Lookup for vulnerable packages by Package URL.
| Purl | pkg:apk/alpine/radare2@4.0.0-r0?arch=aarch64&distroversion=v3.21&reponame=community |
| Type | apk |
| Namespace | alpine |
| Name | radare2 |
| Version | 4.0.0-r0 |
| Qualifiers |
| arch |
aarch64 |
| distroversion |
v3.21 |
| reponame |
community |
|
| Subpath | |
| Is_vulnerable | false |
| Next_non_vulnerable_version | 4.4.0-r0 |
| Latest_non_vulnerable_version | 5.8.2-r0 |
| Affected_by_vulnerabilities |
|
| Fixing_vulnerabilities |
| 0 |
| url |
VCID-6s39-wdz1-yuhz |
| vulnerability_id |
VCID-6s39-wdz1-yuhz |
| summary |
radare2 through 4.0.0 lacks validation of the content variable in the function r_asm_pseudo_incbin at libr/asm/asm.c, ultimately leading to an arbitrary write. This allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted input. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-19647 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0049 |
| scoring_system |
epss |
| scoring_elements |
0.65496 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.0049 |
| scoring_system |
epss |
| scoring_elements |
0.65544 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.0049 |
| scoring_system |
epss |
| scoring_elements |
0.65575 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.0049 |
| scoring_system |
epss |
| scoring_elements |
0.6554 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.0049 |
| scoring_system |
epss |
| scoring_elements |
0.65593 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.0049 |
| scoring_system |
epss |
| scoring_elements |
0.65605 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.0049 |
| scoring_system |
epss |
| scoring_elements |
0.65624 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.0049 |
| scoring_system |
epss |
| scoring_elements |
0.6561 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.0049 |
| scoring_system |
epss |
| scoring_elements |
0.65582 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.0049 |
| scoring_system |
epss |
| scoring_elements |
0.65617 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.0049 |
| scoring_system |
epss |
| scoring_elements |
0.65629 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.0049 |
| scoring_system |
epss |
| scoring_elements |
0.65613 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.0049 |
| scoring_system |
epss |
| scoring_elements |
0.65628 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-19647 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-19647
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6s39-wdz1-yuhz |
|
| 1 |
| url |
VCID-797x-2rdg-efbq |
| vulnerability_id |
VCID-797x-2rdg-efbq |
| summary |
In radare2 through 4.0, there is an integer overflow for the variable new_token_size in the function r_asm_massemble at libr/asm/asm.c. This integer overflow will result in a Use-After-Free for the buffer tokens, which can be filled with arbitrary malicious data after the free. This allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted input. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-19590 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03052 |
| scoring_system |
epss |
| scoring_elements |
0.86636 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.03052 |
| scoring_system |
epss |
| scoring_elements |
0.86647 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.03052 |
| scoring_system |
epss |
| scoring_elements |
0.86667 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.03052 |
| scoring_system |
epss |
| scoring_elements |
0.86666 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.03052 |
| scoring_system |
epss |
| scoring_elements |
0.86684 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.03052 |
| scoring_system |
epss |
| scoring_elements |
0.86694 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.03052 |
| scoring_system |
epss |
| scoring_elements |
0.86708 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.03052 |
| scoring_system |
epss |
| scoring_elements |
0.86705 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.03052 |
| scoring_system |
epss |
| scoring_elements |
0.86698 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.03052 |
| scoring_system |
epss |
| scoring_elements |
0.86711 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.03052 |
| scoring_system |
epss |
| scoring_elements |
0.86717 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.03052 |
| scoring_system |
epss |
| scoring_elements |
0.86728 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-19590 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-19590
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-797x-2rdg-efbq |
|
|
| Risk_score | null |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:apk/alpine/radare2@4.0.0-r0%3Farch=aarch64&distroversion=v3.21&reponame=community |