{"url":"http://public2.vulnerablecode.io/api/packages/946908?format=json","purl":"pkg:apk/alpine/radare2@5.7.0-r0?arch=armhf&distroversion=v3.19&reponame=community","type":"apk","namespace":"alpine","name":"radare2","version":"5.7.0-r0","qualifiers":{"arch":"armhf","distroversion":"v3.19","reponame":"community"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"5.7.2-r0","latest_non_vulnerable_version":"5.8.2-r0","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/265460?format=json","vulnerability_id":"VCID-8xen-g6z6-hfcs","summary":"Null pointer dereference in libr/bin/format/mach0/mach0.c in radareorg/radare2 in GitHub repository radareorg/radare2 prior to 5.7.0. It is likely to be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/476.html).","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-1649","reference_id":"","reference_type":"","scores":[{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.4807","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48107","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48128","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48077","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.4813","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48125","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48149","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48122","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48133","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48186","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.4818","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48137","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48116","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48072","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.47993","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-1649"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014478","reference_id":"1014478","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014478"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/946908?format=json","purl":"pkg:apk/alpine/radare2@5.7.0-r0?arch=armhf&distroversion=v3.19&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/radare2@5.7.0-r0%3Farch=armhf&distroversion=v3.19&reponame=community"}],"aliases":["CVE-2022-1649"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8xen-g6z6-hfcs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/265338?format=json","vulnerability_id":"VCID-aupe-75b8-fbff","summary":"heap-use-after-free in GitHub repository radareorg/radare2 prior to 5.7.0. This vulnerability is capable of inducing denial of service.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-1444","reference_id":"","reference_type":"","scores":[{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.51996","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.52043","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.52069","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.52035","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.52089","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.52086","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.52138","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.52121","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.52107","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.52147","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.5215","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.52132","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.52079","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.52085","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.52048","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.51994","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-1444"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014478","reference_id":"1014478","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014478"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/946908?format=json","purl":"pkg:apk/alpine/radare2@5.7.0-r0?arch=armhf&distroversion=v3.19&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/radare2@5.7.0-r0%3Farch=armhf&distroversion=v3.19&reponame=community"}],"aliases":["CVE-2022-1444"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-aupe-75b8-fbff"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/265336?format=json","vulnerability_id":"VCID-hkwf-9xsj-xqct","summary":"Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end of the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-1437","reference_id":"","reference_type":"","scores":[{"value":"0.00251","scoring_system":"epss","scoring_elements":"0.48361","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00251","scoring_system":"epss","scoring_elements":"0.48397","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00251","scoring_system":"epss","scoring_elements":"0.48418","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00251","scoring_system":"epss","scoring_elements":"0.48371","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00251","scoring_system":"epss","scoring_elements":"0.48426","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00251","scoring_system":"epss","scoring_elements":"0.4842","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00251","scoring_system":"epss","scoring_elements":"0.48444","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00251","scoring_system":"epss","scoring_elements":"0.48419","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00251","scoring_system":"epss","scoring_elements":"0.48431","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00251","scoring_system":"epss","scoring_elements":"0.48481","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00251","scoring_system":"epss","scoring_elements":"0.48476","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00251","scoring_system":"epss","scoring_elements":"0.48417","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00251","scoring_system":"epss","scoring_elements":"0.48429","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00251","scoring_system":"epss","scoring_elements":"0.48376","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00251","scoring_system":"epss","scoring_elements":"0.48292","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-1437"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014478","reference_id":"1014478","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014478"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/946908?format=json","purl":"pkg:apk/alpine/radare2@5.7.0-r0?arch=armhf&distroversion=v3.19&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/radare2@5.7.0-r0%3Farch=armhf&distroversion=v3.19&reponame=community"}],"aliases":["CVE-2022-1437"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hkwf-9xsj-xqct"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/265505?format=json","vulnerability_id":"VCID-tdq4-q57q-ufht","summary":"Out-of-bounds Read in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end of the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-1714","reference_id":"","reference_type":"","scores":[{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32832","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32684","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32569","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32484","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32343","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35037","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35041","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35005","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34858","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35021","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35006","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34981","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35056","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35083","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34963","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35008","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-1714"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014478","reference_id":"1014478","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014478"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/946908?format=json","purl":"pkg:apk/alpine/radare2@5.7.0-r0?arch=armhf&distroversion=v3.19&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/radare2@5.7.0-r0%3Farch=armhf&distroversion=v3.19&reponame=community"}],"aliases":["CVE-2022-1714"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tdq4-q57q-ufht"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/265339?format=json","vulnerability_id":"VCID-tqf6-xzpu-37d9","summary":"Out-of-bounds Read in r_bin_java_constant_value_attr_new function in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end 2f the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash. More details see [CWE-125: Out-of-bounds read](https://cwe.mitre.org/data/definitions/125.html).","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-1451","reference_id":"","reference_type":"","scores":[{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.5095","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51003","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51028","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.50985","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51042","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51039","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51082","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.5106","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51043","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51081","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51087","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51064","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51013","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.5102","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.5098","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.50912","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-1451"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014478","reference_id":"1014478","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014478"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/946908?format=json","purl":"pkg:apk/alpine/radare2@5.7.0-r0?arch=armhf&distroversion=v3.19&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/radare2@5.7.0-r0%3Farch=armhf&distroversion=v3.19&reponame=community"}],"aliases":["CVE-2022-1451"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tqf6-xzpu-37d9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/265624?format=json","vulnerability_id":"VCID-x1ew-h8tp-67c2","summary":"Out-of-bounds Read in GitHub repository radareorg/radare2 prior to 5.7.0.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-1899","reference_id":"","reference_type":"","scores":[{"value":"0.00454","scoring_system":"epss","scoring_elements":"0.6371","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00454","scoring_system":"epss","scoring_elements":"0.63771","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00454","scoring_system":"epss","scoring_elements":"0.63798","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00454","scoring_system":"epss","scoring_elements":"0.63754","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00454","scoring_system":"epss","scoring_elements":"0.63806","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00454","scoring_system":"epss","scoring_elements":"0.63823","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00454","scoring_system":"epss","scoring_elements":"0.63836","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00454","scoring_system":"epss","scoring_elements":"0.63822","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00454","scoring_system":"epss","scoring_elements":"0.63789","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00454","scoring_system":"epss","scoring_elements":"0.63824","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00454","scoring_system":"epss","scoring_elements":"0.63833","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00454","scoring_system":"epss","scoring_elements":"0.63821","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00454","scoring_system":"epss","scoring_elements":"0.63837","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00454","scoring_system":"epss","scoring_elements":"0.6385","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00454","scoring_system":"epss","scoring_elements":"0.63848","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00454","scoring_system":"epss","scoring_elements":"0.6382","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-1899"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014478","reference_id":"1014478","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014478"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/946908?format=json","purl":"pkg:apk/alpine/radare2@5.7.0-r0?arch=armhf&distroversion=v3.19&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/radare2@5.7.0-r0%3Farch=armhf&distroversion=v3.19&reponame=community"}],"aliases":["CVE-2022-1899"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-x1ew-h8tp-67c2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/265580?format=json","vulnerability_id":"VCID-yycm-mx2c-tkae","summary":"Access of Uninitialized Pointer in GitHub repository radareorg/radare2 prior to 5.7.0.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-1809","reference_id":"","reference_type":"","scores":[{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.50647","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.507","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.50726","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.50682","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.50737","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.50734","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.50776","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.50752","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.50777","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.50783","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.50763","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.50712","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.50721","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.50675","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.50596","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-1809"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014478","reference_id":"1014478","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014478"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/946908?format=json","purl":"pkg:apk/alpine/radare2@5.7.0-r0?arch=armhf&distroversion=v3.19&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/radare2@5.7.0-r0%3Farch=armhf&distroversion=v3.19&reponame=community"}],"aliases":["CVE-2022-1809"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yycm-mx2c-tkae"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/265340?format=json","vulnerability_id":"VCID-z1c6-6naw-byeg","summary":"Out-of-bounds Read in r_bin_java_bootstrap_methods_attr_new function in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end 2f the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash. More details see [CWE-125: Out-of-bounds read](https://cwe.mitre.org/data/definitions/125.html).","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-1452","reference_id":"","reference_type":"","scores":[{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.5095","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51003","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51028","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.50985","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51042","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51039","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51082","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.5106","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51043","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51081","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51087","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51064","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51013","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.5102","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.5098","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.50912","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-1452"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014478","reference_id":"1014478","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014478"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/946908?format=json","purl":"pkg:apk/alpine/radare2@5.7.0-r0?arch=armhf&distroversion=v3.19&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/radare2@5.7.0-r0%3Farch=armhf&distroversion=v3.19&reponame=community"}],"aliases":["CVE-2022-1452"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-z1c6-6naw-byeg"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/radare2@5.7.0-r0%3Farch=armhf&distroversion=v3.19&reponame=community"}