Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/radare2@3.8.0%2Bdfsg-1?distro=sid
Typedeb
Namespacedebian
Nameradare2
Version3.8.0+dfsg-1
Qualifiers
distro sid
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version3.9.0+dfsg-1
Latest_non_vulnerable_version6.0.7+ds-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-3px7-6e74-cqfe
vulnerability_id VCID-3px7-6e74-cqfe
summary In radare2 through 3.5.1, cmd_mount in libr/core/cmd_mount.c has a double free for the ms command.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-12865
reference_id
reference_type
scores
0
value 0.00313
scoring_system epss
scoring_elements 0.54482
published_at 2026-04-21T12:55:00Z
1
value 0.00313
scoring_system epss
scoring_elements 0.54502
published_at 2026-04-16T12:55:00Z
2
value 0.00313
scoring_system epss
scoring_elements 0.54505
published_at 2026-04-18T12:55:00Z
3
value 0.00313
scoring_system epss
scoring_elements 0.54474
published_at 2026-04-04T12:55:00Z
4
value 0.00313
scoring_system epss
scoring_elements 0.54443
published_at 2026-04-07T12:55:00Z
5
value 0.00313
scoring_system epss
scoring_elements 0.54495
published_at 2026-04-08T12:55:00Z
6
value 0.00313
scoring_system epss
scoring_elements 0.54489
published_at 2026-04-09T12:55:00Z
7
value 0.00313
scoring_system epss
scoring_elements 0.54501
published_at 2026-04-11T12:55:00Z
8
value 0.00313
scoring_system epss
scoring_elements 0.54484
published_at 2026-04-12T12:55:00Z
9
value 0.00313
scoring_system epss
scoring_elements 0.54463
published_at 2026-04-13T12:55:00Z
10
value 0.00327
scoring_system epss
scoring_elements 0.55654
published_at 2026-04-02T12:55:00Z
11
value 0.00327
scoring_system epss
scoring_elements 0.55542
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-12865
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=930704
reference_id 930704
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=930704
fixed_packages
0
url pkg:deb/debian/radare2@3.8.0%2Bdfsg-1?distro=sid
purl pkg:deb/debian/radare2@3.8.0%2Bdfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/radare2@3.8.0%252Bdfsg-1%3Fdistro=sid
1
url pkg:deb/debian/radare2@6.0.7%2Bds-1?distro=sid
purl pkg:deb/debian/radare2@6.0.7%2Bds-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/radare2@6.0.7%252Bds-1%3Fdistro=sid
aliases CVE-2019-12865
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3px7-6e74-cqfe
1
url VCID-3wjf-z8kn-23g1
vulnerability_id VCID-3wjf-z8kn-23g1
summary In radare2 through 3.5.1, there is a heap-based buffer over-read in the r_egg_lang_parsechar function of egg_lang.c. This allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact because of missing length validation in libr/egg/egg.c.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-12790
reference_id
reference_type
scores
0
value 0.00481
scoring_system epss
scoring_elements 0.65035
published_at 2026-04-01T12:55:00Z
1
value 0.00481
scoring_system epss
scoring_elements 0.65085
published_at 2026-04-02T12:55:00Z
2
value 0.00481
scoring_system epss
scoring_elements 0.65112
published_at 2026-04-04T12:55:00Z
3
value 0.00481
scoring_system epss
scoring_elements 0.65075
published_at 2026-04-07T12:55:00Z
4
value 0.00481
scoring_system epss
scoring_elements 0.65125
published_at 2026-04-08T12:55:00Z
5
value 0.00481
scoring_system epss
scoring_elements 0.65138
published_at 2026-04-09T12:55:00Z
6
value 0.00481
scoring_system epss
scoring_elements 0.65157
published_at 2026-04-11T12:55:00Z
7
value 0.00481
scoring_system epss
scoring_elements 0.65147
published_at 2026-04-12T12:55:00Z
8
value 0.00481
scoring_system epss
scoring_elements 0.6512
published_at 2026-04-13T12:55:00Z
9
value 0.00481
scoring_system epss
scoring_elements 0.65156
published_at 2026-04-16T12:55:00Z
10
value 0.00481
scoring_system epss
scoring_elements 0.65166
published_at 2026-04-18T12:55:00Z
11
value 0.00481
scoring_system epss
scoring_elements 0.65149
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-12790
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=930344
reference_id 930344
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=930344
fixed_packages
0
url pkg:deb/debian/radare2@3.8.0%2Bdfsg-1?distro=sid
purl pkg:deb/debian/radare2@3.8.0%2Bdfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/radare2@3.8.0%252Bdfsg-1%3Fdistro=sid
1
url pkg:deb/debian/radare2@6.0.7%2Bds-1?distro=sid
purl pkg:deb/debian/radare2@6.0.7%2Bds-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/radare2@6.0.7%252Bds-1%3Fdistro=sid
aliases CVE-2019-12790
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3wjf-z8kn-23g1
2
url VCID-7gtx-pkzb-yqcz
vulnerability_id VCID-7gtx-pkzb-yqcz
summary radare2 through 3.5.1 mishandles the RParse API, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact, as demonstrated by newstr buffer overflows during replace operations. This affects libr/asm/asm.c and libr/parse/parse.c.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-12829
reference_id
reference_type
scores
0
value 0.00784
scoring_system epss
scoring_elements 0.73702
published_at 2026-04-01T12:55:00Z
1
value 0.00784
scoring_system epss
scoring_elements 0.73712
published_at 2026-04-02T12:55:00Z
2
value 0.00784
scoring_system epss
scoring_elements 0.73735
published_at 2026-04-04T12:55:00Z
3
value 0.00784
scoring_system epss
scoring_elements 0.73707
published_at 2026-04-07T12:55:00Z
4
value 0.00784
scoring_system epss
scoring_elements 0.73742
published_at 2026-04-08T12:55:00Z
5
value 0.00784
scoring_system epss
scoring_elements 0.73755
published_at 2026-04-09T12:55:00Z
6
value 0.00784
scoring_system epss
scoring_elements 0.73778
published_at 2026-04-11T12:55:00Z
7
value 0.00784
scoring_system epss
scoring_elements 0.73759
published_at 2026-04-12T12:55:00Z
8
value 0.00784
scoring_system epss
scoring_elements 0.7375
published_at 2026-04-13T12:55:00Z
9
value 0.00784
scoring_system epss
scoring_elements 0.73792
published_at 2026-04-16T12:55:00Z
10
value 0.00784
scoring_system epss
scoring_elements 0.73801
published_at 2026-04-18T12:55:00Z
11
value 0.00784
scoring_system epss
scoring_elements 0.73791
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-12829
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=930590
reference_id 930590
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=930590
fixed_packages
0
url pkg:deb/debian/radare2@3.8.0%2Bdfsg-1?distro=sid
purl pkg:deb/debian/radare2@3.8.0%2Bdfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/radare2@3.8.0%252Bdfsg-1%3Fdistro=sid
1
url pkg:deb/debian/radare2@6.0.7%2Bds-1?distro=sid
purl pkg:deb/debian/radare2@6.0.7%2Bds-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/radare2@6.0.7%252Bds-1%3Fdistro=sid
aliases CVE-2019-12829
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7gtx-pkzb-yqcz
3
url VCID-ba9q-e289-ekbt
vulnerability_id VCID-ba9q-e289-ekbt
summary In radare2 through 3.5.1, the rcc_context function of libr/egg/egg_lang.c mishandles changing context. This allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact (invalid memory access in r_egg_lang_parsechar; invalid free in rcc_pusharg).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-12802
reference_id
reference_type
scores
0
value 0.0046
scoring_system epss
scoring_elements 0.6404
published_at 2026-04-01T12:55:00Z
1
value 0.0046
scoring_system epss
scoring_elements 0.64097
published_at 2026-04-02T12:55:00Z
2
value 0.0046
scoring_system epss
scoring_elements 0.64124
published_at 2026-04-04T12:55:00Z
3
value 0.0046
scoring_system epss
scoring_elements 0.64083
published_at 2026-04-07T12:55:00Z
4
value 0.0046
scoring_system epss
scoring_elements 0.64134
published_at 2026-04-08T12:55:00Z
5
value 0.0046
scoring_system epss
scoring_elements 0.6415
published_at 2026-04-09T12:55:00Z
6
value 0.0046
scoring_system epss
scoring_elements 0.64162
published_at 2026-04-11T12:55:00Z
7
value 0.0046
scoring_system epss
scoring_elements 0.64151
published_at 2026-04-12T12:55:00Z
8
value 0.0046
scoring_system epss
scoring_elements 0.64122
published_at 2026-04-13T12:55:00Z
9
value 0.0046
scoring_system epss
scoring_elements 0.64158
published_at 2026-04-21T12:55:00Z
10
value 0.0046
scoring_system epss
scoring_elements 0.6417
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-12802
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=930510
reference_id 930510
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=930510
fixed_packages
0
url pkg:deb/debian/radare2@3.8.0%2Bdfsg-1?distro=sid
purl pkg:deb/debian/radare2@3.8.0%2Bdfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/radare2@3.8.0%252Bdfsg-1%3Fdistro=sid
1
url pkg:deb/debian/radare2@6.0.7%2Bds-1?distro=sid
purl pkg:deb/debian/radare2@6.0.7%2Bds-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/radare2@6.0.7%252Bds-1%3Fdistro=sid
aliases CVE-2019-12802
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ba9q-e289-ekbt
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/radare2@3.8.0%252Bdfsg-1%3Fdistro=sid