Page 6 of 132 results (0.007 seconds)

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 2

radareorg radare2 5.5.2 is vulnerable to Buffer Overflow via /libr/core/anal_objc.c mach-o parser. radareorg radare versión 2 5.5.2 es vulnerable a un Desbordamiento del Búfer por medio del parser /libr/core/anal_objc.c mach-o • http://www.openwall.com/lists/oss-security/2022/05/25/1 https://census-labs.com/news/2022/05/24/multiple-vulnerabilities-in-radare2 https://github.com/radareorg/radare2/issues/19476 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

Access of Uninitialized Pointer in GitHub repository radareorg/radare2 prior to 5.7.0. Un Acceso de Puntero no Inicializado en el repositorio GitHub radareorg/radare2 versiones anteriores a 5.7.0 • https://github.com/radareorg/radare2/commit/919e3ac1a13f753c73e7a8e8d8bb4a143218732d https://huntr.dev/bounties/0730a95e-c485-4ff2-9a5d-bb3abfda0b17 • CWE-824: Access of Uninitialized Pointer •

CVSS: 7.9EPSS: 0%CPEs: 1EXPL: 1

Out-of-bounds Read in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end of the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash. Un Desbordamiento de Búfer en la Región Heap de la Memoria en el repositorio GitHub radareorg/radare2 versiones anteriores a 5.7.0. El bug causa que el programa lea datos más allá del final del búfer previsto. • https://github.com/radareorg/radare2/commit/3ecdbf8e21186a9c5a4d3cfa3b1e9fd27045340e https://huntr.dev/bounties/1c22055b-b015-47a8-a57b-4982978751d0 • CWE-125: Out-of-bounds Read •

CVSS: 7.6EPSS: 0%CPEs: 1EXPL: 1

Null pointer dereference in libr/bin/format/mach0/mach0.c in radareorg/radare2 in GitHub repository radareorg/radare2 prior to 5.7.0. It is likely to be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/476.html). Una Desreferencia de puntero Null en el archivo libr/bin/format/mach0/mach0.c en radareorg/radare2 en el repositorio de GitHub radareorg/radare2 versiones anteriores a 5.7.0. Es probable que pueda ser explotada. • https://github.com/radareorg/radare2/commit/a5aafb99c3965259c84ddcf45a91144bf7eb4cf1 https://huntr.dev/bounties/c07e4918-cf86-4d2e-8969-5fb63575b449 • CWE-476: NULL Pointer Dereference •

CVSS: 7.1EPSS: 0%CPEs: 1EXPL: 1

Out-of-bounds Read in r_bin_java_constant_value_attr_new function in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end 2f the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash. More details see [CWE-125: Out-of-bounds read](https://cwe.mitre.org/data/definitions/125.html). Una Lectura fuera de Límites en la función r_bin_java_constant_value_attr_new en el repositorio GitHub radareorg/radare2 versiones anteriores a 5.7.0. • https://github.com/radareorg/radare2/commit/0927ed3ae99444e7b47b84e43118deb10fe37529 https://huntr.dev/bounties/229a2e0d-9e5c-402f-9a24-57fa2eb1aaa7 • CWE-125: Out-of-bounds Read CWE-788: Access of Memory Location After End of Buffer •