Lookup for vulnerable packages by Package URL.
| Purl | pkg:deb/debian/radare2@0?distro=sid |
| Type | deb |
| Namespace | debian |
| Name | radare2 |
| Version | 0 |
| Qualifiers |
|
| Subpath | |
| Is_vulnerable | false |
| Next_non_vulnerable_version | 0.10.5+dfsg-1 |
| Latest_non_vulnerable_version | 6.0.7+ds-1 |
| Affected_by_vulnerabilities |
|
| Fixing_vulnerabilities |
| 0 |
| url |
VCID-3r1r-24qj-zyef |
| vulnerability_id |
VCID-3r1r-24qj-zyef |
| summary |
In radare2 before 3.9.0, a command injection vulnerability exists in bin_symbols() in libr/core/cbin.c. By using a crafted executable file, it's possible to execute arbitrary shell commands with the permissions of the victim. This vulnerability is due to an insufficient fix for CVE-2019-14745 and improper handling of symbol names embedded in executables. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-16718 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0134 |
| scoring_system |
epss |
| scoring_elements |
0.80067 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.0134 |
| scoring_system |
epss |
| scoring_elements |
0.80039 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.0134 |
| scoring_system |
epss |
| scoring_elements |
0.79959 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.0134 |
| scoring_system |
epss |
| scoring_elements |
0.79967 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.0134 |
| scoring_system |
epss |
| scoring_elements |
0.79988 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.0134 |
| scoring_system |
epss |
| scoring_elements |
0.79977 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.0134 |
| scoring_system |
epss |
| scoring_elements |
0.80005 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.0134 |
| scoring_system |
epss |
| scoring_elements |
0.80014 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.0134 |
| scoring_system |
epss |
| scoring_elements |
0.80034 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.0134 |
| scoring_system |
epss |
| scoring_elements |
0.80018 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.0134 |
| scoring_system |
epss |
| scoring_elements |
0.8001 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.0134 |
| scoring_system |
epss |
| scoring_elements |
0.80038 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-16718 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-16718
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3r1r-24qj-zyef |
|
| 1 |
| url |
VCID-54v3-r36b-pqbt |
| vulnerability_id |
VCID-54v3-r36b-pqbt |
| summary |
The _inst__sts() function in radare2 2.5.0 allows remote attackers to cause a denial of service (heap-based out-of-bounds read and application crash) via a crafted binary file. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-11382 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00232 |
| scoring_system |
epss |
| scoring_elements |
0.46025 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00232 |
| scoring_system |
epss |
| scoring_elements |
0.46114 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00232 |
| scoring_system |
epss |
| scoring_elements |
0.4606 |
| published_at |
2026-04-21T12:55:00Z |
|
| 3 |
| value |
0.00232 |
| scoring_system |
epss |
| scoring_elements |
0.45986 |
| published_at |
2026-04-01T12:55:00Z |
|
| 4 |
| value |
0.00232 |
| scoring_system |
epss |
| scoring_elements |
0.46037 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00232 |
| scoring_system |
epss |
| scoring_elements |
0.46059 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00232 |
| scoring_system |
epss |
| scoring_elements |
0.46006 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00232 |
| scoring_system |
epss |
| scoring_elements |
0.46062 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00232 |
| scoring_system |
epss |
| scoring_elements |
0.46084 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00232 |
| scoring_system |
epss |
| scoring_elements |
0.46055 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00232 |
| scoring_system |
epss |
| scoring_elements |
0.46063 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00232 |
| scoring_system |
epss |
| scoring_elements |
0.46118 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-11382 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-11382
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-54v3-r36b-pqbt |
|
| 2 |
| url |
VCID-56w7-1t75-ckc9 |
| vulnerability_id |
VCID-56w7-1t75-ckc9 |
| summary |
The consume_init_expr function in wasm.c in radare2 1.3.0 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted Web Assembly file. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-7854 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00256 |
| scoring_system |
epss |
| scoring_elements |
0.48959 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00256 |
| scoring_system |
epss |
| scoring_elements |
0.48971 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00256 |
| scoring_system |
epss |
| scoring_elements |
0.48901 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.00256 |
| scoring_system |
epss |
| scoring_elements |
0.48938 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00256 |
| scoring_system |
epss |
| scoring_elements |
0.48964 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00256 |
| scoring_system |
epss |
| scoring_elements |
0.48918 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00256 |
| scoring_system |
epss |
| scoring_elements |
0.48972 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00256 |
| scoring_system |
epss |
| scoring_elements |
0.48969 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00256 |
| scoring_system |
epss |
| scoring_elements |
0.48986 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00256 |
| scoring_system |
epss |
| scoring_elements |
0.4896 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00256 |
| scoring_system |
epss |
| scoring_elements |
0.48967 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00256 |
| scoring_system |
epss |
| scoring_elements |
0.49013 |
| published_at |
2026-04-16T12:55:00Z |
|
| 12 |
| value |
0.00256 |
| scoring_system |
epss |
| scoring_elements |
0.4901 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-7854 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-7854
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-56w7-1t75-ckc9 |
|
| 3 |
| url |
VCID-a4us-jxhs-nfgh |
| vulnerability_id |
VCID-a4us-jxhs-nfgh |
| summary |
The _inst__lds() function in radare2 2.5.0 allows remote attackers to cause a denial of service (heap-based out-of-bounds read and application crash) via a crafted binary file. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-11375 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00232 |
| scoring_system |
epss |
| scoring_elements |
0.46025 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00232 |
| scoring_system |
epss |
| scoring_elements |
0.46114 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00232 |
| scoring_system |
epss |
| scoring_elements |
0.4606 |
| published_at |
2026-04-21T12:55:00Z |
|
| 3 |
| value |
0.00232 |
| scoring_system |
epss |
| scoring_elements |
0.45986 |
| published_at |
2026-04-01T12:55:00Z |
|
| 4 |
| value |
0.00232 |
| scoring_system |
epss |
| scoring_elements |
0.46037 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00232 |
| scoring_system |
epss |
| scoring_elements |
0.46059 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00232 |
| scoring_system |
epss |
| scoring_elements |
0.46006 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00232 |
| scoring_system |
epss |
| scoring_elements |
0.46062 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00232 |
| scoring_system |
epss |
| scoring_elements |
0.46084 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00232 |
| scoring_system |
epss |
| scoring_elements |
0.46055 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00232 |
| scoring_system |
epss |
| scoring_elements |
0.46063 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00232 |
| scoring_system |
epss |
| scoring_elements |
0.46118 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-11375 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-11375
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-a4us-jxhs-nfgh |
|
| 4 |
| url |
VCID-j79s-4ev5-jucd |
| vulnerability_id |
VCID-j79s-4ev5-jucd |
| summary |
The read_u32_leb128 function in libr/util/uleb128.c in radare2 1.3.0 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted Web Assembly file. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-7716 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00186 |
| scoring_system |
epss |
| scoring_elements |
0.4022 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00186 |
| scoring_system |
epss |
| scoring_elements |
0.40309 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00186 |
| scoring_system |
epss |
| scoring_elements |
0.40326 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.00186 |
| scoring_system |
epss |
| scoring_elements |
0.40392 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00186 |
| scoring_system |
epss |
| scoring_elements |
0.40418 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00186 |
| scoring_system |
epss |
| scoring_elements |
0.40342 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00186 |
| scoring_system |
epss |
| scoring_elements |
0.40393 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00186 |
| scoring_system |
epss |
| scoring_elements |
0.40404 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00186 |
| scoring_system |
epss |
| scoring_elements |
0.40424 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00186 |
| scoring_system |
epss |
| scoring_elements |
0.40387 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00186 |
| scoring_system |
epss |
| scoring_elements |
0.40368 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00186 |
| scoring_system |
epss |
| scoring_elements |
0.40415 |
| published_at |
2026-04-16T12:55:00Z |
|
| 12 |
| value |
0.00186 |
| scoring_system |
epss |
| scoring_elements |
0.40384 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-7716 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-7716
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-j79s-4ev5-jucd |
|
| 5 |
|
| 6 |
| url |
VCID-sgqw-g5s2-6ydd |
| vulnerability_id |
VCID-sgqw-g5s2-6ydd |
| summary |
NULL Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.8.2. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-4843 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18616 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18843 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18849 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18802 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18749 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18699 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18711 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18729 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18934 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18987 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.1871 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.1879 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-4843 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-4843
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-sgqw-g5s2-6ydd |
|
| 7 |
| url |
VCID-yjkb-tsqy-uqa5 |
| vulnerability_id |
VCID-yjkb-tsqy-uqa5 |
| summary |
The r_pkcs7_parse_cms function in libr/util/r_pkcs7.c in radare2 1.3.0 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted PE file. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-7274 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00227 |
| scoring_system |
epss |
| scoring_elements |
0.45405 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00227 |
| scoring_system |
epss |
| scoring_elements |
0.45489 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00227 |
| scoring_system |
epss |
| scoring_elements |
0.45404 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.00227 |
| scoring_system |
epss |
| scoring_elements |
0.45478 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00227 |
| scoring_system |
epss |
| scoring_elements |
0.455 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00227 |
| scoring_system |
epss |
| scoring_elements |
0.45445 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00227 |
| scoring_system |
epss |
| scoring_elements |
0.45499 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00227 |
| scoring_system |
epss |
| scoring_elements |
0.4552 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00227 |
| scoring_system |
epss |
| scoring_elements |
0.4549 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00227 |
| scoring_system |
epss |
| scoring_elements |
0.45495 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00227 |
| scoring_system |
epss |
| scoring_elements |
0.45543 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00227 |
| scoring_system |
epss |
| scoring_elements |
0.45539 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-7274 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-7274
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-yjkb-tsqy-uqa5 |
|
|
| Risk_score | null |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:deb/debian/radare2@0%3Fdistro=sid |