Radare
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in any Radare product.
RSS Feeds for Radare security vulnerabilities
Create a CVE RSS feed including security vulnerabilities found in Radare products with stack.watch. Just hit watch, then grab your custom RSS feed url.
Products by Radare Sorted by Most Security Vulnerabilities since 2018
By the Year
In 2026 there have been 1 vulnerability in Radare with an average score of 3.3 out of ten. Last year, in 2025 Radare had 15 security vulnerabilities published. Right now, Radare is on track to have less security vulnerabilities in 2026 than it did last year. Last year, the average CVE base score was greater by 0.88
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 1 | 3.30 |
| 2025 | 15 | 4.18 |
| 2024 | 5 | 6.65 |
| 2023 | 16 | 8.01 |
| 2022 | 48 | 6.95 |
| 2021 | 3 | 7.60 |
| 2020 | 1 | 9.60 |
| 2019 | 8 | 7.80 |
| 2018 | 31 | 6.01 |
It may take a day or so for new Radare vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Radare Security Vulnerabilities
| CVE | Date | Vulnerability | Products |
|---|---|---|---|
| CVE-2026-4174 | Mar 15, 2026 |
Radare2 5.9.9 Mach-O Parser DoS via walk_exports_trie (CVE-2026-4174)A vulnerability has been found in Radare2 5.9.9. This issue affects the function walk_exports_trie of the file libr/bin/format/mach0/mach0.c of the component Mach-O File Parser. Such manipulation leads to resource consumption. The attack can only be performed from a local environment. The exploit has been disclosed to the public and may be used. The existence of this vulnerability is still disputed at present. Upgrading to version 6.1.2 is capable of addressing this issue. The name of the patch is 4371ae84c99c46b48cb21badbbef06b30757aba0. You should upgrade the affected component. The code maintainer states that, "[he] wont consider this bug a DoS". |
|
| CVE-2025-63745 | Nov 14, 2025 |
NULL-pointer deref in radare2 <6.0.5 (bin_ne) leading to DoSA NULL pointer dereference vulnerability was discovered in radare2 6.0.5 and earlier within the info() function of bin_ne.c. A crafted binary input can trigger a segmentation fault, leading to a denial of service when the tool processes malformed data. |
|
| CVE-2025-60361 | Oct 17, 2025 |
Memory Leak in radare2 v5.9.8 bochs_open functionradare2 v5.9.8 and before contains a memory leak in the function bochs_open. |
|
| CVE-2025-60359 | Oct 17, 2025 |
radare2 v5.9.8- Before - Memory Leak in r_bin_object_newradare2 v5.9.8 and before contains a memory leak in the function r_bin_object_new. |
|
| CVE-2025-60358 | Oct 16, 2025 |
radare2 <5.9.8: _load_relocations Memory Leakradare2 v.5.9.8 and before contains a memory leak in the function _load_relocations. |
|
| CVE-2025-5647 | Jun 05, 2025 |
Radare2 5.9.9 Radiff2 r_cons_context_break_pop Mem Corrupt via -TA vulnerability was found in Radare2 5.9.9 and classified as problematic. This issue affects the function r_cons_context_break_pop in the library /libr/cons/cons.c of the component radiff2. The manipulation of the argument -T leads to memory corruption. The attack needs to be approached locally. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The patch is named 5705d99cc1f23f36f9a84aab26d1724010b97798. It is recommended to apply a patch to fix this issue. The documentation explains that the parameter -T is experimental and "crashy". Further analysis has shown "the race is not a real problem unless you use asan". A new warning has been added. |
|
| CVE-2025-5648 | Jun 05, 2025 |
Radare2 5.9.9 r_cons_pal_init MemCorrupt via -T ArgumentA vulnerability was found in Radare2 5.9.9. It has been classified as problematic. Affected is the function r_cons_pal_init in the library /libr/cons/pal.c of the component radiff2. The manipulation of the argument -T leads to memory corruption. An attack has to be approached locally. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The name of the patch is 5705d99cc1f23f36f9a84aab26d1724010b97798. It is recommended to apply a patch to fix this issue. The documentation explains that the parameter -T is experimental and "crashy". Further analysis has shown "the race is not a real problem unless you use asan". A new warning has been added. |
|
| CVE-2025-5645 | Jun 05, 2025 |
Memory Corruption via -T in radare2 5.9.9 (radiff2)A vulnerability, which was classified as problematic, was found in Radare2 5.9.9. This affects the function r_cons_pal_init in the library /libr/cons/pal.c of the component radiff2. The manipulation of the argument -T leads to memory corruption. Attacking locally is a requirement. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The identifier of the patch is 5705d99cc1f23f36f9a84aab26d1724010b97798. It is recommended to apply a patch to fix this issue. The documentation explains that the parameter -T is experimental and "crashy". Further analysis has shown "the race is not a real problem unless you use asan". A new warning has been added. |
|
| CVE-2025-5646 | Jun 05, 2025 |
Radare2 5.9.9 Memory Corruption in r_cons_rainbow_free (radiff2)A vulnerability has been found in Radare2 5.9.9 and classified as problematic. This vulnerability affects the function r_cons_rainbow_free in the library /libr/cons/pal.c of the component radiff2. The manipulation of the argument -T leads to memory corruption. It is possible to launch the attack on the local host. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The patch is identified as 5705d99cc1f23f36f9a84aab26d1724010b97798. It is recommended to apply a patch to fix this issue. The documentation explains that the parameter -T is experimental and "crashy". Further analysis has shown "the race is not a real problem unless you use asan". A new warning has been added. |
|
| CVE-2025-5643 | Jun 05, 2025 |
Radare2 5.9.9 cons_stack_load Memory Corruption via -TA vulnerability classified as problematic was found in Radare2 5.9.9. Affected by this vulnerability is the function cons_stack_load in the library /libr/cons/cons.c of the component radiff2. The manipulation of the argument -T leads to memory corruption. An attack has to be approached locally. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The patch is named 5705d99cc1f23f36f9a84aab26d1724010b97798. It is recommended to apply a patch to fix this issue. The documentation explains that the parameter -T is experimental and "crashy". Further analysis has shown "the race is not a real problem unless you use asan". A new warning has been added. |
|