Search CVE reports
81 – 90 of 153 results
Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.6.2.
1 affected package
radare2
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| radare2 | Needs evaluation | — | Needs evaluation | Needs evaluation |
Use After Free in GitHub repository radareorg/radare2 prior to 5.6.0.
1 affected package
radare2
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| radare2 | Needs evaluation | — | Needs evaluation | Needs evaluation |
NULL Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.6.0.
1 affected package
radare2
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| radare2 | Needs evaluation | — | Needs evaluation | Needs evaluation |
radare2 is vulnerable to Out-of-bounds Read
1 affected package
radare2
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| radare2 | Needs evaluation | Not in release | Needs evaluation | Needs evaluation |
A vulnerability was found in Radare2 in version 5.3.1. Improper input validation when reading a crafted LE binary can lead to resource exhaustion and DoS.
1 affected package
radare2
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| radare2 | Needs evaluation | Not in release | Needs evaluation | Needs evaluation |
In radare2 through 5.3.0 there is a double free vulnerability in the pyc parse via a crafted file which can lead to DoS.
1 affected package
radare2
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| radare2 | Needs evaluation | Not in release | Needs evaluation | Needs evaluation |
radare2 4.5.0 misparses signature information in PE files, causing a segmentation fault in r_x509_parse_algorithmidentifier in libr/util/x509.c. This is due to a malformed object identifier in IMAGE_DIRECTORY_ENTRY_SECURITY.
1 affected package
radare2
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| radare2 | Needs evaluation | Not in release | Needs evaluation | Needs evaluation |
radare2 4.5.0 misparses DWARF information in executable files, causing a segmentation fault in parse_typedef in type_dwarf.c via a malformed DW_AT_name in the .debug_info section.
1 affected package
radare2
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| radare2 | Needs evaluation | Not in release | Needs evaluation | Needs evaluation |
In radare2 before version 4.5.0, malformed PDB file names in the PDB server path cause shell injection. To trigger the problem it's required to open the executable in radare2 and run idpd to trigger the download. The shell code...
1 affected package
radare2
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| radare2 | Needs evaluation | Not in release | Needs evaluation | Needs evaluation |
radare2 through 4.0.0 lacks validation of the content variable in the function r_asm_pseudo_incbin at libr/asm/asm.c, ultimately leading to an arbitrary write. This allows remote attackers to cause a denial of service (application...
1 affected package
radare2
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| radare2 | Not affected | Not in release | Not affected | Vulnerable |