Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Radare2
(Radare)Repositories |
• https://github.com/radare/radare2
• https://github.com/devnexen/radare2 |
#Vulnerabilities | 132 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2022-02-24 | CVE-2021-4021 | A vulnerability was found in Radare2 in versions prior to 5.6.2, 5.6.0, 5.5.4 and 5.5.2. Mapping a huge section filled with zeros of an ELF64 binary for MIPS architecture can lead to uncontrolled resource consumption and DoS. | Radare2 | 7.5 | ||
2022-03-05 | CVE-2022-0849 | Use After Free in r_reg_get_name_idx in GitHub repository radareorg/radare2 prior to 5.6.6. | Radare2 | 5.5 | ||
2022-03-22 | CVE-2022-1031 | Use After Free in op_is_set_bp in GitHub repository radareorg/radare2 prior to 5.6.6. | Radare2 | 7.8 | ||
2022-03-24 | CVE-2022-1061 | Heap Buffer Overflow in parseDragons in GitHub repository radareorg/radare2 prior to 5.6.8. | Radare2 | 7.5 | ||
2022-03-24 | CVE-2022-1052 | Heap Buffer Overflow in iterate_chained_fixups in GitHub repository radareorg/radare2 prior to 5.6.6. | Radare2 | 5.5 | ||
2022-04-01 | CVE-2022-1207 | Out-of-bounds read in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability allows attackers to read sensitive information from outside the allocated buffer boundary. | Radare2 | 6.6 | ||
2022-04-05 | CVE-2022-1244 | heap-buffer-overflow in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is capable of inducing denial of service. | Radare2 | 5.5 | ||
2022-04-06 | CVE-2022-1237 | Improper Validation of Array Index in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is heap overflow and may be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/122.html). | Radare2 | 7.8 | ||
2022-04-06 | CVE-2022-1238 | Out-of-bounds Write in libr/bin/format/ne/ne.c in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is heap overflow and may be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/122.html). | Radare2 | 7.8 | ||
2022-04-06 | CVE-2022-1240 | Heap buffer overflow in libr/bin/format/mach0/mach0.c in GitHub repository radareorg/radare2 prior to 5.8.6. If address sanitizer is disabled during the compiling, the program should executes into the `r_str_ncpy` function. Therefore I think it is very likely to be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/122.html). | Radare2 | 7.8 |