Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 01 May 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Mon, 20 Apr 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 16 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 16 Apr 2026 01:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 15 Apr 2026 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Radare
Radare radare2 |
|
| Vendors & Products |
Radare
Radare radare2 |
Wed, 15 Apr 2026 02:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | radare2 prior to version 6.1.4 contains a command injection vulnerability in the PDB parser's print_gvars() function that allows attackers to execute arbitrary commands by embedding a newline byte in the PE section header name field. Attackers can craft a malicious PDB file with specially crafted section names to inject r2 commands that are executed when the idp command processes the file. | |
| Title | radare2 < 6.1.4 Command Injection via PDB Parser print_gvars() | |
| Weaknesses | CWE-78 | |
| References |
|
|
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-20T15:51:22.636Z
Reserved: 2026-04-13T20:29:02.808Z
Link: CVE-2026-40499
Updated: 2026-04-16T14:06:50.626Z
Status : Analyzed
Published: 2026-04-15T04:17:48.330
Modified: 2026-05-01T15:20:01.863
Link: CVE-2026-40499
No data.
OpenCVE Enrichment
Updated: 2026-04-15T13:49:14Z