| 0 |
| url |
VCID-1jmy-vuq8-8ufa |
| vulnerability_id |
VCID-1jmy-vuq8-8ufa |
| summary |
Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.6.4. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0713 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00343 |
| scoring_system |
epss |
| scoring_elements |
0.5687 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00343 |
| scoring_system |
epss |
| scoring_elements |
0.56966 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00343 |
| scoring_system |
epss |
| scoring_elements |
0.56988 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00343 |
| scoring_system |
epss |
| scoring_elements |
0.56964 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00343 |
| scoring_system |
epss |
| scoring_elements |
0.57015 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00343 |
| scoring_system |
epss |
| scoring_elements |
0.57017 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00343 |
| scoring_system |
epss |
| scoring_elements |
0.57029 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00343 |
| scoring_system |
epss |
| scoring_elements |
0.57008 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00343 |
| scoring_system |
epss |
| scoring_elements |
0.56985 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00343 |
| scoring_system |
epss |
| scoring_elements |
0.57014 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00343 |
| scoring_system |
epss |
| scoring_elements |
0.57011 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00343 |
| scoring_system |
epss |
| scoring_elements |
0.56987 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00343 |
| scoring_system |
epss |
| scoring_elements |
0.56922 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0713 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-0713
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1jmy-vuq8-8ufa |
|
| 1 |
| url |
VCID-5rv8-9w1a-9yag |
| vulnerability_id |
VCID-5rv8-9w1a-9yag |
| summary |
heap-use-after-free in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is capable of inducing denial of service. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1284 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.51996 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52043 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52069 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52035 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52089 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52086 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52138 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52121 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52107 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52147 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.5215 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52132 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52079 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1284 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-1284
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5rv8-9w1a-9yag |
|
| 2 |
| url |
VCID-5xy5-6f5d-83c7 |
| vulnerability_id |
VCID-5xy5-6f5d-83c7 |
| summary |
Out-of-bounds Read in r_bin_ne_get_entrypoints function in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability may allow attackers to read sensitive information or cause a crash. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1297 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00297 |
| scoring_system |
epss |
| scoring_elements |
0.52944 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00297 |
| scoring_system |
epss |
| scoring_elements |
0.52969 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00297 |
| scoring_system |
epss |
| scoring_elements |
0.52994 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00297 |
| scoring_system |
epss |
| scoring_elements |
0.52961 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00297 |
| scoring_system |
epss |
| scoring_elements |
0.53012 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00297 |
| scoring_system |
epss |
| scoring_elements |
0.53006 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00297 |
| scoring_system |
epss |
| scoring_elements |
0.53055 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00297 |
| scoring_system |
epss |
| scoring_elements |
0.5304 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00297 |
| scoring_system |
epss |
| scoring_elements |
0.53023 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00297 |
| scoring_system |
epss |
| scoring_elements |
0.53061 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00297 |
| scoring_system |
epss |
| scoring_elements |
0.53068 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00297 |
| scoring_system |
epss |
| scoring_elements |
0.5305 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00297 |
| scoring_system |
epss |
| scoring_elements |
0.53016 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1297 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-1297
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5xy5-6f5d-83c7 |
|
| 3 |
| url |
VCID-6zbf-v2qf-kudb |
| vulnerability_id |
VCID-6zbf-v2qf-kudb |
| summary |
Out-of-bounds read in `r_bin_ne_get_relocs` function in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability may allow attackers to read sensitive information or cause a crash. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1296 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00283 |
| scoring_system |
epss |
| scoring_elements |
0.51594 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00283 |
| scoring_system |
epss |
| scoring_elements |
0.51645 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00283 |
| scoring_system |
epss |
| scoring_elements |
0.5167 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00283 |
| scoring_system |
epss |
| scoring_elements |
0.51631 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00283 |
| scoring_system |
epss |
| scoring_elements |
0.51685 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00283 |
| scoring_system |
epss |
| scoring_elements |
0.51681 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00283 |
| scoring_system |
epss |
| scoring_elements |
0.5173 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00283 |
| scoring_system |
epss |
| scoring_elements |
0.51708 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00283 |
| scoring_system |
epss |
| scoring_elements |
0.51692 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00283 |
| scoring_system |
epss |
| scoring_elements |
0.51733 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00283 |
| scoring_system |
epss |
| scoring_elements |
0.5174 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00283 |
| scoring_system |
epss |
| scoring_elements |
0.5172 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00283 |
| scoring_system |
epss |
| scoring_elements |
0.51672 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1296 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-1296
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6zbf-v2qf-kudb |
|
| 4 |
| url |
VCID-7f5v-63rw-47c5 |
| vulnerability_id |
VCID-7f5v-63rw-47c5 |
| summary |
radareorg radare2 5.5.2 is vulnerable to Buffer Overflow via /libr/core/anal_objc.c mach-o parser. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-44975 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00317 |
| scoring_system |
epss |
| scoring_elements |
0.54759 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00317 |
| scoring_system |
epss |
| scoring_elements |
0.5468 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00317 |
| scoring_system |
epss |
| scoring_elements |
0.5475 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00317 |
| scoring_system |
epss |
| scoring_elements |
0.54773 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00317 |
| scoring_system |
epss |
| scoring_elements |
0.54743 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00317 |
| scoring_system |
epss |
| scoring_elements |
0.54793 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00317 |
| scoring_system |
epss |
| scoring_elements |
0.5479 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00317 |
| scoring_system |
epss |
| scoring_elements |
0.54802 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00317 |
| scoring_system |
epss |
| scoring_elements |
0.54785 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00317 |
| scoring_system |
epss |
| scoring_elements |
0.54764 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00317 |
| scoring_system |
epss |
| scoring_elements |
0.54804 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00317 |
| scoring_system |
epss |
| scoring_elements |
0.54786 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-44975 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-44975
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7f5v-63rw-47c5 |
|
| 5 |
| url |
VCID-7hzf-vk9r-dfh1 |
| vulnerability_id |
VCID-7hzf-vk9r-dfh1 |
| summary |
heap-buffer-overflow in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is capable of inducing denial of service. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1244 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.51996 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52043 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52069 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52035 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52089 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52086 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52138 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52121 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52107 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52147 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.5215 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52132 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52079 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1244 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-1244
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7hzf-vk9r-dfh1 |
|
| 6 |
| url |
VCID-8xen-g6z6-hfcs |
| vulnerability_id |
VCID-8xen-g6z6-hfcs |
| summary |
Null pointer dereference in libr/bin/format/mach0/mach0.c in radareorg/radare2 in GitHub repository radareorg/radare2 prior to 5.7.0. It is likely to be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/476.html). |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1649 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.4807 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.48107 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.48128 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.48077 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.4813 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.48125 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.48149 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.48122 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.48133 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.48186 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.4818 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.48137 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.48116 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1649 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-1649
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8xen-g6z6-hfcs |
|
| 7 |
| url |
VCID-8zuq-cnzg-9bfk |
| vulnerability_id |
VCID-8zuq-cnzg-9bfk |
| summary |
A vulnerability was found in Radare2 in versions prior to 5.6.2, 5.6.0, 5.5.4 and 5.5.2. Mapping a huge section filled with zeros of an ELF64 binary for MIPS architecture can lead to uncontrolled resource consumption and DoS. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-4021 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00436 |
| scoring_system |
epss |
| scoring_elements |
0.62962 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00436 |
| scoring_system |
epss |
| scoring_elements |
0.62832 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00436 |
| scoring_system |
epss |
| scoring_elements |
0.6289 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00436 |
| scoring_system |
epss |
| scoring_elements |
0.6292 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00436 |
| scoring_system |
epss |
| scoring_elements |
0.62883 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00436 |
| scoring_system |
epss |
| scoring_elements |
0.62934 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00436 |
| scoring_system |
epss |
| scoring_elements |
0.6295 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00436 |
| scoring_system |
epss |
| scoring_elements |
0.62969 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00436 |
| scoring_system |
epss |
| scoring_elements |
0.62957 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00436 |
| scoring_system |
epss |
| scoring_elements |
0.62935 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00436 |
| scoring_system |
epss |
| scoring_elements |
0.62976 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00436 |
| scoring_system |
epss |
| scoring_elements |
0.62983 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-4021 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-4021
|
| risk_score |
1.4 |
| exploitability |
0.5 |
| weighted_severity |
2.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8zuq-cnzg-9bfk |
|
| 8 |
| url |
VCID-9cdv-pbch-47cp |
| vulnerability_id |
VCID-9cdv-pbch-47cp |
| summary |
Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.9.0. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-4322 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00243 |
| scoring_system |
epss |
| scoring_elements |
0.47589 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00243 |
| scoring_system |
epss |
| scoring_elements |
0.47546 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00243 |
| scoring_system |
epss |
| scoring_elements |
0.47601 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00243 |
| scoring_system |
epss |
| scoring_elements |
0.47621 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00243 |
| scoring_system |
epss |
| scoring_elements |
0.47606 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00243 |
| scoring_system |
epss |
| scoring_elements |
0.47664 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00243 |
| scoring_system |
epss |
| scoring_elements |
0.47656 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00243 |
| scoring_system |
epss |
| scoring_elements |
0.47609 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00243 |
| scoring_system |
epss |
| scoring_elements |
0.47576 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.00243 |
| scoring_system |
epss |
| scoring_elements |
0.47597 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-4322 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-4322
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9cdv-pbch-47cp |
|
| 9 |
| url |
VCID-9yq7-v9ah-qyek |
| vulnerability_id |
VCID-9yq7-v9ah-qyek |
| summary |
An out-of-bounds read in radare2 v.5.8.9 and before exists in the print_insn32 function of libr/arch/p/nds32/nds32-dis.h. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-46570 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00139 |
| scoring_system |
epss |
| scoring_elements |
0.33587 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00139 |
| scoring_system |
epss |
| scoring_elements |
0.34003 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00139 |
| scoring_system |
epss |
| scoring_elements |
0.3399 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00139 |
| scoring_system |
epss |
| scoring_elements |
0.33957 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00139 |
| scoring_system |
epss |
| scoring_elements |
0.34073 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00139 |
| scoring_system |
epss |
| scoring_elements |
0.34104 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00139 |
| scoring_system |
epss |
| scoring_elements |
0.33963 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00139 |
| scoring_system |
epss |
| scoring_elements |
0.34005 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00139 |
| scoring_system |
epss |
| scoring_elements |
0.34036 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00139 |
| scoring_system |
epss |
| scoring_elements |
0.33993 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00139 |
| scoring_system |
epss |
| scoring_elements |
0.33969 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-46570 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-46570
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9yq7-v9ah-qyek |
|
| 10 |
| url |
VCID-aubp-kw7t-abam |
| vulnerability_id |
VCID-aubp-kw7t-abam |
| summary |
Use After Free in r_reg_get_name_idx in GitHub repository radareorg/radare2 prior to 5.6.6. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0849 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00265 |
| scoring_system |
epss |
| scoring_elements |
0.50009 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00265 |
| scoring_system |
epss |
| scoring_elements |
0.49951 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00265 |
| scoring_system |
epss |
| scoring_elements |
0.49988 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00265 |
| scoring_system |
epss |
| scoring_elements |
0.50016 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00265 |
| scoring_system |
epss |
| scoring_elements |
0.49966 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00265 |
| scoring_system |
epss |
| scoring_elements |
0.50021 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00265 |
| scoring_system |
epss |
| scoring_elements |
0.50014 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00265 |
| scoring_system |
epss |
| scoring_elements |
0.50032 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00265 |
| scoring_system |
epss |
| scoring_elements |
0.50005 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00265 |
| scoring_system |
epss |
| scoring_elements |
0.50001 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00265 |
| scoring_system |
epss |
| scoring_elements |
0.50047 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00265 |
| scoring_system |
epss |
| scoring_elements |
0.50049 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0849 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-0849
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-aubp-kw7t-abam |
|
| 11 |
| url |
VCID-aupe-75b8-fbff |
| vulnerability_id |
VCID-aupe-75b8-fbff |
| summary |
heap-use-after-free in GitHub repository radareorg/radare2 prior to 5.7.0. This vulnerability is capable of inducing denial of service. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1444 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.51996 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52043 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52069 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52035 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52089 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52086 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52138 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52121 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52107 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52147 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.5215 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52132 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52079 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1444 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-1444
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-aupe-75b8-fbff |
|
| 12 |
| url |
VCID-befg-btu3-g3ek |
| vulnerability_id |
VCID-befg-btu3-g3ek |
| summary |
Buffer Access with Incorrect Length Value in GitHub repository radareorg/radare2 prior to 5.6.2. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0519 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57709 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57794 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57814 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57787 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57842 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57844 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57861 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57839 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57817 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57846 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57845 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57822 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.5778 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0519 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-0519
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-befg-btu3-g3ek |
|
| 13 |
| url |
VCID-bmmz-g7bb-6ydp |
| vulnerability_id |
VCID-bmmz-g7bb-6ydp |
| summary |
An out-of-bounds read in radare2 v.5.8.9 and before exists in the print_insn32_fpu function of libr/arch/p/nds32/nds32-dis.h. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-46569 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00152 |
| scoring_system |
epss |
| scoring_elements |
0.35575 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00152 |
| scoring_system |
epss |
| scoring_elements |
0.3587 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00152 |
| scoring_system |
epss |
| scoring_elements |
0.35858 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00152 |
| scoring_system |
epss |
| scoring_elements |
0.35808 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00152 |
| scoring_system |
epss |
| scoring_elements |
0.35956 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00152 |
| scoring_system |
epss |
| scoring_elements |
0.35986 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00152 |
| scoring_system |
epss |
| scoring_elements |
0.35817 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00152 |
| scoring_system |
epss |
| scoring_elements |
0.35867 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00152 |
| scoring_system |
epss |
| scoring_elements |
0.3589 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00152 |
| scoring_system |
epss |
| scoring_elements |
0.35896 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00152 |
| scoring_system |
epss |
| scoring_elements |
0.35855 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.00152 |
| scoring_system |
epss |
| scoring_elements |
0.35831 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-46569 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-46569
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bmmz-g7bb-6ydp |
|
| 14 |
| url |
VCID-czpx-39nm-3fhk |
| vulnerability_id |
VCID-czpx-39nm-3fhk |
| summary |
radareorg radare2 version 5.5.2 is vulnerable to NULL Pointer Dereference via libr/bin/p/bin_symbols.c binary symbol parser. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-44974 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00349 |
| scoring_system |
epss |
| scoring_elements |
0.574 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00349 |
| scoring_system |
epss |
| scoring_elements |
0.57335 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00349 |
| scoring_system |
epss |
| scoring_elements |
0.57416 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00349 |
| scoring_system |
epss |
| scoring_elements |
0.57439 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00349 |
| scoring_system |
epss |
| scoring_elements |
0.57414 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00349 |
| scoring_system |
epss |
| scoring_elements |
0.57466 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00349 |
| scoring_system |
epss |
| scoring_elements |
0.57469 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00349 |
| scoring_system |
epss |
| scoring_elements |
0.57485 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00349 |
| scoring_system |
epss |
| scoring_elements |
0.57462 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00349 |
| scoring_system |
epss |
| scoring_elements |
0.57443 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00349 |
| scoring_system |
epss |
| scoring_elements |
0.5747 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00349 |
| scoring_system |
epss |
| scoring_elements |
0.57465 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00349 |
| scoring_system |
epss |
| scoring_elements |
0.57445 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-44974 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-44974
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-czpx-39nm-3fhk |
|
| 15 |
| url |
VCID-drqw-6fx3-augx |
| vulnerability_id |
VCID-drqw-6fx3-augx |
| summary |
Denial of Service in GitHub repository radareorg/radare2 prior to 5.6.4. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0695 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00324 |
| scoring_system |
epss |
| scoring_elements |
0.553 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00324 |
| scoring_system |
epss |
| scoring_elements |
0.55414 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00324 |
| scoring_system |
epss |
| scoring_elements |
0.55439 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00324 |
| scoring_system |
epss |
| scoring_elements |
0.55418 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00324 |
| scoring_system |
epss |
| scoring_elements |
0.55469 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00324 |
| scoring_system |
epss |
| scoring_elements |
0.55479 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00324 |
| scoring_system |
epss |
| scoring_elements |
0.55458 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00324 |
| scoring_system |
epss |
| scoring_elements |
0.5544 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00324 |
| scoring_system |
epss |
| scoring_elements |
0.55476 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00324 |
| scoring_system |
epss |
| scoring_elements |
0.5548 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00324 |
| scoring_system |
epss |
| scoring_elements |
0.55381 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0695 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-0695
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-drqw-6fx3-augx |
|
| 16 |
| url |
VCID-ds17-huzd-37d2 |
| vulnerability_id |
VCID-ds17-huzd-37d2 |
| summary |
Access of Memory Location After End of Buffer in GitHub repository radareorg/radare2 prior to 5.6.2. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0521 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57709 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57794 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57814 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57787 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57842 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57844 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57861 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57839 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57817 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57846 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57845 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57822 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.5778 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0521 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-0521
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ds17-huzd-37d2 |
|
| 17 |
| url |
VCID-e1ry-7wyr-z7gt |
| vulnerability_id |
VCID-e1ry-7wyr-z7gt |
| summary |
Heap Buffer Overflow in iterate_chained_fixups in GitHub repository radareorg/radare2 prior to 5.6.6. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1052 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0015 |
| scoring_system |
epss |
| scoring_elements |
0.35448 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.0015 |
| scoring_system |
epss |
| scoring_elements |
0.35647 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.0015 |
| scoring_system |
epss |
| scoring_elements |
0.35672 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.0015 |
| scoring_system |
epss |
| scoring_elements |
0.35553 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.0015 |
| scoring_system |
epss |
| scoring_elements |
0.35599 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.0015 |
| scoring_system |
epss |
| scoring_elements |
0.35622 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.0015 |
| scoring_system |
epss |
| scoring_elements |
0.35632 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.0015 |
| scoring_system |
epss |
| scoring_elements |
0.35587 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.0015 |
| scoring_system |
epss |
| scoring_elements |
0.35565 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.0015 |
| scoring_system |
epss |
| scoring_elements |
0.35604 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.0015 |
| scoring_system |
epss |
| scoring_elements |
0.35593 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.0015 |
| scoring_system |
epss |
| scoring_elements |
0.35544 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.0015 |
| scoring_system |
epss |
| scoring_elements |
0.35306 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1052 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-1052
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-e1ry-7wyr-z7gt |
|
| 18 |
| url |
VCID-e4sm-emrh-qkc9 |
| vulnerability_id |
VCID-e4sm-emrh-qkc9 |
| summary |
Out-of-bounds read in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability allows attackers to read sensitive information from outside the allocated buffer boundary. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1207 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00106 |
| scoring_system |
epss |
| scoring_elements |
0.28699 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00106 |
| scoring_system |
epss |
| scoring_elements |
0.28781 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00106 |
| scoring_system |
epss |
| scoring_elements |
0.2883 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00106 |
| scoring_system |
epss |
| scoring_elements |
0.28635 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00106 |
| scoring_system |
epss |
| scoring_elements |
0.28701 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00106 |
| scoring_system |
epss |
| scoring_elements |
0.2874 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00106 |
| scoring_system |
epss |
| scoring_elements |
0.28744 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00106 |
| scoring_system |
epss |
| scoring_elements |
0.287 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00106 |
| scoring_system |
epss |
| scoring_elements |
0.28651 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00106 |
| scoring_system |
epss |
| scoring_elements |
0.28671 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00106 |
| scoring_system |
epss |
| scoring_elements |
0.28646 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00106 |
| scoring_system |
epss |
| scoring_elements |
0.28599 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00106 |
| scoring_system |
epss |
| scoring_elements |
0.28485 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1207 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-1207
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-e4sm-emrh-qkc9 |
|
| 19 |
| url |
VCID-esdn-avz7-c3g4 |
| vulnerability_id |
VCID-esdn-avz7-c3g4 |
| summary |
Use After Free in GitHub repository radareorg/radare2 prior to 5.6.0. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0139 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00398 |
| scoring_system |
epss |
| scoring_elements |
0.60491 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00398 |
| scoring_system |
epss |
| scoring_elements |
0.60565 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00398 |
| scoring_system |
epss |
| scoring_elements |
0.60594 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00398 |
| scoring_system |
epss |
| scoring_elements |
0.60563 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00398 |
| scoring_system |
epss |
| scoring_elements |
0.60611 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00398 |
| scoring_system |
epss |
| scoring_elements |
0.60627 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00398 |
| scoring_system |
epss |
| scoring_elements |
0.60652 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00398 |
| scoring_system |
epss |
| scoring_elements |
0.60637 |
| published_at |
2026-04-24T12:55:00Z |
|
| 8 |
| value |
0.00398 |
| scoring_system |
epss |
| scoring_elements |
0.60616 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00398 |
| scoring_system |
epss |
| scoring_elements |
0.60658 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00398 |
| scoring_system |
epss |
| scoring_elements |
0.60664 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00398 |
| scoring_system |
epss |
| scoring_elements |
0.60651 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0139 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-0139
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-esdn-avz7-c3g4 |
|
| 20 |
| url |
VCID-euwf-e2ud-wban |
| vulnerability_id |
VCID-euwf-e2ud-wban |
| summary |
Denial of Service in GitHub repository radareorg/radare2 prior to 5.8.6. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-1605 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00272 |
| scoring_system |
epss |
| scoring_elements |
0.50642 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00272 |
| scoring_system |
epss |
| scoring_elements |
0.50709 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00272 |
| scoring_system |
epss |
| scoring_elements |
0.50715 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00272 |
| scoring_system |
epss |
| scoring_elements |
0.50695 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00272 |
| scoring_system |
epss |
| scoring_elements |
0.5063 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00272 |
| scoring_system |
epss |
| scoring_elements |
0.50657 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00272 |
| scoring_system |
epss |
| scoring_elements |
0.50612 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00272 |
| scoring_system |
epss |
| scoring_elements |
0.50667 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00272 |
| scoring_system |
epss |
| scoring_elements |
0.50663 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00272 |
| scoring_system |
epss |
| scoring_elements |
0.50705 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00272 |
| scoring_system |
epss |
| scoring_elements |
0.50683 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-1605 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-1605
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-euwf-e2ud-wban |
|
| 21 |
| url |
VCID-fktn-5h3c-t3ay |
| vulnerability_id |
VCID-fktn-5h3c-t3ay |
| summary |
Use After Free in GitHub repository radareorg/radare2 prior to 5.6.2. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0559 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00327 |
| scoring_system |
epss |
| scoring_elements |
0.55513 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00327 |
| scoring_system |
epss |
| scoring_elements |
0.55624 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00327 |
| scoring_system |
epss |
| scoring_elements |
0.55648 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00327 |
| scoring_system |
epss |
| scoring_elements |
0.55626 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00327 |
| scoring_system |
epss |
| scoring_elements |
0.55678 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00327 |
| scoring_system |
epss |
| scoring_elements |
0.55681 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00327 |
| scoring_system |
epss |
| scoring_elements |
0.5569 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00327 |
| scoring_system |
epss |
| scoring_elements |
0.5567 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00327 |
| scoring_system |
epss |
| scoring_elements |
0.55652 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00327 |
| scoring_system |
epss |
| scoring_elements |
0.55691 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00327 |
| scoring_system |
epss |
| scoring_elements |
0.55695 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00327 |
| scoring_system |
epss |
| scoring_elements |
0.55674 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00327 |
| scoring_system |
epss |
| scoring_elements |
0.556 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0559 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-0559
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-fktn-5h3c-t3ay |
|
| 22 |
| url |
VCID-gn9n-bv7p-bbap |
| vulnerability_id |
VCID-gn9n-bv7p-bbap |
| summary |
Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.6.2. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0518 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57568 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57652 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57674 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.5765 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57704 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57707 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57722 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57701 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57681 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57711 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57708 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57686 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57643 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0518 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-0518
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-gn9n-bv7p-bbap |
|
| 23 |
| url |
VCID-h43t-cy2h-jfdv |
| vulnerability_id |
VCID-h43t-cy2h-jfdv |
| summary |
Heap Buffer Overflow in parseDragons in GitHub repository radareorg/radare2 prior to 5.6.8. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1061 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0027 |
| scoring_system |
epss |
| scoring_elements |
0.50418 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.0027 |
| scoring_system |
epss |
| scoring_elements |
0.50474 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.0027 |
| scoring_system |
epss |
| scoring_elements |
0.50502 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.0027 |
| scoring_system |
epss |
| scoring_elements |
0.50456 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.0027 |
| scoring_system |
epss |
| scoring_elements |
0.5051 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.0027 |
| scoring_system |
epss |
| scoring_elements |
0.50506 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.0027 |
| scoring_system |
epss |
| scoring_elements |
0.50548 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.0027 |
| scoring_system |
epss |
| scoring_elements |
0.50525 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.0027 |
| scoring_system |
epss |
| scoring_elements |
0.50553 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.0027 |
| scoring_system |
epss |
| scoring_elements |
0.50558 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.0027 |
| scoring_system |
epss |
| scoring_elements |
0.50535 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.0027 |
| scoring_system |
epss |
| scoring_elements |
0.50482 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1061 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-1061
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-h43t-cy2h-jfdv |
|
| 24 |
| url |
VCID-hkwf-9xsj-xqct |
| vulnerability_id |
VCID-hkwf-9xsj-xqct |
| summary |
Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end of the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1437 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00251 |
| scoring_system |
epss |
| scoring_elements |
0.48361 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00251 |
| scoring_system |
epss |
| scoring_elements |
0.48397 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00251 |
| scoring_system |
epss |
| scoring_elements |
0.48418 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00251 |
| scoring_system |
epss |
| scoring_elements |
0.48371 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00251 |
| scoring_system |
epss |
| scoring_elements |
0.48426 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00251 |
| scoring_system |
epss |
| scoring_elements |
0.4842 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00251 |
| scoring_system |
epss |
| scoring_elements |
0.48444 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00251 |
| scoring_system |
epss |
| scoring_elements |
0.48419 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00251 |
| scoring_system |
epss |
| scoring_elements |
0.48431 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00251 |
| scoring_system |
epss |
| scoring_elements |
0.48481 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00251 |
| scoring_system |
epss |
| scoring_elements |
0.48476 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00251 |
| scoring_system |
epss |
| scoring_elements |
0.48417 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1437 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-1437
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hkwf-9xsj-xqct |
|
| 25 |
| url |
VCID-khyh-e434-x3hk |
| vulnerability_id |
VCID-khyh-e434-x3hk |
| summary |
radare2 is vulnerable to Out-of-bounds Read |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0173 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57714 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57799 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57819 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57793 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57848 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57849 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57866 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57844 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57823 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57852 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57851 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57828 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57787 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0173 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-0173
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-khyh-e434-x3hk |
|
| 26 |
| url |
VCID-n5c5-p9qk-zkgz |
| vulnerability_id |
VCID-n5c5-p9qk-zkgz |
| summary |
NULL Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is capable of making the radare2 crash, thus affecting the availability of the system. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1382 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.48146 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.48183 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.48202 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.48154 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.48208 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.48201 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.48225 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.48199 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.48211 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.48262 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.48258 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.48213 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00249 |
| scoring_system |
epss |
| scoring_elements |
0.48195 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1382 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-1382
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-n5c5-p9qk-zkgz |
|
| 27 |
| url |
VCID-nh84-fufj-pfgr |
| vulnerability_id |
VCID-nh84-fufj-pfgr |
| summary |
Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.6.4. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0676 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57578 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57664 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57685 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00369 |
| scoring_system |
epss |
| scoring_elements |
0.5875 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00369 |
| scoring_system |
epss |
| scoring_elements |
0.58803 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00369 |
| scoring_system |
epss |
| scoring_elements |
0.5881 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00369 |
| scoring_system |
epss |
| scoring_elements |
0.58828 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00369 |
| scoring_system |
epss |
| scoring_elements |
0.5879 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00369 |
| scoring_system |
epss |
| scoring_elements |
0.58823 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00369 |
| scoring_system |
epss |
| scoring_elements |
0.58827 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00369 |
| scoring_system |
epss |
| scoring_elements |
0.58804 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00369 |
| scoring_system |
epss |
| scoring_elements |
0.58784 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0676 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-0676
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-nh84-fufj-pfgr |
|
| 28 |
| url |
VCID-nnye-265s-hfdm |
| vulnerability_id |
VCID-nnye-265s-hfdm |
| summary |
Buffer Overflow vulnerability in radarorg radare2 v.5.8.8 allows an attacker to execute arbitrary code via the name, type, or group fields. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-29646 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00605 |
| scoring_system |
epss |
| scoring_elements |
0.69702 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00605 |
| scoring_system |
epss |
| scoring_elements |
0.69564 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00605 |
| scoring_system |
epss |
| scoring_elements |
0.6958 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00605 |
| scoring_system |
epss |
| scoring_elements |
0.69558 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00605 |
| scoring_system |
epss |
| scoring_elements |
0.69609 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00605 |
| scoring_system |
epss |
| scoring_elements |
0.69626 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00605 |
| scoring_system |
epss |
| scoring_elements |
0.69648 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00605 |
| scoring_system |
epss |
| scoring_elements |
0.69633 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00605 |
| scoring_system |
epss |
| scoring_elements |
0.69619 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00605 |
| scoring_system |
epss |
| scoring_elements |
0.69659 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00605 |
| scoring_system |
epss |
| scoring_elements |
0.69668 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00605 |
| scoring_system |
epss |
| scoring_elements |
0.6965 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-29646 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-29646
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-nnye-265s-hfdm |
|
| 29 |
| url |
VCID-nuzb-2zqv-wbgf |
| vulnerability_id |
VCID-nuzb-2zqv-wbgf |
| summary |
NULL Pointer Dereference in r_bin_ne_get_entrypoints function in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability allows attackers to cause a denial of service (application crash). |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1283 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.50624 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.50677 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.50703 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.50659 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.50714 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.5071 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.50752 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.50729 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.50754 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.5076 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.5074 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.50689 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1283 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-1283
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-nuzb-2zqv-wbgf |
|
| 30 |
| url |
VCID-ny2r-28hp-5uep |
| vulnerability_id |
VCID-ny2r-28hp-5uep |
| summary |
Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.9.0. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-5686 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24664 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24702 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24474 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24544 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24589 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24605 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24563 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24509 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.2452 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24512 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24489 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24431 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-5686 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-5686
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ny2r-28hp-5uep |
|
| 31 |
| url |
VCID-p5f7-7r1a-rycr |
| vulnerability_id |
VCID-p5f7-7r1a-rycr |
| summary |
NULL Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.6.0. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0419 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00248 |
| scoring_system |
epss |
| scoring_elements |
0.48031 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00248 |
| scoring_system |
epss |
| scoring_elements |
0.47979 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00248 |
| scoring_system |
epss |
| scoring_elements |
0.48017 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00248 |
| scoring_system |
epss |
| scoring_elements |
0.48038 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00248 |
| scoring_system |
epss |
| scoring_elements |
0.47987 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00248 |
| scoring_system |
epss |
| scoring_elements |
0.4804 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00248 |
| scoring_system |
epss |
| scoring_elements |
0.48034 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00248 |
| scoring_system |
epss |
| scoring_elements |
0.48058 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00248 |
| scoring_system |
epss |
| scoring_elements |
0.48035 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00248 |
| scoring_system |
epss |
| scoring_elements |
0.48046 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00248 |
| scoring_system |
epss |
| scoring_elements |
0.48098 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00248 |
| scoring_system |
epss |
| scoring_elements |
0.48093 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00248 |
| scoring_system |
epss |
| scoring_elements |
0.4805 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0419 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-0419
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-p5f7-7r1a-rycr |
|
| 32 |
| url |
VCID-patn-amhm-cqcp |
| vulnerability_id |
VCID-patn-amhm-cqcp |
| summary |
Failure to Sanitize Special Elements into a Different Plane (Special Element Injection) in GitHub repository radareorg/radare2 prior to 5.8.2. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-0302 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00189 |
| scoring_system |
epss |
| scoring_elements |
0.40539 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00189 |
| scoring_system |
epss |
| scoring_elements |
0.40742 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00189 |
| scoring_system |
epss |
| scoring_elements |
0.40713 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00189 |
| scoring_system |
epss |
| scoring_elements |
0.40636 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00189 |
| scoring_system |
epss |
| scoring_elements |
0.40725 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00189 |
| scoring_system |
epss |
| scoring_elements |
0.40753 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00189 |
| scoring_system |
epss |
| scoring_elements |
0.40676 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00189 |
| scoring_system |
epss |
| scoring_elements |
0.40726 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00189 |
| scoring_system |
epss |
| scoring_elements |
0.40732 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00189 |
| scoring_system |
epss |
| scoring_elements |
0.4075 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00189 |
| scoring_system |
epss |
| scoring_elements |
0.40715 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.00189 |
| scoring_system |
epss |
| scoring_elements |
0.40697 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-0302 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-0302
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-patn-amhm-cqcp |
|
| 33 |
| url |
VCID-pq2q-hnd2-y3eb |
| vulnerability_id |
VCID-pq2q-hnd2-y3eb |
| summary |
Buffer Overflow vulnerability in radarorg radare2 v.5.8.8 allows an attacker to execute arbitrary code via the parse_die function. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-29645 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.1768 |
| published_at |
2026-04-11T12:55:00Z |
|
| 1 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.17568 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.17535 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.17527 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.17581 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.17634 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.17736 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.17783 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.17511 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.17601 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.17662 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.2262 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-29645 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-29645
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-pq2q-hnd2-y3eb |
|
| 34 |
| url |
VCID-pt1y-cpch-1qfn |
| vulnerability_id |
VCID-pt1y-cpch-1qfn |
| summary |
Out-of-bounds Write in libr/bin/format/ne/ne.c in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is heap overflow and may be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/122.html). |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1238 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00269 |
| scoring_system |
epss |
| scoring_elements |
0.50334 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00269 |
| scoring_system |
epss |
| scoring_elements |
0.5039 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00269 |
| scoring_system |
epss |
| scoring_elements |
0.5042 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00269 |
| scoring_system |
epss |
| scoring_elements |
0.50372 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00269 |
| scoring_system |
epss |
| scoring_elements |
0.50425 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00269 |
| scoring_system |
epss |
| scoring_elements |
0.50419 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00269 |
| scoring_system |
epss |
| scoring_elements |
0.5046 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00269 |
| scoring_system |
epss |
| scoring_elements |
0.50437 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00269 |
| scoring_system |
epss |
| scoring_elements |
0.50422 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00269 |
| scoring_system |
epss |
| scoring_elements |
0.50465 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00269 |
| scoring_system |
epss |
| scoring_elements |
0.50469 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00269 |
| scoring_system |
epss |
| scoring_elements |
0.50445 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00269 |
| scoring_system |
epss |
| scoring_elements |
0.50391 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1238 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-1238
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-pt1y-cpch-1qfn |
|
| 35 |
| url |
VCID-rgst-sefy-mya3 |
| vulnerability_id |
VCID-rgst-sefy-mya3 |
| summary |
Use After Free in op_is_set_bp in GitHub repository radareorg/radare2 prior to 5.6.6. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1031 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00285 |
| scoring_system |
epss |
| scoring_elements |
0.51927 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00285 |
| scoring_system |
epss |
| scoring_elements |
0.51975 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00285 |
| scoring_system |
epss |
| scoring_elements |
0.52 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00285 |
| scoring_system |
epss |
| scoring_elements |
0.51966 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00285 |
| scoring_system |
epss |
| scoring_elements |
0.52021 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00285 |
| scoring_system |
epss |
| scoring_elements |
0.52019 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00285 |
| scoring_system |
epss |
| scoring_elements |
0.52071 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00285 |
| scoring_system |
epss |
| scoring_elements |
0.52053 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00285 |
| scoring_system |
epss |
| scoring_elements |
0.52037 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00285 |
| scoring_system |
epss |
| scoring_elements |
0.52077 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00285 |
| scoring_system |
epss |
| scoring_elements |
0.52083 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00285 |
| scoring_system |
epss |
| scoring_elements |
0.52064 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00285 |
| scoring_system |
epss |
| scoring_elements |
0.52011 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1031 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-1031
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rgst-sefy-mya3 |
|
| 36 |
| url |
VCID-sk4s-yzns-jfbk |
| vulnerability_id |
VCID-sk4s-yzns-jfbk |
| summary |
Integer Overflow or Wraparound in GitHub repository radareorg/radare2 prior to 5.8.0. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-4398 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00324 |
| scoring_system |
epss |
| scoring_elements |
0.55431 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00324 |
| scoring_system |
epss |
| scoring_elements |
0.55523 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00324 |
| scoring_system |
epss |
| scoring_elements |
0.55527 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00324 |
| scoring_system |
epss |
| scoring_elements |
0.55506 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00324 |
| scoring_system |
epss |
| scoring_elements |
0.55461 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00324 |
| scoring_system |
epss |
| scoring_elements |
0.55485 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00324 |
| scoring_system |
epss |
| scoring_elements |
0.55463 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00324 |
| scoring_system |
epss |
| scoring_elements |
0.55515 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00324 |
| scoring_system |
epss |
| scoring_elements |
0.55516 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00324 |
| scoring_system |
epss |
| scoring_elements |
0.55525 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00324 |
| scoring_system |
epss |
| scoring_elements |
0.55504 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.00324 |
| scoring_system |
epss |
| scoring_elements |
0.55487 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-4398 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-4398
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-sk4s-yzns-jfbk |
|
| 37 |
| url |
VCID-tbyx-yrx3-vfag |
| vulnerability_id |
VCID-tbyx-yrx3-vfag |
| summary |
Heap buffer overflow in libr/bin/format/mach0/mach0.c in GitHub repository radareorg/radare2 prior to 5.8.6. If address sanitizer is disabled during the compiling, the program should executes into the `r_str_ncpy` function. Therefore I think it is very likely to be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/122.html). |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1240 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0024 |
| scoring_system |
epss |
| scoring_elements |
0.46991 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.0024 |
| scoring_system |
epss |
| scoring_elements |
0.47028 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.0024 |
| scoring_system |
epss |
| scoring_elements |
0.47047 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.0024 |
| scoring_system |
epss |
| scoring_elements |
0.46995 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.0024 |
| scoring_system |
epss |
| scoring_elements |
0.47049 |
| published_at |
2026-04-21T12:55:00Z |
|
| 5 |
| value |
0.0024 |
| scoring_system |
epss |
| scoring_elements |
0.47045 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.0024 |
| scoring_system |
epss |
| scoring_elements |
0.47069 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.0024 |
| scoring_system |
epss |
| scoring_elements |
0.47043 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.0024 |
| scoring_system |
epss |
| scoring_elements |
0.47105 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.0024 |
| scoring_system |
epss |
| scoring_elements |
0.47101 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.0024 |
| scoring_system |
epss |
| scoring_elements |
0.47035 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1240 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-1240
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-tbyx-yrx3-vfag |
|
| 38 |
| url |
VCID-tdq4-q57q-ufht |
| vulnerability_id |
VCID-tdq4-q57q-ufht |
| summary |
Out-of-bounds Read in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end of the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1714 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00133 |
| scoring_system |
epss |
| scoring_elements |
0.32832 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00133 |
| scoring_system |
epss |
| scoring_elements |
0.32684 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00146 |
| scoring_system |
epss |
| scoring_elements |
0.35083 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00146 |
| scoring_system |
epss |
| scoring_elements |
0.34963 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00146 |
| scoring_system |
epss |
| scoring_elements |
0.35008 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00146 |
| scoring_system |
epss |
| scoring_elements |
0.35037 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00146 |
| scoring_system |
epss |
| scoring_elements |
0.34858 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.00146 |
| scoring_system |
epss |
| scoring_elements |
0.35005 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00146 |
| scoring_system |
epss |
| scoring_elements |
0.34981 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00146 |
| scoring_system |
epss |
| scoring_elements |
0.35021 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00146 |
| scoring_system |
epss |
| scoring_elements |
0.35006 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00146 |
| scoring_system |
epss |
| scoring_elements |
0.35041 |
| published_at |
2026-04-11T12:55:00Z |
|
| 12 |
| value |
0.00146 |
| scoring_system |
epss |
| scoring_elements |
0.35056 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1714 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-1714
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-tdq4-q57q-ufht |
|
| 39 |
| url |
VCID-te26-ushn-aybj |
| vulnerability_id |
VCID-te26-ushn-aybj |
| summary |
An issue in radareorg radare2 v.0.9.7 through v.5.8.6 and fixed in v.5.8.8 allows a local attacker to cause a denial of service via the grub_sfs_read_extent function. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-26475 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.17687 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.17738 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.17776 |
| published_at |
2026-04-21T12:55:00Z |
|
| 3 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.17959 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.18013 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.17713 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.178 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.17861 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.17877 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.17833 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.17785 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.17729 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-26475 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-26475
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-te26-ushn-aybj |
|
| 40 |
| url |
VCID-tqf6-xzpu-37d9 |
| vulnerability_id |
VCID-tqf6-xzpu-37d9 |
| summary |
Out-of-bounds Read in r_bin_java_constant_value_attr_new function in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end 2f the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash. More details see [CWE-125: Out-of-bounds read](https://cwe.mitre.org/data/definitions/125.html). |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1451 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.5095 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.51003 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.51028 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.50985 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.51042 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.51039 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.51082 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.5106 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.51043 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.51081 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.51087 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.51064 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.51013 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1451 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-1451
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-tqf6-xzpu-37d9 |
|
| 41 |
| url |
VCID-v71n-cp33-7uc9 |
| vulnerability_id |
VCID-v71n-cp33-7uc9 |
| summary |
NULL Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.6.4. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0712 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00425 |
| scoring_system |
epss |
| scoring_elements |
0.62123 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00425 |
| scoring_system |
epss |
| scoring_elements |
0.62184 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00425 |
| scoring_system |
epss |
| scoring_elements |
0.62215 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00425 |
| scoring_system |
epss |
| scoring_elements |
0.62182 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00425 |
| scoring_system |
epss |
| scoring_elements |
0.62232 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00425 |
| scoring_system |
epss |
| scoring_elements |
0.62249 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00425 |
| scoring_system |
epss |
| scoring_elements |
0.62267 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00425 |
| scoring_system |
epss |
| scoring_elements |
0.62257 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00425 |
| scoring_system |
epss |
| scoring_elements |
0.62235 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00425 |
| scoring_system |
epss |
| scoring_elements |
0.6228 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00425 |
| scoring_system |
epss |
| scoring_elements |
0.62287 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00425 |
| scoring_system |
epss |
| scoring_elements |
0.62272 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00425 |
| scoring_system |
epss |
| scoring_elements |
0.62282 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0712 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-0712
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-v71n-cp33-7uc9 |
|
| 42 |
| url |
VCID-v86n-wjus-g7h5 |
| vulnerability_id |
VCID-v86n-wjus-g7h5 |
| summary |
radare2 v5.8.3 was discovered to contain a segmentation fault via the component wasm_dis at p/wasm/wasm.c. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-27114 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22286 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22492 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22489 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22439 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22589 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22631 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22418 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.225 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22554 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22572 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22531 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22477 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-27114 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-27114
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-v86n-wjus-g7h5 |
|
| 43 |
| url |
VCID-w45p-1p1t-tkav |
| vulnerability_id |
VCID-w45p-1p1t-tkav |
| summary |
Radare2 v5.7.2 was discovered to contain a NULL pointer dereference via the function r_bin_file_xtr_load_buffer at bin/bfile.c. This vulnerability allows attackers to cause a Denial of Service (DOS) via a crafted binary file. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-34520 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32799 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32835 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32656 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32704 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.3273 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32731 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32695 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32667 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32706 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32683 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32653 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32499 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-34520 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-34520
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-w45p-1p1t-tkav |
|
| 44 |
| url |
VCID-w5bc-f4gs-aqa6 |
| vulnerability_id |
VCID-w5bc-f4gs-aqa6 |
| summary |
Improper Validation of Array Index in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is heap overflow and may be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/122.html). |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1237 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00258 |
| scoring_system |
epss |
| scoring_elements |
0.49093 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00258 |
| scoring_system |
epss |
| scoring_elements |
0.49126 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00258 |
| scoring_system |
epss |
| scoring_elements |
0.49156 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00258 |
| scoring_system |
epss |
| scoring_elements |
0.49108 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00258 |
| scoring_system |
epss |
| scoring_elements |
0.49162 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00258 |
| scoring_system |
epss |
| scoring_elements |
0.49159 |
| published_at |
2026-04-24T12:55:00Z |
|
| 6 |
| value |
0.00258 |
| scoring_system |
epss |
| scoring_elements |
0.49176 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00258 |
| scoring_system |
epss |
| scoring_elements |
0.4915 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00258 |
| scoring_system |
epss |
| scoring_elements |
0.49202 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00258 |
| scoring_system |
epss |
| scoring_elements |
0.492 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00258 |
| scoring_system |
epss |
| scoring_elements |
0.49169 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1237 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-1237
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-w5bc-f4gs-aqa6 |
|
| 45 |
| url |
VCID-wkg7-9vfg-rbgc |
| vulnerability_id |
VCID-wkg7-9vfg-rbgc |
| summary |
radare2 5.8.9 has an out-of-bounds read in r_bin_object_set_items in libr/bin/bobj.c, causing a crash in r_read_le32 in libr/include/r_endian.h. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-47016 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00179 |
| scoring_system |
epss |
| scoring_elements |
0.39206 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00179 |
| scoring_system |
epss |
| scoring_elements |
0.3948 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00179 |
| scoring_system |
epss |
| scoring_elements |
0.39463 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00179 |
| scoring_system |
epss |
| scoring_elements |
0.39514 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00179 |
| scoring_system |
epss |
| scoring_elements |
0.39486 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00179 |
| scoring_system |
epss |
| scoring_elements |
0.39402 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00179 |
| scoring_system |
epss |
| scoring_elements |
0.39499 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00179 |
| scoring_system |
epss |
| scoring_elements |
0.39522 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00179 |
| scoring_system |
epss |
| scoring_elements |
0.39437 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00179 |
| scoring_system |
epss |
| scoring_elements |
0.39492 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.00179 |
| scoring_system |
epss |
| scoring_elements |
0.39508 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.00179 |
| scoring_system |
epss |
| scoring_elements |
0.39519 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-47016 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-47016
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wkg7-9vfg-rbgc |
|
| 46 |
| url |
VCID-x1ew-h8tp-67c2 |
| vulnerability_id |
VCID-x1ew-h8tp-67c2 |
| summary |
Out-of-bounds Read in GitHub repository radareorg/radare2 prior to 5.7.0. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1899 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00454 |
| scoring_system |
epss |
| scoring_elements |
0.6371 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00454 |
| scoring_system |
epss |
| scoring_elements |
0.63771 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00454 |
| scoring_system |
epss |
| scoring_elements |
0.63798 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00454 |
| scoring_system |
epss |
| scoring_elements |
0.63754 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00454 |
| scoring_system |
epss |
| scoring_elements |
0.63806 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00454 |
| scoring_system |
epss |
| scoring_elements |
0.63823 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00454 |
| scoring_system |
epss |
| scoring_elements |
0.63836 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00454 |
| scoring_system |
epss |
| scoring_elements |
0.63822 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00454 |
| scoring_system |
epss |
| scoring_elements |
0.63789 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00454 |
| scoring_system |
epss |
| scoring_elements |
0.63824 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00454 |
| scoring_system |
epss |
| scoring_elements |
0.63833 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00454 |
| scoring_system |
epss |
| scoring_elements |
0.63821 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00454 |
| scoring_system |
epss |
| scoring_elements |
0.63837 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1899 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-1899
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-x1ew-h8tp-67c2 |
|
| 47 |
| url |
VCID-xgjj-4vb7-uubp |
| vulnerability_id |
VCID-xgjj-4vb7-uubp |
| summary |
Radare2 v5.7.0 was discovered to contain a heap buffer overflow via the function consume_encoded_name_new at format/wasm/wasm.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted binary file. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-34502 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00142 |
| scoring_system |
epss |
| scoring_elements |
0.34539 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00142 |
| scoring_system |
epss |
| scoring_elements |
0.34567 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00142 |
| scoring_system |
epss |
| scoring_elements |
0.34434 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00142 |
| scoring_system |
epss |
| scoring_elements |
0.34477 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00142 |
| scoring_system |
epss |
| scoring_elements |
0.34506 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00142 |
| scoring_system |
epss |
| scoring_elements |
0.34507 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00142 |
| scoring_system |
epss |
| scoring_elements |
0.34468 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00142 |
| scoring_system |
epss |
| scoring_elements |
0.34444 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00142 |
| scoring_system |
epss |
| scoring_elements |
0.3448 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00142 |
| scoring_system |
epss |
| scoring_elements |
0.34465 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00142 |
| scoring_system |
epss |
| scoring_elements |
0.34425 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00142 |
| scoring_system |
epss |
| scoring_elements |
0.34053 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-34502 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-34502
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xgjj-4vb7-uubp |
|
| 48 |
| url |
VCID-y9b9-yzvm-e3df |
| vulnerability_id |
VCID-y9b9-yzvm-e3df |
| summary |
Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.6.8. The bug causes the program reads data past the end of the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1383 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00242 |
| scoring_system |
epss |
| scoring_elements |
0.47401 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00242 |
| scoring_system |
epss |
| scoring_elements |
0.47435 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00242 |
| scoring_system |
epss |
| scoring_elements |
0.47456 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00242 |
| scoring_system |
epss |
| scoring_elements |
0.47406 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00242 |
| scoring_system |
epss |
| scoring_elements |
0.4746 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00242 |
| scoring_system |
epss |
| scoring_elements |
0.47457 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00242 |
| scoring_system |
epss |
| scoring_elements |
0.4748 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00242 |
| scoring_system |
epss |
| scoring_elements |
0.47455 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00242 |
| scoring_system |
epss |
| scoring_elements |
0.47462 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00242 |
| scoring_system |
epss |
| scoring_elements |
0.47521 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00242 |
| scoring_system |
epss |
| scoring_elements |
0.47513 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00242 |
| scoring_system |
epss |
| scoring_elements |
0.47466 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00242 |
| scoring_system |
epss |
| scoring_elements |
0.47452 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1383 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-1383
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-y9b9-yzvm-e3df |
|
| 49 |
| url |
VCID-ynz2-8u9q-2yba |
| vulnerability_id |
VCID-ynz2-8u9q-2yba |
| summary |
Use After Free in GitHub repository radareorg/radare2 prior to 5.6.2. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0523 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0024 |
| scoring_system |
epss |
| scoring_elements |
0.4724 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.0024 |
| scoring_system |
epss |
| scoring_elements |
0.47277 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.0024 |
| scoring_system |
epss |
| scoring_elements |
0.47296 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.0024 |
| scoring_system |
epss |
| scoring_elements |
0.47243 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.0024 |
| scoring_system |
epss |
| scoring_elements |
0.47298 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.0024 |
| scoring_system |
epss |
| scoring_elements |
0.47294 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.0024 |
| scoring_system |
epss |
| scoring_elements |
0.47318 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.0024 |
| scoring_system |
epss |
| scoring_elements |
0.47293 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.0024 |
| scoring_system |
epss |
| scoring_elements |
0.473 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.0024 |
| scoring_system |
epss |
| scoring_elements |
0.47358 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.0024 |
| scoring_system |
epss |
| scoring_elements |
0.47353 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.0024 |
| scoring_system |
epss |
| scoring_elements |
0.47303 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.0024 |
| scoring_system |
epss |
| scoring_elements |
0.47288 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0523 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-0523
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ynz2-8u9q-2yba |
|
| 50 |
| url |
VCID-yycm-mx2c-tkae |
| vulnerability_id |
VCID-yycm-mx2c-tkae |
| summary |
Access of Uninitialized Pointer in GitHub repository radareorg/radare2 prior to 5.7.0. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1809 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.50647 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.507 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.50726 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.50682 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.50737 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.50734 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.50776 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.50752 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.50777 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.50783 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.50763 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.50712 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1809 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-1809
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-yycm-mx2c-tkae |
|
| 51 |
| url |
VCID-z1c6-6naw-byeg |
| vulnerability_id |
VCID-z1c6-6naw-byeg |
| summary |
Out-of-bounds Read in r_bin_java_bootstrap_methods_attr_new function in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end 2f the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash. More details see [CWE-125: Out-of-bounds read](https://cwe.mitre.org/data/definitions/125.html). |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1452 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.5095 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.51003 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.51028 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.50985 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.51042 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.51039 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.51082 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.5106 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.51043 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.51081 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.51087 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.51064 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00276 |
| scoring_system |
epss |
| scoring_elements |
0.51013 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1452 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-1452
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-z1c6-6naw-byeg |
|
| 52 |
| url |
VCID-zec6-qhn1-4qh2 |
| vulnerability_id |
VCID-zec6-qhn1-4qh2 |
| summary |
Denial of Service in GitHub repository radareorg/radare2 prior to 5.6.4. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0476 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00225 |
| scoring_system |
epss |
| scoring_elements |
0.45129 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00225 |
| scoring_system |
epss |
| scoring_elements |
0.4521 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00225 |
| scoring_system |
epss |
| scoring_elements |
0.45233 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00225 |
| scoring_system |
epss |
| scoring_elements |
0.45175 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00225 |
| scoring_system |
epss |
| scoring_elements |
0.4523 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00225 |
| scoring_system |
epss |
| scoring_elements |
0.45229 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00225 |
| scoring_system |
epss |
| scoring_elements |
0.4525 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00225 |
| scoring_system |
epss |
| scoring_elements |
0.45218 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00225 |
| scoring_system |
epss |
| scoring_elements |
0.4522 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00225 |
| scoring_system |
epss |
| scoring_elements |
0.45271 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00225 |
| scoring_system |
epss |
| scoring_elements |
0.45265 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00225 |
| scoring_system |
epss |
| scoring_elements |
0.45217 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0476 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-0476
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zec6-qhn1-4qh2 |
|