Search CVE reports


Toggle filters

81 – 90 of 153 results


CVE-2022-0518

Medium priority
Needs evaluation

Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.6.2.

1 affected package

radare2

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
radare2 Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2022-0139

Medium priority
Needs evaluation

Use After Free in GitHub repository radareorg/radare2 prior to 5.6.0.

1 affected package

radare2

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
radare2 Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2022-0419

Low priority
Needs evaluation

NULL Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.6.0.

1 affected package

radare2

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
radare2 Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2022-0173

Medium priority
Needs evaluation

radare2 is vulnerable to Out-of-bounds Read

1 affected package

radare2

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
radare2 Needs evaluation Not in release Needs evaluation Needs evaluation
Show less packages

CVE-2021-3673

Medium priority
Needs evaluation

A vulnerability was found in Radare2 in version 5.3.1. Improper input validation when reading a crafted LE binary can lead to resource exhaustion and DoS.

1 affected package

radare2

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
radare2 Needs evaluation Not in release Needs evaluation Needs evaluation
Show less packages

CVE-2021-32613

Medium priority
Needs evaluation

In radare2 through 5.3.0 there is a double free vulnerability in the pyc parse via a crafted file which can lead to DoS.

1 affected package

radare2

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
radare2 Needs evaluation Not in release Needs evaluation Needs evaluation
Show less packages

CVE-2020-17487

Medium priority
Needs evaluation

radare2 4.5.0 misparses signature information in PE files, causing a segmentation fault in r_x509_parse_algorithmidentifier in libr/util/x509.c. This is due to a malformed object identifier in IMAGE_DIRECTORY_ENTRY_SECURITY.

1 affected package

radare2

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
radare2 Needs evaluation Not in release Needs evaluation Needs evaluation
Show less packages

CVE-2020-16269

Low priority
Needs evaluation

radare2 4.5.0 misparses DWARF information in executable files, causing a segmentation fault in parse_typedef in type_dwarf.c via a malformed DW_AT_name in the .debug_info section.

1 affected package

radare2

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
radare2 Needs evaluation Not in release Needs evaluation Needs evaluation
Show less packages

CVE-2020-15121

Medium priority
Needs evaluation

In radare2 before version 4.5.0, malformed PDB file names in the PDB server path cause shell injection. To trigger the problem it's required to open the executable in radare2 and run idpd to trigger the download. The shell code...

1 affected package

radare2

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
radare2 Needs evaluation Not in release Needs evaluation Needs evaluation
Show less packages

CVE-2019-19647

Medium priority
Vulnerable

radare2 through 4.0.0 lacks validation of the content variable in the function r_asm_pseudo_incbin at libr/asm/asm.c, ultimately leading to an arbitrary write. This allows remote attackers to cause a denial of service (application...

1 affected package

radare2

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
radare2 Not affected Not in release Not affected Vulnerable
Show less packages