Lookup for vulnerable packages by Package URL.
| Purl | pkg:deb/debian/radare2@1.1.0%2Bdfsg-3?distro=sid |
| Type | deb |
| Namespace | debian |
| Name | radare2 |
| Version | 1.1.0+dfsg-3 |
| Qualifiers |
|
| Subpath | |
| Is_vulnerable | false |
| Next_non_vulnerable_version | 1.1.0+dfsg-4 |
| Latest_non_vulnerable_version | 6.0.7+ds-1 |
| Affected_by_vulnerabilities |
|
| Fixing_vulnerabilities |
| 0 |
| url |
VCID-12eh-yc81-afaa |
| vulnerability_id |
VCID-12eh-yc81-afaa |
| summary |
The dex_parse_debug_item function in libr/bin/p/bin_dex.c in radare2 1.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted DEX file. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-6415 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00231 |
| scoring_system |
epss |
| scoring_elements |
0.45833 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00231 |
| scoring_system |
epss |
| scoring_elements |
0.45879 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00231 |
| scoring_system |
epss |
| scoring_elements |
0.45901 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00231 |
| scoring_system |
epss |
| scoring_elements |
0.45851 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00231 |
| scoring_system |
epss |
| scoring_elements |
0.45907 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00231 |
| scoring_system |
epss |
| scoring_elements |
0.45904 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00231 |
| scoring_system |
epss |
| scoring_elements |
0.45927 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00231 |
| scoring_system |
epss |
| scoring_elements |
0.45897 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00231 |
| scoring_system |
epss |
| scoring_elements |
0.45956 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00231 |
| scoring_system |
epss |
| scoring_elements |
0.45951 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00231 |
| scoring_system |
epss |
| scoring_elements |
0.45896 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-6415 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-6415
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-12eh-yc81-afaa |
|
| 1 |
| url |
VCID-5hrv-qq76-mbcd |
| vulnerability_id |
VCID-5hrv-qq76-mbcd |
| summary |
The dex_loadcode function in libr/bin/p/bin_dex.c in radare2 1.2.1 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted DEX file. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-6387 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00234 |
| scoring_system |
epss |
| scoring_elements |
0.46217 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00234 |
| scoring_system |
epss |
| scoring_elements |
0.46259 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00234 |
| scoring_system |
epss |
| scoring_elements |
0.46278 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00234 |
| scoring_system |
epss |
| scoring_elements |
0.46225 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00234 |
| scoring_system |
epss |
| scoring_elements |
0.46281 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00234 |
| scoring_system |
epss |
| scoring_elements |
0.46282 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00234 |
| scoring_system |
epss |
| scoring_elements |
0.46305 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00234 |
| scoring_system |
epss |
| scoring_elements |
0.46277 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00234 |
| scoring_system |
epss |
| scoring_elements |
0.46286 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00234 |
| scoring_system |
epss |
| scoring_elements |
0.46343 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00234 |
| scoring_system |
epss |
| scoring_elements |
0.46339 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00234 |
| scoring_system |
epss |
| scoring_elements |
0.46284 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-6387 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-6387
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5hrv-qq76-mbcd |
|
| 2 |
| url |
VCID-v386-f2n9-8ya1 |
| vulnerability_id |
VCID-v386-f2n9-8ya1 |
| summary |
The dex_parse_debug_item function in libr/bin/p/bin_dex.c in radare2 1.2.1 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted DEX file. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-6319 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00292 |
| scoring_system |
epss |
| scoring_elements |
0.52456 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00292 |
| scoring_system |
epss |
| scoring_elements |
0.52502 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00292 |
| scoring_system |
epss |
| scoring_elements |
0.52528 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00292 |
| scoring_system |
epss |
| scoring_elements |
0.52495 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00292 |
| scoring_system |
epss |
| scoring_elements |
0.52548 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00292 |
| scoring_system |
epss |
| scoring_elements |
0.52542 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00292 |
| scoring_system |
epss |
| scoring_elements |
0.52593 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00292 |
| scoring_system |
epss |
| scoring_elements |
0.52577 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00292 |
| scoring_system |
epss |
| scoring_elements |
0.52562 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00292 |
| scoring_system |
epss |
| scoring_elements |
0.52602 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00292 |
| scoring_system |
epss |
| scoring_elements |
0.52609 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00292 |
| scoring_system |
epss |
| scoring_elements |
0.52594 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-6319 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-6319
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-v386-f2n9-8ya1 |
|
|
| Risk_score | null |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:deb/debian/radare2@1.1.0%252Bdfsg-3%3Fdistro=sid |