Page 13 of 131 results (0.011 seconds)

CVSS: 8.8EPSS: 0%CPEs: 3EXPL: 1

Use After Free in GitHub repository radareorg/radare2 prior to 5.6.2. Una Desreferencia de Puntero Caducada en el repositorio GitHub radareorg/radare2 versiones anteriores a 5.6.2 • https://github.com/radareorg/radare2/commit/35482cb760db10f87a62569e2f8872dbd95e9269 https://huntr.dev/bounties/9d8d6ae0-fe00-40b9-ae1e-b0e8103bac69 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND • CWE-416: Use After Free •

CVSS: 5.9EPSS: 0%CPEs: 3EXPL: 2

NULL Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.6.0. Una Desreferencia de puntero NULL en el repositorio GitHub radareorg/radare2 anterior a la versión 5.6.0. • http://www.openwall.com/lists/oss-security/2022/05/25/1 https://census-labs.com/news/2022/05/24/multiple-vulnerabilities-in-radare2 https://github.com/radareorg/radare2/commit/feaa4e7f7399c51ee6f52deb84dc3f795b4035d6 https://huntr.dev/bounties/1f84e79d-70e7-4b29-8b48-a108f81c89aa https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IQIRJ72UALGMSWH6MYPVJQQLXFGZ23RS https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SKGIB52R4XPCPNEW6GF56EHW7ST24IJU • CWE-476: NULL Pointer Dereference •

CVSS: 9.6EPSS: 0%CPEs: 3EXPL: 1

radare2 is vulnerable to Out-of-bounds Read radare2 es vulnerable a una Lectura Fuera de Límites • https://github.com/radareorg/radare2/commit/37897226a1a31f982bfefdc4aeefc2e50355c73c https://huntr.dev/bounties/727d8600-88bc-4dde-8dea-ee3d192600e5 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IQIRJ72UALGMSWH6MYPVJQQLXFGZ23RS https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SKGIB52R4XPCPNEW6GF56EHW7ST24IJU • CWE-125: Out-of-bounds Read •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 1

A vulnerability was found in Radare2 in version 5.3.1. Improper input validation when reading a crafted LE binary can lead to resource exhaustion and DoS. Se ha encontrado una vulnerabilidad en Radare2 en versión 5.3.1. Una comprobación inapropiada de la entrada cuando es leído un binario LE diseñado puede conllevar a un agotamiento de los recursos y DoS • https://bugzilla.redhat.com/show_bug.cgi?id=1989130 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IQIRJ72UALGMSWH6MYPVJQQLXFGZ23RS https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JIARALLVVY2362AYFSFULTZKIW6QO5R5 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NFQPEPMLAOQNGZG5OHSPZBNONGG4DDJO https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SKGIB52R4XPCPNEW6GF56EHW7ST24IJU https:&#x • CWE-20: Improper Input Validation CWE-252: Unchecked Return Value •

CVSS: 5.5EPSS: 0%CPEs: 3EXPL: 3

In radare2 through 5.3.0 there is a double free vulnerability in the pyc parse via a crafted file which can lead to DoS. En radare2 versiones hasta 5.3.0, se presenta una vulnerabilidad de doble liberación en el análisis de pyc mediante un archivo diseñado que puede conllevar a una denegación de servicio • https://bugzilla.redhat.com/show_bug.cgi?id=1959939 https://github.com/radareorg/radare2/commit/5e16e2d1c9fe245e4c17005d779fde91ec0b9c05 https://github.com/radareorg/radare2/commit/a07dedb804a82bc01c07072861942dd80c6b6d62 https://github.com/radareorg/radare2/issues/18666 https://github.com/radareorg/radare2/issues/18667 https://github.com/radareorg/radare2/issues/18679 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W3LPB5VGCIA7WA55FSB3YZQFUGZKWD7O https://lists.fedoraproject.org/archives/l • CWE-415: Double Free CWE-416: Use After Free •