Vulnerabilities > Radare > Radare2 > 1.3.0
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2018-12-04 | CVE-2018-19843 | Out-of-bounds Read vulnerability in Radare Radare2 opmov in libr/asm/p/asm_x86_nz.c in radare2 before 3.1.0 allows attackers to cause a denial of service (buffer over-read) via crafted x86 assembly data, as demonstrated by rasm2. | 5.5 |
2018-12-04 | CVE-2018-19842 | Out-of-bounds Read vulnerability in Radare Radare2 getToken in libr/asm/p/asm_x86_nz.c in radare2 before 3.1.0 allows attackers to cause a denial of service (stack-based buffer over-read) via crafted x86 assembly data, as demonstrated by rasm2. | 5.5 |
2018-09-12 | CVE-2018-15834 | Out-of-bounds Write vulnerability in Radare Radare2 In radare2 before 2.9.0, a heap overflow vulnerability exists in the read_module_referenced_functions function in libr/anal/flirt.c via a crafted flirt signature file. | 5.5 |
2017-04-18 | CVE-2017-7946 | Use After Free vulnerability in Radare Radare2 1.3.0 The get_relocs_64 function in libr/bin/format/mach0/mach0.c in radare2 1.3.0 allows remote attackers to cause a denial of service (use-after-free and application crash) via a crafted Mach0 file. | 5.5 |
2017-04-13 | CVE-2017-7854 | Out-of-bounds Read vulnerability in Radare Radare2 1.3.0 The consume_init_expr function in wasm.c in radare2 1.3.0 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted Web Assembly file. | 5.5 |
2017-04-12 | CVE-2017-7716 | Out-of-bounds Read vulnerability in Radare Radare2 1.3.0 The read_u32_leb128 function in libr/util/uleb128.c in radare2 1.3.0 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted Web Assembly file. | 5.5 |
2017-03-27 | CVE-2017-7274 | NULL Pointer Dereference vulnerability in Radare Radare2 1.3.0 The r_pkcs7_parse_cms function in libr/util/r_pkcs7.c in radare2 1.3.0 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted PE file. | 5.5 |