Lookup for vulnerable packages by Package URL.
| Purl | pkg:deb/debian/radare2@2.1.0%2Bdfsg-1?distro=sid |
| Type | deb |
| Namespace | debian |
| Name | radare2 |
| Version | 2.1.0+dfsg-1 |
| Qualifiers |
|
| Subpath | |
| Is_vulnerable | false |
| Next_non_vulnerable_version | 2.6.0+dfsg-1 |
| Latest_non_vulnerable_version | 6.0.7+ds-1 |
| Affected_by_vulnerabilities |
|
| Fixing_vulnerabilities |
| 0 |
| url |
VCID-41wv-efp7-23cn |
| vulnerability_id |
VCID-41wv-efp7-23cn |
| summary |
In radare 2.0.1, a memory corruption vulnerability exists in store_versioninfo_gnu_verdef() and store_versioninfo_gnu_verneed() in libr/bin/format/elf/elf.c, as demonstrated by an invalid free. This error is due to improper sh_size validation when allocating memory. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-16357 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00215 |
| scoring_system |
epss |
| scoring_elements |
0.43904 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00215 |
| scoring_system |
epss |
| scoring_elements |
0.43953 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00215 |
| scoring_system |
epss |
| scoring_elements |
0.43943 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.00215 |
| scoring_system |
epss |
| scoring_elements |
0.43991 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00215 |
| scoring_system |
epss |
| scoring_elements |
0.44014 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00215 |
| scoring_system |
epss |
| scoring_elements |
0.43944 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00215 |
| scoring_system |
epss |
| scoring_elements |
0.43995 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00215 |
| scoring_system |
epss |
| scoring_elements |
0.43998 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00215 |
| scoring_system |
epss |
| scoring_elements |
0.44013 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00215 |
| scoring_system |
epss |
| scoring_elements |
0.4398 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00215 |
| scoring_system |
epss |
| scoring_elements |
0.43965 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00215 |
| scoring_system |
epss |
| scoring_elements |
0.44026 |
| published_at |
2026-04-16T12:55:00Z |
|
| 12 |
| value |
0.00215 |
| scoring_system |
epss |
| scoring_elements |
0.44017 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-16357 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-16357
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-41wv-efp7-23cn |
|
| 1 |
| url |
VCID-7p7w-jwbj-guea |
| vulnerability_id |
VCID-7p7w-jwbj-guea |
| summary |
In radare 2.0.1, a pointer wraparound vulnerability exists in store_versioninfo_gnu_verdef() in libr/bin/format/elf/elf.c. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-16359 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00193 |
| scoring_system |
epss |
| scoring_elements |
0.41059 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00193 |
| scoring_system |
epss |
| scoring_elements |
0.41171 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00193 |
| scoring_system |
epss |
| scoring_elements |
0.41149 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.00193 |
| scoring_system |
epss |
| scoring_elements |
0.41241 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00193 |
| scoring_system |
epss |
| scoring_elements |
0.4127 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00193 |
| scoring_system |
epss |
| scoring_elements |
0.41196 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00193 |
| scoring_system |
epss |
| scoring_elements |
0.41244 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00193 |
| scoring_system |
epss |
| scoring_elements |
0.41252 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00193 |
| scoring_system |
epss |
| scoring_elements |
0.41274 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00193 |
| scoring_system |
epss |
| scoring_elements |
0.41242 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00193 |
| scoring_system |
epss |
| scoring_elements |
0.41228 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00193 |
| scoring_system |
epss |
| scoring_elements |
0.41272 |
| published_at |
2026-04-16T12:55:00Z |
|
| 12 |
| value |
0.00193 |
| scoring_system |
epss |
| scoring_elements |
0.41243 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-16359 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-16359
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7p7w-jwbj-guea |
|
| 2 |
| url |
VCID-8bzm-ye49-w7fc |
| vulnerability_id |
VCID-8bzm-ye49-w7fc |
| summary |
The store_versioninfo_gnu_verdef function in libr/bin/format/elf/elf.c in radare2 2.0.0 allows remote attackers to cause a denial of service (r_read_le16 invalid write and application crash) or possibly have unspecified other impact via a crafted ELF file. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-15385 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00283 |
| scoring_system |
epss |
| scoring_elements |
0.51726 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00283 |
| scoring_system |
epss |
| scoring_elements |
0.51746 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00283 |
| scoring_system |
epss |
| scoring_elements |
0.51601 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.00283 |
| scoring_system |
epss |
| scoring_elements |
0.51652 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00283 |
| scoring_system |
epss |
| scoring_elements |
0.51677 |
| published_at |
2026-04-24T12:55:00Z |
|
| 5 |
| value |
0.00283 |
| scoring_system |
epss |
| scoring_elements |
0.51637 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00283 |
| scoring_system |
epss |
| scoring_elements |
0.51692 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00283 |
| scoring_system |
epss |
| scoring_elements |
0.51688 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00283 |
| scoring_system |
epss |
| scoring_elements |
0.51737 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00283 |
| scoring_system |
epss |
| scoring_elements |
0.51715 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00283 |
| scoring_system |
epss |
| scoring_elements |
0.51698 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00283 |
| scoring_system |
epss |
| scoring_elements |
0.51739 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-15385 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-15385
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8bzm-ye49-w7fc |
|
| 3 |
| url |
VCID-hvrq-x6mt-nuad |
| vulnerability_id |
VCID-hvrq-x6mt-nuad |
| summary |
In radare2 2.0.1, libr/bin/dwarf.c allows remote attackers to cause a denial of service (invalid read and application crash) via a crafted ELF file, related to r_bin_dwarf_parse_comp_unit in dwarf.c and sdb_set_internal in shlr/sdb/src/sdb.c. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-16805 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00202 |
| scoring_system |
epss |
| scoring_elements |
0.42185 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00202 |
| scoring_system |
epss |
| scoring_elements |
0.42253 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00202 |
| scoring_system |
epss |
| scoring_elements |
0.42241 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.00202 |
| scoring_system |
epss |
| scoring_elements |
0.42316 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00202 |
| scoring_system |
epss |
| scoring_elements |
0.42345 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00202 |
| scoring_system |
epss |
| scoring_elements |
0.42286 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00202 |
| scoring_system |
epss |
| scoring_elements |
0.42334 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00202 |
| scoring_system |
epss |
| scoring_elements |
0.42342 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00202 |
| scoring_system |
epss |
| scoring_elements |
0.42365 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00202 |
| scoring_system |
epss |
| scoring_elements |
0.42328 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00202 |
| scoring_system |
epss |
| scoring_elements |
0.423 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00202 |
| scoring_system |
epss |
| scoring_elements |
0.4235 |
| published_at |
2026-04-16T12:55:00Z |
|
| 12 |
| value |
0.00202 |
| scoring_system |
epss |
| scoring_elements |
0.42326 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-16805 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-16805
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hvrq-x6mt-nuad |
|
| 4 |
| url |
VCID-pqrq-1jus-tkep |
| vulnerability_id |
VCID-pqrq-1jus-tkep |
| summary |
In radare 2.0.1, an out-of-bounds read vulnerability exists in string_scan_range() in libr/bin/bin.c when doing a string search. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-16358 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00184 |
| scoring_system |
epss |
| scoring_elements |
0.39924 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00184 |
| scoring_system |
epss |
| scoring_elements |
0.40099 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00184 |
| scoring_system |
epss |
| scoring_elements |
0.4004 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.00184 |
| scoring_system |
epss |
| scoring_elements |
0.40189 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00184 |
| scoring_system |
epss |
| scoring_elements |
0.40214 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00184 |
| scoring_system |
epss |
| scoring_elements |
0.40137 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00184 |
| scoring_system |
epss |
| scoring_elements |
0.4019 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00184 |
| scoring_system |
epss |
| scoring_elements |
0.40201 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00184 |
| scoring_system |
epss |
| scoring_elements |
0.40213 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00184 |
| scoring_system |
epss |
| scoring_elements |
0.40176 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00184 |
| scoring_system |
epss |
| scoring_elements |
0.40157 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00184 |
| scoring_system |
epss |
| scoring_elements |
0.40207 |
| published_at |
2026-04-16T12:55:00Z |
|
| 12 |
| value |
0.00184 |
| scoring_system |
epss |
| scoring_elements |
0.40177 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-16358 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-16358
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-pqrq-1jus-tkep |
|
| 5 |
| url |
VCID-qtjk-bakx-nyar |
| vulnerability_id |
VCID-qtjk-bakx-nyar |
| summary |
The wasm_dis function in libr/asm/arch/wasm/wasm.c in radare2 2.0.0 allows remote attackers to cause a denial of service (stack-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted WASM file that triggers an incorrect r_hex_bin2str call. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-15368 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00237 |
| scoring_system |
epss |
| scoring_elements |
0.46744 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00237 |
| scoring_system |
epss |
| scoring_elements |
0.46815 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00237 |
| scoring_system |
epss |
| scoring_elements |
0.46699 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.00237 |
| scoring_system |
epss |
| scoring_elements |
0.46738 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00237 |
| scoring_system |
epss |
| scoring_elements |
0.46758 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00237 |
| scoring_system |
epss |
| scoring_elements |
0.46706 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00237 |
| scoring_system |
epss |
| scoring_elements |
0.46761 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00237 |
| scoring_system |
epss |
| scoring_elements |
0.4676 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00237 |
| scoring_system |
epss |
| scoring_elements |
0.46783 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00237 |
| scoring_system |
epss |
| scoring_elements |
0.46755 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00237 |
| scoring_system |
epss |
| scoring_elements |
0.46762 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00237 |
| scoring_system |
epss |
| scoring_elements |
0.46818 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-15368 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-15368
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qtjk-bakx-nyar |
|
| 6 |
| url |
VCID-wqu2-yhcs-tqgh |
| vulnerability_id |
VCID-wqu2-yhcs-tqgh |
| summary |
In radare2 2.0.1, an integer exception (negative number leading to an invalid memory access) exists in store_versioninfo_gnu_verdef() in libr/bin/format/elf/elf.c via crafted ELF files when parsing the ELF version on 32bit systems. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-15932 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00206 |
| scoring_system |
epss |
| scoring_elements |
0.42764 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00206 |
| scoring_system |
epss |
| scoring_elements |
0.4284 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00206 |
| scoring_system |
epss |
| scoring_elements |
0.42784 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.00206 |
| scoring_system |
epss |
| scoring_elements |
0.42854 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00206 |
| scoring_system |
epss |
| scoring_elements |
0.42881 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00206 |
| scoring_system |
epss |
| scoring_elements |
0.42821 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00206 |
| scoring_system |
epss |
| scoring_elements |
0.42871 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00206 |
| scoring_system |
epss |
| scoring_elements |
0.42884 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00206 |
| scoring_system |
epss |
| scoring_elements |
0.42906 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00206 |
| scoring_system |
epss |
| scoring_elements |
0.42914 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00206 |
| scoring_system |
epss |
| scoring_elements |
0.42902 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-15932 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-15932
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wqu2-yhcs-tqgh |
|
| 7 |
| url |
VCID-x9x1-xeec-z7ej |
| vulnerability_id |
VCID-x9x1-xeec-z7ej |
| summary |
In radare2 2.0.1, an integer exception (negative number leading to an invalid memory access) exists in store_versioninfo_gnu_verneed() in libr/bin/format/elf/elf.c via crafted ELF files on 32bit systems. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-15931 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00206 |
| scoring_system |
epss |
| scoring_elements |
0.42764 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00206 |
| scoring_system |
epss |
| scoring_elements |
0.4284 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00206 |
| scoring_system |
epss |
| scoring_elements |
0.42784 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.00206 |
| scoring_system |
epss |
| scoring_elements |
0.42854 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00206 |
| scoring_system |
epss |
| scoring_elements |
0.42881 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00206 |
| scoring_system |
epss |
| scoring_elements |
0.42821 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00206 |
| scoring_system |
epss |
| scoring_elements |
0.42871 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00206 |
| scoring_system |
epss |
| scoring_elements |
0.42884 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00206 |
| scoring_system |
epss |
| scoring_elements |
0.42906 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00206 |
| scoring_system |
epss |
| scoring_elements |
0.42914 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00206 |
| scoring_system |
epss |
| scoring_elements |
0.42902 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-15931 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-15931
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-x9x1-xeec-z7ej |
|
|
| Risk_score | null |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:deb/debian/radare2@2.1.0%252Bdfsg-1%3Fdistro=sid |