Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/radare2@0?distro=sid
Typedeb
Namespacedebian
Nameradare2
Version0
Qualifiers
distro sid
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version0.10.5+dfsg-1
Latest_non_vulnerable_version6.0.7+ds-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-3r1r-24qj-zyef
vulnerability_id VCID-3r1r-24qj-zyef
summary In radare2 before 3.9.0, a command injection vulnerability exists in bin_symbols() in libr/core/cbin.c. By using a crafted executable file, it's possible to execute arbitrary shell commands with the permissions of the victim. This vulnerability is due to an insufficient fix for CVE-2019-14745 and improper handling of symbol names embedded in executables.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-16718
reference_id
reference_type
scores
0
value 0.0134
scoring_system epss
scoring_elements 0.80067
published_at 2026-04-24T12:55:00Z
1
value 0.0134
scoring_system epss
scoring_elements 0.80039
published_at 2026-04-21T12:55:00Z
2
value 0.0134
scoring_system epss
scoring_elements 0.79959
published_at 2026-04-01T12:55:00Z
3
value 0.0134
scoring_system epss
scoring_elements 0.79967
published_at 2026-04-02T12:55:00Z
4
value 0.0134
scoring_system epss
scoring_elements 0.79988
published_at 2026-04-04T12:55:00Z
5
value 0.0134
scoring_system epss
scoring_elements 0.79977
published_at 2026-04-07T12:55:00Z
6
value 0.0134
scoring_system epss
scoring_elements 0.80005
published_at 2026-04-08T12:55:00Z
7
value 0.0134
scoring_system epss
scoring_elements 0.80014
published_at 2026-04-09T12:55:00Z
8
value 0.0134
scoring_system epss
scoring_elements 0.80034
published_at 2026-04-11T12:55:00Z
9
value 0.0134
scoring_system epss
scoring_elements 0.80018
published_at 2026-04-12T12:55:00Z
10
value 0.0134
scoring_system epss
scoring_elements 0.8001
published_at 2026-04-13T12:55:00Z
11
value 0.0134
scoring_system epss
scoring_elements 0.80038
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-16718
1
reference_url https://github.com/radareorg/radare2/commit/5411543a310a470b1257fb93273cdd6e8dfcb3af
reference_id
reference_type
scores
url https://github.com/radareorg/radare2/commit/5411543a310a470b1257fb93273cdd6e8dfcb3af
2
reference_url https://github.com/radareorg/radare2/commit/dd739f5a45b3af3d1f65f00fe19af1dbfec7aea7
reference_id
reference_type
scores
url https://github.com/radareorg/radare2/commit/dd739f5a45b3af3d1f65f00fe19af1dbfec7aea7
3
reference_url https://github.com/radareorg/radare2/compare/3.8.0...3.9.0
reference_id
reference_type
scores
url https://github.com/radareorg/radare2/compare/3.8.0...3.9.0
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-16718
reference_id CVE-2019-16718
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-16718
fixed_packages
0
url pkg:deb/debian/radare2@0?distro=sid
purl pkg:deb/debian/radare2@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/radare2@0%3Fdistro=sid
1
url pkg:deb/debian/radare2@6.0.7%2Bds-1?distro=sid
purl pkg:deb/debian/radare2@6.0.7%2Bds-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/radare2@6.0.7%252Bds-1%3Fdistro=sid
aliases CVE-2019-16718
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3r1r-24qj-zyef
1
url VCID-54v3-r36b-pqbt
vulnerability_id VCID-54v3-r36b-pqbt
summary The _inst__sts() function in radare2 2.5.0 allows remote attackers to cause a denial of service (heap-based out-of-bounds read and application crash) via a crafted binary file.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-11382
reference_id
reference_type
scores
0
value 0.00232
scoring_system epss
scoring_elements 0.46025
published_at 2026-04-24T12:55:00Z
1
value 0.00232
scoring_system epss
scoring_elements 0.46114
published_at 2026-04-18T12:55:00Z
2
value 0.00232
scoring_system epss
scoring_elements 0.4606
published_at 2026-04-21T12:55:00Z
3
value 0.00232
scoring_system epss
scoring_elements 0.45986
published_at 2026-04-01T12:55:00Z
4
value 0.00232
scoring_system epss
scoring_elements 0.46037
published_at 2026-04-02T12:55:00Z
5
value 0.00232
scoring_system epss
scoring_elements 0.46059
published_at 2026-04-09T12:55:00Z
6
value 0.00232
scoring_system epss
scoring_elements 0.46006
published_at 2026-04-07T12:55:00Z
7
value 0.00232
scoring_system epss
scoring_elements 0.46062
published_at 2026-04-08T12:55:00Z
8
value 0.00232
scoring_system epss
scoring_elements 0.46084
published_at 2026-04-11T12:55:00Z
9
value 0.00232
scoring_system epss
scoring_elements 0.46055
published_at 2026-04-12T12:55:00Z
10
value 0.00232
scoring_system epss
scoring_elements 0.46063
published_at 2026-04-13T12:55:00Z
11
value 0.00232
scoring_system epss
scoring_elements 0.46118
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-11382
1
reference_url https://github.com/radare/radare2/commit/d04c78773f6959bcb427453f8e5b9824d5ba9eff
reference_id
reference_type
scores
url https://github.com/radare/radare2/commit/d04c78773f6959bcb427453f8e5b9824d5ba9eff
2
reference_url https://github.com/radare/radare2/issues/10091
reference_id
reference_type
scores
url https://github.com/radare/radare2/issues/10091
3
reference_url https://security.archlinux.org/ASA-201806-2
reference_id ASA-201806-2
reference_type
scores
url https://security.archlinux.org/ASA-201806-2
4
reference_url https://security.archlinux.org/AVG-709
reference_id AVG-709
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-709
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:radare:radare2:2.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:radare:radare2:2.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:radare:radare2:2.5.0:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-11382
reference_id CVE-2018-11382
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-11382
fixed_packages
0
url pkg:deb/debian/radare2@0?distro=sid
purl pkg:deb/debian/radare2@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/radare2@0%3Fdistro=sid
1
url pkg:deb/debian/radare2@6.0.7%2Bds-1?distro=sid
purl pkg:deb/debian/radare2@6.0.7%2Bds-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/radare2@6.0.7%252Bds-1%3Fdistro=sid
aliases CVE-2018-11382
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-54v3-r36b-pqbt
2
url VCID-56w7-1t75-ckc9
vulnerability_id VCID-56w7-1t75-ckc9
summary The consume_init_expr function in wasm.c in radare2 1.3.0 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted Web Assembly file.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7854
reference_id
reference_type
scores
0
value 0.00256
scoring_system epss
scoring_elements 0.48959
published_at 2026-04-24T12:55:00Z
1
value 0.00256
scoring_system epss
scoring_elements 0.48971
published_at 2026-04-21T12:55:00Z
2
value 0.00256
scoring_system epss
scoring_elements 0.48901
published_at 2026-04-01T12:55:00Z
3
value 0.00256
scoring_system epss
scoring_elements 0.48938
published_at 2026-04-02T12:55:00Z
4
value 0.00256
scoring_system epss
scoring_elements 0.48964
published_at 2026-04-04T12:55:00Z
5
value 0.00256
scoring_system epss
scoring_elements 0.48918
published_at 2026-04-07T12:55:00Z
6
value 0.00256
scoring_system epss
scoring_elements 0.48972
published_at 2026-04-08T12:55:00Z
7
value 0.00256
scoring_system epss
scoring_elements 0.48969
published_at 2026-04-09T12:55:00Z
8
value 0.00256
scoring_system epss
scoring_elements 0.48986
published_at 2026-04-11T12:55:00Z
9
value 0.00256
scoring_system epss
scoring_elements 0.4896
published_at 2026-04-12T12:55:00Z
10
value 0.00256
scoring_system epss
scoring_elements 0.48967
published_at 2026-04-13T12:55:00Z
11
value 0.00256
scoring_system epss
scoring_elements 0.49013
published_at 2026-04-16T12:55:00Z
12
value 0.00256
scoring_system epss
scoring_elements 0.4901
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7854
1
reference_url https://github.com/radare/radare2/commit/d2632f6483a3ceb5d8e0a5fb11142c51c43978b4
reference_id
reference_type
scores
url https://github.com/radare/radare2/commit/d2632f6483a3ceb5d8e0a5fb11142c51c43978b4
2
reference_url https://github.com/radare/radare2/issues/7265
reference_id
reference_type
scores
url https://github.com/radare/radare2/issues/7265
3
reference_url http://www.securityfocus.com/bid/97648
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/97648
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:radare:radare2:1.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:radare:radare2:1.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:radare:radare2:1.3.0:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7854
reference_id CVE-2017-7854
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-7854
fixed_packages
0
url pkg:deb/debian/radare2@0?distro=sid
purl pkg:deb/debian/radare2@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/radare2@0%3Fdistro=sid
1
url pkg:deb/debian/radare2@6.0.7%2Bds-1?distro=sid
purl pkg:deb/debian/radare2@6.0.7%2Bds-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/radare2@6.0.7%252Bds-1%3Fdistro=sid
aliases CVE-2017-7854
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-56w7-1t75-ckc9
3
url VCID-a4us-jxhs-nfgh
vulnerability_id VCID-a4us-jxhs-nfgh
summary The _inst__lds() function in radare2 2.5.0 allows remote attackers to cause a denial of service (heap-based out-of-bounds read and application crash) via a crafted binary file.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-11375
reference_id
reference_type
scores
0
value 0.00232
scoring_system epss
scoring_elements 0.46025
published_at 2026-04-24T12:55:00Z
1
value 0.00232
scoring_system epss
scoring_elements 0.46114
published_at 2026-04-18T12:55:00Z
2
value 0.00232
scoring_system epss
scoring_elements 0.4606
published_at 2026-04-21T12:55:00Z
3
value 0.00232
scoring_system epss
scoring_elements 0.45986
published_at 2026-04-01T12:55:00Z
4
value 0.00232
scoring_system epss
scoring_elements 0.46037
published_at 2026-04-02T12:55:00Z
5
value 0.00232
scoring_system epss
scoring_elements 0.46059
published_at 2026-04-09T12:55:00Z
6
value 0.00232
scoring_system epss
scoring_elements 0.46006
published_at 2026-04-07T12:55:00Z
7
value 0.00232
scoring_system epss
scoring_elements 0.46062
published_at 2026-04-08T12:55:00Z
8
value 0.00232
scoring_system epss
scoring_elements 0.46084
published_at 2026-04-11T12:55:00Z
9
value 0.00232
scoring_system epss
scoring_elements 0.46055
published_at 2026-04-12T12:55:00Z
10
value 0.00232
scoring_system epss
scoring_elements 0.46063
published_at 2026-04-13T12:55:00Z
11
value 0.00232
scoring_system epss
scoring_elements 0.46118
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-11375
1
reference_url https://github.com/radare/radare2/commit/041e53cab7ca33481ae45ecd65ad596976d78e68
reference_id
reference_type
scores
url https://github.com/radare/radare2/commit/041e53cab7ca33481ae45ecd65ad596976d78e68
2
reference_url https://github.com/radare/radare2/issues/9928
reference_id
reference_type
scores
url https://github.com/radare/radare2/issues/9928
3
reference_url https://security.archlinux.org/ASA-201806-2
reference_id ASA-201806-2
reference_type
scores
url https://security.archlinux.org/ASA-201806-2
4
reference_url https://security.archlinux.org/AVG-709
reference_id AVG-709
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-709
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:radare:radare2:2.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:radare:radare2:2.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:radare:radare2:2.5.0:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-11375
reference_id CVE-2018-11375
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-11375
fixed_packages
0
url pkg:deb/debian/radare2@0?distro=sid
purl pkg:deb/debian/radare2@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/radare2@0%3Fdistro=sid
1
url pkg:deb/debian/radare2@6.0.7%2Bds-1?distro=sid
purl pkg:deb/debian/radare2@6.0.7%2Bds-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/radare2@6.0.7%252Bds-1%3Fdistro=sid
aliases CVE-2018-11375
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a4us-jxhs-nfgh
4
url VCID-j79s-4ev5-jucd
vulnerability_id VCID-j79s-4ev5-jucd
summary The read_u32_leb128 function in libr/util/uleb128.c in radare2 1.3.0 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted Web Assembly file.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7716
reference_id
reference_type
scores
0
value 0.00186
scoring_system epss
scoring_elements 0.4022
published_at 2026-04-24T12:55:00Z
1
value 0.00186
scoring_system epss
scoring_elements 0.40309
published_at 2026-04-21T12:55:00Z
2
value 0.00186
scoring_system epss
scoring_elements 0.40326
published_at 2026-04-01T12:55:00Z
3
value 0.00186
scoring_system epss
scoring_elements 0.40392
published_at 2026-04-02T12:55:00Z
4
value 0.00186
scoring_system epss
scoring_elements 0.40418
published_at 2026-04-04T12:55:00Z
5
value 0.00186
scoring_system epss
scoring_elements 0.40342
published_at 2026-04-07T12:55:00Z
6
value 0.00186
scoring_system epss
scoring_elements 0.40393
published_at 2026-04-08T12:55:00Z
7
value 0.00186
scoring_system epss
scoring_elements 0.40404
published_at 2026-04-09T12:55:00Z
8
value 0.00186
scoring_system epss
scoring_elements 0.40424
published_at 2026-04-11T12:55:00Z
9
value 0.00186
scoring_system epss
scoring_elements 0.40387
published_at 2026-04-12T12:55:00Z
10
value 0.00186
scoring_system epss
scoring_elements 0.40368
published_at 2026-04-13T12:55:00Z
11
value 0.00186
scoring_system epss
scoring_elements 0.40415
published_at 2026-04-16T12:55:00Z
12
value 0.00186
scoring_system epss
scoring_elements 0.40384
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7716
1
reference_url https://github.com/radare/radare2/issues/7260
reference_id
reference_type
scores
url https://github.com/radare/radare2/issues/7260
2
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:radare:radare2:1.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:radare:radare2:1.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:radare:radare2:1.3.0:*:*:*:*:*:*:*
3
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7716
reference_id CVE-2017-7716
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-7716
fixed_packages
0
url pkg:deb/debian/radare2@0?distro=sid
purl pkg:deb/debian/radare2@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/radare2@0%3Fdistro=sid
1
url pkg:deb/debian/radare2@6.0.7%2Bds-1?distro=sid
purl pkg:deb/debian/radare2@6.0.7%2Bds-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/radare2@6.0.7%252Bds-1%3Fdistro=sid
aliases CVE-2017-7716
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j79s-4ev5-jucd
5
url VCID-m715-ppbg-xya5
vulnerability_id VCID-m715-ppbg-xya5
summary
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-41015
reference_id
reference_type
scores
0
value 0.0001
scoring_system epss
scoring_elements 0.01082
published_at 2026-04-16T12:55:00Z
1
value 0.0001
scoring_system epss
scoring_elements 0.01093
published_at 2026-04-18T12:55:00Z
2
value 0.0001
scoring_system epss
scoring_elements 0.01157
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-41015
1
reference_url https://github.com/radareorg/radare2/issues/25650
reference_id 25650
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2026-04-16T13:15:20Z/
url https://github.com/radareorg/radare2/issues/25650
2
reference_url https://github.com/radareorg/radare2/pull/25651
reference_id 25651
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2026-04-16T13:15:20Z/
url https://github.com/radareorg/radare2/pull/25651
3
reference_url https://github.com/radareorg/radare2/commit/9236f44a28812fe911814e1b3a7bcf1e4de5d3c2
reference_id 9236f44a28812fe911814e1b3a7bcf1e4de5d3c2
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2026-04-16T13:15:20Z/
url https://github.com/radareorg/radare2/commit/9236f44a28812fe911814e1b3a7bcf1e4de5d3c2
4
reference_url https://github.com/radareorg/radare2/blob/9236f44a28812fe911814e1b3a7bcf1e4de5d3c2/SECURITY.md?plain=1#L3-L5
reference_id SECURITY.md?plain=1#L3-L5
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2026-04-16T13:15:20Z/
url https://github.com/radareorg/radare2/blob/9236f44a28812fe911814e1b3a7bcf1e4de5d3c2/SECURITY.md?plain=1#L3-L5
fixed_packages
0
url pkg:deb/debian/radare2@0?distro=sid
purl pkg:deb/debian/radare2@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/radare2@0%3Fdistro=sid
1
url pkg:deb/debian/radare2@6.0.7%2Bds-1?distro=sid
purl pkg:deb/debian/radare2@6.0.7%2Bds-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/radare2@6.0.7%252Bds-1%3Fdistro=sid
aliases CVE-2026-41015
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m715-ppbg-xya5
6
url VCID-sgqw-g5s2-6ydd
vulnerability_id VCID-sgqw-g5s2-6ydd
summary NULL Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.8.2.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-4843
reference_id
reference_type
scores
0
value 0.0006
scoring_system epss
scoring_elements 0.18616
published_at 2026-04-24T12:55:00Z
1
value 0.0006
scoring_system epss
scoring_elements 0.18843
published_at 2026-04-09T12:55:00Z
2
value 0.0006
scoring_system epss
scoring_elements 0.18849
published_at 2026-04-11T12:55:00Z
3
value 0.0006
scoring_system epss
scoring_elements 0.18802
published_at 2026-04-12T12:55:00Z
4
value 0.0006
scoring_system epss
scoring_elements 0.18749
published_at 2026-04-13T12:55:00Z
5
value 0.0006
scoring_system epss
scoring_elements 0.18699
published_at 2026-04-16T12:55:00Z
6
value 0.0006
scoring_system epss
scoring_elements 0.18711
published_at 2026-04-18T12:55:00Z
7
value 0.0006
scoring_system epss
scoring_elements 0.18729
published_at 2026-04-21T12:55:00Z
8
value 0.0006
scoring_system epss
scoring_elements 0.18934
published_at 2026-04-02T12:55:00Z
9
value 0.0006
scoring_system epss
scoring_elements 0.18987
published_at 2026-04-04T12:55:00Z
10
value 0.0006
scoring_system epss
scoring_elements 0.1871
published_at 2026-04-07T12:55:00Z
11
value 0.0006
scoring_system epss
scoring_elements 0.1879
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-4843
1
reference_url https://huntr.dev/bounties/075b2760-66a0-4d38-b3b5-e9934956ab7f
reference_id 075b2760-66a0-4d38-b3b5-e9934956ab7f
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-09T14:50:53Z/
url https://huntr.dev/bounties/075b2760-66a0-4d38-b3b5-e9934956ab7f
2
reference_url https://github.com/radareorg/radare2/commit/842f809d4ec6a12af2906f948657281c9ebc8a24
reference_id 842f809d4ec6a12af2906f948657281c9ebc8a24
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-09T14:50:53Z/
url https://github.com/radareorg/radare2/commit/842f809d4ec6a12af2906f948657281c9ebc8a24
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FOXRDPI3OYYKO4PKXE3XD2IFONL6BCHR/
reference_id FOXRDPI3OYYKO4PKXE3XD2IFONL6BCHR
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-09T14:50:53Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FOXRDPI3OYYKO4PKXE3XD2IFONL6BCHR/
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OFCCTYAD7ASNQ23ABCUPAZHEDEIOCW6T/
reference_id OFCCTYAD7ASNQ23ABCUPAZHEDEIOCW6T
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-09T14:50:53Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OFCCTYAD7ASNQ23ABCUPAZHEDEIOCW6T/
fixed_packages
0
url pkg:deb/debian/radare2@0?distro=sid
purl pkg:deb/debian/radare2@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/radare2@0%3Fdistro=sid
1
url pkg:deb/debian/radare2@6.0.7%2Bds-1?distro=sid
purl pkg:deb/debian/radare2@6.0.7%2Bds-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/radare2@6.0.7%252Bds-1%3Fdistro=sid
aliases CVE-2022-4843
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sgqw-g5s2-6ydd
7
url VCID-yjkb-tsqy-uqa5
vulnerability_id VCID-yjkb-tsqy-uqa5
summary The r_pkcs7_parse_cms function in libr/util/r_pkcs7.c in radare2 1.3.0 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted PE file.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7274
reference_id
reference_type
scores
0
value 0.00227
scoring_system epss
scoring_elements 0.45405
published_at 2026-04-24T12:55:00Z
1
value 0.00227
scoring_system epss
scoring_elements 0.45489
published_at 2026-04-21T12:55:00Z
2
value 0.00227
scoring_system epss
scoring_elements 0.45404
published_at 2026-04-01T12:55:00Z
3
value 0.00227
scoring_system epss
scoring_elements 0.45478
published_at 2026-04-02T12:55:00Z
4
value 0.00227
scoring_system epss
scoring_elements 0.455
published_at 2026-04-09T12:55:00Z
5
value 0.00227
scoring_system epss
scoring_elements 0.45445
published_at 2026-04-07T12:55:00Z
6
value 0.00227
scoring_system epss
scoring_elements 0.45499
published_at 2026-04-08T12:55:00Z
7
value 0.00227
scoring_system epss
scoring_elements 0.4552
published_at 2026-04-11T12:55:00Z
8
value 0.00227
scoring_system epss
scoring_elements 0.4549
published_at 2026-04-12T12:55:00Z
9
value 0.00227
scoring_system epss
scoring_elements 0.45495
published_at 2026-04-13T12:55:00Z
10
value 0.00227
scoring_system epss
scoring_elements 0.45543
published_at 2026-04-16T12:55:00Z
11
value 0.00227
scoring_system epss
scoring_elements 0.45539
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7274
1
reference_url https://github.com/radare/radare2/commit/7ab66cca5bbdf6cb2d69339ef4f513d95e532dbf
reference_id
reference_type
scores
url https://github.com/radare/radare2/commit/7ab66cca5bbdf6cb2d69339ef4f513d95e532dbf
2
reference_url https://github.com/radare/radare2/issues/7152
reference_id
reference_type
scores
url https://github.com/radare/radare2/issues/7152
3
reference_url http://www.securityfocus.com/bid/97181
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/97181
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:radare:radare2:1.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:radare:radare2:1.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:radare:radare2:1.3.0:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7274
reference_id CVE-2017-7274
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-7274
fixed_packages
0
url pkg:deb/debian/radare2@0?distro=sid
purl pkg:deb/debian/radare2@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/radare2@0%3Fdistro=sid
1
url pkg:deb/debian/radare2@6.0.7%2Bds-1?distro=sid
purl pkg:deb/debian/radare2@6.0.7%2Bds-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/radare2@6.0.7%252Bds-1%3Fdistro=sid
aliases CVE-2017-7274
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yjkb-tsqy-uqa5
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/radare2@0%3Fdistro=sid