CVE ID | Published | Description | Score | Severity |
---|---|---|---|---|
An issue in radareorg radare2 v.0.9.7 through v.5.8.6 and fixed in v.5.8.8 allows a local attacker to cause a denial of service via the grub_sfs_read_extent function. | 5.5 |
Medium |
||
radare2 5.8.9 has an out-of-bounds read in r_bin_object_set_items in libr/bin/bobj.c, causing a crash in r_read_le32 in libr/include/r_endian.h. | 7.5 |
High |
||
An out-of-bounds read in radare2 v.5.8.9 and before exists in the print_insn32_fpu function of libr/arch/p/nds32/nds32-dis.h. | 9.8 |
Critical |
||
An out-of-bounds read in radare2 v.5.8.9 and before exists in the print_insn32 function of libr/arch/p/nds32/nds32-dis.h. | 9.8 |
Critical |
||
Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.9.0. | 8.8 |
High |
||
Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.9.0. | 9.8 |
Critical |
||
Denial of Service in GitHub repository radareorg/radare2 prior to 5.8.6. | 7.5 |
High |
||
Failure to Sanitize Special Elements into a Different Plane (Special Element Injection) in GitHub repository radareorg/radare2 prior to 5.8.2. | 7.8 |
High |
||
NULL Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.8.2. | 7.5 |
High |
||
Integer Overflow or Wraparound in GitHub repository radareorg/radare2 prior to 5.8.0. | 7.8 |
High |
||
Radare2 v5.7.0 was discovered to contain a heap buffer overflow via the function consume_encoded_name_new at format/wasm/wasm.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted binary file. | 5.5 |
Medium |