Lookup for vulnerable packages by Package URL.

GET /api/packages/378141?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/378141?format=api",
    "purl": "pkg:apk/alpine/radare2@5.6.8-r0?arch=ppc64le&distroversion=v3.23&reponame=community",
    "type": "apk",
    "namespace": "alpine",
    "name": "radare2",
    "version": "5.6.8-r0",
    "qualifiers": {
        "arch": "ppc64le",
        "distroversion": "v3.23",
        "reponame": "community"
    },
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "5.7.0-r0",
    "latest_non_vulnerable_version": "5.8.2-r0",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/265235?format=api",
            "vulnerability_id": "VCID-5rv8-9w1a-9yag",
            "summary": "heap-use-after-free in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is capable of inducing denial of service.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-1284",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00286",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51996",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00286",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52043",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00286",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52069",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00286",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52035",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00286",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52089",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00286",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52086",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00286",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52138",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00286",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52121",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00286",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52107",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00286",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52147",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00286",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5215",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00286",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52132",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00286",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52079",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00286",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52085",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00286",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52048",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-1284"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014478",
                    "reference_id": "1014478",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014478"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/378141?format=api",
                    "purl": "pkg:apk/alpine/radare2@5.6.8-r0?arch=ppc64le&distroversion=v3.23&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/radare2@5.6.8-r0%3Farch=ppc64le&distroversion=v3.23&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2022-1284"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5rv8-9w1a-9yag"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/265243?format=api",
            "vulnerability_id": "VCID-5xy5-6f5d-83c7",
            "summary": "Out-of-bounds Read in r_bin_ne_get_entrypoints function in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability may allow attackers to read sensitive information or cause a crash.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-1297",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00297",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52944",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00297",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52969",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00297",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52994",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00297",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52961",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00297",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53012",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00297",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53006",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00297",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53055",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00297",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5304",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00297",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53023",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00297",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53061",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00297",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53068",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00297",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5305",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00297",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53016",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00297",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53025",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00297",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52985",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-1297"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014478",
                    "reference_id": "1014478",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014478"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/378141?format=api",
                    "purl": "pkg:apk/alpine/radare2@5.6.8-r0?arch=ppc64le&distroversion=v3.23&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/radare2@5.6.8-r0%3Farch=ppc64le&distroversion=v3.23&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2022-1297"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5xy5-6f5d-83c7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/265242?format=api",
            "vulnerability_id": "VCID-6zbf-v2qf-kudb",
            "summary": "Out-of-bounds read in `r_bin_ne_get_relocs` function in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability may allow attackers to read sensitive information or cause a crash.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-1296",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00283",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51594",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00283",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51645",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00283",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5167",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00283",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51631",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00283",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51685",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00283",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51681",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00283",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5173",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00283",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51708",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00283",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51692",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00283",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51733",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00283",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5174",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00283",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5172",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00283",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51672",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00283",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51678",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00283",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51638",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-1296"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014478",
                    "reference_id": "1014478",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014478"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/378141?format=api",
                    "purl": "pkg:apk/alpine/radare2@5.6.8-r0?arch=ppc64le&distroversion=v3.23&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/radare2@5.6.8-r0%3Farch=ppc64le&distroversion=v3.23&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2022-1296"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6zbf-v2qf-kudb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/265210?format=api",
            "vulnerability_id": "VCID-7hzf-vk9r-dfh1",
            "summary": "heap-buffer-overflow in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is capable of inducing denial of service.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-1244",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00286",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51996",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00286",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52043",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00286",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52069",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00286",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52035",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00286",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52089",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00286",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52086",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00286",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52138",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00286",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52121",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00286",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52107",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00286",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52147",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00286",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5215",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00286",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52132",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00286",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52079",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00286",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52085",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00286",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52048",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-1244"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014478",
                    "reference_id": "1014478",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014478"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/378141?format=api",
                    "purl": "pkg:apk/alpine/radare2@5.6.8-r0?arch=ppc64le&distroversion=v3.23&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/radare2@5.6.8-r0%3Farch=ppc64le&distroversion=v3.23&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2022-1244"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7hzf-vk9r-dfh1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/265187?format=api",
            "vulnerability_id": "VCID-e4sm-emrh-qkc9",
            "summary": "Out-of-bounds read in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability allows attackers to read sensitive information from outside the allocated buffer boundary.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-1207",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28699",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28781",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2883",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28635",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28701",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2874",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28744",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.287",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28651",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28671",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28646",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28599",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28485",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28372",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28297",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-1207"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014478",
                    "reference_id": "1014478",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014478"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/378141?format=api",
                    "purl": "pkg:apk/alpine/radare2@5.6.8-r0?arch=ppc64le&distroversion=v3.23&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/radare2@5.6.8-r0%3Farch=ppc64le&distroversion=v3.23&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2022-1207"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e4sm-emrh-qkc9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/265096?format=api",
            "vulnerability_id": "VCID-h43t-cy2h-jfdv",
            "summary": "Heap Buffer Overflow in parseDragons in GitHub repository radareorg/radare2 prior to 5.6.8.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-1061",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50418",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50474",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50502",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50456",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5051",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50506",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50548",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50525",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50553",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50558",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50535",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50482",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5049",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50445",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-1061"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014478",
                    "reference_id": "1014478",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014478"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/378141?format=api",
                    "purl": "pkg:apk/alpine/radare2@5.6.8-r0?arch=ppc64le&distroversion=v3.23&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/radare2@5.6.8-r0%3Farch=ppc64le&distroversion=v3.23&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2022-1061"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h43t-cy2h-jfdv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/265294?format=api",
            "vulnerability_id": "VCID-n5c5-p9qk-zkgz",
            "summary": "NULL Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is capable of making the radare2 crash, thus affecting the availability of the system.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-1382",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00249",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48146",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00249",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48183",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00249",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48202",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00249",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48154",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00249",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48208",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00249",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48201",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00249",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48225",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00249",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48199",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00249",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48211",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00249",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48262",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00249",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48258",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00249",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48213",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00249",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48195",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00249",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48205",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00249",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48151",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-1382"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014478",
                    "reference_id": "1014478",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014478"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/378141?format=api",
                    "purl": "pkg:apk/alpine/radare2@5.6.8-r0?arch=ppc64le&distroversion=v3.23&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/radare2@5.6.8-r0%3Farch=ppc64le&distroversion=v3.23&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2022-1382"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n5c5-p9qk-zkgz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/265234?format=api",
            "vulnerability_id": "VCID-nuzb-2zqv-wbgf",
            "summary": "NULL Pointer Dereference in r_bin_ne_get_entrypoints function in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability allows attackers to cause a denial of service (application crash).",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-1283",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50624",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50677",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50703",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50659",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50714",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5071",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50752",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50729",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50754",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5076",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5074",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50689",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50698",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50653",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-1283"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014478",
                    "reference_id": "1014478",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014478"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/378141?format=api",
                    "purl": "pkg:apk/alpine/radare2@5.6.8-r0?arch=ppc64le&distroversion=v3.23&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/radare2@5.6.8-r0%3Farch=ppc64le&distroversion=v3.23&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2022-1283"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nuzb-2zqv-wbgf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/265206?format=api",
            "vulnerability_id": "VCID-pt1y-cpch-1qfn",
            "summary": "Out-of-bounds Write in libr/bin/format/ne/ne.c in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is heap overflow and may be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/122.html).",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-1238",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00269",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50334",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00269",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5039",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00269",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5042",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00269",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50372",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00269",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50425",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00269",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50419",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00269",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5046",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00269",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50437",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00269",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50422",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00269",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50465",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00269",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50469",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00269",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50445",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00269",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50391",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00269",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50401",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00269",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50352",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-1238"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014478",
                    "reference_id": "1014478",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014478"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/378141?format=api",
                    "purl": "pkg:apk/alpine/radare2@5.6.8-r0?arch=ppc64le&distroversion=v3.23&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/radare2@5.6.8-r0%3Farch=ppc64le&distroversion=v3.23&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2022-1238"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pt1y-cpch-1qfn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/265205?format=api",
            "vulnerability_id": "VCID-w5bc-f4gs-aqa6",
            "summary": "Improper Validation of Array Index in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is heap overflow and may be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/122.html).",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-1237",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49093",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49126",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49156",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49108",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49162",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49159",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49176",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4915",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49202",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.492",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49169",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49168",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49124",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-1237"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014478",
                    "reference_id": "1014478",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014478"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/378141?format=api",
                    "purl": "pkg:apk/alpine/radare2@5.6.8-r0?arch=ppc64le&distroversion=v3.23&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/radare2@5.6.8-r0%3Farch=ppc64le&distroversion=v3.23&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2022-1237"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w5bc-f4gs-aqa6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/265295?format=api",
            "vulnerability_id": "VCID-y9b9-yzvm-e3df",
            "summary": "Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.6.8. The bug causes the program reads data past the end of the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-1383",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47401",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47435",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47456",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47406",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4746",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47457",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4748",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47455",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47462",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47521",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47513",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47466",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47452",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47461",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47408",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-1383"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014478",
                    "reference_id": "1014478",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014478"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/378141?format=api",
                    "purl": "pkg:apk/alpine/radare2@5.6.8-r0?arch=ppc64le&distroversion=v3.23&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/radare2@5.6.8-r0%3Farch=ppc64le&distroversion=v3.23&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2022-1383"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y9b9-yzvm-e3df"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/radare2@5.6.8-r0%3Farch=ppc64le&distroversion=v3.23&reponame=community"
}