Search Results (Refine Search)
- Results Type: Overview
- Keyword (text search): cpe:2.3:a:radare:radare2:5.4.2:*:*:*:*:*:*:*
- CPE Name Search: true
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2023-47016 |
radare2 5.8.9 has an out-of-bounds read in r_bin_object_set_items in libr/bin/bobj.c, causing a crash in r_read_le32 in libr/include/r_endian.h. Published: November 22, 2023; 2:15:07 AM -0500 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-46570 |
An out-of-bounds read in radare2 v.5.8.9 and before exists in the print_insn32 function of libr/arch/p/nds32/nds32-dis.h. Published: October 27, 2023; 10:15:07 PM -0400 |
V4.0:(not available) V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2023-46569 |
An out-of-bounds read in radare2 v.5.8.9 and before exists in the print_insn32_fpu function of libr/arch/p/nds32/nds32-dis.h. Published: October 27, 2023; 10:15:07 PM -0400 |
V4.0:(not available) V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2023-5686 |
Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.9.0. Published: October 20, 2023; 1:15:08 PM -0400 |
V4.0:(not available) V3.1: 8.8 HIGH V2.0:(not available) |
CVE-2022-28073 |
A use after free in r_reg_set_value function in radare2 5.4.2 and 5.4.0. Published: August 22, 2023; 3:16:22 PM -0400 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2022-28072 |
A heap buffer overflow in r_read_le32 function in radare25.4.2 and 5.4.0. Published: August 22, 2023; 3:16:22 PM -0400 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2022-28071 |
A use after free in r_reg_get_name_idx function in radare2 5.4.2 and 5.4.0. Published: August 22, 2023; 3:16:22 PM -0400 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2022-28070 |
A null pointer deference in __core_anal_fcn function in radare2 5.4.2 and 5.4.0. Published: August 22, 2023; 3:16:22 PM -0400 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2022-28069 |
A heap buffer overflow in vax_opfunction in radare2 5.4.2 and 5.4.0. Published: August 22, 2023; 3:16:22 PM -0400 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2022-28068 |
A heap buffer overflow in r_sleb128 function in radare2 5.4.2 and 5.4.0. Published: August 22, 2023; 3:16:22 PM -0400 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-4322 |
Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.9.0. Published: August 14, 2023; 12:15:09 PM -0400 |
V4.0:(not available) V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2023-1605 |
Denial of Service in GitHub repository radareorg/radare2 prior to 5.8.6. Published: March 23, 2023; 3:15:12 PM -0400 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-0302 |
Failure to Sanitize Special Elements into a Different Plane (Special Element Injection) in GitHub repository radareorg/radare2 prior to 5.8.2. Published: January 14, 2023; 8:15:15 PM -0500 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2022-4843 |
NULL Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.8.2. Published: December 29, 2022; 1:15:10 PM -0500 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2022-4398 |
Integer Overflow or Wraparound in GitHub repository radareorg/radare2 prior to 5.8.0. Published: December 10, 2022; 3:15:10 PM -0500 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2022-1899 |
Out-of-bounds Read in GitHub repository radareorg/radare2 prior to 5.7.0. Published: May 26, 2022; 1:15:08 PM -0400 |
V4.0:(not available) V3.1: 9.1 CRITICAL V2.0: 6.4 MEDIUM |
CVE-2021-44974 |
radareorg radare2 version 5.5.2 is vulnerable to NULL Pointer Dereference via libr/bin/p/bin_symbols.c binary symbol parser. Published: May 25, 2022; 8:15:07 AM -0400 |
V4.0:(not available) V3.1: 5.5 MEDIUM V2.0: 4.3 MEDIUM |
CVE-2022-1809 |
Access of Uninitialized Pointer in GitHub repository radareorg/radare2 prior to 5.7.0. Published: May 21, 2022; 7:16:11 PM -0400 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0: 6.8 MEDIUM |
CVE-2022-1714 |
Out-of-bounds Read in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end of the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash. Published: May 13, 2022; 11:15:08 AM -0400 |
V4.0:(not available) V3.1: 7.1 HIGH V2.0: 3.6 LOW |
CVE-2022-1649 |
Null pointer dereference in libr/bin/format/mach0/mach0.c in radareorg/radare2 in GitHub repository radareorg/radare2 prior to 5.7.0. It is likely to be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/476.html). Published: May 10, 2022; 1:15:07 PM -0400 |
V4.0:(not available) V3.1: 5.5 MEDIUM V2.0: 4.3 MEDIUM |