{"api_version":"1","generated_at":"2026-04-18T12:51:37+00:00","cve":"CVE-2022-1452","urls":{"html":"https://cve.report/CVE-2022-1452","api":"https://cve.report/api/cve/CVE-2022-1452.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-1452","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-1452"},"summary":{"title":"CVE-2022-1452","description":"Out-of-bounds Read in r_bin_java_bootstrap_methods_attr_new function in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end 2f the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash. More details see [CWE-125: Out-of-bounds read](https://cwe.mitre.org/data/definitions/125.html).","state":"PUBLIC","assigner":"security@huntr.dev","published_at":"2022-04-24 21:15:00","updated_at":"2022-05-03 17:37:00"},"problem_types":["CWE-125"],"metrics":[],"references":[{"url":"https://huntr.dev/bounties/c8f4c2de-7d96-4ad4-857a-c099effca2d6","name":"https://huntr.dev/bounties/c8f4c2de-7d96-4ad4-857a-c099effca2d6","refsource":"CONFIRM","tags":[],"title":"huntr – Security Bounties for any GitHub repository","mime":"text/html","httpstatus":"404","archivestatus":"404"},{"url":"https://github.com/radareorg/radare2/commit/ecc44b6a2f18ee70ac133365de0e509d26d5e168","name":"https://github.com/radareorg/radare2/commit/ecc44b6a2f18ee70ac133365de0e509d26d5e168","refsource":"MISC","tags":[],"title":"Fix oobread in java parser ##crash · radareorg/radare2@ecc44b6 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-1452","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1452","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"1452","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"radare","cpe5":"radare2","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2022-1452","qid":"503257","title":"Alpine Linux Security Update for radare2"},{"cve":"CVE-2022-1452","qid":"506230","title":"Alpine Linux Security Update for radare2"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security@huntr.dev","ID":"CVE-2022-1452","STATE":"PUBLIC","TITLE":"Out-of-bounds Read in r_bin_java_bootstrap_methods_attr_new function in radareorg/radare2"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"radareorg/radare2","version":{"version_data":[{"version_affected":"<","version_value":"5.7.0"}]}}]},"vendor_name":"radareorg"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Out-of-bounds Read in r_bin_java_bootstrap_methods_attr_new function in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end 2f the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash. More details see [CWE-125: Out-of-bounds read](https://cwe.mitre.org/data/definitions/125.html)."}]},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":7.1,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H","version":"3.0"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-125 Out-of-bounds Read"}]}]},"references":{"reference_data":[{"name":"https://huntr.dev/bounties/c8f4c2de-7d96-4ad4-857a-c099effca2d6","refsource":"CONFIRM","url":"https://huntr.dev/bounties/c8f4c2de-7d96-4ad4-857a-c099effca2d6"},{"name":"https://github.com/radareorg/radare2/commit/ecc44b6a2f18ee70ac133365de0e509d26d5e168","refsource":"MISC","url":"https://github.com/radareorg/radare2/commit/ecc44b6a2f18ee70ac133365de0e509d26d5e168"}]},"source":{"advisory":"c8f4c2de-7d96-4ad4-857a-c099effca2d6","discovery":"EXTERNAL"}},"nvd":{"publishedDate":"2022-04-24 21:15:00","lastModifiedDate":"2022-05-03 17:37:00","problem_types":["CWE-125"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":7.1,"baseSeverity":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.2},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:N/A:P","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"PARTIAL","baseScore":5.8},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*","versionEndExcluding":"5.7.0","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}