Total
133 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2022-28071 | 1 Radare | 1 Radare2 | 2024-11-21 | N/A | 7.5 HIGH |
A use after free in r_reg_get_name_idx function in radare2 5.4.2 and 5.4.0. | |||||
CVE-2022-28070 | 1 Radare | 1 Radare2 | 2024-11-21 | N/A | 7.5 HIGH |
A null pointer deference in __core_anal_fcn function in radare2 5.4.2 and 5.4.0. | |||||
CVE-2022-28069 | 1 Radare | 1 Radare2 | 2024-11-21 | N/A | 7.5 HIGH |
A heap buffer overflow in vax_opfunction in radare2 5.4.2 and 5.4.0. | |||||
CVE-2022-28068 | 1 Radare | 1 Radare2 | 2024-11-21 | N/A | 7.5 HIGH |
A heap buffer overflow in r_sleb128 function in radare2 5.4.2 and 5.4.0. | |||||
CVE-2022-1899 | 1 Radare | 1 Radare2 | 2024-11-21 | 6.4 MEDIUM | 9.1 CRITICAL |
Out-of-bounds Read in GitHub repository radareorg/radare2 prior to 5.7.0. | |||||
CVE-2022-1809 | 1 Radare | 1 Radare2 | 2024-11-21 | 6.8 MEDIUM | 7.8 HIGH |
Access of Uninitialized Pointer in GitHub repository radareorg/radare2 prior to 5.7.0. | |||||
CVE-2022-1714 | 1 Radare | 1 Radare2 | 2024-11-21 | 3.6 LOW | 7.1 HIGH |
Out-of-bounds Read in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end of the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash. | |||||
CVE-2022-1649 | 1 Radare | 1 Radare2 | 2024-11-21 | 4.3 MEDIUM | 5.5 MEDIUM |
Null pointer dereference in libr/bin/format/mach0/mach0.c in radareorg/radare2 in GitHub repository radareorg/radare2 prior to 5.7.0. It is likely to be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/476.html). | |||||
CVE-2022-1452 | 1 Radare | 1 Radare2 | 2024-11-21 | 5.8 MEDIUM | 7.1 HIGH |
Out-of-bounds Read in r_bin_java_bootstrap_methods_attr_new function in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end 2f the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash. More details see [CWE-125: Out-of-bounds read](https://cwe.mitre.org/data/definitions/125.html). | |||||
CVE-2022-1451 | 1 Radare | 1 Radare2 | 2024-11-21 | 5.8 MEDIUM | 7.1 HIGH |
Out-of-bounds Read in r_bin_java_constant_value_attr_new function in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end 2f the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash. More details see [CWE-125: Out-of-bounds read](https://cwe.mitre.org/data/definitions/125.html). | |||||
CVE-2022-1444 | 1 Radare | 1 Radare2 | 2024-11-21 | 4.3 MEDIUM | 5.5 MEDIUM |
heap-use-after-free in GitHub repository radareorg/radare2 prior to 5.7.0. This vulnerability is capable of inducing denial of service. | |||||
CVE-2022-1437 | 1 Radare | 1 Radare2 | 2024-11-21 | 5.8 MEDIUM | 7.1 HIGH |
Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end of the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash. | |||||
CVE-2022-1383 | 1 Radare | 1 Radare2 | 2024-11-21 | 5.8 MEDIUM | 6.1 MEDIUM |
Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.6.8. The bug causes the program reads data past the end of the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash. | |||||
CVE-2022-1382 | 1 Radare | 1 Radare2 | 2024-11-21 | 7.1 HIGH | 5.5 MEDIUM |
NULL Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is capable of making the radare2 crash, thus affecting the availability of the system. | |||||
CVE-2022-1297 | 1 Radare | 1 Radare2 | 2024-11-21 | 6.4 MEDIUM | 9.1 CRITICAL |
Out-of-bounds Read in r_bin_ne_get_entrypoints function in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability may allow attackers to read sensitive information or cause a crash. | |||||
CVE-2022-1296 | 1 Radare | 1 Radare2 | 2024-11-21 | 6.4 MEDIUM | 9.1 CRITICAL |
Out-of-bounds read in `r_bin_ne_get_relocs` function in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability may allow attackers to read sensitive information or cause a crash. | |||||
CVE-2022-1284 | 1 Radare | 1 Radare2 | 2024-11-21 | 4.3 MEDIUM | 5.5 MEDIUM |
heap-use-after-free in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is capable of inducing denial of service. | |||||
CVE-2022-1283 | 1 Radare | 1 Radare2 | 2024-11-21 | 4.3 MEDIUM | 5.5 MEDIUM |
NULL Pointer Dereference in r_bin_ne_get_entrypoints function in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability allows attackers to cause a denial of service (application crash). | |||||
CVE-2022-1244 | 1 Radare | 1 Radare2 | 2024-11-21 | 4.3 MEDIUM | 5.5 MEDIUM |
heap-buffer-overflow in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is capable of inducing denial of service. | |||||
CVE-2022-1240 | 1 Radare | 1 Radare2 | 2024-11-21 | 6.8 MEDIUM | 7.8 HIGH |
Heap buffer overflow in libr/bin/format/mach0/mach0.c in GitHub repository radareorg/radare2 prior to 5.8.6. If address sanitizer is disabled during the compiling, the program should executes into the `r_str_ncpy` function. Therefore I think it is very likely to be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/122.html). |