Radare Radare2 5.1.0

CPE Details

Radare Radare2 5.1.0
5.1.0
2021-05-20
15h46 +00:00
2021-05-26
18h43 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:radare:radare2:5.1.0:*:*:*:*:*:*:*

Informations

Vendor

radare

Product

radare2

Version

5.1.0

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2024-26475 2024-03-14 00h00 +00:00 An issue in radareorg radare2 v.0.9.7 through v.5.8.6 and fixed in v.5.8.8 allows a local attacker to cause a denial of service via the grub_sfs_read_extent function.
5.5
Medium
CVE-2023-47016 2023-11-21 23h00 +00:00 radare2 5.8.9 has an out-of-bounds read in r_bin_object_set_items in libr/bin/bobj.c, causing a crash in r_read_le32 in libr/include/r_endian.h.
7.5
High
CVE-2023-46569 2023-10-27 22h00 +00:00 An out-of-bounds read in radare2 v.5.8.9 and before exists in the print_insn32_fpu function of libr/arch/p/nds32/nds32-dis.h.
9.8
Critical
CVE-2023-46570 2023-10-27 22h00 +00:00 An out-of-bounds read in radare2 v.5.8.9 and before exists in the print_insn32 function of libr/arch/p/nds32/nds32-dis.h.
9.8
Critical
CVE-2023-5686 2023-10-20 16h22 +00:00 Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.9.0.
8.8
High
CVE-2023-4322 2023-08-14 15h27 +00:00 Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.9.0.
9.8
Critical
CVE-2023-1605 2023-03-23 00h00 +00:00 Denial of Service in GitHub repository radareorg/radare2 prior to 5.8.6.
7.5
High
CVE-2023-0302 2023-01-15 00h00 +00:00 Failure to Sanitize Special Elements into a Different Plane (Special Element Injection) in GitHub repository radareorg/radare2 prior to 5.8.2.
7.8
High
CVE-2022-4843 2022-12-29 00h00 +00:00 NULL Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.8.2.
7.5
High
CVE-2022-4398 2022-12-10 00h00 +00:00 Integer Overflow or Wraparound in GitHub repository radareorg/radare2 prior to 5.8.0.
7.8
High
CVE-2022-1899 2022-05-26 14h25 +00:00 Out-of-bounds Read in GitHub repository radareorg/radare2 prior to 5.7.0.
9.1
Critical
CVE-2021-44974 2022-05-25 09h56 +00:00 radareorg radare2 version 5.5.2 is vulnerable to NULL Pointer Dereference via libr/bin/p/bin_symbols.c binary symbol parser.
5.5
Medium
CVE-2022-1809 2022-05-21 20h25 +00:00 Access of Uninitialized Pointer in GitHub repository radareorg/radare2 prior to 5.7.0.
7.8
High
CVE-2022-1714 2022-05-12 22h00 +00:00 Out-of-bounds Read in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end of the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash.
7.1
High
CVE-2022-1649 2022-05-10 07h55 +00:00 Null pointer dereference in libr/bin/format/mach0/mach0.c in radareorg/radare2 in GitHub repository radareorg/radare2 prior to 5.7.0. It is likely to be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/476.html).
5.5
Medium
CVE-2022-1451 2022-04-24 18h50 +00:00 Out-of-bounds Read in r_bin_java_constant_value_attr_new function in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end 2f the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash. More details see [CWE-125: Out-of-bounds read](https://cwe.mitre.org/data/definitions/125.html).
7.1
High
CVE-2022-1452 2022-04-24 18h50 +00:00 Out-of-bounds Read in r_bin_java_bootstrap_methods_attr_new function in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end 2f the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash. More details see [CWE-125: Out-of-bounds read](https://cwe.mitre.org/data/definitions/125.html).
7.1
High
CVE-2022-1444 2022-04-23 19h20 +00:00 heap-use-after-free in GitHub repository radareorg/radare2 prior to 5.7.0. This vulnerability is capable of inducing denial of service.
5.5
Medium
CVE-2022-1437 2022-04-22 12h00 +00:00 Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end of the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash.
7.1
High
CVE-2022-1383 2022-04-16 22h05 +00:00 Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.6.8. The bug causes the program reads data past the end of the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash.
6.1
Medium
CVE-2022-1382 2022-04-16 20h45 +00:00 NULL Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is capable of making the radare2 crash, thus affecting the availability of the system.
5.5
Medium
CVE-2022-1297 2022-04-11 09h50 +00:00 Out-of-bounds Read in r_bin_ne_get_entrypoints function in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability may allow attackers to read sensitive information or cause a crash.
9.1
Critical
CVE-2022-1296 2022-04-11 09h30 +00:00 Out-of-bounds read in `r_bin_ne_get_relocs` function in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability may allow attackers to read sensitive information or cause a crash.
9.1
Critical
CVE-2022-1284 2022-04-08 16h45 +00:00 heap-use-after-free in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is capable of inducing denial of service.
5.5
Medium
CVE-2022-1283 2022-04-08 15h55 +00:00 NULL Pointer Dereference in r_bin_ne_get_entrypoints function in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability allows attackers to cause a denial of service (application crash).
5.5
Medium
CVE-2022-1240 2022-04-06 08h15 +00:00 Heap buffer overflow in libr/bin/format/mach0/mach0.c in GitHub repository radareorg/radare2 prior to 5.8.6. If address sanitizer is disabled during the compiling, the program should executes into the `r_str_ncpy` function. Therefore I think it is very likely to be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/122.html).
7.8
High
CVE-2022-1237 2022-04-06 07h35 +00:00 Improper Validation of Array Index in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is heap overflow and may be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/122.html).
7.8
High
CVE-2022-1238 2022-04-05 22h00 +00:00 Out-of-bounds Write in libr/bin/format/ne/ne.c in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is heap overflow and may be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/122.html).
7.8
High
CVE-2022-1244 2022-04-05 15h55 +00:00 heap-buffer-overflow in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is capable of inducing denial of service.
5.5
Medium
CVE-2022-1207 2022-04-01 17h10 +00:00 Out-of-bounds read in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability allows attackers to read sensitive information from outside the allocated buffer boundary.
6.6
Medium
CVE-2022-1052 2022-03-24 12h05 +00:00 Heap Buffer Overflow in iterate_chained_fixups in GitHub repository radareorg/radare2 prior to 5.6.6.
5.5
Medium
CVE-2022-1061 2022-03-24 08h20 +00:00 Heap Buffer Overflow in parseDragons in GitHub repository radareorg/radare2 prior to 5.6.8.
7.5
High
CVE-2022-1031 2022-03-22 18h40 +00:00 Use After Free in op_is_set_bp in GitHub repository radareorg/radare2 prior to 5.6.6.
7.8
High
CVE-2022-0849 2022-03-05 08h30 +00:00 Use After Free in r_reg_get_name_idx in GitHub repository radareorg/radare2 prior to 5.6.6.
5.5
Medium
CVE-2021-4021 2022-02-24 17h50 +00:00 A vulnerability was found in Radare2 in versions prior to 5.6.2, 5.6.0, 5.5.4 and 5.5.2. Mapping a huge section filled with zeros of an ELF64 binary for MIPS architecture can lead to uncontrolled resource consumption and DoS.
7.5
High
CVE-2022-0695 2022-02-24 11h25 +00:00 Denial of Service in GitHub repository radareorg/radare2 prior to 5.6.4.
5.5
Medium
CVE-2022-0476 2022-02-23 15h40 +00:00 Denial of Service in GitHub repository radareorg/radare2 prior to 5.6.4.
5.5
Medium
CVE-2022-0713 2022-02-22 17h30 +00:00 Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.6.4.
7.1
High
CVE-2022-0712 2022-02-22 16h52 +00:00 NULL Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.6.4.
5.5
Medium
CVE-2022-0676 2022-02-21 23h05 +00:00 Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.6.4.
7.8
High
CVE-2022-0559 2022-02-16 09h15 +00:00 Use After Free in GitHub repository radareorg/radare2 prior to 5.6.2.
9.8
Critical
CVE-2022-0522 2022-02-08 19h55 +00:00 Access of Memory Location Before Start of Buffer in NPM radare2.js prior to 5.6.2.
7.1
High
CVE-2022-0521 2022-02-08 19h50 +00:00 Access of Memory Location After End of Buffer in GitHub repository radareorg/radare2 prior to 5.6.2.
7.1
High
CVE-2022-0520 2022-02-08 19h40 +00:00 Use After Free in NPM radare2.js prior to 5.6.2.
7.8
High
CVE-2022-0519 2022-02-08 19h25 +00:00 Buffer Access with Incorrect Length Value in GitHub repository radareorg/radare2 prior to 5.6.2.
7.1
High
CVE-2022-0518 2022-02-08 19h20 +00:00 Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.6.2.
7.1
High
CVE-2022-0139 2022-02-08 17h40 +00:00 Use After Free in GitHub repository radareorg/radare2 prior to 5.6.0.
9.8
Critical
CVE-2022-0523 2022-02-07 23h00 +00:00 Use After Free in GitHub repository radareorg/radare2 prior to 5.6.2.
7.8
High
CVE-2022-0419 2022-02-01 09h38 +00:00 NULL Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.6.0.
5.5
Medium
CVE-2022-0173 2022-01-11 15h55 +00:00 radare2 is vulnerable to Out-of-bounds Read
5.5
Medium
CVE-2021-32613 2021-05-14 10h11 +00:00 In radare2 through 5.3.0 there is a double free vulnerability in the pyc parse via a crafted file which can lead to DoS.
5.5
Medium