Known Vulnerabilities for Radareorg/radare2 by Radareorg

Listed below are 10 of the newest known vulnerabilities associated with the software "Radareorg/radare2" by "Radareorg".

These CVEs are retrieved based on exact matches on listed software and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.

Data on known vulnerable versions is also displayed based on information from known CPEs

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2022-1899 Out-of-bounds Read in GitHub repository radareorg/radare2 prior to 5.7.0. 7.7 - HIGH 2022-05-26 2022-05-26
CVE-2022-1809 Access of Uninitialized Pointer in GitHub repository radareorg/radare2 prior to 5.7.0. 7.4 - HIGH 2022-05-21 2022-05-21
CVE-2022-1714 Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past ... 7.9 - HIGH 2022-05-13 2022-05-13
CVE-2022-1649 Null pointer dereference in libr/bin/format/mach0/mach0.c in radareorg/radare2 in GitHub repository radareorg/radare2 prior t... 7.6 - HIGH 2022-05-10 2022-05-10
CVE-2022-1452 Out-of-bounds Read in r_bin_java_bootstrap_methods_attr_new function in GitHub repository radareorg/radare2 prior to 5.7.0. T... 7.1 - HIGH 2022-04-24 2022-04-24
CVE-2022-1451 Out-of-bounds Read in r_bin_java_constant_value_attr_new function in GitHub repository radareorg/radare2 prior to 5.7.0. The ... 7.1 - HIGH 2022-04-24 2022-04-24
CVE-2022-1444 heap-use-after-free in GitHub repository radareorg/radare2 prior to 5.7.0. This vulnerability is capable of inducing denial o... 7.5 - HIGH 2022-04-23 2022-04-23
CVE-2022-1437 Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past ... 5.3 - MEDIUM 2022-04-22 2022-04-22
CVE-2022-1383 Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.6.8. The bug causes the program reads data past ... 4.8 - MEDIUM 2022-04-18 2022-04-17
CVE-2022-1382 NULL Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is capable of making the r... 5.3 - MEDIUM 2022-04-18 2022-04-16

Popular searches for Radareorg/radare2

GitHub - radareorg/radare2: UNIX-like reverse engineering framework and command-line toolset

github.com/radareorg/radare2

GitHub - radareorg/radare2: UNIX-like reverse engineering framework and command-line toolset P N LUNIX-like reverse engineering framework and command-line toolset - GitHub - radareorg N L J/radare2: UNIX-like reverse engineering framework and command-line toolset

github.com/radare/radare2 github.com/radare/radare2 github.com/radare/radare2 github.com/radare/radare2/wiki/R2PipeAPI github.com/radare/radare2/wiki/ESIL GitHub Command-line interface Reverse engineering Unix-like Software framework Radare2 Plug-in (computing) Installation (computer programs) Package manager Git Mkdir Repository (version control) Software repository Programming tool Emulator WebAssembly Symbolic execution Decompiler Binary file QNX

Releases · radareorg/radare2

github.com/radareorg/radare2/releases

Releases radareorg/radare2 G E CUNIX-like reverse engineering framework and command-line toolset - radareorg /radare2

github.com/radare/radare2/releases Radare2 Command (computing) GitHub Plug-in (computing) Parsing ARM architecture Command-line interface Application programming interface Crash (computing) Implementation Disassembler Debugger Tag (metadata) Reverse engineering Unix-like Software bug Software framework Instruction set architecture Debugging Computer file

© CVE.report 2022 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report