| Advisory
Products
MOOLE SCA
Continuous visibility into open-source risk
MOOLE Container Security
End-to-end container defense across the SDLC
MOOLE SAST
Static application security testing for source code
About Us
CVE-2022-0713
Vulnerability Database
CVE-2022-0713
Base Score
HIGH
7.1
CVE-2022-0713
Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.6.4.
Vector
LOCAL
Published By
security@huntr.dev
Published Date
Feb 22, 2022, 19:15
Weakness Type (CWE)
:
CWE-787
CVSS Metrics
CVSS v3.1
CVSS v3.0
CVSS v2
Base Score
7.1
Vector String
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
Base Severity
HIGH
Version
3.1
Attack Vector (AV)
LOCAL
Attack Complexity (AC)
LOW
Privileges Required (PR)
NONE
User Interaction (UI)
REQUIRED
Scope (S)
UNCHANGED
Confidentiality (C)
HIGH
Integrity (I)
NONE
Availability (A)
HIGH
References
https://github.com/radareorg/radare2/commit/a35f89f86ed12161af09330e92e5a213014e46a1
https://huntr.dev/bounties/d35b3dff-768d-4a09-a742-c18ca8f56d3c
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/
Base Score
HIGH
7.1
Weakness Type (CWE)
:
CWE-787
CVSS Metrics
CVSS v3.1
CVSS v3.0
CVSS v2
Base Score
7.1
Vector String
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
Base Severity
HIGH
Version
3.1
Attack Vector (AV)
LOCAL
Attack Complexity (AC)
LOW
Privileges Required (PR)
NONE
User Interaction (UI)
REQUIRED
Scope (S)
UNCHANGED
Confidentiality (C)
HIGH
Integrity (I)
NONE
Availability (A)
HIGH