Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

radareorg — Vulnerabilities & Security Advisories 53

Browse all 53 CVE security advisories affecting radareorg. AI-powered Chinese analysis, POCs, and references for each vulnerability.

radareorg operates as a provider of reverse engineering frameworks and security analysis tools, primarily serving developers and security researchers who require low-level binary inspection capabilities. Historical vulnerability assessments indicate a pattern of common web application flaws, with Remote Code Execution (RCE) and Cross-Site Scripting (XSS) representing the most frequent attack vectors. These issues often stem from insufficient input validation within the platform’s administrative interfaces or web-based management consoles. While the core binary analysis engine remains relatively stable, the associated web components have historically exhibited privilege escalation risks, allowing unauthorized users to gain elevated access. Security audits reveal that many of the recorded Common Vulnerabilities and Exposures (CVEs) relate to outdated dependencies or misconfigured access controls rather than fundamental architectural defects. Consequently, maintaining strict patch management and enforcing robust authentication mechanisms are critical for mitigating the identified risks associated with this software ecosystem.

Found 9 results / 53Clear Filters
Top products by radareorg: radareorg/radare2 radare2

This page lists every published CVE security advisory associated with radareorg. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.