Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/radare2@1.6.0%2Bdfsg-1?distro=sid
Typedeb
Namespacedebian
Nameradare2
Version1.6.0+dfsg-1
Qualifiers
distro sid
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2.1.0+dfsg-1
Latest_non_vulnerable_version6.0.7+ds-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-27ek-n7rv-1fdw
vulnerability_id VCID-27ek-n7rv-1fdw
summary The cmd_info function in libr/core/cmd_info.c in radare2 1.5.0 allows remote attackers to cause a denial of service (use-after-free and application crash) via a crafted binary file.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9762
reference_id
reference_type
scores
0
value 0.00203
scoring_system epss
scoring_elements 0.42314
published_at 2026-04-01T12:55:00Z
1
value 0.00203
scoring_system epss
scoring_elements 0.42387
published_at 2026-04-02T12:55:00Z
2
value 0.00203
scoring_system epss
scoring_elements 0.42417
published_at 2026-04-04T12:55:00Z
3
value 0.00203
scoring_system epss
scoring_elements 0.42357
published_at 2026-04-07T12:55:00Z
4
value 0.00203
scoring_system epss
scoring_elements 0.42405
published_at 2026-04-08T12:55:00Z
5
value 0.00203
scoring_system epss
scoring_elements 0.42413
published_at 2026-04-09T12:55:00Z
6
value 0.00203
scoring_system epss
scoring_elements 0.42436
published_at 2026-04-11T12:55:00Z
7
value 0.00203
scoring_system epss
scoring_elements 0.42399
published_at 2026-04-12T12:55:00Z
8
value 0.00203
scoring_system epss
scoring_elements 0.4237
published_at 2026-04-13T12:55:00Z
9
value 0.00203
scoring_system epss
scoring_elements 0.42419
published_at 2026-04-16T12:55:00Z
10
value 0.00203
scoring_system epss
scoring_elements 0.42394
published_at 2026-04-18T12:55:00Z
11
value 0.00203
scoring_system epss
scoring_elements 0.42322
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9762
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869426
reference_id 869426
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869426
fixed_packages
0
url pkg:deb/debian/radare2@1.6.0%2Bdfsg-1?distro=sid
purl pkg:deb/debian/radare2@1.6.0%2Bdfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/radare2@1.6.0%252Bdfsg-1%3Fdistro=sid
1
url pkg:deb/debian/radare2@6.0.7%2Bds-1?distro=sid
purl pkg:deb/debian/radare2@6.0.7%2Bds-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/radare2@6.0.7%252Bds-1%3Fdistro=sid
aliases CVE-2017-9762
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-27ek-n7rv-1fdw
1
url VCID-2u2h-ryzx-wker
vulnerability_id VCID-2u2h-ryzx-wker
summary The grub_memmove function in shlr/grub/kern/misc.c in radare2 1.5.0 allows remote attackers to cause a denial of service (stack-based buffer underflow and application crash) or possibly have unspecified other impact via a crafted binary file, possibly related to a buffer underflow in fs/ext2.c in GNU GRUB 2.02.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9949
reference_id
reference_type
scores
0
value 0.00338
scoring_system epss
scoring_elements 0.56526
published_at 2026-04-01T12:55:00Z
1
value 0.00338
scoring_system epss
scoring_elements 0.56623
published_at 2026-04-07T12:55:00Z
2
value 0.00338
scoring_system epss
scoring_elements 0.56644
published_at 2026-04-21T12:55:00Z
3
value 0.00338
scoring_system epss
scoring_elements 0.56674
published_at 2026-04-08T12:55:00Z
4
value 0.00338
scoring_system epss
scoring_elements 0.56679
published_at 2026-04-09T12:55:00Z
5
value 0.00338
scoring_system epss
scoring_elements 0.56688
published_at 2026-04-11T12:55:00Z
6
value 0.00338
scoring_system epss
scoring_elements 0.56663
published_at 2026-04-12T12:55:00Z
7
value 0.00338
scoring_system epss
scoring_elements 0.56642
published_at 2026-04-13T12:55:00Z
8
value 0.00338
scoring_system epss
scoring_elements 0.56673
published_at 2026-04-16T12:55:00Z
9
value 0.00338
scoring_system epss
scoring_elements 0.56672
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9949
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=866068
reference_id 866068
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=866068
fixed_packages
0
url pkg:deb/debian/radare2@1.6.0%2Bdfsg-1?distro=sid
purl pkg:deb/debian/radare2@1.6.0%2Bdfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/radare2@1.6.0%252Bdfsg-1%3Fdistro=sid
1
url pkg:deb/debian/radare2@6.0.7%2Bds-1?distro=sid
purl pkg:deb/debian/radare2@6.0.7%2Bds-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/radare2@6.0.7%252Bds-1%3Fdistro=sid
aliases CVE-2017-9949
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2u2h-ryzx-wker
2
url VCID-428v-jh9w-g3g6
vulnerability_id VCID-428v-jh9w-g3g6
summary grub2: Stack exhaustion in grub_ext2_read_block
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9763.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9763.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9763
reference_id
reference_type
scores
0
value 0.01357
scoring_system epss
scoring_elements 0.80082
published_at 2026-04-01T12:55:00Z
1
value 0.01357
scoring_system epss
scoring_elements 0.80162
published_at 2026-04-21T12:55:00Z
2
value 0.01357
scoring_system epss
scoring_elements 0.80158
published_at 2026-04-16T12:55:00Z
3
value 0.01357
scoring_system epss
scoring_elements 0.80159
published_at 2026-04-18T12:55:00Z
4
value 0.01357
scoring_system epss
scoring_elements 0.80089
published_at 2026-04-02T12:55:00Z
5
value 0.01357
scoring_system epss
scoring_elements 0.80109
published_at 2026-04-04T12:55:00Z
6
value 0.01357
scoring_system epss
scoring_elements 0.80097
published_at 2026-04-07T12:55:00Z
7
value 0.01357
scoring_system epss
scoring_elements 0.80127
published_at 2026-04-08T12:55:00Z
8
value 0.01357
scoring_system epss
scoring_elements 0.80133
published_at 2026-04-09T12:55:00Z
9
value 0.01357
scoring_system epss
scoring_elements 0.80152
published_at 2026-04-11T12:55:00Z
10
value 0.01357
scoring_system epss
scoring_elements 0.80136
published_at 2026-04-12T12:55:00Z
11
value 0.01357
scoring_system epss
scoring_elements 0.80128
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9763
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9763
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9763
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.8
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:S/C:N/I:N/A:C
1
value 4.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1463361
reference_id 1463361
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1463361
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869423
reference_id 869423
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869423
fixed_packages
0
url pkg:deb/debian/radare2@1.6.0%2Bdfsg-1?distro=sid
purl pkg:deb/debian/radare2@1.6.0%2Bdfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/radare2@1.6.0%252Bdfsg-1%3Fdistro=sid
1
url pkg:deb/debian/radare2@6.0.7%2Bds-1?distro=sid
purl pkg:deb/debian/radare2@6.0.7%2Bds-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/radare2@6.0.7%252Bds-1%3Fdistro=sid
aliases CVE-2017-9763
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-428v-jh9w-g3g6
3
url VCID-a4ec-hp76-rqcv
vulnerability_id VCID-a4ec-hp76-rqcv
summary The r_config_set function in libr/config/config.c in radare2 1.5.0 allows remote attackers to cause a denial of service (use-after-free and application crash) via a crafted DEX file.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9520
reference_id
reference_type
scores
0
value 0.00202
scoring_system epss
scoring_elements 0.42241
published_at 2026-04-01T12:55:00Z
1
value 0.00202
scoring_system epss
scoring_elements 0.42316
published_at 2026-04-02T12:55:00Z
2
value 0.00202
scoring_system epss
scoring_elements 0.42345
published_at 2026-04-04T12:55:00Z
3
value 0.00202
scoring_system epss
scoring_elements 0.42286
published_at 2026-04-07T12:55:00Z
4
value 0.00202
scoring_system epss
scoring_elements 0.42334
published_at 2026-04-08T12:55:00Z
5
value 0.00202
scoring_system epss
scoring_elements 0.42342
published_at 2026-04-09T12:55:00Z
6
value 0.00202
scoring_system epss
scoring_elements 0.42365
published_at 2026-04-11T12:55:00Z
7
value 0.00202
scoring_system epss
scoring_elements 0.42328
published_at 2026-04-12T12:55:00Z
8
value 0.00202
scoring_system epss
scoring_elements 0.423
published_at 2026-04-13T12:55:00Z
9
value 0.00202
scoring_system epss
scoring_elements 0.4235
published_at 2026-04-16T12:55:00Z
10
value 0.00202
scoring_system epss
scoring_elements 0.42326
published_at 2026-04-18T12:55:00Z
11
value 0.00202
scoring_system epss
scoring_elements 0.42253
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9520
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=864533
reference_id 864533
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=864533
fixed_packages
0
url pkg:deb/debian/radare2@1.6.0%2Bdfsg-1?distro=sid
purl pkg:deb/debian/radare2@1.6.0%2Bdfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/radare2@1.6.0%252Bdfsg-1%3Fdistro=sid
1
url pkg:deb/debian/radare2@6.0.7%2Bds-1?distro=sid
purl pkg:deb/debian/radare2@6.0.7%2Bds-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/radare2@6.0.7%252Bds-1%3Fdistro=sid
aliases CVE-2017-9520
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a4ec-hp76-rqcv
4
url VCID-pz9s-ebvf-77c5
vulnerability_id VCID-pz9s-ebvf-77c5
summary The grub_memmove function in shlr/grub/kern/misc.c in radare2 1.5.0 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, possibly related to a read overflow in the grub_disk_read_small_real function in kern/disk.c in GNU GRUB 2.02.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10929
reference_id
reference_type
scores
0
value 0.00369
scoring_system epss
scoring_elements 0.58687
published_at 2026-04-01T12:55:00Z
1
value 0.00369
scoring_system epss
scoring_elements 0.58761
published_at 2026-04-02T12:55:00Z
2
value 0.00369
scoring_system epss
scoring_elements 0.58783
published_at 2026-04-04T12:55:00Z
3
value 0.00369
scoring_system epss
scoring_elements 0.58751
published_at 2026-04-07T12:55:00Z
4
value 0.00369
scoring_system epss
scoring_elements 0.58803
published_at 2026-04-08T12:55:00Z
5
value 0.00369
scoring_system epss
scoring_elements 0.5881
published_at 2026-04-12T12:55:00Z
6
value 0.00369
scoring_system epss
scoring_elements 0.58828
published_at 2026-04-18T12:55:00Z
7
value 0.00369
scoring_system epss
scoring_elements 0.58791
published_at 2026-04-13T12:55:00Z
8
value 0.00369
scoring_system epss
scoring_elements 0.58823
published_at 2026-04-16T12:55:00Z
9
value 0.00369
scoring_system epss
scoring_elements 0.58805
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10929
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=867369
reference_id 867369
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=867369
fixed_packages
0
url pkg:deb/debian/radare2@1.6.0%2Bdfsg-1?distro=sid
purl pkg:deb/debian/radare2@1.6.0%2Bdfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/radare2@1.6.0%252Bdfsg-1%3Fdistro=sid
1
url pkg:deb/debian/radare2@6.0.7%2Bds-1?distro=sid
purl pkg:deb/debian/radare2@6.0.7%2Bds-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/radare2@6.0.7%252Bds-1%3Fdistro=sid
aliases CVE-2017-10929
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pz9s-ebvf-77c5
5
url VCID-wbqn-8k7x-bbc6
vulnerability_id VCID-wbqn-8k7x-bbc6
summary The find_eoq function in libr/core/cmd.c in radare2 1.5.0 allows remote attackers to cause a denial of service (heap-based out-of-bounds read and application crash) via a crafted binary file.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9761
reference_id
reference_type
scores
0
value 0.00227
scoring_system epss
scoring_elements 0.45404
published_at 2026-04-01T12:55:00Z
1
value 0.00227
scoring_system epss
scoring_elements 0.45478
published_at 2026-04-02T12:55:00Z
2
value 0.00227
scoring_system epss
scoring_elements 0.455
published_at 2026-04-09T12:55:00Z
3
value 0.00227
scoring_system epss
scoring_elements 0.45445
published_at 2026-04-07T12:55:00Z
4
value 0.00227
scoring_system epss
scoring_elements 0.45499
published_at 2026-04-08T12:55:00Z
5
value 0.00227
scoring_system epss
scoring_elements 0.4552
published_at 2026-04-11T12:55:00Z
6
value 0.00227
scoring_system epss
scoring_elements 0.4549
published_at 2026-04-12T12:55:00Z
7
value 0.00227
scoring_system epss
scoring_elements 0.45495
published_at 2026-04-13T12:55:00Z
8
value 0.00227
scoring_system epss
scoring_elements 0.45543
published_at 2026-04-16T12:55:00Z
9
value 0.00227
scoring_system epss
scoring_elements 0.45539
published_at 2026-04-18T12:55:00Z
10
value 0.00227
scoring_system epss
scoring_elements 0.45489
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9761
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869428
reference_id 869428
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869428
fixed_packages
0
url pkg:deb/debian/radare2@1.6.0%2Bdfsg-1?distro=sid
purl pkg:deb/debian/radare2@1.6.0%2Bdfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/radare2@1.6.0%252Bdfsg-1%3Fdistro=sid
1
url pkg:deb/debian/radare2@6.0.7%2Bds-1?distro=sid
purl pkg:deb/debian/radare2@6.0.7%2Bds-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/radare2@6.0.7%252Bds-1%3Fdistro=sid
aliases CVE-2017-9761
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wbqn-8k7x-bbc6
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/radare2@1.6.0%252Bdfsg-1%3Fdistro=sid