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00203 |
| scoring_system |
epss |
| scoring_elements |
0.42394 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00203 |
| scoring_system |
epss |
| scoring_elements |
0.42322 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-9762 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-9762
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-27ek-n7rv-1fdw |
|
| 1 |
| url |
VCID-2u2h-ryzx-wker |
| vulnerability_id |
VCID-2u2h-ryzx-wker |
| summary |
The grub_memmove function in shlr/grub/kern/misc.c in radare2 1.5.0 allows remote attackers to cause a denial of service (stack-based buffer underflow and application crash) or possibly have unspecified other impact via a crafted binary file, possibly related to a buffer underflow in fs/ext2.c in GNU GRUB 2.02. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-9949 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00338 |
| scoring_system |
epss |
| scoring_elements |
0.56526 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00338 |
| scoring_system |
epss |
| scoring_elements |
0.56623 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00338 |
| scoring_system |
epss |
| scoring_elements |
0.56644 |
| published_at |
2026-04-21T12:55:00Z |
|
| 3 |
| value |
0.00338 |
| scoring_system |
epss |
| scoring_elements |
0.56674 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00338 |
| scoring_system |
epss |
| scoring_elements |
0.56679 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00338 |
| scoring_system |
epss |
| scoring_elements |
0.56688 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00338 |
| scoring_system |
epss |
| scoring_elements |
0.56663 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00338 |
| scoring_system |
epss |
| scoring_elements |
0.56642 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00338 |
| scoring_system |
epss |
| scoring_elements |
0.56673 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00338 |
| scoring_system |
epss |
| scoring_elements |
0.56672 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-9949 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-9949
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2u2h-ryzx-wker |
|
| 2 |
| url |
VCID-428v-jh9w-g3g6 |
| vulnerability_id |
VCID-428v-jh9w-g3g6 |
| summary |
grub2: Stack exhaustion in grub_ext2_read_block |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-9763 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01357 |
| scoring_system |
epss |
| scoring_elements |
0.80082 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01357 |
| scoring_system |
epss |
| scoring_elements |
0.80162 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.01357 |
| scoring_system |
epss |
| scoring_elements |
0.80158 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.01357 |
| scoring_system |
epss |
| scoring_elements |
0.80159 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.01357 |
| scoring_system |
epss |
| scoring_elements |
0.80089 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.01357 |
| scoring_system |
epss |
| scoring_elements |
0.80109 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.01357 |
| scoring_system |
epss |
| scoring_elements |
0.80097 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.01357 |
| scoring_system |
epss |
| scoring_elements |
0.80127 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.01357 |
| scoring_system |
epss |
| scoring_elements |
0.80133 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.01357 |
| scoring_system |
epss |
| scoring_elements |
0.80152 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.01357 |
| scoring_system |
epss |
| scoring_elements |
0.80136 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.01357 |
| scoring_system |
epss |
| scoring_elements |
0.80128 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-9763 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-9763
|
| risk_score |
1.5 |
| exploitability |
0.5 |
| weighted_severity |
3.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-428v-jh9w-g3g6 |
|
| 3 |
| url |
VCID-a4ec-hp76-rqcv |
| vulnerability_id |
VCID-a4ec-hp76-rqcv |
| summary |
The r_config_set function in libr/config/config.c in radare2 1.5.0 allows remote attackers to cause a denial of service (use-after-free and application crash) via a crafted DEX file. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-9520 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00202 |
| scoring_system |
epss |
| scoring_elements |
0.42241 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00202 |
| scoring_system |
epss |
| scoring_elements |
0.42316 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00202 |
| scoring_system |
epss |
| scoring_elements |
0.42345 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00202 |
| scoring_system |
epss |
| scoring_elements |
0.42286 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00202 |
| scoring_system |
epss |
| scoring_elements |
0.42334 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00202 |
| scoring_system |
epss |
| scoring_elements |
0.42342 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00202 |
| scoring_system |
epss |
| scoring_elements |
0.42365 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00202 |
| scoring_system |
epss |
| scoring_elements |
0.42328 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00202 |
| scoring_system |
epss |
| scoring_elements |
0.423 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00202 |
| scoring_system |
epss |
| scoring_elements |
0.4235 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00202 |
| scoring_system |
epss |
| scoring_elements |
0.42326 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00202 |
| scoring_system |
epss |
| scoring_elements |
0.42253 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-9520 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-9520
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-a4ec-hp76-rqcv |
|
| 4 |
| url |
VCID-pz9s-ebvf-77c5 |
| vulnerability_id |
VCID-pz9s-ebvf-77c5 |
| summary |
The grub_memmove function in shlr/grub/kern/misc.c in radare2 1.5.0 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, possibly related to a read overflow in the grub_disk_read_small_real function in kern/disk.c in GNU GRUB 2.02. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-10929 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00369 |
| scoring_system |
epss |
| scoring_elements |
0.58687 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00369 |
| scoring_system |
epss |
| scoring_elements |
0.58761 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00369 |
| scoring_system |
epss |
| scoring_elements |
0.58783 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00369 |
| scoring_system |
epss |
| scoring_elements |
0.58751 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00369 |
| scoring_system |
epss |
| scoring_elements |
0.58803 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00369 |
| scoring_system |
epss |
| scoring_elements |
0.5881 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00369 |
| scoring_system |
epss |
| scoring_elements |
0.58828 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00369 |
| scoring_system |
epss |
| scoring_elements |
0.58791 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00369 |
| scoring_system |
epss |
| scoring_elements |
0.58823 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00369 |
| scoring_system |
epss |
| scoring_elements |
0.58805 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-10929 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-10929
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-pz9s-ebvf-77c5 |
|
| 5 |
| url |
VCID-wbqn-8k7x-bbc6 |
| vulnerability_id |
VCID-wbqn-8k7x-bbc6 |
| summary |
The find_eoq function in libr/core/cmd.c in radare2 1.5.0 allows remote attackers to cause a denial of service (heap-based out-of-bounds read and application crash) via a crafted binary file. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-9761 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00227 |
| scoring_system |
epss |
| scoring_elements |
0.45404 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00227 |
| scoring_system |
epss |
| scoring_elements |
0.45478 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00227 |
| scoring_system |
epss |
| scoring_elements |
0.455 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00227 |
| scoring_system |
epss |
| scoring_elements |
0.45445 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00227 |
| scoring_system |
epss |
| scoring_elements |
0.45499 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00227 |
| scoring_system |
epss |
| scoring_elements |
0.4552 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00227 |
| scoring_system |
epss |
| scoring_elements |
0.4549 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00227 |
| scoring_system |
epss |
| scoring_elements |
0.45495 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00227 |
| scoring_system |
epss |
| scoring_elements |
0.45543 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00227 |
| scoring_system |
epss |
| scoring_elements |
0.45539 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00227 |
| scoring_system |
epss |
| scoring_elements |
0.45489 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-9761 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-9761
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wbqn-8k7x-bbc6 |
|
|
| Risk_score | null |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:deb/debian/radare2@1.6.0%252Bdfsg-1%3Fdistro=sid |