Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Radare2
(Radare)Repositories |
• https://github.com/radare/radare2
• https://github.com/devnexen/radare2 |
#Vulnerabilities | 111 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2022-02-24 | CVE-2021-4021 | A vulnerability was found in Radare2 in versions prior to 5.6.2, 5.6.0, 5.5.4 and 5.5.2. Mapping a huge section filled with zeros of an ELF64 binary for MIPS architecture can lead to uncontrolled resource consumption and DoS. | Radare2 | 7.5 | ||
2022-02-01 | CVE-2022-0419 | NULL Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.6.0. | Fedora, Radare2 | 5.5 | ||
2022-07-22 | CVE-2022-34502 | Radare2 v5.7.0 was discovered to contain a heap buffer overflow via the function consume_encoded_name_new at format/wasm/wasm.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted binary file. | Radare2 | 5.5 | ||
2022-07-22 | CVE-2022-34520 | Radare2 v5.7.2 was discovered to contain a NULL pointer dereference via the function r_bin_file_xtr_load_buffer at bin/bfile.c. This vulnerability allows attackers to cause a Denial of Service (DOS) via a crafted binary file. | Radare2 | 5.5 | ||
2022-05-24 | CVE-2021-44975 | radareorg radare2 5.5.2 is vulnerable to Buffer Overflow via /libr/core/anal_objc.c mach-o parser. | Radare2 | 5.5 | ||
2022-05-21 | CVE-2022-1809 | Access of Uninitialized Pointer in GitHub repository radareorg/radare2 prior to 5.7.0. | Radare2 | 7.8 | ||
2022-05-25 | CVE-2021-44974 | radareorg radare2 version 5.5.2 is vulnerable to NULL Pointer Dereference via libr/bin/p/bin_symbols.c binary symbol parser. | Radare2 | 5.5 | ||
2022-05-26 | CVE-2022-1899 | Out-of-bounds Read in GitHub repository radareorg/radare2 prior to 5.7.0. | Radare2 | 9.1 | ||
2022-05-13 | CVE-2022-1714 | Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end of the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash. | Radare2 | 7.1 | ||
2022-05-10 | CVE-2022-1649 | Null pointer dereference in libr/bin/format/mach0/mach0.c in radareorg/radare2 in GitHub repository radareorg/radare2 prior to 5.7.0. It is likely to be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/476.html). | Radare2 | 5.5 |