- Description
- A flaw was found in Radare2, which contains a command injection vulnerability caused by insufficient input validation when handling Pebble Application files. Maliciously crafted inputs can inject shell commands during command parsing, leading to unintended behavior during file processing
- Source
- patrick@puiterwijk.org
- NVD status
- Received
CVSS 3.1
- Type
- Secondary
- Base score
- 8.6
- Impact score
- 6
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
- Severity
- HIGH
- patrick@puiterwijk.org
- CWE-78
- Hype score
- Not currently trending
CVE-2024-11858 Command Injection Vulnerability Found in Radare2 Pebble File Handling There's a command injection flaw in Radare2. It happens because the software doesn't check inputs well when dealing with Pebble... https://t.co/wvvmeqH1HH
@VulmonFeeds
15 Dec 2024
11 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[CVE-2024-11858: HIGH] Critical command injection vulnerability found in Radare2 due to poor input validation, allowing malicious inputs to execute shell commands and disrupt file processing. #cybersecurity#cybersecurity,#vulnerability https://t.co/v24OUwW061 https://t.co/kBbjq4s
@CveFindCom
15 Dec 2024
47 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes