All the vulnerabilites related to radareorg - radareorg/radare2
cve-2022-1238
Vulnerability from cvelistv5
Published
2022-04-06 00:00
Modified
2024-08-02 23:55
Severity ?
EPSS score ?
Summary
Out-of-bounds Write in libr/bin/format/ne/ne.c in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is heap overflow and may be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/122.html).
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | radareorg | radareorg/radare2 |
Version: unspecified < 5.6.8 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:55:24.538Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/47422cdf-aad2-4405-a6a1-6f63a3a93200" }, { "tags": [ "x_transferred" ], "url": "https://github.com/radareorg/radare2/commit/c40a4f9862104ede15d0ba05ccbf805923070778" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "radareorg/radare2", "vendor": "radareorg", "versions": [ { "lessThan": "5.6.8", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Out-of-bounds Write in libr/bin/format/ne/ne.c in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is heap overflow and may be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/122.html)." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-29T00:00:00", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/47422cdf-aad2-4405-a6a1-6f63a3a93200" }, { "url": "https://github.com/radareorg/radare2/commit/c40a4f9862104ede15d0ba05ccbf805923070778" } ], "source": { "advisory": "47422cdf-aad2-4405-a6a1-6f63a3a93200", "discovery": "EXTERNAL" }, "title": "Out-of-bounds Write in libr/bin/format/ne/ne.c in radareorg/radare2" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-1238", "datePublished": "2022-04-06T00:00:00", "dateReserved": "2022-04-05T00:00:00", "dateUpdated": "2024-08-02T23:55:24.538Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-1284
Vulnerability from cvelistv5
Published
2022-04-08 18:45
Modified
2024-08-02 23:55
Severity ?
EPSS score ?
Summary
heap-use-after-free in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is capable of inducing denial of service.
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/e98ad92c-3a64-48fb-84d4-d13afdbcbdd7 | x_refsource_CONFIRM | |
https://github.com/radareorg/radare2/commit/64a82e284dddabaeb549228380103b57dead32a6 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | radareorg | radareorg/radare2 |
Version: unspecified < 5.6.8 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:55:24.602Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://huntr.dev/bounties/e98ad92c-3a64-48fb-84d4-d13afdbcbdd7" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/radareorg/radare2/commit/64a82e284dddabaeb549228380103b57dead32a6" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "radareorg/radare2", "vendor": "radareorg", "versions": [ { "lessThan": "5.6.8", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "heap-use-after-free in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is capable of inducing denial of service." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-08T18:45:14", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://huntr.dev/bounties/e98ad92c-3a64-48fb-84d4-d13afdbcbdd7" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/radareorg/radare2/commit/64a82e284dddabaeb549228380103b57dead32a6" } ], "source": { "advisory": "e98ad92c-3a64-48fb-84d4-d13afdbcbdd7", "discovery": "EXTERNAL" }, "title": "heap-use-after-free in radareorg/radare2", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@huntr.dev", "ID": "CVE-2022-1284", "STATE": "PUBLIC", "TITLE": "heap-use-after-free in radareorg/radare2" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "radareorg/radare2", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.6.8" } ] } } ] }, "vendor_name": "radareorg" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "heap-use-after-free in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is capable of inducing denial of service." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-416 Use After Free" } ] } ] }, "references": { "reference_data": [ { "name": "https://huntr.dev/bounties/e98ad92c-3a64-48fb-84d4-d13afdbcbdd7", "refsource": "CONFIRM", "url": "https://huntr.dev/bounties/e98ad92c-3a64-48fb-84d4-d13afdbcbdd7" }, { "name": "https://github.com/radareorg/radare2/commit/64a82e284dddabaeb549228380103b57dead32a6", "refsource": "MISC", "url": "https://github.com/radareorg/radare2/commit/64a82e284dddabaeb549228380103b57dead32a6" } ] }, "source": { "advisory": "e98ad92c-3a64-48fb-84d4-d13afdbcbdd7", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-1284", "datePublished": "2022-04-08T18:45:14", "dateReserved": "2022-04-08T00:00:00", "dateUpdated": "2024-08-02T23:55:24.602Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-0520
Vulnerability from cvelistv5
Published
2022-02-08 20:40
Modified
2024-08-02 23:32
Severity ?
EPSS score ?
Summary
Use After Free in NPM radare2.js prior to 5.6.2.
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/ce13c371-e5ef-4993-97f3-3d33dcd943a6 | x_refsource_CONFIRM | |
https://github.com/radareorg/radare2/commit/8525ad0b9fd596f4b251bb3d7b114e6dc7ce1ee8 | x_refsource_MISC | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/ | vendor-advisory, x_refsource_FEDORA |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | radareorg | radareorg/radare2 |
Version: unspecified < 5.6.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:32:46.024Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://huntr.dev/bounties/ce13c371-e5ef-4993-97f3-3d33dcd943a6" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/radareorg/radare2/commit/8525ad0b9fd596f4b251bb3d7b114e6dc7ce1ee8" }, { "name": "FEDORA-2022-7db9e7bb5b", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/" }, { "name": "FEDORA-2022-85b277e748", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "radareorg/radare2", "vendor": "radareorg", "versions": [ { "lessThan": "5.6.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Use After Free in NPM radare2.js prior to 5.6.2." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-26T17:06:27", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://huntr.dev/bounties/ce13c371-e5ef-4993-97f3-3d33dcd943a6" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/radareorg/radare2/commit/8525ad0b9fd596f4b251bb3d7b114e6dc7ce1ee8" }, { "name": "FEDORA-2022-7db9e7bb5b", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/" }, { "name": "FEDORA-2022-85b277e748", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/" } ], "source": { "advisory": "ce13c371-e5ef-4993-97f3-3d33dcd943a6", "discovery": "EXTERNAL" }, "title": "Use After Free in radareorg/radare2", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@huntr.dev", "ID": "CVE-2022-0520", "STATE": "PUBLIC", "TITLE": "Use After Free in radareorg/radare2" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "radareorg/radare2", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.6.2" } ] } } ] }, "vendor_name": "radareorg" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Use After Free in NPM radare2.js prior to 5.6.2." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-416 Use After Free" } ] } ] }, "references": { "reference_data": [ { "name": "https://huntr.dev/bounties/ce13c371-e5ef-4993-97f3-3d33dcd943a6", "refsource": "CONFIRM", "url": "https://huntr.dev/bounties/ce13c371-e5ef-4993-97f3-3d33dcd943a6" }, { "name": "https://github.com/radareorg/radare2/commit/8525ad0b9fd596f4b251bb3d7b114e6dc7ce1ee8", "refsource": "MISC", "url": "https://github.com/radareorg/radare2/commit/8525ad0b9fd596f4b251bb3d7b114e6dc7ce1ee8" }, { "name": "FEDORA-2022-7db9e7bb5b", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/" }, { "name": "FEDORA-2022-85b277e748", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/" } ] }, "source": { "advisory": "ce13c371-e5ef-4993-97f3-3d33dcd943a6", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-0520", "datePublished": "2022-02-08T20:40:15", "dateReserved": "2022-02-07T00:00:00", "dateUpdated": "2024-08-02T23:32:46.024Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-1207
Vulnerability from cvelistv5
Published
2022-04-01 19:10
Modified
2024-08-02 23:55
Severity ?
EPSS score ?
Summary
Out-of-bounds read in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability allows attackers to read sensitive information from outside the allocated buffer boundary.
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/7b979e76-ae54-4132-b455-0833e45195eb | x_refsource_CONFIRM | |
https://github.com/radareorg/radare2/commit/605785b65dd356d46d4487faa41dbf90943b8bc1 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | radareorg | radareorg/radare2 |
Version: unspecified < 5.6.8 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:55:24.244Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://huntr.dev/bounties/7b979e76-ae54-4132-b455-0833e45195eb" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/radareorg/radare2/commit/605785b65dd356d46d4487faa41dbf90943b8bc1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "radareorg/radare2", "vendor": "radareorg", "versions": [ { "lessThan": "5.6.8", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Out-of-bounds read in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability allows attackers to read sensitive information from outside the allocated buffer boundary." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-01T19:10:10", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://huntr.dev/bounties/7b979e76-ae54-4132-b455-0833e45195eb" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/radareorg/radare2/commit/605785b65dd356d46d4487faa41dbf90943b8bc1" } ], "source": { "advisory": "7b979e76-ae54-4132-b455-0833e45195eb", "discovery": "EXTERNAL" }, "title": "Out-of-bounds read in radareorg/radare2", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@huntr.dev", "ID": "CVE-2022-1207", "STATE": "PUBLIC", "TITLE": "Out-of-bounds read in radareorg/radare2" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "radareorg/radare2", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.6.8" } ] } } ] }, "vendor_name": "radareorg" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Out-of-bounds read in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability allows attackers to read sensitive information from outside the allocated buffer boundary." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-125 Out-of-bounds Read" } ] } ] }, "references": { "reference_data": [ { "name": "https://huntr.dev/bounties/7b979e76-ae54-4132-b455-0833e45195eb", "refsource": "CONFIRM", "url": "https://huntr.dev/bounties/7b979e76-ae54-4132-b455-0833e45195eb" }, { "name": "https://github.com/radareorg/radare2/commit/605785b65dd356d46d4487faa41dbf90943b8bc1", "refsource": "MISC", "url": "https://github.com/radareorg/radare2/commit/605785b65dd356d46d4487faa41dbf90943b8bc1" } ] }, "source": { "advisory": "7b979e76-ae54-4132-b455-0833e45195eb", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-1207", "datePublished": "2022-04-01T19:10:10", "dateReserved": "2022-04-01T00:00:00", "dateUpdated": "2024-08-02T23:55:24.244Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-1605
Vulnerability from cvelistv5
Published
2023-03-23 00:00
Modified
2024-08-02 05:57
Severity ?
EPSS score ?
Summary
Denial of Service in GitHub repository radareorg/radare2 prior to 5.8.6.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | radareorg | radareorg/radare2 |
Version: unspecified < 5.8.6 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:57:24.156Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/9dddcf5b-7dd4-46cc-abf9-172dce20bab2" }, { "tags": [ "x_transferred" ], "url": "https://github.com/radareorg/radare2/commit/508a6307045441defd1bef0999a1f7052097613f" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "radareorg/radare2", "vendor": "radareorg", "versions": [ { "lessThan": "5.8.6", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Denial of Service in GitHub repository radareorg/radare2 prior to 5.8.6." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400 Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-23T00:00:00", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/9dddcf5b-7dd4-46cc-abf9-172dce20bab2" }, { "url": "https://github.com/radareorg/radare2/commit/508a6307045441defd1bef0999a1f7052097613f" } ], "source": { "advisory": "9dddcf5b-7dd4-46cc-abf9-172dce20bab2", "discovery": "EXTERNAL" }, "title": "Denial of Service in radareorg/radare2" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2023-1605", "datePublished": "2023-03-23T00:00:00", "dateReserved": "2023-03-23T00:00:00", "dateUpdated": "2024-08-02T05:57:24.156Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-4843
Vulnerability from cvelistv5
Published
2022-12-29 00:00
Modified
2024-08-03 01:55
Severity ?
EPSS score ?
Summary
NULL Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.8.2.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | radareorg | radareorg/radare2 |
Version: unspecified < 5.8.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:55:45.367Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/075b2760-66a0-4d38-b3b5-e9934956ab7f" }, { "tags": [ "x_transferred" ], "url": "https://github.com/radareorg/radare2/commit/842f809d4ec6a12af2906f948657281c9ebc8a24" }, { "name": "FEDORA-2023-ded3d48ebc", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FOXRDPI3OYYKO4PKXE3XD2IFONL6BCHR/" }, { "name": "FEDORA-2023-5d5aa8b27a", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OFCCTYAD7ASNQ23ABCUPAZHEDEIOCW6T/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "radareorg/radare2", "vendor": "radareorg", "versions": [ { "lessThan": "5.8.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "NULL Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.8.2." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-18T00:00:00", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/075b2760-66a0-4d38-b3b5-e9934956ab7f" }, { "url": "https://github.com/radareorg/radare2/commit/842f809d4ec6a12af2906f948657281c9ebc8a24" }, { "name": "FEDORA-2023-ded3d48ebc", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FOXRDPI3OYYKO4PKXE3XD2IFONL6BCHR/" }, { "name": "FEDORA-2023-5d5aa8b27a", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OFCCTYAD7ASNQ23ABCUPAZHEDEIOCW6T/" } ], "source": { "advisory": "075b2760-66a0-4d38-b3b5-e9934956ab7f", "discovery": "EXTERNAL" }, "title": "NULL Pointer Dereference in radareorg/radare2" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-4843", "datePublished": "2022-12-29T00:00:00", "dateReserved": "2022-12-29T00:00:00", "dateUpdated": "2024-08-03T01:55:45.367Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-0849
Vulnerability from cvelistv5
Published
2022-03-05 09:30
Modified
2024-08-02 23:40
Severity ?
EPSS score ?
Summary
Use After Free in r_reg_get_name_idx in GitHub repository radareorg/radare2 prior to 5.6.6.
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/29c5f76e-5f1f-43ab-a0c8-e31951e407b6 | x_refsource_CONFIRM | |
https://github.com/radareorg/radare2/commit/10517e3ff0e609697eb8cde60ec8dc999ee5ea24 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | radareorg | radareorg/radare2 |
Version: unspecified < 5.6.6 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:40:04.511Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://huntr.dev/bounties/29c5f76e-5f1f-43ab-a0c8-e31951e407b6" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/radareorg/radare2/commit/10517e3ff0e609697eb8cde60ec8dc999ee5ea24" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "radareorg/radare2", "vendor": "radareorg", "versions": [ { "lessThan": "5.6.6", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Use After Free in r_reg_get_name_idx in GitHub repository radareorg/radare2 prior to 5.6.6." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-05T09:30:12", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://huntr.dev/bounties/29c5f76e-5f1f-43ab-a0c8-e31951e407b6" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/radareorg/radare2/commit/10517e3ff0e609697eb8cde60ec8dc999ee5ea24" } ], "source": { "advisory": "29c5f76e-5f1f-43ab-a0c8-e31951e407b6", "discovery": "EXTERNAL" }, "title": "Use After Free in r_reg_get_name_idx in radareorg/radare2", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@huntr.dev", "ID": "CVE-2022-0849", "STATE": "PUBLIC", "TITLE": "Use After Free in r_reg_get_name_idx in radareorg/radare2" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "radareorg/radare2", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.6.6" } ] } } ] }, "vendor_name": "radareorg" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Use After Free in r_reg_get_name_idx in GitHub repository radareorg/radare2 prior to 5.6.6." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-416 Use After Free" } ] } ] }, "references": { "reference_data": [ { "name": "https://huntr.dev/bounties/29c5f76e-5f1f-43ab-a0c8-e31951e407b6", "refsource": "CONFIRM", "url": "https://huntr.dev/bounties/29c5f76e-5f1f-43ab-a0c8-e31951e407b6" }, { "name": "https://github.com/radareorg/radare2/commit/10517e3ff0e609697eb8cde60ec8dc999ee5ea24", "refsource": "MISC", "url": "https://github.com/radareorg/radare2/commit/10517e3ff0e609697eb8cde60ec8dc999ee5ea24" } ] }, "source": { "advisory": "29c5f76e-5f1f-43ab-a0c8-e31951e407b6", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-0849", "datePublished": "2022-03-05T09:30:12", "dateReserved": "2022-03-04T00:00:00", "dateUpdated": "2024-08-02T23:40:04.511Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-0302
Vulnerability from cvelistv5
Published
2023-01-15 00:00
Modified
2024-08-02 05:10
Severity ?
EPSS score ?
Summary
Failure to Sanitize Special Elements into a Different Plane (Special Element Injection) in GitHub repository radareorg/radare2 prior to 5.8.2.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | radareorg | radareorg/radare2 |
Version: unspecified < 5.8.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:10:54.944Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/583133af-7ae6-4a21-beef-a4b0182cf82e" }, { "tags": [ "x_transferred" ], "url": "https://github.com/radareorg/radare2/commit/961f0e723903011d4f54c2396e44efa91fcc74ce" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "radareorg/radare2", "vendor": "radareorg", "versions": [ { "lessThan": "5.8.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Failure to Sanitize Special Elements into a Different Plane (Special Element Injection) in GitHub repository radareorg/radare2 prior to 5.8.2." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-75", "description": "CWE-75 Failure to Sanitize Special Elements into a Different Plane (Special Element Injection)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-15T00:00:00", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/583133af-7ae6-4a21-beef-a4b0182cf82e" }, { "url": "https://github.com/radareorg/radare2/commit/961f0e723903011d4f54c2396e44efa91fcc74ce" } ], "source": { "advisory": "583133af-7ae6-4a21-beef-a4b0182cf82e", "discovery": "EXTERNAL" }, "title": "Failure to Sanitize Special Elements into a Different Plane (Special Element Injection) in radareorg/radare2" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2023-0302", "datePublished": "2023-01-15T00:00:00", "dateReserved": "2023-01-15T00:00:00", "dateUpdated": "2024-08-02T05:10:54.944Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-1244
Vulnerability from cvelistv5
Published
2022-04-05 17:55
Modified
2024-08-02 23:55
Severity ?
EPSS score ?
Summary
heap-buffer-overflow in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is capable of inducing denial of service.
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/8ae2c61a-2220-47a5-bfe8-fe6d41ab1f82 | x_refsource_CONFIRM | |
https://github.com/radareorg/radare2/commit/2b77b277d67ce061ee6ef839e7139ebc2103c1e3 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | radareorg | radareorg/radare2 |
Version: unspecified < 5.6.8 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:55:24.320Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://huntr.dev/bounties/8ae2c61a-2220-47a5-bfe8-fe6d41ab1f82" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/radareorg/radare2/commit/2b77b277d67ce061ee6ef839e7139ebc2103c1e3" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "radareorg/radare2", "vendor": "radareorg", "versions": [ { "lessThan": "5.6.8", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "heap-buffer-overflow in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is capable of inducing denial of service." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "CWE-122 Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-05T17:55:09", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://huntr.dev/bounties/8ae2c61a-2220-47a5-bfe8-fe6d41ab1f82" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/radareorg/radare2/commit/2b77b277d67ce061ee6ef839e7139ebc2103c1e3" } ], "source": { "advisory": "8ae2c61a-2220-47a5-bfe8-fe6d41ab1f82", "discovery": "EXTERNAL" }, "title": "heap-buffer-overflow in radareorg/radare2", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@huntr.dev", "ID": "CVE-2022-1244", "STATE": "PUBLIC", "TITLE": "heap-buffer-overflow in radareorg/radare2" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "radareorg/radare2", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.6.8" } ] } } ] }, "vendor_name": "radareorg" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "heap-buffer-overflow in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is capable of inducing denial of service." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-122 Heap-based Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://huntr.dev/bounties/8ae2c61a-2220-47a5-bfe8-fe6d41ab1f82", "refsource": "CONFIRM", "url": "https://huntr.dev/bounties/8ae2c61a-2220-47a5-bfe8-fe6d41ab1f82" }, { "name": "https://github.com/radareorg/radare2/commit/2b77b277d67ce061ee6ef839e7139ebc2103c1e3", "refsource": "MISC", "url": "https://github.com/radareorg/radare2/commit/2b77b277d67ce061ee6ef839e7139ebc2103c1e3" } ] }, "source": { "advisory": "8ae2c61a-2220-47a5-bfe8-fe6d41ab1f82", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-1244", "datePublished": "2022-04-05T17:55:09", "dateReserved": "2022-04-05T00:00:00", "dateUpdated": "2024-08-02T23:55:24.320Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-1437
Vulnerability from cvelistv5
Published
2022-04-22 14:00
Modified
2024-08-03 00:03
Severity ?
EPSS score ?
Summary
Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end of the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash.
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/af6c3e9e-b7df-4d80-b48f-77fdd17b4038 | x_refsource_CONFIRM | |
https://github.com/radareorg/radare2/commit/669a404b6d98d5db409a5ebadae4e94b34ef5136 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | radareorg | radareorg/radare2 |
Version: unspecified < 5.7.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T00:03:06.283Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://huntr.dev/bounties/af6c3e9e-b7df-4d80-b48f-77fdd17b4038" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/radareorg/radare2/commit/669a404b6d98d5db409a5ebadae4e94b34ef5136" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "radareorg/radare2", "vendor": "radareorg", "versions": [ { "lessThan": "5.7.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end of the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "CWE-122 Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-22T14:00:14", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://huntr.dev/bounties/af6c3e9e-b7df-4d80-b48f-77fdd17b4038" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/radareorg/radare2/commit/669a404b6d98d5db409a5ebadae4e94b34ef5136" } ], "source": { "advisory": "af6c3e9e-b7df-4d80-b48f-77fdd17b4038", "discovery": "EXTERNAL" }, "title": "Heap-based Buffer Overflow in radareorg/radare2", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@huntr.dev", "ID": "CVE-2022-1437", "STATE": "PUBLIC", "TITLE": "Heap-based Buffer Overflow in radareorg/radare2" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "radareorg/radare2", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.7.0" } ] } } ] }, "vendor_name": "radareorg" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end of the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-122 Heap-based Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://huntr.dev/bounties/af6c3e9e-b7df-4d80-b48f-77fdd17b4038", "refsource": "CONFIRM", "url": "https://huntr.dev/bounties/af6c3e9e-b7df-4d80-b48f-77fdd17b4038" }, { "name": "https://github.com/radareorg/radare2/commit/669a404b6d98d5db409a5ebadae4e94b34ef5136", "refsource": "MISC", "url": "https://github.com/radareorg/radare2/commit/669a404b6d98d5db409a5ebadae4e94b34ef5136" } ] }, "source": { "advisory": "af6c3e9e-b7df-4d80-b48f-77fdd17b4038", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-1437", "datePublished": "2022-04-22T14:00:15", "dateReserved": "2022-04-22T00:00:00", "dateUpdated": "2024-08-03T00:03:06.283Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-1382
Vulnerability from cvelistv5
Published
2022-04-16 22:45
Modified
2024-08-03 00:03
Severity ?
EPSS score ?
Summary
NULL Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is capable of making the radare2 crash, thus affecting the availability of the system.
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/d8b6d239-6d7b-4783-b26b-5be848c01aa1 | x_refsource_CONFIRM | |
https://github.com/radareorg/radare2/commit/48f0ea79f99174fb0a62cb2354e13496ce5b7c44 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | radareorg | radareorg/radare2 |
Version: unspecified < 5.6.8 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T00:03:06.103Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://huntr.dev/bounties/d8b6d239-6d7b-4783-b26b-5be848c01aa1" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/radareorg/radare2/commit/48f0ea79f99174fb0a62cb2354e13496ce5b7c44" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "radareorg/radare2", "vendor": "radareorg", "versions": [ { "lessThan": "5.6.8", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "NULL Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is capable of making the radare2 crash, thus affecting the availability of the system." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-16T22:45:17", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://huntr.dev/bounties/d8b6d239-6d7b-4783-b26b-5be848c01aa1" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/radareorg/radare2/commit/48f0ea79f99174fb0a62cb2354e13496ce5b7c44" } ], "source": { "advisory": "d8b6d239-6d7b-4783-b26b-5be848c01aa1", "discovery": "EXTERNAL" }, "title": "NULL Pointer Dereference in radareorg/radare2", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@huntr.dev", "ID": "CVE-2022-1382", "STATE": "PUBLIC", "TITLE": "NULL Pointer Dereference in radareorg/radare2" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "radareorg/radare2", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.6.8" } ] } } ] }, "vendor_name": "radareorg" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "NULL Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is capable of making the radare2 crash, thus affecting the availability of the system." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-476 NULL Pointer Dereference" } ] } ] }, "references": { "reference_data": [ { "name": "https://huntr.dev/bounties/d8b6d239-6d7b-4783-b26b-5be848c01aa1", "refsource": "CONFIRM", "url": "https://huntr.dev/bounties/d8b6d239-6d7b-4783-b26b-5be848c01aa1" }, { "name": "https://github.com/radareorg/radare2/commit/48f0ea79f99174fb0a62cb2354e13496ce5b7c44", "refsource": "MISC", "url": "https://github.com/radareorg/radare2/commit/48f0ea79f99174fb0a62cb2354e13496ce5b7c44" } ] }, "source": { "advisory": "d8b6d239-6d7b-4783-b26b-5be848c01aa1", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-1382", "datePublished": "2022-04-16T22:45:18", "dateReserved": "2022-04-16T00:00:00", "dateUpdated": "2024-08-03T00:03:06.103Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-1899
Vulnerability from cvelistv5
Published
2022-05-26 16:25
Modified
2024-08-03 00:17
Severity ?
EPSS score ?
Summary
Out-of-bounds Read in GitHub repository radareorg/radare2 prior to 5.7.0.
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/8a3dc5cb-08b3-4807-82b2-77f08c137a04 | x_refsource_CONFIRM | |
https://github.com/radareorg/radare2/commit/193f4fe01d7f626e2ea937450f2e0c4604420e9d | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | radareorg | radareorg/radare2 |
Version: unspecified < 5.7.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T00:17:00.930Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://huntr.dev/bounties/8a3dc5cb-08b3-4807-82b2-77f08c137a04" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/radareorg/radare2/commit/193f4fe01d7f626e2ea937450f2e0c4604420e9d" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "radareorg/radare2", "vendor": "radareorg", "versions": [ { "lessThan": "5.7.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Out-of-bounds Read in GitHub repository radareorg/radare2 prior to 5.7.0." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-26T16:25:10", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://huntr.dev/bounties/8a3dc5cb-08b3-4807-82b2-77f08c137a04" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/radareorg/radare2/commit/193f4fe01d7f626e2ea937450f2e0c4604420e9d" } ], "source": { "advisory": "8a3dc5cb-08b3-4807-82b2-77f08c137a04", "discovery": "EXTERNAL" }, "title": "Out-of-bounds Read in radareorg/radare2", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@huntr.dev", "ID": "CVE-2022-1899", "STATE": "PUBLIC", "TITLE": "Out-of-bounds Read in radareorg/radare2" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "radareorg/radare2", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.7.0" } ] } } ] }, "vendor_name": "radareorg" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Out-of-bounds Read in GitHub repository radareorg/radare2 prior to 5.7.0." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-125 Out-of-bounds Read" } ] } ] }, "references": { "reference_data": [ { "name": "https://huntr.dev/bounties/8a3dc5cb-08b3-4807-82b2-77f08c137a04", "refsource": "CONFIRM", "url": "https://huntr.dev/bounties/8a3dc5cb-08b3-4807-82b2-77f08c137a04" }, { "name": "https://github.com/radareorg/radare2/commit/193f4fe01d7f626e2ea937450f2e0c4604420e9d", "refsource": "MISC", "url": "https://github.com/radareorg/radare2/commit/193f4fe01d7f626e2ea937450f2e0c4604420e9d" } ] }, "source": { "advisory": "8a3dc5cb-08b3-4807-82b2-77f08c137a04", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-1899", "datePublished": "2022-05-26T16:25:10", "dateReserved": "2022-05-26T00:00:00", "dateUpdated": "2024-08-03T00:17:00.930Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-0522
Vulnerability from cvelistv5
Published
2022-02-08 20:55
Modified
2024-08-02 23:32
Severity ?
EPSS score ?
Summary
Access of Memory Location Before Start of Buffer in NPM radare2.js prior to 5.6.2.
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/2d45e589-d614-4875-bba1-be0f729e7ca9 | x_refsource_CONFIRM | |
https://github.com/radareorg/radare2/commit/d17a7bdf166108a29a27cd89bf454f9fa6c050d6 | x_refsource_MISC | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/ | vendor-advisory, x_refsource_FEDORA |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | radareorg | radareorg/radare2 |
Version: unspecified < 5.6.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:32:46.087Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://huntr.dev/bounties/2d45e589-d614-4875-bba1-be0f729e7ca9" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/radareorg/radare2/commit/d17a7bdf166108a29a27cd89bf454f9fa6c050d6" }, { "name": "FEDORA-2022-7db9e7bb5b", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/" }, { "name": "FEDORA-2022-85b277e748", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "radareorg/radare2", "vendor": "radareorg", "versions": [ { "lessThan": "5.6.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Access of Memory Location Before Start of Buffer in NPM radare2.js prior to 5.6.2." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-786", "description": "CWE-786 Access of Memory Location Before Start of Buffer", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-26T17:06:22", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://huntr.dev/bounties/2d45e589-d614-4875-bba1-be0f729e7ca9" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/radareorg/radare2/commit/d17a7bdf166108a29a27cd89bf454f9fa6c050d6" }, { "name": "FEDORA-2022-7db9e7bb5b", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/" }, { "name": "FEDORA-2022-85b277e748", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/" } ], "source": { "advisory": "2d45e589-d614-4875-bba1-be0f729e7ca9", "discovery": "EXTERNAL" }, "title": "Access of Memory Location Before Start of Buffer in radareorg/radare2", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@huntr.dev", "ID": "CVE-2022-0522", "STATE": "PUBLIC", "TITLE": "Access of Memory Location Before Start of Buffer in radareorg/radare2" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "radareorg/radare2", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.6.2" } ] } } ] }, "vendor_name": "radareorg" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Access of Memory Location Before Start of Buffer in NPM radare2.js prior to 5.6.2." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-786 Access of Memory Location Before Start of Buffer" } ] } ] }, "references": { "reference_data": [ { "name": "https://huntr.dev/bounties/2d45e589-d614-4875-bba1-be0f729e7ca9", "refsource": "CONFIRM", "url": "https://huntr.dev/bounties/2d45e589-d614-4875-bba1-be0f729e7ca9" }, { "name": "https://github.com/radareorg/radare2/commit/d17a7bdf166108a29a27cd89bf454f9fa6c050d6", "refsource": "MISC", "url": "https://github.com/radareorg/radare2/commit/d17a7bdf166108a29a27cd89bf454f9fa6c050d6" }, { "name": "FEDORA-2022-7db9e7bb5b", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/" }, { "name": "FEDORA-2022-85b277e748", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/" } ] }, "source": { "advisory": "2d45e589-d614-4875-bba1-be0f729e7ca9", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-0522", "datePublished": "2022-02-08T20:55:10", "dateReserved": "2022-02-07T00:00:00", "dateUpdated": "2024-08-02T23:32:46.087Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-0695
Vulnerability from cvelistv5
Published
2022-02-24 12:25
Modified
2024-08-02 23:40
Severity ?
EPSS score ?
Summary
Denial of Service in GitHub repository radareorg/radare2 prior to 5.6.4.
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/bdbddc0e-fb06-4211-a90b-7cbedcee2bea | x_refsource_CONFIRM | |
https://github.com/radareorg/radare2/commit/634b886e84a5c568d243e744becc6b3223e089cf | x_refsource_MISC | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/ | vendor-advisory, x_refsource_FEDORA |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | radareorg | radareorg/radare2 |
Version: unspecified < 5.6.4 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:40:03.320Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://huntr.dev/bounties/bdbddc0e-fb06-4211-a90b-7cbedcee2bea" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/radareorg/radare2/commit/634b886e84a5c568d243e744becc6b3223e089cf" }, { "name": "FEDORA-2022-7db9e7bb5b", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/" }, { "name": "FEDORA-2022-85b277e748", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "radareorg/radare2", "vendor": "radareorg", "versions": [ { "lessThan": "5.6.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Denial of Service in GitHub repository radareorg/radare2 prior to 5.6.4." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400 Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-26T17:06:32", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://huntr.dev/bounties/bdbddc0e-fb06-4211-a90b-7cbedcee2bea" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/radareorg/radare2/commit/634b886e84a5c568d243e744becc6b3223e089cf" }, { "name": "FEDORA-2022-7db9e7bb5b", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/" }, { "name": "FEDORA-2022-85b277e748", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/" } ], "source": { "advisory": "bdbddc0e-fb06-4211-a90b-7cbedcee2bea", "discovery": "EXTERNAL" }, "title": "Denial of Service in radareorg/radare2", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@huntr.dev", "ID": "CVE-2022-0695", "STATE": "PUBLIC", "TITLE": "Denial of Service in radareorg/radare2" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "radareorg/radare2", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.6.4" } ] } } ] }, "vendor_name": "radareorg" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Denial of Service in GitHub repository radareorg/radare2 prior to 5.6.4." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-400 Uncontrolled Resource Consumption" } ] } ] }, "references": { "reference_data": [ { "name": "https://huntr.dev/bounties/bdbddc0e-fb06-4211-a90b-7cbedcee2bea", "refsource": "CONFIRM", "url": "https://huntr.dev/bounties/bdbddc0e-fb06-4211-a90b-7cbedcee2bea" }, { "name": "https://github.com/radareorg/radare2/commit/634b886e84a5c568d243e744becc6b3223e089cf", "refsource": "MISC", "url": "https://github.com/radareorg/radare2/commit/634b886e84a5c568d243e744becc6b3223e089cf" }, { "name": "FEDORA-2022-7db9e7bb5b", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/" }, { "name": "FEDORA-2022-85b277e748", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/" } ] }, "source": { "advisory": "bdbddc0e-fb06-4211-a90b-7cbedcee2bea", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-0695", "datePublished": "2022-02-24T12:25:10", "dateReserved": "2022-02-20T00:00:00", "dateUpdated": "2024-08-02T23:40:03.320Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-1296
Vulnerability from cvelistv5
Published
2022-04-11 11:30
Modified
2024-08-02 23:55
Severity ?
EPSS score ?
Summary
Out-of-bounds read in `r_bin_ne_get_relocs` function in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability may allow attackers to read sensitive information or cause a crash.
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/52b57274-0e1a-4d61-ab29-1373b555fea0 | x_refsource_CONFIRM | |
https://github.com/radareorg/radare2/commit/153bcdc29f11cd8c90e7d639a7405450f644ddb6 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | radareorg | radareorg/radare2 |
Version: unspecified < 5.6.8 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:55:24.624Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://huntr.dev/bounties/52b57274-0e1a-4d61-ab29-1373b555fea0" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/radareorg/radare2/commit/153bcdc29f11cd8c90e7d639a7405450f644ddb6" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "radareorg/radare2", "vendor": "radareorg", "versions": [ { "lessThan": "5.6.8", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Out-of-bounds read in `r_bin_ne_get_relocs` function in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability may allow attackers to read sensitive information or cause a crash." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-11T11:30:16", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://huntr.dev/bounties/52b57274-0e1a-4d61-ab29-1373b555fea0" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/radareorg/radare2/commit/153bcdc29f11cd8c90e7d639a7405450f644ddb6" } ], "source": { "advisory": "52b57274-0e1a-4d61-ab29-1373b555fea0", "discovery": "EXTERNAL" }, "title": "Out-of-bounds read in `r_bin_ne_get_relocs` function in radareorg/radare2", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@huntr.dev", "ID": "CVE-2022-1296", "STATE": "PUBLIC", "TITLE": "Out-of-bounds read in `r_bin_ne_get_relocs` function in radareorg/radare2" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "radareorg/radare2", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.6.8" } ] } } ] }, "vendor_name": "radareorg" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Out-of-bounds read in `r_bin_ne_get_relocs` function in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability may allow attackers to read sensitive information or cause a crash." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-125 Out-of-bounds Read" } ] } ] }, "references": { "reference_data": [ { "name": "https://huntr.dev/bounties/52b57274-0e1a-4d61-ab29-1373b555fea0", "refsource": "CONFIRM", "url": "https://huntr.dev/bounties/52b57274-0e1a-4d61-ab29-1373b555fea0" }, { "name": "https://github.com/radareorg/radare2/commit/153bcdc29f11cd8c90e7d639a7405450f644ddb6", "refsource": "MISC", "url": "https://github.com/radareorg/radare2/commit/153bcdc29f11cd8c90e7d639a7405450f644ddb6" } ] }, "source": { "advisory": "52b57274-0e1a-4d61-ab29-1373b555fea0", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-1296", "datePublished": "2022-04-11T11:30:16", "dateReserved": "2022-04-11T00:00:00", "dateUpdated": "2024-08-02T23:55:24.624Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-1383
Vulnerability from cvelistv5
Published
2022-04-17 00:05
Modified
2024-08-03 00:03
Severity ?
EPSS score ?
Summary
Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.6.8. The bug causes the program reads data past the end of the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash.
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/02b4b563-b946-4343-9092-38d1c5cd60c9 | x_refsource_CONFIRM | |
https://github.com/radareorg/radare2/commit/1dd65336f0f0c351d6ea853efcf73cf9c0030862 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | radareorg | radareorg/radare2 |
Version: unspecified < 5.6.8 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T00:03:06.063Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://huntr.dev/bounties/02b4b563-b946-4343-9092-38d1c5cd60c9" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/radareorg/radare2/commit/1dd65336f0f0c351d6ea853efcf73cf9c0030862" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "radareorg/radare2", "vendor": "radareorg", "versions": [ { "lessThan": "5.6.8", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.6.8. The bug causes the program reads data past the end of the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "CWE-122 Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-17T00:05:10", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://huntr.dev/bounties/02b4b563-b946-4343-9092-38d1c5cd60c9" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/radareorg/radare2/commit/1dd65336f0f0c351d6ea853efcf73cf9c0030862" } ], "source": { "advisory": "02b4b563-b946-4343-9092-38d1c5cd60c9", "discovery": "EXTERNAL" }, "title": "Heap-based Buffer Overflow in radareorg/radare2", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@huntr.dev", "ID": "CVE-2022-1383", "STATE": "PUBLIC", "TITLE": "Heap-based Buffer Overflow in radareorg/radare2" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "radareorg/radare2", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.6.8" } ] } } ] }, "vendor_name": "radareorg" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.6.8. The bug causes the program reads data past the end of the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-122 Heap-based Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://huntr.dev/bounties/02b4b563-b946-4343-9092-38d1c5cd60c9", "refsource": "CONFIRM", "url": "https://huntr.dev/bounties/02b4b563-b946-4343-9092-38d1c5cd60c9" }, { "name": "https://github.com/radareorg/radare2/commit/1dd65336f0f0c351d6ea853efcf73cf9c0030862", "refsource": "MISC", "url": "https://github.com/radareorg/radare2/commit/1dd65336f0f0c351d6ea853efcf73cf9c0030862" } ] }, "source": { "advisory": "02b4b563-b946-4343-9092-38d1c5cd60c9", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-1383", "datePublished": "2022-04-17T00:05:10", "dateReserved": "2022-04-17T00:00:00", "dateUpdated": "2024-08-03T00:03:06.063Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-5686
Vulnerability from cvelistv5
Published
2023-10-20 16:22
Modified
2024-08-02 08:07
Severity ?
EPSS score ?
Summary
Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.9.0.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | radareorg | radareorg/radare2 |
Version: unspecified < 5.9.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:07:32.419Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.com/bounties/bbfe1f76-8fa1-4a8c-909d-65b16e970be0" }, { "tags": [ "x_transferred" ], "url": "https://github.com/radareorg/radare2/commit/1bdda93e348c160c84e30da3637acef26d0348de" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/64KUV6OGEVQ75QOV35PUVVDOJTKSJHYN/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SOZ6XCADVAPAIHMVSV3FUAN742BHXF55/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "radareorg/radare2", "vendor": "radareorg", "versions": [ { "lessThan": "5.9.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.9.0." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "CWE-122 Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-20T16:22:42.339Z", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.com/bounties/bbfe1f76-8fa1-4a8c-909d-65b16e970be0" }, { "url": "https://github.com/radareorg/radare2/commit/1bdda93e348c160c84e30da3637acef26d0348de" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/64KUV6OGEVQ75QOV35PUVVDOJTKSJHYN/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SOZ6XCADVAPAIHMVSV3FUAN742BHXF55/" } ], "source": { "advisory": "bbfe1f76-8fa1-4a8c-909d-65b16e970be0", "discovery": "EXTERNAL" }, "title": "Heap-based Buffer Overflow in radareorg/radare2" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2023-5686", "datePublished": "2023-10-20T16:22:42.339Z", "dateReserved": "2023-10-20T16:22:30.397Z", "dateUpdated": "2024-08-02T08:07:32.419Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-1052
Vulnerability from cvelistv5
Published
2022-03-24 13:05
Modified
2024-08-02 23:47
Severity ?
EPSS score ?
Summary
Heap Buffer Overflow in iterate_chained_fixups in GitHub repository radareorg/radare2 prior to 5.6.6.
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/3b3b7f77-ab8d-4de3-999b-eeec0a3eebe7 | x_refsource_CONFIRM | |
https://github.com/radareorg/radare2/commit/0052500c1ed5bf8263b26b9fd7773dbdc6f170c4 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | radareorg | radareorg/radare2 |
Version: unspecified < 5.6.6 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:47:43.292Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://huntr.dev/bounties/3b3b7f77-ab8d-4de3-999b-eeec0a3eebe7" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/radareorg/radare2/commit/0052500c1ed5bf8263b26b9fd7773dbdc6f170c4" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "radareorg/radare2", "vendor": "radareorg", "versions": [ { "lessThan": "5.6.6", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Heap Buffer Overflow in iterate_chained_fixups in GitHub repository radareorg/radare2 prior to 5.6.6." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "CWE-122 Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-24T13:05:10", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://huntr.dev/bounties/3b3b7f77-ab8d-4de3-999b-eeec0a3eebe7" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/radareorg/radare2/commit/0052500c1ed5bf8263b26b9fd7773dbdc6f170c4" } ], "source": { "advisory": "3b3b7f77-ab8d-4de3-999b-eeec0a3eebe7", "discovery": "EXTERNAL" }, "title": "Heap Buffer Overflow in iterate_chained_fixups in radareorg/radare2", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@huntr.dev", "ID": "CVE-2022-1052", "STATE": "PUBLIC", "TITLE": "Heap Buffer Overflow in iterate_chained_fixups in radareorg/radare2" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "radareorg/radare2", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.6.6" } ] } } ] }, "vendor_name": "radareorg" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap Buffer Overflow in iterate_chained_fixups in GitHub repository radareorg/radare2 prior to 5.6.6." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-122 Heap-based Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://huntr.dev/bounties/3b3b7f77-ab8d-4de3-999b-eeec0a3eebe7", "refsource": "CONFIRM", "url": "https://huntr.dev/bounties/3b3b7f77-ab8d-4de3-999b-eeec0a3eebe7" }, { "name": "https://github.com/radareorg/radare2/commit/0052500c1ed5bf8263b26b9fd7773dbdc6f170c4", "refsource": "MISC", "url": "https://github.com/radareorg/radare2/commit/0052500c1ed5bf8263b26b9fd7773dbdc6f170c4" } ] }, "source": { "advisory": "3b3b7f77-ab8d-4de3-999b-eeec0a3eebe7", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-1052", "datePublished": "2022-03-24T13:05:10", "dateReserved": "2022-03-22T00:00:00", "dateUpdated": "2024-08-02T23:47:43.292Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-1283
Vulnerability from cvelistv5
Published
2022-04-08 17:55
Modified
2024-08-02 23:55
Severity ?
EPSS score ?
Summary
NULL Pointer Dereference in r_bin_ne_get_entrypoints function in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability allows attackers to cause a denial of service (application crash).
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/bfeb8fb8-644d-4587-80d4-cb704c404013 | x_refsource_CONFIRM | |
https://github.com/radareorg/radare2/commit/18d1d064bf599a255d55f09fca3104776fc34a67 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | radareorg | radareorg/radare2 |
Version: unspecified < 5.6.8 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:55:24.530Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://huntr.dev/bounties/bfeb8fb8-644d-4587-80d4-cb704c404013" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/radareorg/radare2/commit/18d1d064bf599a255d55f09fca3104776fc34a67" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "radareorg/radare2", "vendor": "radareorg", "versions": [ { "lessThan": "5.6.8", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "NULL Pointer Dereference in r_bin_ne_get_entrypoints function in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability allows attackers to cause a denial of service (application crash)." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-08T17:55:10", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://huntr.dev/bounties/bfeb8fb8-644d-4587-80d4-cb704c404013" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/radareorg/radare2/commit/18d1d064bf599a255d55f09fca3104776fc34a67" } ], "source": { "advisory": "bfeb8fb8-644d-4587-80d4-cb704c404013", "discovery": "EXTERNAL" }, "title": "NULL Pointer Dereference in r_bin_ne_get_entrypoints function in radareorg/radare2", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@huntr.dev", "ID": "CVE-2022-1283", "STATE": "PUBLIC", "TITLE": "NULL Pointer Dereference in r_bin_ne_get_entrypoints function in radareorg/radare2" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "radareorg/radare2", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.6.8" } ] } } ] }, "vendor_name": "radareorg" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "NULL Pointer Dereference in r_bin_ne_get_entrypoints function in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability allows attackers to cause a denial of service (application crash)." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-476 NULL Pointer Dereference" } ] } ] }, "references": { "reference_data": [ { "name": "https://huntr.dev/bounties/bfeb8fb8-644d-4587-80d4-cb704c404013", "refsource": "CONFIRM", "url": "https://huntr.dev/bounties/bfeb8fb8-644d-4587-80d4-cb704c404013" }, { "name": "https://github.com/radareorg/radare2/commit/18d1d064bf599a255d55f09fca3104776fc34a67", "refsource": "MISC", "url": "https://github.com/radareorg/radare2/commit/18d1d064bf599a255d55f09fca3104776fc34a67" } ] }, "source": { "advisory": "bfeb8fb8-644d-4587-80d4-cb704c404013", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-1283", "datePublished": "2022-04-08T17:55:10", "dateReserved": "2022-04-08T00:00:00", "dateUpdated": "2024-08-02T23:55:24.530Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-0518
Vulnerability from cvelistv5
Published
2022-02-08 20:20
Modified
2024-08-02 23:32
Severity ?
EPSS score ?
Summary
Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.6.2.
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/10051adf-7ddc-4042-8fd0-8e9e0c5b1184 | x_refsource_CONFIRM | |
https://github.com/radareorg/radare2/commit/9650e3c352f675687bf6c6f65ff2c4a3d0e288fa | x_refsource_MISC | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/ | vendor-advisory, x_refsource_FEDORA |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | radareorg | radareorg/radare2 |
Version: unspecified < 5.6.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:32:46.441Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://huntr.dev/bounties/10051adf-7ddc-4042-8fd0-8e9e0c5b1184" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/radareorg/radare2/commit/9650e3c352f675687bf6c6f65ff2c4a3d0e288fa" }, { "name": "FEDORA-2022-7db9e7bb5b", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/" }, { "name": "FEDORA-2022-85b277e748", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "radareorg/radare2", "vendor": "radareorg", "versions": [ { "lessThan": "5.6.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.6.2." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "CWE-122 Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-26T17:06:24", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://huntr.dev/bounties/10051adf-7ddc-4042-8fd0-8e9e0c5b1184" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/radareorg/radare2/commit/9650e3c352f675687bf6c6f65ff2c4a3d0e288fa" }, { "name": "FEDORA-2022-7db9e7bb5b", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/" }, { "name": "FEDORA-2022-85b277e748", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/" } ], "source": { "advisory": "10051adf-7ddc-4042-8fd0-8e9e0c5b1184", "discovery": "EXTERNAL" }, "title": "Heap-based Buffer Overflow in radareorg/radare2", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@huntr.dev", "ID": "CVE-2022-0518", "STATE": "PUBLIC", "TITLE": "Heap-based Buffer Overflow in radareorg/radare2" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "radareorg/radare2", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.6.2" } ] } } ] }, "vendor_name": "radareorg" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.6.2." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-122 Heap-based Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://huntr.dev/bounties/10051adf-7ddc-4042-8fd0-8e9e0c5b1184", "refsource": "CONFIRM", "url": "https://huntr.dev/bounties/10051adf-7ddc-4042-8fd0-8e9e0c5b1184" }, { "name": "https://github.com/radareorg/radare2/commit/9650e3c352f675687bf6c6f65ff2c4a3d0e288fa", "refsource": "MISC", "url": "https://github.com/radareorg/radare2/commit/9650e3c352f675687bf6c6f65ff2c4a3d0e288fa" }, { "name": "FEDORA-2022-7db9e7bb5b", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/" }, { "name": "FEDORA-2022-85b277e748", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/" } ] }, "source": { "advisory": "10051adf-7ddc-4042-8fd0-8e9e0c5b1184", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-0518", "datePublished": "2022-02-08T20:20:11", "dateReserved": "2022-02-07T00:00:00", "dateUpdated": "2024-08-02T23:32:46.441Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-0476
Vulnerability from cvelistv5
Published
2022-02-23 16:40
Modified
2024-08-02 23:32
Severity ?
EPSS score ?
Summary
Denial of Service in GitHub repository radareorg/radare2 prior to 5.6.4.
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/81ddfbda-6c9f-4b69-83ff-85b15141e35d | x_refsource_CONFIRM | |
https://github.com/radareorg/radare2/commit/27fe8031782d3a06c3998eaa94354867864f9f1b | x_refsource_MISC | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/ | vendor-advisory, x_refsource_FEDORA |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | radareorg | radareorg/radare2 |
Version: unspecified < 5.6.4 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:32:46.122Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://huntr.dev/bounties/81ddfbda-6c9f-4b69-83ff-85b15141e35d" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/radareorg/radare2/commit/27fe8031782d3a06c3998eaa94354867864f9f1b" }, { "name": "FEDORA-2022-7db9e7bb5b", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/" }, { "name": "FEDORA-2022-85b277e748", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "radareorg/radare2", "vendor": "radareorg", "versions": [ { "lessThan": "5.6.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Denial of Service in GitHub repository radareorg/radare2 prior to 5.6.4." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400 Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-26T17:06:23", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://huntr.dev/bounties/81ddfbda-6c9f-4b69-83ff-85b15141e35d" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/radareorg/radare2/commit/27fe8031782d3a06c3998eaa94354867864f9f1b" }, { "name": "FEDORA-2022-7db9e7bb5b", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/" }, { "name": "FEDORA-2022-85b277e748", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/" } ], "source": { "advisory": "81ddfbda-6c9f-4b69-83ff-85b15141e35d", "discovery": "EXTERNAL" }, "title": "Denial of Service in radareorg/radare2", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@huntr.dev", "ID": "CVE-2022-0476", "STATE": "PUBLIC", "TITLE": "Denial of Service in radareorg/radare2" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "radareorg/radare2", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.6.4" } ] } } ] }, "vendor_name": "radareorg" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Denial of Service in GitHub repository radareorg/radare2 prior to 5.6.4." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-400 Uncontrolled Resource Consumption" } ] } ] }, "references": { "reference_data": [ { "name": "https://huntr.dev/bounties/81ddfbda-6c9f-4b69-83ff-85b15141e35d", "refsource": "CONFIRM", "url": "https://huntr.dev/bounties/81ddfbda-6c9f-4b69-83ff-85b15141e35d" }, { "name": "https://github.com/radareorg/radare2/commit/27fe8031782d3a06c3998eaa94354867864f9f1b", "refsource": "MISC", "url": "https://github.com/radareorg/radare2/commit/27fe8031782d3a06c3998eaa94354867864f9f1b" }, { "name": "FEDORA-2022-7db9e7bb5b", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/" }, { "name": "FEDORA-2022-85b277e748", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/" } ] }, "source": { "advisory": "81ddfbda-6c9f-4b69-83ff-85b15141e35d", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-0476", "datePublished": "2022-02-23T16:40:10", "dateReserved": "2022-02-02T00:00:00", "dateUpdated": "2024-08-02T23:32:46.122Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-0139
Vulnerability from cvelistv5
Published
2022-02-08 18:40
Modified
2024-08-02 23:18
Severity ?
EPSS score ?
Summary
Use After Free in GitHub repository radareorg/radare2 prior to 5.6.0.
References
▼ | URL | Tags |
---|---|---|
https://github.com/radareorg/radare2/commit/37897226a1a31f982bfefdc4aeefc2e50355c73c | x_refsource_MISC | |
https://huntr.dev/bounties/3dcb6f40-45cd-403b-929f-db123fde32c0 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | radareorg | radareorg/radare2 |
Version: unspecified < 5.6.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:18:41.675Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/radareorg/radare2/commit/37897226a1a31f982bfefdc4aeefc2e50355c73c" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://huntr.dev/bounties/3dcb6f40-45cd-403b-929f-db123fde32c0" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "radareorg/radare2", "vendor": "radareorg", "versions": [ { "lessThan": "5.6.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Use After Free in GitHub repository radareorg/radare2 prior to 5.6.0." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-08T18:40:10", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/radareorg/radare2/commit/37897226a1a31f982bfefdc4aeefc2e50355c73c" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://huntr.dev/bounties/3dcb6f40-45cd-403b-929f-db123fde32c0" } ], "source": { "advisory": "3dcb6f40-45cd-403b-929f-db123fde32c0", "discovery": "EXTERNAL" }, "title": "Use After Free in radareorg/radare2", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@huntr.dev", "ID": "CVE-2022-0139", "STATE": "PUBLIC", "TITLE": "Use After Free in radareorg/radare2" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "radareorg/radare2", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.6.0" } ] } } ] }, "vendor_name": "radareorg" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Use After Free in GitHub repository radareorg/radare2 prior to 5.6.0." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-416 Use After Free" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/radareorg/radare2/commit/37897226a1a31f982bfefdc4aeefc2e50355c73c", "refsource": "MISC", "url": "https://github.com/radareorg/radare2/commit/37897226a1a31f982bfefdc4aeefc2e50355c73c" }, { "name": "https://huntr.dev/bounties/3dcb6f40-45cd-403b-929f-db123fde32c0", "refsource": "CONFIRM", "url": "https://huntr.dev/bounties/3dcb6f40-45cd-403b-929f-db123fde32c0" } ] }, "source": { "advisory": "3dcb6f40-45cd-403b-929f-db123fde32c0", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-0139", "datePublished": "2022-02-08T18:40:10", "dateReserved": "2022-01-06T00:00:00", "dateUpdated": "2024-08-02T23:18:41.675Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-0419
Vulnerability from cvelistv5
Published
2022-02-01 10:38
Modified
2024-08-02 23:25
Severity ?
EPSS score ?
Summary
NULL Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.6.0.
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/1f84e79d-70e7-4b29-8b48-a108f81c89aa | x_refsource_CONFIRM | |
https://github.com/radareorg/radare2/commit/feaa4e7f7399c51ee6f52deb84dc3f795b4035d6 | x_refsource_MISC | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SKGIB52R4XPCPNEW6GF56EHW7ST24IJU/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IQIRJ72UALGMSWH6MYPVJQQLXFGZ23RS/ | vendor-advisory, x_refsource_FEDORA | |
https://census-labs.com/news/2022/05/24/multiple-vulnerabilities-in-radare2/ | x_refsource_MISC | |
http://www.openwall.com/lists/oss-security/2022/05/25/1 | mailing-list, x_refsource_MLIST |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | radareorg | radareorg/radare2 |
Version: unspecified < 5.6.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:25:40.366Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://huntr.dev/bounties/1f84e79d-70e7-4b29-8b48-a108f81c89aa" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/radareorg/radare2/commit/feaa4e7f7399c51ee6f52deb84dc3f795b4035d6" }, { "name": "FEDORA-2022-ba3248e596", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SKGIB52R4XPCPNEW6GF56EHW7ST24IJU/" }, { "name": "FEDORA-2022-3fc85cd09c", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IQIRJ72UALGMSWH6MYPVJQQLXFGZ23RS/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://census-labs.com/news/2022/05/24/multiple-vulnerabilities-in-radare2/" }, { "name": "[oss-security] 20220525 multiple vulnerabilities in radare2", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/05/25/1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "radareorg/radare2", "vendor": "radareorg", "versions": [ { "lessThan": "5.6.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "NULL Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.6.0." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-25T14:06:24", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://huntr.dev/bounties/1f84e79d-70e7-4b29-8b48-a108f81c89aa" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/radareorg/radare2/commit/feaa4e7f7399c51ee6f52deb84dc3f795b4035d6" }, { "name": "FEDORA-2022-ba3248e596", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SKGIB52R4XPCPNEW6GF56EHW7ST24IJU/" }, { "name": "FEDORA-2022-3fc85cd09c", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IQIRJ72UALGMSWH6MYPVJQQLXFGZ23RS/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://census-labs.com/news/2022/05/24/multiple-vulnerabilities-in-radare2/" }, { "name": "[oss-security] 20220525 multiple vulnerabilities in radare2", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2022/05/25/1" } ], "source": { "advisory": "1f84e79d-70e7-4b29-8b48-a108f81c89aa", "discovery": "EXTERNAL" }, "title": "NULL Pointer Dereference in radareorg/radare2", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@huntr.dev", "ID": "CVE-2022-0419", "STATE": "PUBLIC", "TITLE": "NULL Pointer Dereference in radareorg/radare2" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "radareorg/radare2", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.6.0" } ] } } ] }, "vendor_name": "radareorg" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "NULL Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.6.0." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-476 NULL Pointer Dereference" } ] } ] }, "references": { "reference_data": [ { "name": "https://huntr.dev/bounties/1f84e79d-70e7-4b29-8b48-a108f81c89aa", "refsource": "CONFIRM", "url": "https://huntr.dev/bounties/1f84e79d-70e7-4b29-8b48-a108f81c89aa" }, { "name": "https://github.com/radareorg/radare2/commit/feaa4e7f7399c51ee6f52deb84dc3f795b4035d6", "refsource": "MISC", "url": "https://github.com/radareorg/radare2/commit/feaa4e7f7399c51ee6f52deb84dc3f795b4035d6" }, { "name": "FEDORA-2022-ba3248e596", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SKGIB52R4XPCPNEW6GF56EHW7ST24IJU/" }, { "name": "FEDORA-2022-3fc85cd09c", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IQIRJ72UALGMSWH6MYPVJQQLXFGZ23RS/" }, { "name": "https://census-labs.com/news/2022/05/24/multiple-vulnerabilities-in-radare2/", "refsource": "MISC", "url": "https://census-labs.com/news/2022/05/24/multiple-vulnerabilities-in-radare2/" }, { "name": "[oss-security] 20220525 multiple vulnerabilities in radare2", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2022/05/25/1" } ] }, "source": { "advisory": "1f84e79d-70e7-4b29-8b48-a108f81c89aa", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-0419", "datePublished": "2022-02-01T10:38:32", "dateReserved": "2022-01-31T00:00:00", "dateUpdated": "2024-08-02T23:25:40.366Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-1444
Vulnerability from cvelistv5
Published
2022-04-23 21:20
Modified
2024-08-03 00:03
Severity ?
EPSS score ?
Summary
heap-use-after-free in GitHub repository radareorg/radare2 prior to 5.7.0. This vulnerability is capable of inducing denial of service.
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/b438a940-f8a4-4872-b030-59bdd1ab72aa | x_refsource_CONFIRM | |
https://github.com/radareorg/radare2/commit/14189710859c27981adb4c2c2aed2863c1859ec5 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | radareorg | radareorg/radare2 |
Version: unspecified < 5.7.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T00:03:06.253Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://huntr.dev/bounties/b438a940-f8a4-4872-b030-59bdd1ab72aa" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/radareorg/radare2/commit/14189710859c27981adb4c2c2aed2863c1859ec5" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "radareorg/radare2", "vendor": "radareorg", "versions": [ { "lessThan": "5.7.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "heap-use-after-free in GitHub repository radareorg/radare2 prior to 5.7.0. This vulnerability is capable of inducing denial of service." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-23T21:20:09", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://huntr.dev/bounties/b438a940-f8a4-4872-b030-59bdd1ab72aa" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/radareorg/radare2/commit/14189710859c27981adb4c2c2aed2863c1859ec5" } ], "source": { "advisory": "b438a940-f8a4-4872-b030-59bdd1ab72aa", "discovery": "EXTERNAL" }, "title": "heap-use-after-free in radareorg/radare2", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@huntr.dev", "ID": "CVE-2022-1444", "STATE": "PUBLIC", "TITLE": "heap-use-after-free in radareorg/radare2" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "radareorg/radare2", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.7.0" } ] } } ] }, "vendor_name": "radareorg" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "heap-use-after-free in GitHub repository radareorg/radare2 prior to 5.7.0. This vulnerability is capable of inducing denial of service." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-416 Use After Free" } ] } ] }, "references": { "reference_data": [ { "name": "https://huntr.dev/bounties/b438a940-f8a4-4872-b030-59bdd1ab72aa", "refsource": "CONFIRM", "url": "https://huntr.dev/bounties/b438a940-f8a4-4872-b030-59bdd1ab72aa" }, { "name": "https://github.com/radareorg/radare2/commit/14189710859c27981adb4c2c2aed2863c1859ec5", "refsource": "MISC", "url": "https://github.com/radareorg/radare2/commit/14189710859c27981adb4c2c2aed2863c1859ec5" } ] }, "source": { "advisory": "b438a940-f8a4-4872-b030-59bdd1ab72aa", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-1444", "datePublished": "2022-04-23T21:20:10", "dateReserved": "2022-04-23T00:00:00", "dateUpdated": "2024-08-03T00:03:06.253Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-0559
Vulnerability from cvelistv5
Published
2022-02-16 10:15
Modified
2024-08-02 23:32
Severity ?
EPSS score ?
Summary
Use After Free in GitHub repository radareorg/radare2 prior to 5.6.2.
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/aa80adb7-e900-44a5-ad05-91f3ccdfc81e | x_refsource_CONFIRM | |
https://github.com/radareorg/radare2/commit/b5cb90b28ec71fda3504da04e3cc94a362807f5e | x_refsource_MISC | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/ | vendor-advisory, x_refsource_FEDORA |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | radareorg | radareorg/radare2 |
Version: unspecified < 5.6.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:32:46.446Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://huntr.dev/bounties/aa80adb7-e900-44a5-ad05-91f3ccdfc81e" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/radareorg/radare2/commit/b5cb90b28ec71fda3504da04e3cc94a362807f5e" }, { "name": "FEDORA-2022-7db9e7bb5b", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/" }, { "name": "FEDORA-2022-85b277e748", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "radareorg/radare2", "vendor": "radareorg", "versions": [ { "lessThan": "5.6.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Use After Free in GitHub repository radareorg/radare2 prior to 5.6.2." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-26T17:06:26", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://huntr.dev/bounties/aa80adb7-e900-44a5-ad05-91f3ccdfc81e" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/radareorg/radare2/commit/b5cb90b28ec71fda3504da04e3cc94a362807f5e" }, { "name": "FEDORA-2022-7db9e7bb5b", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/" }, { "name": "FEDORA-2022-85b277e748", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/" } ], "source": { "advisory": "aa80adb7-e900-44a5-ad05-91f3ccdfc81e", "discovery": "EXTERNAL" }, "title": "Use After Free in radareorg/radare2", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@huntr.dev", "ID": "CVE-2022-0559", "STATE": "PUBLIC", "TITLE": "Use After Free in radareorg/radare2" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "radareorg/radare2", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.6.2" } ] } } ] }, "vendor_name": "radareorg" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Use After Free in GitHub repository radareorg/radare2 prior to 5.6.2." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-416 Use After Free" } ] } ] }, "references": { "reference_data": [ { "name": "https://huntr.dev/bounties/aa80adb7-e900-44a5-ad05-91f3ccdfc81e", "refsource": "CONFIRM", "url": "https://huntr.dev/bounties/aa80adb7-e900-44a5-ad05-91f3ccdfc81e" }, { "name": "https://github.com/radareorg/radare2/commit/b5cb90b28ec71fda3504da04e3cc94a362807f5e", "refsource": "MISC", "url": "https://github.com/radareorg/radare2/commit/b5cb90b28ec71fda3504da04e3cc94a362807f5e" }, { "name": "FEDORA-2022-7db9e7bb5b", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/" }, { "name": "FEDORA-2022-85b277e748", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/" } ] }, "source": { "advisory": "aa80adb7-e900-44a5-ad05-91f3ccdfc81e", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-0559", "datePublished": "2022-02-16T10:15:11", "dateReserved": "2022-02-10T00:00:00", "dateUpdated": "2024-08-02T23:32:46.446Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-4398
Vulnerability from cvelistv5
Published
2022-12-10 00:00
Modified
2024-08-03 01:41
Severity ?
EPSS score ?
Summary
Integer Overflow or Wraparound in GitHub repository radareorg/radare2 prior to 5.8.0.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | radareorg | radareorg/radare2 |
Version: unspecified < 5.8.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:41:44.418Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/c6f8d3ef-5420-4eba-9a5f-aba5e2b5fea2" }, { "tags": [ "x_transferred" ], "url": "https://github.com/radareorg/radare2/commit/b53a1583d05c3a5bfe5fa60da133fe59dfbb02b8" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "radareorg/radare2", "vendor": "radareorg", "versions": [ { "lessThan": "5.8.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Integer Overflow or Wraparound in GitHub repository radareorg/radare2 prior to 5.8.0." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-190", "description": "CWE-190 Integer Overflow or Wraparound", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-10T00:00:00", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/c6f8d3ef-5420-4eba-9a5f-aba5e2b5fea2" }, { "url": "https://github.com/radareorg/radare2/commit/b53a1583d05c3a5bfe5fa60da133fe59dfbb02b8" } ], "source": { "advisory": "c6f8d3ef-5420-4eba-9a5f-aba5e2b5fea2", "discovery": "EXTERNAL" }, "title": "Integer Overflow or Wraparound in radareorg/radare2" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-4398", "datePublished": "2022-12-10T00:00:00", "dateReserved": "2022-12-10T00:00:00", "dateUpdated": "2024-08-03T01:41:44.418Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-1452
Vulnerability from cvelistv5
Published
2022-04-24 20:50
Modified
2024-08-03 00:03
Severity ?
EPSS score ?
Summary
Out-of-bounds Read in r_bin_java_bootstrap_methods_attr_new function in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end 2f the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash. More details see [CWE-125: Out-of-bounds read](https://cwe.mitre.org/data/definitions/125.html).
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/c8f4c2de-7d96-4ad4-857a-c099effca2d6 | x_refsource_CONFIRM | |
https://github.com/radareorg/radare2/commit/ecc44b6a2f18ee70ac133365de0e509d26d5e168 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | radareorg | radareorg/radare2 |
Version: unspecified < 5.7.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T00:03:06.295Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://huntr.dev/bounties/c8f4c2de-7d96-4ad4-857a-c099effca2d6" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/radareorg/radare2/commit/ecc44b6a2f18ee70ac133365de0e509d26d5e168" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "radareorg/radare2", "vendor": "radareorg", "versions": [ { "lessThan": "5.7.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Out-of-bounds Read in r_bin_java_bootstrap_methods_attr_new function in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end 2f the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash. More details see [CWE-125: Out-of-bounds read](https://cwe.mitre.org/data/definitions/125.html)." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-24T20:50:10", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://huntr.dev/bounties/c8f4c2de-7d96-4ad4-857a-c099effca2d6" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/radareorg/radare2/commit/ecc44b6a2f18ee70ac133365de0e509d26d5e168" } ], "source": { "advisory": "c8f4c2de-7d96-4ad4-857a-c099effca2d6", "discovery": "EXTERNAL" }, "title": "Out-of-bounds Read in r_bin_java_bootstrap_methods_attr_new function in radareorg/radare2", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@huntr.dev", "ID": "CVE-2022-1452", "STATE": "PUBLIC", "TITLE": "Out-of-bounds Read in r_bin_java_bootstrap_methods_attr_new function in radareorg/radare2" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "radareorg/radare2", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.7.0" } ] } } ] }, "vendor_name": "radareorg" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Out-of-bounds Read in r_bin_java_bootstrap_methods_attr_new function in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end 2f the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash. More details see [CWE-125: Out-of-bounds read](https://cwe.mitre.org/data/definitions/125.html)." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-125 Out-of-bounds Read" } ] } ] }, "references": { "reference_data": [ { "name": "https://huntr.dev/bounties/c8f4c2de-7d96-4ad4-857a-c099effca2d6", "refsource": "CONFIRM", "url": "https://huntr.dev/bounties/c8f4c2de-7d96-4ad4-857a-c099effca2d6" }, { "name": "https://github.com/radareorg/radare2/commit/ecc44b6a2f18ee70ac133365de0e509d26d5e168", "refsource": "MISC", "url": "https://github.com/radareorg/radare2/commit/ecc44b6a2f18ee70ac133365de0e509d26d5e168" } ] }, "source": { "advisory": "c8f4c2de-7d96-4ad4-857a-c099effca2d6", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-1452", "datePublished": "2022-04-24T20:50:10", "dateReserved": "2022-04-24T00:00:00", "dateUpdated": "2024-08-03T00:03:06.295Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-1061
Vulnerability from cvelistv5
Published
2022-03-24 09:20
Modified
2024-08-02 23:47
Severity ?
EPSS score ?
Summary
Heap Buffer Overflow in parseDragons in GitHub repository radareorg/radare2 prior to 5.6.8.
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/a7546dae-01c5-4fb0-8a8e-c04ea4e9bac7 | x_refsource_CONFIRM | |
https://github.com/radareorg/radare2/commit/d4ce40b516ffd70cf2e9e36832d8de139117d522 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | radareorg | radareorg/radare2 |
Version: unspecified < 5.6.8 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:47:43.308Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://huntr.dev/bounties/a7546dae-01c5-4fb0-8a8e-c04ea4e9bac7" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/radareorg/radare2/commit/d4ce40b516ffd70cf2e9e36832d8de139117d522" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "radareorg/radare2", "vendor": "radareorg", "versions": [ { "lessThan": "5.6.8", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Heap Buffer Overflow in parseDragons in GitHub repository radareorg/radare2 prior to 5.6.8." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "CWE-122 Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-24T09:20:10", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://huntr.dev/bounties/a7546dae-01c5-4fb0-8a8e-c04ea4e9bac7" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/radareorg/radare2/commit/d4ce40b516ffd70cf2e9e36832d8de139117d522" } ], "source": { "advisory": "a7546dae-01c5-4fb0-8a8e-c04ea4e9bac7", "discovery": "EXTERNAL" }, "title": "Heap Buffer Overflow in parseDragons in radareorg/radare2", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@huntr.dev", "ID": "CVE-2022-1061", "STATE": "PUBLIC", "TITLE": "Heap Buffer Overflow in parseDragons in radareorg/radare2" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "radareorg/radare2", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.6.8" } ] } } ] }, "vendor_name": "radareorg" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap Buffer Overflow in parseDragons in GitHub repository radareorg/radare2 prior to 5.6.8." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-122 Heap-based Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://huntr.dev/bounties/a7546dae-01c5-4fb0-8a8e-c04ea4e9bac7", "refsource": "CONFIRM", "url": "https://huntr.dev/bounties/a7546dae-01c5-4fb0-8a8e-c04ea4e9bac7" }, { "name": "https://github.com/radareorg/radare2/commit/d4ce40b516ffd70cf2e9e36832d8de139117d522", "refsource": "MISC", "url": "https://github.com/radareorg/radare2/commit/d4ce40b516ffd70cf2e9e36832d8de139117d522" } ] }, "source": { "advisory": "a7546dae-01c5-4fb0-8a8e-c04ea4e9bac7", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-1061", "datePublished": "2022-03-24T09:20:10", "dateReserved": "2022-03-24T00:00:00", "dateUpdated": "2024-08-02T23:47:43.308Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-1809
Vulnerability from cvelistv5
Published
2022-05-21 22:25
Modified
2024-08-03 00:17
Severity ?
EPSS score ?
Summary
Access of Uninitialized Pointer in GitHub repository radareorg/radare2 prior to 5.7.0.
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/0730a95e-c485-4ff2-9a5d-bb3abfda0b17 | x_refsource_CONFIRM | |
https://github.com/radareorg/radare2/commit/919e3ac1a13f753c73e7a8e8d8bb4a143218732d | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | radareorg | radareorg/radare2 |
Version: unspecified < 5.7.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T00:17:00.598Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://huntr.dev/bounties/0730a95e-c485-4ff2-9a5d-bb3abfda0b17" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/radareorg/radare2/commit/919e3ac1a13f753c73e7a8e8d8bb4a143218732d" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "radareorg/radare2", "vendor": "radareorg", "versions": [ { "lessThan": "5.7.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Access of Uninitialized Pointer in GitHub repository radareorg/radare2 prior to 5.7.0." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-824", "description": "CWE-824 Access of Uninitialized Pointer", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-21T22:25:09", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://huntr.dev/bounties/0730a95e-c485-4ff2-9a5d-bb3abfda0b17" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/radareorg/radare2/commit/919e3ac1a13f753c73e7a8e8d8bb4a143218732d" } ], "source": { "advisory": "0730a95e-c485-4ff2-9a5d-bb3abfda0b17", "discovery": "EXTERNAL" }, "title": "Access of Uninitialized Pointer in radareorg/radare2", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@huntr.dev", "ID": "CVE-2022-1809", "STATE": "PUBLIC", "TITLE": "Access of Uninitialized Pointer in radareorg/radare2" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "radareorg/radare2", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.7.0" } ] } } ] }, "vendor_name": "radareorg" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Access of Uninitialized Pointer in GitHub repository radareorg/radare2 prior to 5.7.0." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-824 Access of Uninitialized Pointer" } ] } ] }, "references": { "reference_data": [ { "name": "https://huntr.dev/bounties/0730a95e-c485-4ff2-9a5d-bb3abfda0b17", "refsource": "CONFIRM", "url": "https://huntr.dev/bounties/0730a95e-c485-4ff2-9a5d-bb3abfda0b17" }, { "name": "https://github.com/radareorg/radare2/commit/919e3ac1a13f753c73e7a8e8d8bb4a143218732d", "refsource": "MISC", "url": "https://github.com/radareorg/radare2/commit/919e3ac1a13f753c73e7a8e8d8bb4a143218732d" } ] }, "source": { "advisory": "0730a95e-c485-4ff2-9a5d-bb3abfda0b17", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-1809", "datePublished": "2022-05-21T22:25:09", "dateReserved": "2022-05-21T00:00:00", "dateUpdated": "2024-08-03T00:17:00.598Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-0519
Vulnerability from cvelistv5
Published
2022-02-08 20:25
Modified
2024-08-02 23:32
Severity ?
EPSS score ?
Summary
Buffer Access with Incorrect Length Value in GitHub repository radareorg/radare2 prior to 5.6.2.
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/af85b9e1-d1cf-4c0e-ba12-525b82b7c1e3 | x_refsource_CONFIRM | |
https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5 | x_refsource_MISC | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/ | vendor-advisory, x_refsource_FEDORA |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | radareorg | radareorg/radare2 |
Version: unspecified < 5.6.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:32:46.426Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://huntr.dev/bounties/af85b9e1-d1cf-4c0e-ba12-525b82b7c1e3" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5" }, { "name": "FEDORA-2022-7db9e7bb5b", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/" }, { "name": "FEDORA-2022-85b277e748", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "radareorg/radare2", "vendor": "radareorg", "versions": [ { "lessThan": "5.6.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Buffer Access with Incorrect Length Value in GitHub repository radareorg/radare2 prior to 5.6.2." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-805", "description": "CWE-805 Buffer Access with Incorrect Length Value", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-26T17:06:34", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://huntr.dev/bounties/af85b9e1-d1cf-4c0e-ba12-525b82b7c1e3" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5" }, { "name": "FEDORA-2022-7db9e7bb5b", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/" }, { "name": "FEDORA-2022-85b277e748", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/" } ], "source": { "advisory": "af85b9e1-d1cf-4c0e-ba12-525b82b7c1e3", "discovery": "EXTERNAL" }, "title": "Buffer Access with Incorrect Length Value in radareorg/radare2", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@huntr.dev", "ID": "CVE-2022-0519", "STATE": "PUBLIC", "TITLE": "Buffer Access with Incorrect Length Value in radareorg/radare2" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "radareorg/radare2", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.6.2" } ] } } ] }, "vendor_name": "radareorg" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer Access with Incorrect Length Value in GitHub repository radareorg/radare2 prior to 5.6.2." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-805 Buffer Access with Incorrect Length Value" } ] } ] }, "references": { "reference_data": [ { "name": "https://huntr.dev/bounties/af85b9e1-d1cf-4c0e-ba12-525b82b7c1e3", "refsource": "CONFIRM", "url": "https://huntr.dev/bounties/af85b9e1-d1cf-4c0e-ba12-525b82b7c1e3" }, { "name": "https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5", "refsource": "MISC", "url": "https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5" }, { "name": "FEDORA-2022-7db9e7bb5b", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/" }, { "name": "FEDORA-2022-85b277e748", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/" } ] }, "source": { "advisory": "af85b9e1-d1cf-4c0e-ba12-525b82b7c1e3", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-0519", "datePublished": "2022-02-08T20:25:11", "dateReserved": "2022-02-07T00:00:00", "dateUpdated": "2024-08-02T23:32:46.426Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-0521
Vulnerability from cvelistv5
Published
2022-02-08 20:50
Modified
2024-08-02 23:32
Severity ?
EPSS score ?
Summary
Access of Memory Location After End of Buffer in GitHub repository radareorg/radare2 prior to 5.6.2.
References
▼ | URL | Tags |
---|---|---|
https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5 | x_refsource_MISC | |
https://huntr.dev/bounties/4d436311-bbf1-45a3-8774-bdb666d7f7ca | x_refsource_CONFIRM | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/ | vendor-advisory, x_refsource_FEDORA |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | radareorg | radareorg/radare2 |
Version: unspecified < 5.6.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:32:46.279Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://huntr.dev/bounties/4d436311-bbf1-45a3-8774-bdb666d7f7ca" }, { "name": "FEDORA-2022-7db9e7bb5b", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/" }, { "name": "FEDORA-2022-85b277e748", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "radareorg/radare2", "vendor": "radareorg", "versions": [ { "lessThan": "5.6.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Access of Memory Location After End of Buffer in GitHub repository radareorg/radare2 prior to 5.6.2." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-788", "description": "CWE-788 Access of Memory Location After End of Buffer", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-26T17:06:35", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://huntr.dev/bounties/4d436311-bbf1-45a3-8774-bdb666d7f7ca" }, { "name": "FEDORA-2022-7db9e7bb5b", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/" }, { "name": "FEDORA-2022-85b277e748", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/" } ], "source": { "advisory": "4d436311-bbf1-45a3-8774-bdb666d7f7ca", "discovery": "EXTERNAL" }, "title": "Access of Memory Location After End of Buffer in radareorg/radare2", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@huntr.dev", "ID": "CVE-2022-0521", "STATE": "PUBLIC", "TITLE": "Access of Memory Location After End of Buffer in radareorg/radare2" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "radareorg/radare2", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.6.2" } ] } } ] }, "vendor_name": "radareorg" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Access of Memory Location After End of Buffer in GitHub repository radareorg/radare2 prior to 5.6.2." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-788 Access of Memory Location After End of Buffer" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5", "refsource": "MISC", "url": "https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5" }, { "name": "https://huntr.dev/bounties/4d436311-bbf1-45a3-8774-bdb666d7f7ca", "refsource": "CONFIRM", "url": "https://huntr.dev/bounties/4d436311-bbf1-45a3-8774-bdb666d7f7ca" }, { "name": "FEDORA-2022-7db9e7bb5b", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/" }, { "name": "FEDORA-2022-85b277e748", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/" } ] }, "source": { "advisory": "4d436311-bbf1-45a3-8774-bdb666d7f7ca", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-0521", "datePublished": "2022-02-08T20:50:10", "dateReserved": "2022-02-07T00:00:00", "dateUpdated": "2024-08-02T23:32:46.279Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-0173
Vulnerability from cvelistv5
Published
2022-01-11 16:55
Modified
2024-08-02 23:18
Severity ?
EPSS score ?
Summary
radare2 is vulnerable to Out-of-bounds Read
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/727d8600-88bc-4dde-8dea-ee3d192600e5 | x_refsource_CONFIRM | |
https://github.com/radareorg/radare2/commit/37897226a1a31f982bfefdc4aeefc2e50355c73c | x_refsource_MISC | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SKGIB52R4XPCPNEW6GF56EHW7ST24IJU/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IQIRJ72UALGMSWH6MYPVJQQLXFGZ23RS/ | vendor-advisory, x_refsource_FEDORA |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | radareorg | radareorg/radare2 |
Version: unspecified < Will be fixed in the upcoming r2-5.6.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:18:41.953Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://huntr.dev/bounties/727d8600-88bc-4dde-8dea-ee3d192600e5" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/radareorg/radare2/commit/37897226a1a31f982bfefdc4aeefc2e50355c73c" }, { "name": "FEDORA-2022-ba3248e596", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SKGIB52R4XPCPNEW6GF56EHW7ST24IJU/" }, { "name": "FEDORA-2022-3fc85cd09c", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IQIRJ72UALGMSWH6MYPVJQQLXFGZ23RS/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "radareorg/radare2", "vendor": "radareorg", "versions": [ { "lessThan": "Will be fixed in the upcoming r2-5.6.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "radare2 is vulnerable to Out-of-bounds Read" } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.6, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-22T02:06:27", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://huntr.dev/bounties/727d8600-88bc-4dde-8dea-ee3d192600e5" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/radareorg/radare2/commit/37897226a1a31f982bfefdc4aeefc2e50355c73c" }, { "name": "FEDORA-2022-ba3248e596", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SKGIB52R4XPCPNEW6GF56EHW7ST24IJU/" }, { "name": "FEDORA-2022-3fc85cd09c", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IQIRJ72UALGMSWH6MYPVJQQLXFGZ23RS/" } ], "source": { "advisory": "727d8600-88bc-4dde-8dea-ee3d192600e5", "discovery": "EXTERNAL" }, "title": "Out-of-bounds Read in radareorg/radare2", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@huntr.dev", "ID": "CVE-2022-0173", "STATE": "PUBLIC", "TITLE": "Out-of-bounds Read in radareorg/radare2" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "radareorg/radare2", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "Will be fixed in the upcoming r2-5.6.0" } ] } } ] }, "vendor_name": "radareorg" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "radare2 is vulnerable to Out-of-bounds Read" } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.6, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-125 Out-of-bounds Read" } ] } ] }, "references": { "reference_data": [ { "name": "https://huntr.dev/bounties/727d8600-88bc-4dde-8dea-ee3d192600e5", "refsource": "CONFIRM", "url": "https://huntr.dev/bounties/727d8600-88bc-4dde-8dea-ee3d192600e5" }, { "name": "https://github.com/radareorg/radare2/commit/37897226a1a31f982bfefdc4aeefc2e50355c73c", "refsource": "MISC", "url": "https://github.com/radareorg/radare2/commit/37897226a1a31f982bfefdc4aeefc2e50355c73c" }, { "name": "FEDORA-2022-ba3248e596", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SKGIB52R4XPCPNEW6GF56EHW7ST24IJU/" }, { "name": "FEDORA-2022-3fc85cd09c", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IQIRJ72UALGMSWH6MYPVJQQLXFGZ23RS/" } ] }, "source": { "advisory": "727d8600-88bc-4dde-8dea-ee3d192600e5", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-0173", "datePublished": "2022-01-11T16:55:10", "dateReserved": "2022-01-10T00:00:00", "dateUpdated": "2024-08-02T23:18:41.953Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-1237
Vulnerability from cvelistv5
Published
2022-04-06 09:35
Modified
2024-08-02 23:55
Severity ?
EPSS score ?
Summary
Improper Validation of Array Index in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is heap overflow and may be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/122.html).
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/ad3c9c4c-76e7-40c8-bd4a-c095acd8bb40 | x_refsource_CONFIRM | |
https://github.com/radareorg/radare2/commit/2d782cdaa2112c10b8dd5e7a93c134b2ada9c1a6 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | radareorg | radareorg/radare2 |
Version: unspecified < 5.6.8 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:55:24.559Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://huntr.dev/bounties/ad3c9c4c-76e7-40c8-bd4a-c095acd8bb40" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/radareorg/radare2/commit/2d782cdaa2112c10b8dd5e7a93c134b2ada9c1a6" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "radareorg/radare2", "vendor": "radareorg", "versions": [ { "lessThan": "5.6.8", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper Validation of Array Index in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is heap overflow and may be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/122.html)." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-129", "description": "CWE-129 Improper Validation of Array Index", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-06T09:35:10", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://huntr.dev/bounties/ad3c9c4c-76e7-40c8-bd4a-c095acd8bb40" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/radareorg/radare2/commit/2d782cdaa2112c10b8dd5e7a93c134b2ada9c1a6" } ], "source": { "advisory": "ad3c9c4c-76e7-40c8-bd4a-c095acd8bb40", "discovery": "EXTERNAL" }, "title": "Improper Validation of Array Index in radareorg/radare2", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@huntr.dev", "ID": "CVE-2022-1237", "STATE": "PUBLIC", "TITLE": "Improper Validation of Array Index in radareorg/radare2" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "radareorg/radare2", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.6.8" } ] } } ] }, "vendor_name": "radareorg" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper Validation of Array Index in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is heap overflow and may be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/122.html)." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-129 Improper Validation of Array Index" } ] } ] }, "references": { "reference_data": [ { "name": "https://huntr.dev/bounties/ad3c9c4c-76e7-40c8-bd4a-c095acd8bb40", "refsource": "CONFIRM", "url": "https://huntr.dev/bounties/ad3c9c4c-76e7-40c8-bd4a-c095acd8bb40" }, { "name": "https://github.com/radareorg/radare2/commit/2d782cdaa2112c10b8dd5e7a93c134b2ada9c1a6", "refsource": "MISC", "url": "https://github.com/radareorg/radare2/commit/2d782cdaa2112c10b8dd5e7a93c134b2ada9c1a6" } ] }, "source": { "advisory": "ad3c9c4c-76e7-40c8-bd4a-c095acd8bb40", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-1237", "datePublished": "2022-04-06T09:35:11", "dateReserved": "2022-04-05T00:00:00", "dateUpdated": "2024-08-02T23:55:24.559Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-4322
Vulnerability from cvelistv5
Published
2023-08-14 15:27
Modified
2024-08-02 07:24
Severity ?
EPSS score ?
Summary
Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.9.0.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | radareorg | radareorg/radare2 |
Version: unspecified < 5.9.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T07:24:04.542Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/06e2484c-d6f1-4497-af67-26549be9fffd" }, { "tags": [ "x_transferred" ], "url": "https://github.com/radareorg/radare2/commit/ba919adb74ac368bf76b150a00347ded78b572dd" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/64KUV6OGEVQ75QOV35PUVVDOJTKSJHYN/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SOZ6XCADVAPAIHMVSV3FUAN742BHXF55/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "radareorg/radare2", "vendor": "radareorg", "versions": [ { "lessThan": "5.9.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.9.0." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "CWE-122 Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-14T15:27:40.797Z", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/06e2484c-d6f1-4497-af67-26549be9fffd" }, { "url": "https://github.com/radareorg/radare2/commit/ba919adb74ac368bf76b150a00347ded78b572dd" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/64KUV6OGEVQ75QOV35PUVVDOJTKSJHYN/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SOZ6XCADVAPAIHMVSV3FUAN742BHXF55/" } ], "source": { "advisory": "06e2484c-d6f1-4497-af67-26549be9fffd", "discovery": "EXTERNAL" }, "title": "Heap-based Buffer Overflow in radareorg/radare2" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2023-4322", "datePublished": "2023-08-14T15:27:40.797Z", "dateReserved": "2023-08-14T15:27:28.589Z", "dateUpdated": "2024-08-02T07:24:04.542Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-0712
Vulnerability from cvelistv5
Published
2022-02-22 17:52
Modified
2024-08-02 23:40
Severity ?
EPSS score ?
Summary
NULL Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.6.4.
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/1e572820-e502-49d1-af0e-81833e2eb466 | x_refsource_CONFIRM | |
https://github.com/radareorg/radare2/commit/515e592b9bea0612bc63d8e93239ff35bcf645c7 | x_refsource_MISC | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/ | vendor-advisory, x_refsource_FEDORA |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | radareorg | radareorg/radare2 |
Version: unspecified < 5.6.4 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:40:03.461Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://huntr.dev/bounties/1e572820-e502-49d1-af0e-81833e2eb466" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/radareorg/radare2/commit/515e592b9bea0612bc63d8e93239ff35bcf645c7" }, { "name": "FEDORA-2022-7db9e7bb5b", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/" }, { "name": "FEDORA-2022-85b277e748", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "radareorg/radare2", "vendor": "radareorg", "versions": [ { "lessThan": "5.6.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "NULL Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.6.4." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-26T17:06:30", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://huntr.dev/bounties/1e572820-e502-49d1-af0e-81833e2eb466" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/radareorg/radare2/commit/515e592b9bea0612bc63d8e93239ff35bcf645c7" }, { "name": "FEDORA-2022-7db9e7bb5b", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/" }, { "name": "FEDORA-2022-85b277e748", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/" } ], "source": { "advisory": "1e572820-e502-49d1-af0e-81833e2eb466", "discovery": "EXTERNAL" }, "title": "NULL Pointer Dereference in radareorg/radare2", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@huntr.dev", "ID": "CVE-2022-0712", "STATE": "PUBLIC", "TITLE": "NULL Pointer Dereference in radareorg/radare2" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "radareorg/radare2", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.6.4" } ] } } ] }, "vendor_name": "radareorg" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "NULL Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.6.4." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-476 NULL Pointer Dereference" } ] } ] }, "references": { "reference_data": [ { "name": "https://huntr.dev/bounties/1e572820-e502-49d1-af0e-81833e2eb466", "refsource": "CONFIRM", "url": "https://huntr.dev/bounties/1e572820-e502-49d1-af0e-81833e2eb466" }, { "name": "https://github.com/radareorg/radare2/commit/515e592b9bea0612bc63d8e93239ff35bcf645c7", "refsource": "MISC", "url": "https://github.com/radareorg/radare2/commit/515e592b9bea0612bc63d8e93239ff35bcf645c7" }, { "name": "FEDORA-2022-7db9e7bb5b", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/" }, { "name": "FEDORA-2022-85b277e748", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/" } ] }, "source": { "advisory": "1e572820-e502-49d1-af0e-81833e2eb466", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-0712", "datePublished": "2022-02-22T17:52:48", "dateReserved": "2022-02-21T00:00:00", "dateUpdated": "2024-08-02T23:40:03.461Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-0676
Vulnerability from cvelistv5
Published
2022-02-22 00:05
Modified
2024-08-02 23:40
Severity ?
EPSS score ?
Summary
Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.6.4.
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/5ad814a1-5dd3-43f4-869b-33b8dab78485 | x_refsource_CONFIRM | |
https://github.com/radareorg/radare2/commit/c84b7232626badd075caf3ae29661b609164bac6 | x_refsource_MISC | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/ | vendor-advisory, x_refsource_FEDORA |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | radareorg | radareorg/radare2 |
Version: unspecified < 5.6.4 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:40:03.230Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://huntr.dev/bounties/5ad814a1-5dd3-43f4-869b-33b8dab78485" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/radareorg/radare2/commit/c84b7232626badd075caf3ae29661b609164bac6" }, { "name": "FEDORA-2022-7db9e7bb5b", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/" }, { "name": "FEDORA-2022-85b277e748", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "radareorg/radare2", "vendor": "radareorg", "versions": [ { "lessThan": "5.6.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.6.4." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "CWE-122 Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-26T17:06:28", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://huntr.dev/bounties/5ad814a1-5dd3-43f4-869b-33b8dab78485" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/radareorg/radare2/commit/c84b7232626badd075caf3ae29661b609164bac6" }, { "name": "FEDORA-2022-7db9e7bb5b", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/" }, { "name": "FEDORA-2022-85b277e748", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/" } ], "source": { "advisory": "5ad814a1-5dd3-43f4-869b-33b8dab78485", "discovery": "EXTERNAL" }, "title": "Heap-based Buffer Overflow in radareorg/radare2", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@huntr.dev", "ID": "CVE-2022-0676", "STATE": "PUBLIC", "TITLE": "Heap-based Buffer Overflow in radareorg/radare2" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "radareorg/radare2", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.6.4" } ] } } ] }, "vendor_name": "radareorg" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.6.4." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-122 Heap-based Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://huntr.dev/bounties/5ad814a1-5dd3-43f4-869b-33b8dab78485", "refsource": "CONFIRM", "url": "https://huntr.dev/bounties/5ad814a1-5dd3-43f4-869b-33b8dab78485" }, { "name": "https://github.com/radareorg/radare2/commit/c84b7232626badd075caf3ae29661b609164bac6", "refsource": "MISC", "url": "https://github.com/radareorg/radare2/commit/c84b7232626badd075caf3ae29661b609164bac6" }, { "name": "FEDORA-2022-7db9e7bb5b", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/" }, { "name": "FEDORA-2022-85b277e748", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/" } ] }, "source": { "advisory": "5ad814a1-5dd3-43f4-869b-33b8dab78485", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-0676", "datePublished": "2022-02-22T00:05:10", "dateReserved": "2022-02-18T00:00:00", "dateUpdated": "2024-08-02T23:40:03.230Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-0523
Vulnerability from cvelistv5
Published
2022-02-08 00:00
Modified
2024-08-02 23:32
Severity ?
EPSS score ?
Summary
Use After Free in GitHub repository radareorg/radare2 prior to 5.6.2.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | radareorg | radareorg/radare2 |
Version: unspecified < 5.6.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:32:46.139Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/9d8d6ae0-fe00-40b9-ae1e-b0e8103bac69" }, { "tags": [ "x_transferred" ], "url": "https://github.com/radareorg/radare2/commit/35482cb760db10f87a62569e2f8872dbd95e9269" }, { "name": "FEDORA-2022-7db9e7bb5b", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/" }, { "name": "FEDORA-2022-85b277e748", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "radareorg/radare2", "vendor": "radareorg", "versions": [ { "lessThan": "5.6.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Use After Free in GitHub repository radareorg/radare2 prior to 5.6.2." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-27T00:00:00", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/9d8d6ae0-fe00-40b9-ae1e-b0e8103bac69" }, { "url": "https://github.com/radareorg/radare2/commit/35482cb760db10f87a62569e2f8872dbd95e9269" }, { "name": "FEDORA-2022-7db9e7bb5b", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/" }, { "name": "FEDORA-2022-85b277e748", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/" } ], "source": { "advisory": "9d8d6ae0-fe00-40b9-ae1e-b0e8103bac69", "discovery": "EXTERNAL" }, "title": "Use After Free in radareorg/radare2" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-0523", "datePublished": "2022-02-08T00:00:00", "dateReserved": "2022-02-07T00:00:00", "dateUpdated": "2024-08-02T23:32:46.139Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-1451
Vulnerability from cvelistv5
Published
2022-04-24 20:50
Modified
2024-08-03 00:03
Severity ?
EPSS score ?
Summary
Out-of-bounds Read in r_bin_java_constant_value_attr_new function in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end 2f the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash. More details see [CWE-125: Out-of-bounds read](https://cwe.mitre.org/data/definitions/125.html).
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/229a2e0d-9e5c-402f-9a24-57fa2eb1aaa7 | x_refsource_CONFIRM | |
https://github.com/radareorg/radare2/commit/0927ed3ae99444e7b47b84e43118deb10fe37529 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | radareorg | radareorg/radare2 |
Version: unspecified < 5.7.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T00:03:06.292Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://huntr.dev/bounties/229a2e0d-9e5c-402f-9a24-57fa2eb1aaa7" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/radareorg/radare2/commit/0927ed3ae99444e7b47b84e43118deb10fe37529" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "radareorg/radare2", "vendor": "radareorg", "versions": [ { "lessThan": "5.7.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Out-of-bounds Read in r_bin_java_constant_value_attr_new function in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end 2f the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash. More details see [CWE-125: Out-of-bounds read](https://cwe.mitre.org/data/definitions/125.html)." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-788", "description": "CWE-788 Access of Memory Location After End of Buffer", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-24T20:50:15", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://huntr.dev/bounties/229a2e0d-9e5c-402f-9a24-57fa2eb1aaa7" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/radareorg/radare2/commit/0927ed3ae99444e7b47b84e43118deb10fe37529" } ], "source": { "advisory": "229a2e0d-9e5c-402f-9a24-57fa2eb1aaa7", "discovery": "EXTERNAL" }, "title": "Out-of-bounds Read in r_bin_java_constant_value_attr_new function in radareorg/radare2", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@huntr.dev", "ID": "CVE-2022-1451", "STATE": "PUBLIC", "TITLE": "Out-of-bounds Read in r_bin_java_constant_value_attr_new function in radareorg/radare2" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "radareorg/radare2", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.7.0" } ] } } ] }, "vendor_name": "radareorg" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Out-of-bounds Read in r_bin_java_constant_value_attr_new function in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end 2f the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash. More details see [CWE-125: Out-of-bounds read](https://cwe.mitre.org/data/definitions/125.html)." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-788 Access of Memory Location After End of Buffer" } ] } ] }, "references": { "reference_data": [ { "name": "https://huntr.dev/bounties/229a2e0d-9e5c-402f-9a24-57fa2eb1aaa7", "refsource": "CONFIRM", "url": "https://huntr.dev/bounties/229a2e0d-9e5c-402f-9a24-57fa2eb1aaa7" }, { "name": "https://github.com/radareorg/radare2/commit/0927ed3ae99444e7b47b84e43118deb10fe37529", "refsource": "MISC", "url": "https://github.com/radareorg/radare2/commit/0927ed3ae99444e7b47b84e43118deb10fe37529" } ] }, "source": { "advisory": "229a2e0d-9e5c-402f-9a24-57fa2eb1aaa7", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-1451", "datePublished": "2022-04-24T20:50:16", "dateReserved": "2022-04-24T00:00:00", "dateUpdated": "2024-08-03T00:03:06.292Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-1714
Vulnerability from cvelistv5
Published
2022-05-13 00:00
Modified
2024-08-03 00:10
Severity ?
EPSS score ?
Summary
Out-of-bounds Read in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end of the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | radareorg | radareorg/radare2 |
Version: unspecified < 5.7.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T00:10:03.915Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/1c22055b-b015-47a8-a57b-4982978751d0" }, { "tags": [ "x_transferred" ], "url": "https://github.com/radareorg/radare2/commit/3ecdbf8e21186a9c5a4d3cfa3b1e9fd27045340e" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "radareorg/radare2", "vendor": "radareorg", "versions": [ { "lessThan": "5.7.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Out-of-bounds Read in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end of the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 7.9, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-29T00:00:00", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/1c22055b-b015-47a8-a57b-4982978751d0" }, { "url": "https://github.com/radareorg/radare2/commit/3ecdbf8e21186a9c5a4d3cfa3b1e9fd27045340e" } ], "source": { "advisory": "1c22055b-b015-47a8-a57b-4982978751d0", "discovery": "EXTERNAL" }, "title": "Out-of-bounds Read in radareorg/radare2" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-1714", "datePublished": "2022-05-13T00:00:00", "dateReserved": "2022-05-13T00:00:00", "dateUpdated": "2024-08-03T00:10:03.915Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-1240
Vulnerability from cvelistv5
Published
2022-04-06 10:15
Modified
2024-08-02 23:55
Severity ?
EPSS score ?
Summary
Heap buffer overflow in libr/bin/format/mach0/mach0.c in GitHub repository radareorg/radare2 prior to 5.8.6. If address sanitizer is disabled during the compiling, the program should executes into the `r_str_ncpy` function. Therefore I think it is very likely to be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/122.html).
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/e589bd97-4c74-4e79-93b5-0951a281facc | x_refsource_CONFIRM | |
https://github.com/radareorg/radare2/commit/ca8d8b39f3e34a4fd943270330b80f1148129de4 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | radareorg | radareorg/radare2 |
Version: unspecified < 5.8.6 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:55:24.530Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://huntr.dev/bounties/e589bd97-4c74-4e79-93b5-0951a281facc" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/radareorg/radare2/commit/ca8d8b39f3e34a4fd943270330b80f1148129de4" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "radareorg/radare2", "vendor": "radareorg", "versions": [ { "lessThan": "5.8.6", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Heap buffer overflow in libr/bin/format/mach0/mach0.c in GitHub repository radareorg/radare2 prior to 5.8.6. If address sanitizer is disabled during the compiling, the program should executes into the `r_str_ncpy` function. Therefore I think it is very likely to be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/122.html)." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "CWE-122 Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-06T10:15:15", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://huntr.dev/bounties/e589bd97-4c74-4e79-93b5-0951a281facc" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/radareorg/radare2/commit/ca8d8b39f3e34a4fd943270330b80f1148129de4" } ], "source": { "advisory": "e589bd97-4c74-4e79-93b5-0951a281facc", "discovery": "EXTERNAL" }, "title": "Heap buffer overflow in libr/bin/format/mach0/mach0.c in radareorg/radare2", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@huntr.dev", "ID": "CVE-2022-1240", "STATE": "PUBLIC", "TITLE": "Heap buffer overflow in libr/bin/format/mach0/mach0.c in radareorg/radare2" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "radareorg/radare2", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.8.6" } ] } } ] }, "vendor_name": "radareorg" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap buffer overflow in libr/bin/format/mach0/mach0.c in GitHub repository radareorg/radare2 prior to 5.8.6. If address sanitizer is disabled during the compiling, the program should executes into the `r_str_ncpy` function. Therefore I think it is very likely to be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/122.html)." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-122 Heap-based Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://huntr.dev/bounties/e589bd97-4c74-4e79-93b5-0951a281facc", "refsource": "CONFIRM", "url": "https://huntr.dev/bounties/e589bd97-4c74-4e79-93b5-0951a281facc" }, { "name": "https://github.com/radareorg/radare2/commit/ca8d8b39f3e34a4fd943270330b80f1148129de4", "refsource": "MISC", "url": "https://github.com/radareorg/radare2/commit/ca8d8b39f3e34a4fd943270330b80f1148129de4" } ] }, "source": { "advisory": "e589bd97-4c74-4e79-93b5-0951a281facc", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-1240", "datePublished": "2022-04-06T10:15:15", "dateReserved": "2022-04-05T00:00:00", "dateUpdated": "2024-08-02T23:55:24.530Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-1297
Vulnerability from cvelistv5
Published
2022-04-11 11:50
Modified
2024-08-02 23:55
Severity ?
EPSS score ?
Summary
Out-of-bounds Read in r_bin_ne_get_entrypoints function in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability may allow attackers to read sensitive information or cause a crash.
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/ec538fa4-06c6-4050-a141-f60153ddeaac | x_refsource_CONFIRM | |
https://github.com/radareorg/radare2/commit/0a557045476a2969c7079aec9eeb29d02f2809c6 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | radareorg | radareorg/radare2 |
Version: unspecified < 5.6.8 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:55:24.535Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://huntr.dev/bounties/ec538fa4-06c6-4050-a141-f60153ddeaac" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/radareorg/radare2/commit/0a557045476a2969c7079aec9eeb29d02f2809c6" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "radareorg/radare2", "vendor": "radareorg", "versions": [ { "lessThan": "5.6.8", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Out-of-bounds Read in r_bin_ne_get_entrypoints function in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability may allow attackers to read sensitive information or cause a crash." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-11T11:50:09", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://huntr.dev/bounties/ec538fa4-06c6-4050-a141-f60153ddeaac" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/radareorg/radare2/commit/0a557045476a2969c7079aec9eeb29d02f2809c6" } ], "source": { "advisory": "ec538fa4-06c6-4050-a141-f60153ddeaac", "discovery": "EXTERNAL" }, "title": "Out-of-bounds Read in r_bin_ne_get_entrypoints function in radareorg/radare2", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@huntr.dev", "ID": "CVE-2022-1297", "STATE": "PUBLIC", "TITLE": "Out-of-bounds Read in r_bin_ne_get_entrypoints function in radareorg/radare2" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "radareorg/radare2", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.6.8" } ] } } ] }, "vendor_name": "radareorg" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Out-of-bounds Read in r_bin_ne_get_entrypoints function in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability may allow attackers to read sensitive information or cause a crash." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-125 Out-of-bounds Read" } ] } ] }, "references": { "reference_data": [ { "name": "https://huntr.dev/bounties/ec538fa4-06c6-4050-a141-f60153ddeaac", "refsource": "CONFIRM", "url": "https://huntr.dev/bounties/ec538fa4-06c6-4050-a141-f60153ddeaac" }, { "name": "https://github.com/radareorg/radare2/commit/0a557045476a2969c7079aec9eeb29d02f2809c6", "refsource": "MISC", "url": "https://github.com/radareorg/radare2/commit/0a557045476a2969c7079aec9eeb29d02f2809c6" } ] }, "source": { "advisory": "ec538fa4-06c6-4050-a141-f60153ddeaac", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-1297", "datePublished": "2022-04-11T11:50:10", "dateReserved": "2022-04-11T00:00:00", "dateUpdated": "2024-08-02T23:55:24.535Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-1031
Vulnerability from cvelistv5
Published
2022-03-22 19:40
Modified
2024-08-02 23:47
Severity ?
EPSS score ?
Summary
Use After Free in op_is_set_bp in GitHub repository radareorg/radare2 prior to 5.6.6.
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/37da2cd6-0b46-4878-a32e-acbfd8f6f457 | x_refsource_CONFIRM | |
https://github.com/radareorg/radare2/commit/a7ce29647fcb38386d7439696375e16e093d6acb | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | radareorg | radareorg/radare2 |
Version: unspecified < 5.6.6 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:47:43.266Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://huntr.dev/bounties/37da2cd6-0b46-4878-a32e-acbfd8f6f457" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/radareorg/radare2/commit/a7ce29647fcb38386d7439696375e16e093d6acb" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "radareorg/radare2", "vendor": "radareorg", "versions": [ { "lessThan": "5.6.6", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Use After Free in op_is_set_bp in GitHub repository radareorg/radare2 prior to 5.6.6." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-22T19:40:10", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://huntr.dev/bounties/37da2cd6-0b46-4878-a32e-acbfd8f6f457" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/radareorg/radare2/commit/a7ce29647fcb38386d7439696375e16e093d6acb" } ], "source": { "advisory": "37da2cd6-0b46-4878-a32e-acbfd8f6f457", "discovery": "EXTERNAL" }, "title": "Use After Free in op_is_set_bp in radareorg/radare2", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@huntr.dev", "ID": "CVE-2022-1031", "STATE": "PUBLIC", "TITLE": "Use After Free in op_is_set_bp in radareorg/radare2" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "radareorg/radare2", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.6.6" } ] } } ] }, "vendor_name": "radareorg" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Use After Free in op_is_set_bp in GitHub repository radareorg/radare2 prior to 5.6.6." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-416 Use After Free" } ] } ] }, "references": { "reference_data": [ { "name": "https://huntr.dev/bounties/37da2cd6-0b46-4878-a32e-acbfd8f6f457", "refsource": "CONFIRM", "url": "https://huntr.dev/bounties/37da2cd6-0b46-4878-a32e-acbfd8f6f457" }, { "name": "https://github.com/radareorg/radare2/commit/a7ce29647fcb38386d7439696375e16e093d6acb", "refsource": "MISC", "url": "https://github.com/radareorg/radare2/commit/a7ce29647fcb38386d7439696375e16e093d6acb" } ] }, "source": { "advisory": "37da2cd6-0b46-4878-a32e-acbfd8f6f457", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-1031", "datePublished": "2022-03-22T19:40:10", "dateReserved": "2022-03-20T00:00:00", "dateUpdated": "2024-08-02T23:47:43.266Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-1649
Vulnerability from cvelistv5
Published
2022-05-10 09:55
Modified
2024-08-03 00:10
Severity ?
EPSS score ?
Summary
Null pointer dereference in libr/bin/format/mach0/mach0.c in radareorg/radare2 in GitHub repository radareorg/radare2 prior to 5.7.0. It is likely to be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/476.html).
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/c07e4918-cf86-4d2e-8969-5fb63575b449 | x_refsource_CONFIRM | |
https://github.com/radareorg/radare2/commit/a5aafb99c3965259c84ddcf45a91144bf7eb4cf1 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | radareorg | radareorg/radare2 |
Version: unspecified < 5.7.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T00:10:03.791Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://huntr.dev/bounties/c07e4918-cf86-4d2e-8969-5fb63575b449" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/radareorg/radare2/commit/a5aafb99c3965259c84ddcf45a91144bf7eb4cf1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "radareorg/radare2", "vendor": "radareorg", "versions": [ { "lessThan": "5.7.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Null pointer dereference in libr/bin/format/mach0/mach0.c in radareorg/radare2 in GitHub repository radareorg/radare2 prior to 5.7.0. It is likely to be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/476.html)." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-10T09:55:10", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://huntr.dev/bounties/c07e4918-cf86-4d2e-8969-5fb63575b449" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/radareorg/radare2/commit/a5aafb99c3965259c84ddcf45a91144bf7eb4cf1" } ], "source": { "advisory": "c07e4918-cf86-4d2e-8969-5fb63575b449", "discovery": "EXTERNAL" }, "title": "Null pointer dereference in libr/bin/format/mach0/mach0.c in radareorg/radare2 in radareorg/radare2", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@huntr.dev", "ID": "CVE-2022-1649", "STATE": "PUBLIC", "TITLE": "Null pointer dereference in libr/bin/format/mach0/mach0.c in radareorg/radare2 in radareorg/radare2" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "radareorg/radare2", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.7.0" } ] } } ] }, "vendor_name": "radareorg" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Null pointer dereference in libr/bin/format/mach0/mach0.c in radareorg/radare2 in GitHub repository radareorg/radare2 prior to 5.7.0. It is likely to be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/476.html)." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-476 NULL Pointer Dereference" } ] } ] }, "references": { "reference_data": [ { "name": "https://huntr.dev/bounties/c07e4918-cf86-4d2e-8969-5fb63575b449", "refsource": "CONFIRM", "url": "https://huntr.dev/bounties/c07e4918-cf86-4d2e-8969-5fb63575b449" }, { "name": "https://github.com/radareorg/radare2/commit/a5aafb99c3965259c84ddcf45a91144bf7eb4cf1", "refsource": "MISC", "url": "https://github.com/radareorg/radare2/commit/a5aafb99c3965259c84ddcf45a91144bf7eb4cf1" } ] }, "source": { "advisory": "c07e4918-cf86-4d2e-8969-5fb63575b449", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-1649", "datePublished": "2022-05-10T09:55:10", "dateReserved": "2022-05-10T00:00:00", "dateUpdated": "2024-08-03T00:10:03.791Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-0713
Vulnerability from cvelistv5
Published
2022-02-22 18:30
Modified
2024-08-02 23:40
Severity ?
EPSS score ?
Summary
Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.6.4.
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/d35b3dff-768d-4a09-a742-c18ca8f56d3c | x_refsource_CONFIRM | |
https://github.com/radareorg/radare2/commit/a35f89f86ed12161af09330e92e5a213014e46a1 | x_refsource_MISC | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/ | vendor-advisory, x_refsource_FEDORA |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | radareorg | radareorg/radare2 |
Version: unspecified < 5.6.4 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:40:03.538Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://huntr.dev/bounties/d35b3dff-768d-4a09-a742-c18ca8f56d3c" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/radareorg/radare2/commit/a35f89f86ed12161af09330e92e5a213014e46a1" }, { "name": "FEDORA-2022-7db9e7bb5b", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/" }, { "name": "FEDORA-2022-85b277e748", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "radareorg/radare2", "vendor": "radareorg", "versions": [ { "lessThan": "5.6.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.6.4." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "CWE-122 Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-26T17:06:31", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://huntr.dev/bounties/d35b3dff-768d-4a09-a742-c18ca8f56d3c" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/radareorg/radare2/commit/a35f89f86ed12161af09330e92e5a213014e46a1" }, { "name": "FEDORA-2022-7db9e7bb5b", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/" }, { "name": "FEDORA-2022-85b277e748", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/" } ], "source": { "advisory": "d35b3dff-768d-4a09-a742-c18ca8f56d3c", "discovery": "EXTERNAL" }, "title": "Heap-based Buffer Overflow in radareorg/radare2", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@huntr.dev", "ID": "CVE-2022-0713", "STATE": "PUBLIC", "TITLE": "Heap-based Buffer Overflow in radareorg/radare2" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "radareorg/radare2", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.6.4" } ] } } ] }, "vendor_name": "radareorg" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.6.4." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-122 Heap-based Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://huntr.dev/bounties/d35b3dff-768d-4a09-a742-c18ca8f56d3c", "refsource": "CONFIRM", "url": "https://huntr.dev/bounties/d35b3dff-768d-4a09-a742-c18ca8f56d3c" }, { "name": "https://github.com/radareorg/radare2/commit/a35f89f86ed12161af09330e92e5a213014e46a1", "refsource": "MISC", "url": "https://github.com/radareorg/radare2/commit/a35f89f86ed12161af09330e92e5a213014e46a1" }, { "name": "FEDORA-2022-7db9e7bb5b", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/" }, { "name": "FEDORA-2022-85b277e748", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/" } ] }, "source": { "advisory": "d35b3dff-768d-4a09-a742-c18ca8f56d3c", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-0713", "datePublished": "2022-02-22T18:30:11", "dateReserved": "2022-02-21T00:00:00", "dateUpdated": "2024-08-02T23:40:03.538Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }