Buffer Overflow vuln in radarorg radare2 v5.8.8, allows attacker to exec arbitrary code via parse_die functio
Reporter | Title | Published | Views | Family All 9 |
---|---|---|---|---|
OpenVAS | openSUSE: Security Advisory for radare2 (openSUSE-SU-2024:0396-1) | 10 Dec 202400:00 | – | openvas |
OpenVAS | Mageia: Security Advisory (MGASA-2025-0006) | 13 Jan 202500:00 | – | openvas |
Cvelist | CVE-2024-29645 | 2 Dec 202400:00 | – | cvelist |
OSV | UBUNTU-CVE-2024-29645 | 2 Dec 202415:15 | – | osv |
OSV | CVE-2024-29645 | 2 Dec 202415:15 | – | osv |
NVD | CVE-2024-29645 | 2 Dec 202415:15 | – | nvd |
Debian CVE | CVE-2024-29645 | 2 Dec 202415:15 | – | debiancve |
CVE | CVE-2024-29645 | 2 Dec 202415:15 | – | cve |
Mageia | Updated radare2 packages fix security vulnerability | 12 Jan 202509:41 | – | mageia |
[
{
"cpes": [
"cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*"
],
"vendor": "radare",
"product": "radare2",
"versions": [
{
"status": "affected",
"version": "5.8.8",
"lessThan": "5.9.0",
"versionType": "custom"
}
],
"defaultStatus": "unknown"
}
]
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo