task_id stringlengths 8 10 | docker_image stringlengths 17 19 | basedir stringclasses 157
values | target_functions listlengths 1 3 | crash_type stringclasses 85
values | project_name stringclasses 157
values | sanitizer stringclasses 3
values | sanitizer_output stringlengths 1.13k 6.5M | language stringclasses 2
values | vuln_commit stringlengths 40 40 | fix stringlengths 69 110 | vulnerability_description stringlengths 38 824 ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
arvo:59814 | n132/arvo:59814-vul | /src/libheif | [
{
"end_line": 110,
"function_name": "read_plane_interleaved",
"start_line": 86,
"target_file": "/src/libheif/fuzzing/color_conversion_fuzzer.cc"
}
] | Heap-buffer-overflow WRITE {*} | libheif | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2360416361
INFO: Loaded 1 modules (23744 inline 8-bit counters): 23744 [0x865b010, 0x8660cd0),
INFO: Loaded 1 PC tables (23744 PCs): 23744 [0x8660cd0,0x868f2d0),
/out/color_conversion_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=====... | cpp | a26bcb0b219cca182e7aedded4fdc1001eb36f5f | https://github.com/strukturag/libheif/commit/94e5a84d1f05fe905e91a41e8a17e29437c3c15e | An integer overflow occurs in color_conversion_fuzzer due to missing checks, leading to a security vulnerability in the fuzzer code rather than in the library. |
arvo:59827 | n132/arvo:59827-vul | /src/mruby | [
{
"end_line": 576,
"function_name": "mrb_init_kernel",
"start_line": 537,
"target_file": "/src/mruby/src/kernel.c"
}
] | Use-of-uninitialized-value | mruby | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3606614637
INFO: Loaded 1 modules (23894 inline 8-bit counters): 23894 [0x9e7679, 0x9ed3cf),
INFO: Loaded 1 PC tables (23894 PCs): 23894 [0x922d70,0x9802d0),
/out/mruby_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
fz
fz
fz
fz
fz
fz
fz... | c | e96d90dab2042db93c5ba8a85211226e0d48abb3 | https://github.com/mruby/mruby/commit/347586e4002959bd3e6694a0174812f4f7e6d485 | A security vulnerability exists in kernel.c due to the absence of a `respond_to_missing?` method, which may cause objects to incorrectly report their ability to respond to certain methods. |
arvo:59862 | n132/arvo:59862-vul | /src/PcapPlusPlus | [
{
"end_line": 273,
"function_name": "getFirstTLVRecord",
"start_line": 260,
"target_file": "/src/PcapPlusPlus/Packet++/header/TLVData.h"
}
] | Heap-buffer-overflow READ {*} | PcapPlusPlus | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 668505433
INFO: Loaded 1 modules (35869 inline 8-bit counters): 35869 [0xab28e8, 0xabb505),
INFO: Loaded 1 PC tables (35869 PCs): 35869 [0xabb508,0xb476d8),
/out/FuzzTarget: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=======================... | cpp | 65974d73c33aaede1bf3c18a353ea2209d1912a0 | https://github.com/seladb/PcapPlusPlus/commit/59bb2d12ec7e0b90b6fc4746da0a44f4dc64825b | null |
arvo:60003 | n132/arvo:60003-vul | /src/ndpi | [
{
"end_line": 111,
"function_name": "ndpi_search_line",
"start_line": 38,
"target_file": "/src/ndpi/src/lib/protocols/line.c"
}
] | Heap-buffer-overflow READ 1 | ndpi | asan | =================================================================
==13134==ERROR: AddressSanitizer: use-after-poison on address 0x7f2b94cff81d at pc 0x0000005d638a bp 0x7fff7b151e10 sp 0x7fff7b151e08
READ of size 1 at 0x7f2b94cff81d thread T0
SCARINESS: 22 (1-byte-read-use-after-poison)
#0 0x5d6389 in ndpi_search_l... | c | 3608ab01b61bde1b7ac88baa448fe37724a313db | https://github.com/ntop/nDPI/commit/46aab35a296bfe059e60ea7aa3dc75ca6c0b88a8 | null |
arvo:6007 | n132/arvo:6007-vul | /src/openthread | [
{
"end_line": 888,
"function_name": "Leader::AddService",
"start_line": 859,
"target_file": "/src/openthread/src/core/thread/network_data_leader_ftd.cpp"
}
] | Stack-buffer-overflow READ 1 | openthread | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/ip6-send-fuzzer < INPUT_FILE
or
/out/ip6-send-fuzzer INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /out/ip6-send-... | cpp | cc8579fb3f99130f2ce2b1aaf5c1821218b821c0 | https://github.com/openthread/openthread/commit/56bf6a79f773419d21e0426915c7b3a3951d1bdf | null |
arvo:60070 | n132/arvo:60070-vul | /src/ndpi | [
{
"end_line": 125,
"function_name": "thrift_set_method",
"start_line": 115,
"target_file": "/src/ndpi/src/lib/protocols/thrift.c"
}
] | Heap-buffer-overflow WRITE {*} | ndpi | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/fuzz_ndpi_reader_alloc_fail
=================================================================
==13115==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x619000000418 at pc 0x00000048af8d bp 0x7fff50a9f7b0 sp 0x7fff50a9ef70
WRITE of... | c | 7ef80f6b78e882129f47bb9e09e67d53690cba2f | https://github.com/ntop/nDPI/commit/3a1600ff26d02a3440186a6e8355521086a7e11f | null |
arvo:60116 | n132/arvo:60116-vul | /src/harfbuzz | [
{
"end_line": 69,
"function_name": "add",
"start_line": 52,
"target_file": "/src/harfbuzz/src/hb-subset-cff1.cc"
}
] | Use-of-uninitialized-value | harfbuzz | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1158855375
INFO: Loaded 1 modules (87784 inline 8-bit counters): 87784 [0x11fbd44, 0x121142c),
INFO: Loaded 1 PC tables (87784 PCs): 87784 [0x1211430,0x13682b0),
/out/hb-subset-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==837==WARNI... | cpp | dc1b172408ae02a64cac6edefd333d3651f7e92c | https://github.com/harfbuzz/harfbuzz/commit/86a550dc7e182a53eb950278b42d0243b7185f73 | null |
arvo:60253 | n132/arvo:60253-vul | /src/libjpeg-turbo.2.0.x | [
{
"end_line": 634,
"function_name": "encode_one_block",
"start_line": 564,
"target_file": "/src/libjpeg-turbo.2.0.x/jchuff.c"
}
] | Use-of-uninitialized-value | libjpeg-turbo.2.1.x | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1053430275
INFO: Loaded 1 modules (8852 inline 8-bit counters): 8852 [0x82948c, 0x82b720),
INFO: Loaded 1 PC tables (8852 PCs): 8852 [0x7bbdb0,0x7de6f0),
/out/transform_fuzzer_2_0_x: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==3416==WARNIN... | cpp | 369b84a4eeb5714b0322d352b57135fd3e3433d2 | https://github.com/libjpeg-turbo/libjpeg-turbo/commit/31a301389bc94b6cac513e315cca0c621f7e1684 | The C baseline Huffman encoder in jchuff.c lacks two coefficient range checks, allowing out-of-range coefficients when transforming a specially-crafted malformed arithmetic-coded JPEG source image into a baseline Huffman-coded JPEG destination image with default Huffman tables. This can cause the variable r to equal 25... |
arvo:60354 | n132/arvo:60354-vul | /src/PcapPlusPlus | [
{
"end_line": 273,
"function_name": "getFirstTLVRecord",
"start_line": 260,
"target_file": "/src/PcapPlusPlus/Packet++/header/TLVData.h"
}
] | Use-of-uninitialized-value | PcapPlusPlus | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1224632652
INFO: Loaded 1 modules (27194 inline 8-bit counters): 27194 [0xc083a8, 0xc0ede2),
INFO: Loaded 1 PC tables (27194 PCs): 27194 [0xc0ede8,0xc79188),
/out/FuzzTarget: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
Uninitialized bytes in... | cpp | 65974d73c33aaede1bf3c18a353ea2209d1912a0 | https://github.com/seladb/PcapPlusPlus/commit/59bb2d12ec7e0b90b6fc4746da0a44f4dc64825b | null |
arvo:60456 | n132/arvo:60456-vul | /src/PcapPlusPlus | [
{
"end_line": 273,
"function_name": "getFirstTLVRecord",
"start_line": 260,
"target_file": "/src/PcapPlusPlus/Packet++/header/TLVData.h"
}
] | Heap-buffer-overflow READ 2 | PcapPlusPlus | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1527069857
INFO: Loaded 1 modules (35869 inline 8-bit counters): 35869 [0xab28e8, 0xabb505),
INFO: Loaded 1 PC tables (35869 PCs): 35869 [0xabb508,0xb476d8),
/out/FuzzTarget: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
======================... | cpp | 65974d73c33aaede1bf3c18a353ea2209d1912a0 | https://github.com/seladb/PcapPlusPlus/commit/59bb2d12ec7e0b90b6fc4746da0a44f4dc64825b | null |
arvo:60532 | n132/arvo:60532-vul | /src/binutils-gdb | [
{
"end_line": 922,
"function_name": "elf_object_p",
"start_line": 515,
"target_file": "/src/binutils-gdb/bfd/elfcode.h"
}
] | Use-of-uninitialized-value | binutils-gdb | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2697736042
INFO: Loaded 1 modules (249072 inline 8-bit counters): 249072 [0x3976e68, 0x39b3b58),
INFO: Loaded 1 PC tables (249072 PCs): 249072 [0x3291c38,0x365eb38),
/out/fuzz_dwarf: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==83632==WARNI... | cpp | e726bad8af9a12dc7cbc5f148523fdf0a0b3cf5a | https://github.com/bminor/binutils-gdb/commit/22e90ac5af46c01ee4972cf04e835266862bbb35 | An uninitialized memory access occurs in the function offset_from_vma in elf.c when _bfd_elf_get_dynamic_symbols is called from bfd_elf32_object_p in elfcode.h. The vulnerability is triggered when attempting to load dynamic symbols for a file with no section headers before all the program headers are swapped in, partic... |
arvo:60557 | n132/arvo:60557-vul | /src/ndpi | [
{
"end_line": 361,
"function_name": "ndpi_http_check_content",
"start_line": 223,
"target_file": "/src/ndpi/src/lib/protocols/http.c"
}
] | Heap-buffer-overflow READ 1 | ndpi | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/fuzz_process_packet
=================================================================
==13304==ERROR: AddressSanitizer: negative-size-param: (size=-1)
SCARINESS: 10 (negative-size-param)
#0 0x489cae in __interceptor_strncpy /src/llvm-pr... | c | 0c5a17accb509ff950829d50c2af0b031bcbe3a5 | https://github.com/ntop/nDPI/commit/bd0fcb2e62e5fa1fb3f4342e605e15f1f4920efc | A heap-buffer-overflow vulnerability exists in the HTTP protocol handling code in src/lib/protocols/http.c, specifically in the ndpi_http_check_content, check_content_type_and_change_protocol, process_response, ndpi_check_http_tcp, and ndpi_search_http_tcp functions. The issue occurs due to an out-of-bounds read in str... |
arvo:60605 | n132/arvo:60605-vul | /src/ndpi | [
{
"end_line": 364,
"function_name": "ndpi_http_check_content",
"start_line": 223,
"target_file": "/src/ndpi/src/lib/protocols/http.c"
}
] | Negative-size-param | ndpi | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3635496528
INFO: Loaded 1 modules (21014 inline 8-bit counters): 21014 [0x1105510, 0x110a726),
INFO: Loaded 1 PC tables (21014 PCs): 21014 [0x110a728,0x115c888),
/out/fuzz_ndpi_reader: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
============... | c | 2bbde5bad3ca309141df7522da1b20bb0a506ec2 | https://github.com/ntop/nDPI/commit/5267858b3d09fbc6a70c4bdcabdd176ea26ee72c | A memory access vulnerability exists in the HTTP protocol implementation in http.c, specifically in the ndpi_http_check_content function. The issue involves a negative-size parameter being passed to strncpy, leading to an AddressSanitizer error (negative-size-param: size=-1). This can result in invalid memory access du... |
arvo:60616 | n132/arvo:60616-vul | /src/opensc | [
{
"end_line": 363,
"function_name": "sc_pkcs15_decode_pukdf_entry",
"start_line": 199,
"target_file": "/src/opensc/src/libopensc/pkcs15-pubkey.c"
}
] | Heap-double-free | opensc | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/fuzz_pkcs15_decode
=================================================================
==42060==ERROR: AddressSanitizer: attempting double-free on 0x6060000000e0 in thread T0:
SCARINESS: 42 (double-free)
#0 0x4a10d2 in __interceptor_free ... | c | 02b37bf38d5cfbe68088de647553c36e00b5b02e | https://github.com/OpenSC/OpenSC/commit/638a5007a5d240d6fa901aa822cfeef94fe36e85 | A double-free vulnerability exists in pkcs15-pubkey.c, where memory is freed more than once, potentially leading to security issues. |
arvo:60650 | n132/arvo:60650-vul | /src/opensc | [
{
"end_line": 752,
"function_name": "cosm_create_key",
"start_line": 705,
"target_file": "/src/opensc/src/pkcs15init/pkcs15-oberthur.c"
}
] | Heap-buffer-overflow READ 1 | opensc | asan | Reading 110 bytes from /tmp/poc
=================================================================
==42074==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6150000025fe at pc 0x000000bb3390 bp 0x7ffe6ef81370 sp 0x7ffe6ef81368
READ of size 1 at 0x6150000025fe thread T0
SCARINESS: 12 (1-byte-read-heap-buffer-ov... | c | 1634adab29757ecbb5b9b5635e0a66ef92fa56ce | https://github.com/OpenSC/OpenSC/commit/41d61da8481582e12710b5858f8b635e0a71ab5e | null |
arvo:60670 | n132/arvo:60670-vul | /src/selinux | [
{
"end_line": 239,
"function_name": "cil_resolve_classpermissionset",
"start_line": 201,
"target_file": "/src/selinux/libsepol/cil/src/cil_resolve_ast.c"
}
] | Heap-use-after-free READ 8 | selinux | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/secilc-fuzzer
=================================================================
==587==ERROR: AddressSanitizer: heap-use-after-free on address 0x6030000039b0 at pc 0x000000574f97 bp 0x7ffcb9a1af30 sp 0x7ffcb9a1af28
READ of size 8 at 0x60300... | c | 9b7d560a4a8770377cdac233243b369c5916b642 | https://github.com/SELinuxProject/selinux/commit/903e8cf26e2ab874618e0fdaef537bc3d9a8b69d | A vulnerability exists in libsepol/cil where an anonymous classpermission can be passed into a macro that uses a classpermissionset rule. When this occurs, there is no way to distinguish between the anonymous classpermission that needs to be destroyed and the classpermission in the classpermissionset rule, which is des... |
arvo:60672 | n132/arvo:60672-vul | /src/opensc | [
{
"end_line": 381,
"function_name": "setcos_create_key",
"start_line": 323,
"target_file": "/src/opensc/src/pkcs15init/pkcs15-setcos.c"
}
] | Heap-buffer-overflow READ 1 | opensc | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 539235604
INFO: Loaded 1 modules (42194 inline 8-bit counters): 42194 [0xf71670, 0xf7bb42),
INFO: Loaded 1 PC tables (42194 PCs): 42194 [0xd97800,0xe3c520),
/out/fuzz_pkcs15init: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==================... | c | ce7fcdaa35196706a83fe982900228e15464f928 | https://github.com/OpenSC/OpenSC/commit/440ca666eff10cc7011901252d20f3fc4ea23651 | A buffer underflow occurs in the setcos function. |
arvo:60723 | n132/arvo:60723-vul | /src/liblouis | [
{
"end_line": 489,
"function_name": "swapReplace",
"start_line": 435,
"target_file": "/src/liblouis/liblouis/lou_translateString.c"
}
] | Negative-size-param | liblouis | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 231861375
INFO: Loaded 1 modules (6182 inline 8-bit counters): 6182 [0x67d5d0, 0x67edf6),
INFO: Loaded 1 PC tables (6182 PCs): 6182 [0x67edf8,0x697058),
/out/fuzz_translate_generic: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
===============... | c | 2e9409c1b4f32e2c752bf22686c8e752ffd868e2 | https://github.com/liblouis/liblouis/commit/878ef436e6cf401e5134899d70d5a8c0815cd549 | A security vulnerability exists where the size parameter passed to memcpy is not checked for negativity, potentially allowing negative values. This can lead to undefined behavior or security issues if memcpy is called with a negative size parameter. |
arvo:60728 | n132/arvo:60728-vul | /src/libraw | [
{
"end_line": 433,
"function_name": "LibRaw::xtrans_interpolate",
"start_line": 25,
"target_file": "/src/libraw/src/demosaic/xtrans_demosaic.cpp"
}
] | Stack-buffer-overflow WRITE 4 | libraw | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 352218031
INFO: Loaded 1 modules (21924 inline 8-bit counters): 21924 [0x93ac90, 0x940234),
INFO: Loaded 1 PC tables (21924 PCs): 21924 [0x81af20,0x870960),
/out/libraw_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
unknown file: data c... | cpp | eaf63bf5f7b98a607c2d3d0849827669c1b443ea | https://github.com/libraw/libraw/commit/3baa51068767ae2070c4661e00a3b77d5c3139b7 | A vulnerability exists where invalid patterns in the xtrans_interpolate function are not properly skipped. |
arvo:6091 | n132/arvo:6091-vul | /src/imagemagick | [
{
"end_line": 1826,
"function_name": "FxGetSymbol",
"start_line": 1242,
"target_file": "/src/imagemagick/MagickCore/fx.c"
}
] | Use-of-uninitialized-value | imagemagick | msan | INFO: Seed: 308977120
INFO: Loaded 1 modules (52651 inline 8-bit counters): 52651 [0x16dff38, 0x16ecce3),
INFO: Loaded 1 PC tables (52651 PCs): 52651 [0x1343d70,0x1411820),
/out/encoder_label_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
Uninitialized bytes in __interceptor_strlen at offset 0 inside [0... | cpp | 5f68b29b843b3c57f61b34e1db8f3144af458614 | https://github.com/imagemagick/imagemagick/commit/5d3171ffa3c79bf1aee47bb9678ce04a4fc6e05a | null |
arvo:6096 | n132/arvo:6096-vul | /src/imagemagick | [
{
"end_line": 2949,
"function_name": "FxEvaluateSubexpression",
"start_line": 2085,
"target_file": "/src/imagemagick/MagickCore/fx.c"
}
] | Stack-buffer-overflow WRITE 1 | imagemagick | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/encoder_label_fuzzer < INPUT_FILE
or
/out/encoder_label_fuzzer INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /out... | cpp | 091f337c2f0d50420199df26be44f2d47df98fe3 | https://github.com/imagemagick/imagemagick/commit/69c4513a4fb5f71421a21643edb53de53d3864a6 | null |
arvo:60971 | n132/arvo:60971-vul | /src/opensc | [
{
"end_line": 529,
"function_name": "test_verify",
"start_line": 460,
"target_file": "/src/opensc/src/tests/fuzzing/fuzz_pkcs11.c"
}
] | Heap-buffer-overflow READ {*} | opensc | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3011393249
INFO: Loaded 1 modules (47199 inline 8-bit counters): 47199 [0x108b050, 0x10968af),
INFO: Loaded 1 PC tables (47199 PCs): 47199 [0xe7a3e0,0xf329d0),
/out/fuzz_pkcs11: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
===================... | c | 04be2e6799cd33dcdad9d88df76493d5e80440b3 | https://github.com/OpenSC/OpenSC/commit/ffbff25ec6c6d0ad3f8df76f57210698f7947fc3 | The vulnerability in fuzz_pkcs11.c occurs when invalid data is used for the verify operation, which can lead to unexpected behavior or security issues. |
arvo:60983 | n132/arvo:60983-vul | /src/libraw | [
{
"end_line": 53,
"function_name": "LibRaw::sony_arq_load_raw",
"start_line": 22,
"target_file": "/src/libraw/src/decoders/decoders_libraw.cpp"
}
] | Heap-buffer-overflow WRITE {*} | libraw | asan | Reading 61381 bytes from /tmp/poc
======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/libraw_raf_fuzzer < INPUT_FILE
or
/out/libraw_raf_fuzzer INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:... | cpp | 47d9dd8e288e4638d52bc17afad400378ef6f371 | https://github.com/libraw/libraw/commit/17294b5fd82bff80463c21386d3847142a37549d | A security vulnerability exists in the arq_load_raw function due to insufficient metadata validation. |
arvo:61237 | n132/arvo:61237-vul | /src/mupdf | [
{
"end_line": 1347,
"function_name": "fz_load_bmp_subimage_count",
"start_line": 1306,
"target_file": "/src/mupdf/source/fitz/load-bmp.c"
}
] | Use-of-uninitialized-value | mupdf | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 213002324
INFO: Loaded 1 modules (160618 inline 8-bit counters): 160618 [0x4268c11, 0x428ff7b),
INFO: Loaded 1 PC tables (160618 PCs): 160618 [0x1f2cdf0,0x21a0490),
/out/pdf_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==300==WARNING:... | cpp | 9975bc4e0403e71e6105efe2847a2b2ff956d682 | https://github.com/ArtifexSoftware/mupdf/commit/6b113a67bd016538478b24dd585a3ab6c479a5ec | A vulnerability exists where the code prints a possibly invalid bitmap signature, which may result in the output of useless or malformed data. |
arvo:61285 | n132/arvo:61285-vul | /src/oss-fuzz-example | [
{
"end_line": 115,
"function_name": "parse_complex_format",
"start_line": 75,
"target_file": "/src/oss-fuzz-example/char_lib.c"
}
] | Heap-buffer-overflow READ 1 | oss-fuzz-example | asan | =================================================================
==134==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60b000000162 at pc 0x0000004dce72 bp 0x7ffdcd859860 sp 0x7ffdcd859858
READ of size 1 at 0x60b000000162 thread T0
SCARINESS: 12 (1-byte-read-heap-buffer-overflow)
#0 0x4dce71 in get_the... | c | c5d2a988f0f66ff3a20519d9b389aeb563305485 | https://github.com/AdaLogics/oss-fuzz-example/commit/61e234fde0dbc8fc03b3586ffe085654723acd33 | null |
arvo:61675 | n132/arvo:61675-vul | /src/exiv2 | [
{
"end_line": 235,
"function_name": "BmffImage::brotliUncompress",
"start_line": 196,
"target_file": "/src/exiv2/src/bmffimage.cpp"
}
] | Container-overflow WRITE {*} | exiv2 | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/fuzz-read-print-write
=================================================================
==5885==ERROR: AddressSanitizer: container-overflow on address 0x7f4057d3a802 at pc 0x00000047f5c1 bp 0x7ffd239c4420 sp 0x7ffd239c3be8
WRITE of size 655... | cpp | 78642f786a35c79a4eeca695fc0f2b7c4e012ec1 | https://github.com/Exiv2/exiv2/commit/a1f254358de167af9a619523ca7ba6492bd89959 | An integer overflow occurs in the calculation of available_out. |
arvo:61677 | n132/arvo:61677-vul | /src/binutils-gdb | [
{
"end_line": 1191,
"function_name": "print_insn_kvx",
"start_line": 1012,
"target_file": "/src/binutils-gdb/opcodes/kvx-dis.c"
}
] | Global-buffer-overflow READ 4 | binutils-gdb | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3145618121
INFO: Loaded 1 modules (233489 inline 8-bit counters): 233489 [0x3834300, 0x386d311),
INFO: Loaded 1 PC tables (233489 PCs): 233489 [0x29d4850,0x2d64960),
/out/fuzz_disassemble: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
========... | c | 476dd29dc60b6dc3aec0e29ce2150202cf85f7a8 | https://github.com/bminor/binutils-gdb/commit/f1917fc63166d73a9d0930d96468e486a49c666d | A vulnerability exists in kvx_reassemble_bundle where an index 8 out of bounds error can occur due to improper loop conditions in opcodes/kvx-dis.c, specifically in the print_insn_kvx and decode_prologue_epilogue_bundle functions, where wordcount is not always less than KVXMAXBUNDLEWORDS. |
arvo:61691 | n132/arvo:61691-vul | /src/libxaac | [
{
"end_line": 741,
"function_name": "ixheaacd_cplx_anal_qmffilt",
"start_line": 590,
"target_file": "/src/libxaac/decoder/generic/ixheaacd_qmf_dec_generic.c"
}
] | Use-of-uninitialized-value | libxaac | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2840636434
INFO: Loaded 1 modules (44721 inline 8-bit counters): 44721 [0xff8410, 0x10032c1),
INFO: Loaded 1 PC tables (44721 PCs): 44721 [0xee38d0,0xf923e0),
/out/xaac_dec_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==2093==WARNING:... | cpp | cd91e1af765486ea6aad21e258b3a23294fa291d | https://github.com/ittiam-systems/libxaac/commit/e3f38372d0e16b33369e0b56e116fedaf055936a | A use of uninitialized value vulnerability exists in the function ixheaacd_cos_sin_mod, where a local buffer in the complex analysis QMF filter block is not initialized, leading to uninitialized memory access. |
arvo:61718 | n132/arvo:61718-vul | /src/libheif | [
{
"end_line": 1016,
"function_name": "HeifContext::interpret_heif_file",
"start_line": 534,
"target_file": "/src/libheif/libheif/context.cc"
}
] | Heap-buffer-overflow READ 4 | libheif | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 926728692
INFO: Loaded 1 modules (24381 inline 8-bit counters): 24381 [0x8fbc50, 0x901b8d),
INFO: Loaded 1 PC tables (24381 PCs): 24381 [0x901b90,0x960f60),
/out/file_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
======================... | cpp | 4a3327b5b73c94a26b2deed91d0cae82d53db24a | https://github.com/strukturag/libheif/commit/6c4016fd3d944a8903bdd3e6be8fcdd1bc73ca79 | A vulnerability exists where invalid mask region image references are not detected. |
arvo:6175 | n132/arvo:6175-vul | /src/yara | [
{
"end_line": 664,
"function_name": "load_encoded_method",
"start_line": 486,
"target_file": "/src/yara/libyara/modules/dex.c"
}
] | UNKNOWN READ | yara | msan | INFO: Seed: 955672617
INFO: Loaded 1 modules (6417 inline 8-bit counters): 6417 [0xada128, 0xadba39),
INFO: Loaded 1 PC tables (6417 PCs): 6417 [0x858260,0x871370),
/out/dex_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
MemorySanitizer:DEADLYSIGNAL
==34141==ERROR: MemorySanitizer: SEGV on unknown addre... | cpp | 9a9c40efd5856a228663bc4a41873f5d34cc945b | https://github.com/VirusTotal/yara/commit/105054bc1bab9ac19ec9bdaa9163b8383fe72a07 | null |
arvo:61750 | n132/arvo:61750-vul | /src/opensc | [
{
"end_line": 328,
"function_name": "idprime_process_containermap",
"start_line": 268,
"target_file": "/src/opensc/src/libopensc/card-idprime.c"
}
] | Stack-buffer-overflow READ {*} | opensc | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1794849488
INFO: Loaded 1 modules (42973 inline 8-bit counters): 42973 [0xf98970, 0xfa314d),
INFO: Loaded 1 PC tables (42973 PCs): 42973 [0xdb7340,0xe5f110),
/out/fuzz_pkcs15_crypt: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
===============... | c | 78be048f478c40f49a970342261229ffa2c78817 | https://github.com/OpenSC/OpenSC/commit/fa8ad362852dbefad5b6796c32f2a33859b8a8e0 | A vulnerability exists in idprime where the container guid is not stored as a string. |
arvo:61778 | n132/arvo:61778-vul | /src/binutils-gdb | [
{
"end_line": 1062,
"function_name": "fill_comdat_hash",
"start_line": 864,
"target_file": "/src/binutils-gdb/bfd/coffcode.h"
}
] | Heap-buffer-overflow READ {*} | binutils-gdb | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2805370777
INFO: Loaded 1 modules (252734 inline 8-bit counters): 252734 [0x3a6fba0, 0x3aad6de),
INFO: Loaded 1 PC tables (252734 PCs): 252734 [0x2b6c4d0,0x2f478b0),
/out/fuzz_dwarf: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==============... | cpp | 9cadc5fa8d2ed0310f182b4524367635730d7f73 | https://github.com/bminor/binutils-gdb/commit/398f1ddf5e89e066aeee242ea854dcbaa8eb9539 | A vulnerability exists due to insufficient sanity checking of aux entries used by PE to extend a C_FILE name in coffswap.h:coff_swap_aux_in. The existing check only accounts for cases where n_numaux == 1, potentially allowing improper handling of other values. This affects the fill_comdat_hash function in coffcode.h. |
arvo:61797 | n132/arvo:61797-vul | /src/opensc | [
{
"end_line": 257,
"function_name": "iasecc_crt_parse",
"start_line": 206,
"target_file": "/src/opensc/src/libopensc/iasecc-sdo.c"
}
] | Stack-buffer-overflow READ 1 | opensc | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/fuzz_pkcs15init
=================================================================
==42053==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7f49c46f11b0 at pc 0x0000008f5cd5 bp 0x7ffd3b7b10b0 sp 0x7ffd3b7b10a8
READ of size 1 at 0... | c | fa8ad362852dbefad5b6796c32f2a33859b8a8e0 | https://github.com/OpenSC/OpenSC/commit/2a4921ab23fd0853f327517636c50de947548161 | A vulnerability exists in the iasecc module where the length of data is not checked when parsing crt, potentially leading to security issues. |
arvo:61800 | n132/arvo:61800-vul | /src/librawspeed | [
{
"end_line": 297,
"function_name": "DngDecoder::parseColorMatrix",
"start_line": 262,
"target_file": "/src/librawspeed/src/librawspeed/decoders/DngDecoder.cpp"
}
] | Heap-buffer-overflow READ 4 | librawspeed | asan | =================================================================
==5073==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x603000000090 at pc 0x000000512cd6 bp 0x7ffd762f3c80 sp 0x7ffd762f3c78
READ of size 4 at 0x603000000090 thread T0
SCARINESS: 17 (4-byte-read-heap-buffer-overflow)
#0 0x512cd5 in rawspe... | cpp | 8d37641f8a3d548f1ebb7deb9ee7a18b13f39d45 | https://github.com/darktable-org/rawspeed/commit/b79d3f2ab9df07be675d262474a70f59eae55a66 | null |
arvo:61820 | n132/arvo:61820-vul | /src/PcapPlusPlus | [
{
"end_line": 118,
"function_name": "assign",
"start_line": 115,
"target_file": "/src/PcapPlusPlus/Packet++/header/NflogLayer.h"
}
] | Use-of-uninitialized-value | PcapPlusPlus | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1930782043
INFO: Loaded 1 modules (27421 inline 8-bit counters): 27421 [0xc0f888, 0xc163a5),
INFO: Loaded 1 PC tables (27421 PCs): 27421 [0xc163a8,0xc81578),
/out/FuzzTarget: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
MemorySanitizer:DEADLY... | cpp | 843765f594a3d0c494c2c64e5c2b786f02122ccc | https://github.com/seladb/PcapPlusPlus/commit/6986e81f6fa441a56c4effe2bf2f177ca892255e | null |
arvo:61822 | n132/arvo:61822-vul | /src/binutils-gdb | [
{
"end_line": 1086,
"function_name": "fill_comdat_hash",
"start_line": 888,
"target_file": "/src/binutils-gdb/bfd/coffcode.h"
}
] | Stack-buffer-overflow WRITE {*} | binutils-gdb | asan | =================================================================
==79022==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7fde7cb70328 at pc 0x00000049ef4c bp 0x7ffdd0b9e9f0 sp 0x7ffdd0b9e1c0
WRITE of size 640 at 0x7fde7cb70328 thread T0
SCARINESS: 60 (multi-byte-write-stack-buffer-overflow)
#0 0x49ef4... | cpp | f5362c933e2280398d7aea3cc0748bec8f66a1ab | https://github.com/bminor/binutils-gdb/commit/54d57acf610e5db2e70afa234fd4018207606774 | A memory leak occurs in comdat_hash due to a missed field that requires freeing. Additionally, a C_FILE symbol using multiple auxents for a long file name can overflow the single auxent buffer. In coffcode.h, the comdat_delf function does not free comdat_name, and fill_comdat_hash does not restrict processing to symbol... |
arvo:61825 | n132/arvo:61825-vul | /src/libxaac | [
{
"end_line": 3287,
"function_name": "iusace_process",
"start_line": 2738,
"target_file": "/src/libxaac/encoder/ixheaace_api.c"
}
] | Heap-buffer-overflow READ 1 | libxaac | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2601008757
INFO: Loaded 1 modules (23407 inline 8-bit counters): 23407 [0x87882f0, 0x878de5f),
INFO: Loaded 1 PC tables (23407 PCs): 23407 [0x86dc294,0x8709e0c),
/out/xaac_enc_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=============... | cpp | 5285d1921d3a1d002eb07b2269f18ebeb64d4136 | https://github.com/ittiam-systems/libxaac/commit/cd91e1af765486ea6aad21e258b3a23294fa291d | A heap-buffer-overflow occurs in the function ixheaace_process due to not considering the bits used by the SBR encoder for USAC mono streams. |
arvo:61882 | n132/arvo:61882-vul | /src/ndpi | [
{
"end_line": 3422,
"function_name": "ndpi_match_custom_category",
"start_line": 3395,
"target_file": "/src/ndpi/src/lib/ndpi_main.c"
},
{
"end_line": 3609,
"function_name": "ndpi_exit_detection_module",
"start_line": 3484,
"target_file": "/src/ndpi/src/lib/ndpi_main.c"
}
] | Heap-buffer-overflow READ 2 | ndpi | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1110124534
INFO: Loaded 1 modules (26368 inline 8-bit counters): 26368 [0xbb12a8, 0xbb79a8),
INFO: Loaded 1 PC tables (26368 PCs): 26368 [0xbb79a8,0xc1e9a8),
/out/fuzz_process_packet: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=============... | c | 16b0ce37100242b6cbaafe65d05ee4940b5aab3f | https://github.com/ntop/nDPI/commit/19381f330ae735d361d9e765148be5e14478256d | null |
arvo:61901 | n132/arvo:61901-vul | /src/libredwg | [
{
"end_line": 218,
"function_name": "LLVMFuzzerTestOneInput",
"start_line": 68,
"target_file": "/src/libredwg/examples/llvmfuzz.c"
}
] | Heap-buffer-overflow READ 1 | libredwg | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1906578877
INFO: Loaded 1 modules (644963 inline 8-bit counters): 644963 [0x52bfee0, 0x535d643),
INFO: Loaded 1 PC tables (644963 PCs): 644963 [0x463dd98,0x50153c8),
/out/llvmfuzz: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
================... | c | 5ec283f560643e4aa19ede6f025e7bb9247cabda | https://github.com/LibreDWG/libredwg/commit/b01634c896c29bb3a778daeef9e13ef115995610 | null |
arvo:61902 | n132/arvo:61902-vul | /src/libxaac | [
{
"end_line": 1705,
"function_name": "iusace_estimate_scfs_chan",
"start_line": 1550,
"target_file": "/src/libxaac/encoder/ixheaace_fd_qc_adjthr.c"
}
] | Global-buffer-overflow READ 4 | libxaac | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/xaac_enc_fuzzer
=================================================================
==2090==ERROR: AddressSanitizer: global-buffer-overflow on address 0x0000008d9868 at pc 0x0000006c0b36 bp 0x7fff63882df0 sp 0x7fff63882de8
READ of size 4 at 0... | cpp | 1ac90c8ac361ea0ff0dd796017534e00658638e6 | https://github.com/ittiam-systems/libxaac/commit/112fe0d0dba0531cf540eaeefc21397982ad47da | A global buffer overflow vulnerability exists in the function iusace_estimate_scfs_chan, triggered when the value of the scalefactor band form factor becomes zero. This leads to a runtime error due to reading beyond the buffer boundary. |
arvo:61998 | n132/arvo:61998-vul | /src/libxaac | [
{
"end_line": 1707,
"function_name": "iusace_estimate_scfs_chan",
"start_line": 1551,
"target_file": "/src/libxaac/encoder/ixheaace_fd_qc_adjthr.c"
}
] | Global-buffer-overflow READ 4 | libxaac | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2554465745
INFO: Loaded 1 modules (23411 inline 8-bit counters): 23411 [0xb06a40, 0xb0c5b3),
INFO: Loaded 1 PC tables (23411 PCs): 23411 [0xa4b060,0xaa6790),
/out/xaac_enc_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================... | cpp | 58acdb87a1485393925277efb630d536ac3be8fe | https://github.com/ittiam-systems/libxaac/commit/62c8372f6b2506bf96f962f09497f88491d0d96e | A global buffer overflow vulnerability exists in the function iusace_estimate_scfs_chan, where a runtime error occurs if the value of the scalefactor band form factor becomes zero. This issue affects USAC and is also present in AAC, due to missing bound checks for the gain value. |
arvo:62033 | n132/arvo:62033-vul | /src/serenity | [
{
"end_line": 321,
"function_name": "decode_bmhd_chunk",
"start_line": 295,
"target_file": "/src/serenity/Userland/Libraries/LibGfx/ImageFormats/ILBMLoader.cpp"
}
] | Heap-buffer-overflow READ {*} | serenity | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1575056391
INFO: Loaded 1 modules (53268 inline 8-bit counters): 53268 [0xe42fa0, 0xe4ffb4),
INFO: Loaded 1 PC tables (53268 PCs): 53268 [0xe4ffb8,0xf200f8),
/out/FuzzILBMLoader: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==================... | cpp | f2b7224d93da1fd70729da18a96fa37e5dfa6bd5 | https://github.com/SerenityOS/serenity/commit/9e3ee0e2b589ec8b28b27a72232a76e5d57e294b | A buffer overrun occurs in LibGfx/ILBM when reading the header chunk. |
arvo:6214 | n132/arvo:6214-vul | /src/imagemagick | [
{
"end_line": 1638,
"function_name": "GetEXIFProperty",
"start_line": 823,
"target_file": "/src/imagemagick/MagickCore/property.c"
}
] | Use-of-uninitialized-value | imagemagick | msan | INFO: Seed: 99666836
INFO: Loaded 1 modules (52766 inline 8-bit counters): 52766 [0x16eab78, 0x16f7996),
INFO: Loaded 1 PC tables (52766 PCs): 52766 [0x13468a0,0x1414a80),
/out/encoder_mpc_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==62790==WARNING: MemorySanitizer: use-of-uninitialized-value
#0... | cpp | a35998ba55eb17d9811b4aa2169978329ac87dc6 | https://github.com/imagemagick/imagemagick/commit/48eca15747e47be25b244c6a2b572e5f0ebd0d15 | null |
arvo:62183 | n132/arvo:62183-vul | /src/libxaac | [
{
"end_line": 297,
"function_name": "impd_drc_enc_init",
"start_line": 230,
"target_file": "/src/libxaac/encoder/drc_src/impd_drc_api.c"
},
{
"end_line": 513,
"function_name": "impd_drc_stft_drc_gain_calc_init",
"start_line": 324,
"target_file": "/src/libxaac/encoder/drc_src/impd... | Heap-buffer-overflow READ 1 | libxaac | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2319600890
INFO: Loaded 1 modules (23437 inline 8-bit counters): 23437 [0xb07a40, 0xb0d5cd),
INFO: Loaded 1 PC tables (23437 PCs): 23437 [0xa4c060,0xaa7930),
/out/xaac_enc_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================... | cpp | f39922ae991f3fdd66da1e02d2fdebe6619ae28e | https://github.com/ittiam-systems/libxaac/commit/ccdced7d6a30828a9988616f199cea014150175d | A divide-by-zero vulnerability exists in the function impd_drc_stft_drc_gain_calc_init, which occurs when the DRC gain coordinates are identical or the slope is perpendicular to the gain value. This can lead to a runtime error. |
arvo:62222 | n132/arvo:62222-vul | /src/ndpi | [
{
"end_line": 527,
"function_name": "binary_fuse16_allocate",
"start_line": 501,
"target_file": "/src/ndpi/src/lib/third_party/include/binaryfusefilter.h"
}
] | Use-of-uninitialized-value | ndpi | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1830623459
INFO: Loaded 1 modules (29381 inline 8-bit counters): 29381 [0xac5a72, 0xaccd37),
INFO: Loaded 1 PC tables (29381 PCs): 29381 [0xaccd38,0xb3f988),
/out/fuzz_ndpi_reader: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==13473==WARNING... | c | 805df2e5ceebf9252248ac4514d47ba8756c4042 | https://github.com/ntop/nDPI/commit/2b883b93be5feef26469fb07ca126b7c13b2fd21 | null |
arvo:62290 | n132/arvo:62290-vul | /src/libavc | [
{
"end_line": 203,
"function_name": "isvcd_interlyr_motion_mode_pred",
"start_line": 104,
"target_file": "/src/libavc/decoder/svc/isvcd_process_epslice.c"
}
] | Null-dereference READ | libavc | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/svc_dec_fuzzer
AddressSanitizer:DEADLYSIGNAL
=================================================================
==3315==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x000000000000 bp 0x7ffe35ff0410 sp 0x7ffe35ff0158 T0... | cpp | 37beb9729249a1cde472545e2a19d80660e40edc | https://github.com/ittiam-systems/libavc/commit/82f4e69094b7d6e4200d14ba64ac9937f337710d | A vulnerability exists in the inter-layer prediction functions of svcdec where NULL dereferencing can occur due to improper tracking of resolution level initialization. |
arvo:62313 | n132/arvo:62313-vul | /src/serenity | [
{
"end_line": 725,
"function_name": "Lexer::reduce_start",
"start_line": 529,
"target_file": "/src/serenity/Userland/Shell/PosixLexer.cpp"
}
] | Stack-buffer-overflow WRITE {*} | serenity | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 419639594
INFO: Loaded 1 modules (77724 inline 8-bit counters): 77724 [0xff1270, 0x100420c),
INFO: Loaded 1 PC tables (77724 PCs): 77724 [0x1004210,0x1133bd0),
/out/FuzzShellPosix: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
VERIFICATION FAI... | cpp | 21ea9cedff4f945a691950900b7f3b99c08b9e3a | https://github.com/SerenityOS/serenity/commit/9e978c6cd1bf3b2692e44f246b904927b4982d03 | null |
arvo:62375 | n132/arvo:62375-vul | /src/WasmEdge | [
{
"end_line": 148,
"function_name": "SharedLibrary::load",
"start_line": 79,
"target_file": "/src/WasmEdge/lib/loader/shared_library.cpp"
}
] | Segv on unknown address | WasmEdge | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 134574151
INFO: Loaded 2 modules (57394 inline 8-bit counters): 57393 [0x7f4c7f65fbe0, 0x7f4c7f66dc11), 1 [0x3f44d0, 0x3f44d1),
INFO: Loaded 2 PC tables (57394 PCs): 57393 [0x7f4c7f66dc18,0x7f4c7f74df28), 1 [0x3f44d8,0x3f44e8),
/out/wasmedge-fuzzto... | cpp | e63e8ee0ed40d25504ab90934bdca50de9295f59 | https://github.com/WasmEdge/WasmEdge/commit/7d4213b3abd5360c88e9120c3bc68ffd9b8a6870 | null |
arvo:62388 | n132/arvo:62388-vul | /src/libxaac | [
{
"end_line": 1096,
"function_name": "impd_drc_set_preselection",
"start_line": 686,
"target_file": "/src/libxaac/decoder/drc_src/impd_drc_selection_process_drcset_selection.c"
}
] | Use-of-uninitialized-value | libxaac | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1804295156
INFO: Loaded 1 modules (45236 inline 8-bit counters): 45236 [0x1009410, 0x10144c4),
INFO: Loaded 1 PC tables (45236 PCs): 45236 [0xef28e0,0xfa3420),
/out/xaac_dec_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==2093==WARNING... | cpp | d5356896efdec2f38750bb24da0f95919cf2c5bb | https://github.com/ittiam-systems/libxaac/commit/5b0bee231b0a1e5ce0e87b2681147fb35bc5518a | A use-of-uninitialized-value vulnerability exists in the function impd_drc_set_preselection, where one of the buffers is not initialized correctly, leading to a runtime error. |
arvo:62389 | n132/arvo:62389-vul | /src/mongoose | [
{
"end_line": 2217,
"function_name": "getchunk",
"start_line": 2206,
"target_file": "/src/mongoose/mongoose.c"
}
] | Negative-size-param | mongoose | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2872651130
INFO: Loaded 1 modules (4203 inline 8-bit counters): 4203 [0x65a260, 0x65b2cb),
INFO: Loaded 1 PC tables (4203 PCs): 4203 [0x5fdeb0,0x60e560),
/out/fuzz: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
================================... | c | 9055a83b4fd1eac5ae88b7189ff7f8e95b91553f | https://github.com/cesanta/mongoose/commit/d1204e8a66437b9c7a665d2da878c1bbf52f7f93 | null |
arvo:62435 | n132/arvo:62435-vul | /src/lldpd | [
{
"end_line": 54,
"function_name": "LLVMFuzzerTestOneInput",
"start_line": 26,
"target_file": "/src/lldpd/tests/fuzz_edp.c"
}
] | Use-of-uninitialized-value | lldpd | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2160388719
INFO: Loaded 1 modules (7662 inline 8-bit counters): 7662 [0x558939617549, 0x558939619337),
INFO: Loaded 1 PC tables (7662 PCs): 7662 [0x558939619338,0x558939637218),
/out/fuzz_edp: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==24... | c | 83f0eddcfb7fb1d0a825136e3929f8847cd85a62 | https://github.com/lldpd/lldpd/commit/145d654803ffcfb4ccbf28b692465194fb538dda | null |
arvo:62561 | n132/arvo:62561-vul | /src/libredwg | [
{
"end_line": 12261,
"function_name": "dxf_entities_read",
"start_line": 12172,
"target_file": "/src/libredwg/src/in_dxf.c"
}
] | Heap-double-free | libredwg | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1157169671
INFO: Loaded 1 modules (639114 inline 8-bit counters): 639114 [0x522ec60, 0x52cacea),
INFO: Loaded 1 PC tables (639114 PCs): 639114 [0x45c3958,0x4f841f8),
/out/llvmfuzz: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
================... | c | 6d082fd0b2c6c33914cbdc943370b9a0a5dd3ef0 | https://github.com/LibreDWG/libredwg/commit/37bbf357cec24cd90df2ba3b5c105baa66c6b9ea | null |
arvo:62609 | n132/arvo:62609-vul | /src/mongoose | [
{
"end_line": 2217,
"function_name": "getchunk",
"start_line": 2206,
"target_file": "/src/mongoose/mongoose.c"
}
] | UNKNOWN READ | mongoose | ubsan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3593610208
INFO: Loaded 1 modules (5756 inline 8-bit counters): 5756 [0x5aa3a8, 0x5aba24),
INFO: Loaded 1 PC tables (5756 PCs): 5756 [0x549be0,0x5603a0),
/out/fuzz: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
UndefinedBehaviorSanitizer:DEADL... | c | 9055a83b4fd1eac5ae88b7189ff7f8e95b91553f | https://github.com/cesanta/mongoose/commit/d1204e8a66437b9c7a665d2da878c1bbf52f7f93 | null |
arvo:62613 | n132/arvo:62613-vul | /src/opensc | [
{
"end_line": 752,
"function_name": "cosm_create_key",
"start_line": 705,
"target_file": "/src/opensc/src/pkcs15init/pkcs15-oberthur.c"
}
] | Heap-buffer-overflow READ 1 | opensc | asan | Reading 110 bytes from /tmp/poc
=================================================================
==42075==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6150000025fe at pc 0x000000bb3390 bp 0x7ffe16a7e150 sp 0x7ffe16a7e148
READ of size 1 at 0x6150000025fe thread T0
SCARINESS: 12 (1-byte-read-heap-buffer-ov... | c | 1634adab29757ecbb5b9b5635e0a66ef92fa56ce | https://github.com/OpenSC/OpenSC/commit/41d61da8481582e12710b5858f8b635e0a71ab5e | null |
arvo:62707 | n132/arvo:62707-vul | /src/libxaac | [
{
"end_line": 202,
"function_name": "ixheaacd_parse_extension_config",
"start_line": 74,
"target_file": "/src/libxaac/decoder/ixheaacd_mps_bitdec.c"
}
] | Index-out-of-bounds | libxaac | ubsan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 4112695653
INFO: Loaded 1 modules (72776 inline 8-bit counters): 72776 [0xab23d0, 0xac4018),
INFO: Loaded 1 PC tables (72776 PCs): 72776 [0x8ac280,0x9c8700),
/out/xaac_dec_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
/src/libxaac/deco... | cpp | 11669841e31d156074f4ae5bab2a44033fb92153 | https://github.com/ittiam-systems/libxaac/commit/3c8329953cd596b4f5b2163910be223fb6a52e3c | An index-out-of-bounds runtime error occurs in the function ixheaacd_res_ctns_apply when the value of the residual sampling frequency index exceeds the maximum residual sampling frequency index. |
arvo:62822 | n132/arvo:62822-vul | /src/mruby | [
{
"end_line": 947,
"function_name": "unpack_bstr",
"start_line": 917,
"target_file": "/src/mruby/mrbgems/mruby-pack/src/pack.c"
}
] | Heap-buffer-overflow READ 1 | mruby | asan | =================================================================
==2372==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x62f00000c420 at pc 0x0000006a03d2 bp 0x7ffd06c0b210 sp 0x7ffd06c0b208
READ of size 1 at 0x62f00000c420 thread T0
SCARINESS: 12 (1-byte-read-heap-buffer-overflow)
#0 0x6a03d1 in unpack... | c | 861f8bdfa9fe06eda6cf1257658a1aff03ee47df | https://github.com/mruby/mruby/commit/097681b4d458899dff945138ea39ae125df3e16a | The unpack "b/B" functions in mruby-pack do not limit the result size. |
arvo:62837 | n132/arvo:62837-vul | /src/libxml2 | [
{
"end_line": 8869,
"function_name": "xmlParseQNameHashed",
"start_line": 8828,
"target_file": "/src/libxml2/parser.c"
}
] | Use-of-uninitialized-value | libxml2 | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2087219996
INFO: Loaded 1 modules (39374 inline 8-bit counters): 39374 [0xb22437, 0xb2be05),
INFO: Loaded 1 PC tables (39374 PCs): 39374 [0xa263c8,0xac00a8),
/out/xslt: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==18105==WARNING: MemorySani... | c | 6dd87f5eefe42b8771d0f1b26d9ea5bd077ddaa3 | https://gitlab.gnome.org/GNOME/libxml2/-/commit/fc49679316e067d667b71b8e0b987f0b704abce6 | null |
arvo:62855 | n132/arvo:62855-vul | /src/libxml2 | [
{
"end_line": 8869,
"function_name": "xmlParseQNameHashed",
"start_line": 8828,
"target_file": "/src/libxml2/parser.c"
}
] | Use-of-uninitialized-value | libxml2 | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2523058485
INFO: Loaded 1 modules (51668 inline 8-bit counters): 51668 [0xce79c7, 0xcf439b),
INFO: Loaded 1 PC tables (51668 PCs): 51668 [0xbaf370,0xc790b0),
/out/valid: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==10583==WARNING: MemorySan... | c | 6dd87f5eefe42b8771d0f1b26d9ea5bd077ddaa3 | https://gitlab.gnome.org/GNOME/libxml2/-/commit/fc49679316e067d667b71b8e0b987f0b704abce6 | null |
arvo:62859 | n132/arvo:62859-vul | /src/libxml2 | [
{
"end_line": 8869,
"function_name": "xmlParseQNameHashed",
"start_line": 8828,
"target_file": "/src/libxml2/parser.c"
}
] | Use-of-uninitialized-value | libxml2 | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2481286142
INFO: Loaded 1 modules (51668 inline 8-bit counters): 51668 [0xce79c7, 0xcf439b),
INFO: Loaded 1 PC tables (51668 PCs): 51668 [0xbaf370,0xc790b0),
/out/valid: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==10583==WARNING: MemorySan... | c | 6dd87f5eefe42b8771d0f1b26d9ea5bd077ddaa3 | https://gitlab.gnome.org/GNOME/libxml2/-/commit/fc49679316e067d667b71b8e0b987f0b704abce6 | null |
arvo:62954 | n132/arvo:62954-vul | /src/libxml2 | [
{
"end_line": 8869,
"function_name": "xmlParseQNameHashed",
"start_line": 8828,
"target_file": "/src/libxml2/parser.c"
}
] | Use-of-uninitialized-value | libxml2 | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 657155371
INFO: Loaded 1 modules (39374 inline 8-bit counters): 39374 [0xb22437, 0xb2be05),
INFO: Loaded 1 PC tables (39374 PCs): 39374 [0xa263c8,0xac00a8),
/out/xslt: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==18106==WARNING: MemorySanit... | c | 6dd87f5eefe42b8771d0f1b26d9ea5bd077ddaa3 | https://gitlab.gnome.org/GNOME/libxml2/-/commit/fc49679316e067d667b71b8e0b987f0b704abce6 | null |
arvo:62996 | n132/arvo:62996-vul | /src/libxml2 | [
{
"end_line": 13097,
"function_name": "xmlParseBalancedChunkMemoryInternal",
"start_line": 12902,
"target_file": "/src/libxml2/parser.c"
}
] | Heap-use-after-free READ 4 | libxml2 | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1881577773
INFO: Loaded 1 modules (51632 inline 8-bit counters): 51632 [0x8735f90, 0x8742940),
INFO: Loaded 1 PC tables (51632 PCs): 51632 [0x8628b9c,0x868d91c),
/out/xml: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=========================... | c | b8e03e13ed2441ef98538b75a80da816c5511028 | https://gitlab.gnome.org/GNOME/libxml2/-/commit/97e99f411228fe4f65ebb60e4f2c56f9ee9cdb1c | Entities that reference out-of-scope namespaces in xmlParseBalancedChunkMemoryInternal are broken, as the function attempts to reuse currently in-scope namespaces, but these namespaces are ignored by the SAX handler. Different namespaces may be in scope when expanding the entity again, leading to inconsistent behavior.... |
arvo:63034 | n132/arvo:63034-vul | /src/glog | [
{
"end_line": 625,
"function_name": "ParseNumber",
"start_line": 589,
"target_file": "/src/glog/src/demangle.cc"
}
] | UNKNOWN READ | glog | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1063491032
INFO: Loaded 1 modules (1149 inline 8-bit counters): 1149 [0x6b3a38, 0x6b3eb5),
INFO: Loaded 1 PC tables (1149 PCs): 1149 [0x6b3eb8,0x6b8688),
/out/fuzz_demangle: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
AddressSanitizer:DEADLY... | cpp | 27bf2b2fd396dae160b0449224bc227eb3edbc31 | https://github.com/google/glog/commit/7ba2f7bc02cdbab9314f3804c698ec78e20c441e | null |
arvo:63051 | n132/arvo:63051-vul | /src/mongoose | [
{
"end_line": 2829,
"function_name": "skip_chunk",
"start_line": 2817,
"target_file": "/src/mongoose/mongoose.c"
}
] | UNKNOWN READ | mongoose | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2552118746
INFO: Loaded 1 modules (4330 inline 8-bit counters): 4330 [0x65f2e0, 0x6603ca),
INFO: Loaded 1 PC tables (4330 PCs): 4330 [0x602130,0x612fd0),
/out/fuzz: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
AddressSanitizer:DEADLYSIGNAL
==... | c | 3965aecfd473cbd70027b636492bb19b615eadd4 | https://github.com/cesanta/mongoose/commit/744df7b2443032e9d342055da12c634150b17c29 | null |
arvo:63057 | n132/arvo:63057-vul | /src/libredwg | [
{
"end_line": 1333,
"function_name": "json_HEADER",
"start_line": 1147,
"target_file": "/src/libredwg/src/in_json.c"
}
] | Heap-buffer-overflow WRITE 2 | libredwg | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 4124881322
INFO: Loaded 1 modules (645227 inline 8-bit counters): 645227 [0x52c3260, 0x5360acb),
INFO: Loaded 1 PC tables (645227 PCs): 645227 [0x463f378,0x5017a28),
/out/llvmfuzz: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
================... | c | 90532ce047dfe7008ee1bc722a06ddb19b8e3016 | https://github.com/LibreDWG/libredwg/commit/f522359c08d49e0f1a059ad6cc8566ddeb7a37ed | The vulnerability occurs in injson where the code does not fail when an array is provided but a primitive is expected. This can lead to incorrect parsing or processing of JSON input. |
arvo:63079 | n132/arvo:63079-vul | /src/libxml2 | [
{
"end_line": 5188,
"function_name": "xmlParseComment",
"start_line": 5026,
"target_file": "/src/libxml2/parser.c"
}
] | Use-of-uninitialized-value | libxml2 | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 271681743
INFO: Loaded 1 modules (39339 inline 8-bit counters): 39339 [0xb223d7, 0xb2bd82),
INFO: Loaded 1 PC tables (39339 PCs): 39339 [0xa263c8,0xabfe78),
/out/xslt: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==18106==WARNING: MemorySanit... | c | 36374bc9fcf6e670dc9521ac032474066521858b | https://gitlab.gnome.org/GNOME/libxml2/-/commit/4fc5340ec55a12cd6819395030d5d132a219984a | null |
arvo:63082 | n132/arvo:63082-vul | /src/libxml2 | [
{
"end_line": 5188,
"function_name": "xmlParseComment",
"start_line": 5026,
"target_file": "/src/libxml2/parser.c"
}
] | Heap-buffer-overflow WRITE 1 | libxml2 | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/xslt
=================================================================
==18140==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000000c94 at pc 0x0000005c54b7 bp 0x7ffe2947f190 sp 0x7ffe2947f188
WRITE of size 1 at 0x602000000c... | c | 36374bc9fcf6e670dc9521ac032474066521858b | https://gitlab.gnome.org/GNOME/libxml2/-/commit/4fc5340ec55a12cd6819395030d5d132a219984a | null |
arvo:63084 | n132/arvo:63084-vul | /src/libxml2 | [
{
"end_line": 5188,
"function_name": "xmlParseComment",
"start_line": 5026,
"target_file": "/src/libxml2/parser.c"
}
] | Use-of-uninitialized-value | libxml2 | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2518958948
INFO: Loaded 1 modules (51625 inline 8-bit counters): 51625 [0xce5939, 0xcf22e2),
INFO: Loaded 1 PC tables (51625 PCs): 51625 [0xbae370,0xc77e00),
/out/schema: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==10582==WARNING: MemorySa... | c | 36374bc9fcf6e670dc9521ac032474066521858b | https://gitlab.gnome.org/GNOME/libxml2/-/commit/4fc5340ec55a12cd6819395030d5d132a219984a | null |
arvo:63086 | n132/arvo:63086-vul | /src/libxml2 | [
{
"end_line": 5188,
"function_name": "xmlParseComment",
"start_line": 5026,
"target_file": "/src/libxml2/parser.c"
}
] | Heap-buffer-overflow WRITE 1 | libxml2 | asan | Running LLVMFuzzerInitialize ...
continue...
=================================================================
==10599==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000000134 at pc 0x0000005612dc bp 0x7ffca0479240 sp 0x7ffca0479238
WRITE of size 1 at 0x602000000134 thread T0
SCARINESS: 31 (1-byte-write... | c | 36374bc9fcf6e670dc9521ac032474066521858b | https://gitlab.gnome.org/GNOME/libxml2/-/commit/4fc5340ec55a12cd6819395030d5d132a219984a | null |
arvo:63124 | n132/arvo:63124-vul | /src/libxml2 | [
{
"end_line": 5188,
"function_name": "xmlParseComment",
"start_line": 5026,
"target_file": "/src/libxml2/parser.c"
}
] | Heap-buffer-overflow WRITE 1 | libxml2 | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2291526736
INFO: Loaded 1 modules (39460 inline 8-bit counters): 39460 [0x996030, 0x99fa54),
INFO: Loaded 1 PC tables (39460 PCs): 39460 [0x85f470,0x8f96b0),
/out/xslt: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
============================... | c | 36374bc9fcf6e670dc9521ac032474066521858b | https://gitlab.gnome.org/GNOME/libxml2/-/commit/4fc5340ec55a12cd6819395030d5d132a219984a | null |
arvo:63127 | n132/arvo:63127-vul | /src/libxml2 | [
{
"end_line": 5188,
"function_name": "xmlParseComment",
"start_line": 5026,
"target_file": "/src/libxml2/parser.c"
}
] | Heap-buffer-overflow WRITE 1 | libxml2 | asan | Running LLVMFuzzerInitialize ...
continue...
=================================================================
==10597==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000000934 at pc 0x000000511ba8 bp 0x7ffc60357b70 sp 0x7ffc60357b68
WRITE of size 1 at 0x602000000934 thread T0
SCARINESS: 31 (1-byte-write... | c | 36374bc9fcf6e670dc9521ac032474066521858b | https://gitlab.gnome.org/GNOME/libxml2/-/commit/4fc5340ec55a12cd6819395030d5d132a219984a | null |
arvo:63137 | n132/arvo:63137-vul | /src/libredwg | [
{
"end_line": 218,
"function_name": "LLVMFuzzerTestOneInput",
"start_line": 68,
"target_file": "/src/libredwg/examples/llvmfuzz.c"
}
] | Heap-buffer-overflow READ 1 | libredwg | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3156628203
INFO: Loaded 1 modules (644963 inline 8-bit counters): 644963 [0x52bfee0, 0x535d643),
INFO: Loaded 1 PC tables (644963 PCs): 644963 [0x463dd98,0x50153c8),
/out/llvmfuzz: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
================... | c | 5ec283f560643e4aa19ede6f025e7bb9247cabda | https://github.com/LibreDWG/libredwg/commit/b01634c896c29bb3a778daeef9e13ef115995610 | null |
arvo:63157 | n132/arvo:63157-vul | /src/libxml2 | [
{
"end_line": 1060,
"function_name": "xmlBufDump",
"start_line": 463,
"target_file": "/src/libxml2/buf.c"
},
{
"end_line": 1030,
"function_name": "xmlBufResetInput",
"start_line": 1018,
"target_file": "/src/libxml2/buf.c"
}
] | Heap-use-after-free READ 1 | libxml2 | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3890507033
INFO: Loaded 1 modules (51594 inline 8-bit counters): 51594 [0xabf270, 0xacbbfa),
INFO: Loaded 1 PC tables (51594 PCs): 51594 [0x94b2b0,0xa14b50),
/out/xml: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=============================... | c | 514ab399550a9bfcd4a5eb60e921d06a1d38af9e | https://gitlab.gnome.org/GNOME/libxml2/-/commit/fef12ed81619c79729bf66a906701308a02d6b2b | A vulnerability exists in buf where input is not reset in error cases, potentially leading to dangling pointers if memory allocation fails. This can cause a use-after-free due to recent changes. |
arvo:63179 | n132/arvo:63179-vul | /src/ndpi | [
{
"end_line": 1527,
"function_name": "ndpi_serialize_string_int32",
"start_line": 1491,
"target_file": "/src/ndpi/src/lib/ndpi_serializer.c"
}
] | Heap-buffer-overflow WRITE 11 | ndpi | asan | =================================================================
==14166==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x619000001330 at pc 0x0000004402ee bp 0x7ffd5e9b55b0 sp 0x7ffd5e9b4d50
WRITE of size 11 at 0x619000001330 thread T0
SCARINESS: 45 (multi-byte-write-heap-buffer-overflow)
#0 0x4402ed i... | cpp | 304747f1fac02038c64dca004a80768db43eeb65 | https://github.com/ntop/nDPI/commit/30fc89e556e5c09bf62b9548862cc3d924b9ec81 | A buffer overflow exists in the serialization process. |
arvo:63186 | n132/arvo:63186-vul | /src/bind9 | [
{
"end_line": 2007,
"function_name": "add_link",
"start_line": 1997,
"target_file": "/src/bind9/lib/dns/qp.c"
}
] | Index-out-of-bounds | bind9 | ubsan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1944377542
INFO: Loaded 1 modules (95767 inline 8-bit counters): 95767 [0xda6ca8, 0xdbe2bf),
INFO: Loaded 1 PC tables (95767 PCs): 95767 [0xdbe2c0,0xf34430),
/out/dns_message_checksig_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
qp.c:... | c | a87436d3d5dfb63b770e2de2a89c281da5774225 | https://gitlab.isc.org/isc-projects/bind9.git3a206da456723cc38a8a27e1edde1e48da33489a | A vulnerability exists where the chain length is not checked to be nonzero before examining the last entry in add_link(). It is possible to reach add_link() without visiting an intermediate node first, and the check for a duplicate entry can then cause a crash. |
arvo:63357 | n132/arvo:63357-vul | /src/serenity | [
{
"end_line": 940,
"function_name": "decode_bmp_dib",
"start_line": 810,
"target_file": "/src/serenity/Userland/Libraries/LibGfx/ImageFormats/BMPLoader.cpp"
}
] | Heap-buffer-overflow READ 1 | serenity | asan | =================================================================
==65656==ERROR: AddressSanitizer: use-after-poison on address 0x7f86e9aff83f at pc 0x000000827c59 bp 0x7ffc70a44110 sp 0x7ffc70a44108
READ of size 1 at 0x7f86e9aff83f thread T0
SCARINESS: 22 (1-byte-read-use-after-poison)
#0 0x827c58 in Gfx::InputStr... | cpp | 4e0a9267374314a777d40bb11ff445958268ceec | https://github.com/SerenityOS/serenity/commit/8ec26f3b549c338ccbaf3e16889863efcf5143a2 | A vulnerability exists in LibGfx/BMPLoader where the header size is not accounted for when checking DIB bounds. |
arvo:63537 | n132/arvo:63537-vul | /src/libredwg | [
{
"end_line": 12335,
"function_name": "dxf_objects_read",
"start_line": 12292,
"target_file": "/src/libredwg/src/in_dxf.c"
}
] | Heap-double-free | libredwg | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3570571834
INFO: Loaded 1 modules (644833 inline 8-bit counters): 644833 [0x52bcee0, 0x535a5c1),
INFO: Loaded 1 PC tables (644833 PCs): 644833 [0x463abd8,0x50119e8),
/out/llvmfuzz: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
================... | c | 8027830aac4625a96b70b645fbbb4ccb625f781e | https://github.com/LibreDWG/libredwg/commit/9801c8580ecabfd5770f927e5d71b0d1d184a55c | A double-free vulnerability exists in the dxfname function in indxf, similar to the issue in dxf_entities_read. |
arvo:63564 | n132/arvo:63564-vul | /src/libxaac | [
{
"end_line": 208,
"function_name": "ixheaacd_parse_extension_config",
"start_line": 76,
"target_file": "/src/libxaac/decoder/ixheaacd_mps_bitdec.c"
}
] | Index-out-of-bounds | libxaac | ubsan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3494565501
INFO: Loaded 1 modules (72788 inline 8-bit counters): 72788 [0xab3370, 0xac4fc4),
INFO: Loaded 1 PC tables (72788 PCs): 72788 [0x8ad270,0x9c97b0),
/out/xaac_dec_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
/src/libxaac/deco... | cpp | 947ad9f32b9378a637b6f3cf733fa80eb3f5dc90 | https://github.com/ittiam-systems/libxaac/commit/60b65345813bfd0c07f9646e4924ec18e15aa8a9 | An index-out-of-bounds runtime error occurs in the function ixheaacd_smooth_m1m2 when the value of arbitrary downmix residual bands is greater than or equal to the number of parameter bands. |
arvo:63587 | n132/arvo:63587-vul | /src/opensc | [
{
"end_line": 388,
"function_name": "iasecc_parse_size",
"start_line": 371,
"target_file": "/src/opensc/src/libopensc/iasecc-sdo.c"
}
] | Heap-buffer-overflow READ 1 | opensc | asan | Reading 82 bytes from /tmp/poc
=================================================================
==42077==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000000531 at pc 0x0000008fc844 bp 0x7ffcd06314e0 sp 0x7ffcd06314d8
READ of size 1 at 0x602000000531 thread T0
SCARINESS: 12 (1-byte-read-heap-buffer-ove... | c | 12e01b8e3a263efa3f55c67a433ebfb711479dbb | https://github.com/OpenSC/OpenSC/commit/fbda61d0d276dc98b9d1d1e6810bbd21d19e3859 | A buffer overflow occurs in the iasecc component when processing invalid data. |
arvo:63754 | n132/arvo:63754-vul | /src/ndpi | [
{
"end_line": 4174,
"function_name": "ndpi_add_ip_risk_mask",
"start_line": 4134,
"target_file": "/src/ndpi/src/lib/ndpi_main.c"
}
] | Use-of-uninitialized-value | ndpi | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1763427911
INFO: Loaded 1 modules (20614 inline 8-bit counters): 20614 [0xa4ca22, 0xa51aa8),
INFO: Loaded 1 PC tables (20614 PCs): 20614 [0xa51aa8,0xaa2308),
/out/fuzz_filecfg_protocols: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==14471==W... | c | 50006516b3816a67f264728455b3a295f79bcac6 | https://github.com/ntop/nDPI/commit/cd59485f7e2b99889f279b0dff7daca857079fa3 | A use-of-uninitialized-value vulnerability exists in the ndpi_patricia_lookup function in ndpi_patricia.c, which is called from add_to_ptree, ndpi_add_ip_risk_mask, ndpi_handle_rule, and ndpi_load_protocols_file_fd in ndpi_main.c. This issue occurs due to a missing check in custom rules, leading to the use of uninitial... |
arvo:63777 | n132/arvo:63777-vul | /src/serenity | [
{
"end_line": 570,
"function_name": "Font::try_load_from_offset",
"start_line": 385,
"target_file": "/src/serenity/Userland/Libraries/LibGfx/Font/OpenType/Font.cpp"
}
] | Heap-buffer-overflow READ 1 | serenity | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3140190546
INFO: Loaded 1 modules (53129 inline 8-bit counters): 53129 [0xe468c0, 0xe53849),
INFO: Loaded 1 PC tables (53129 PCs): 53129 [0xe53850,0xf230e0),
/out/FuzzTTF: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=========================... | cpp | 49d21619d45fc194af162fa1654cf5bdc5ed7a8e | https://github.com/SerenityOS/serenity/commit/a6f9ad60124c4dd355084240019abc1e7d62baba | LibGfx/OpenType allows offsets that are equal to the file size, which causes a crash. Offsets are not strictly checked to be less than the file size. |
arvo:63885 | n132/arvo:63885-vul | /src/WasmEdge | [
{
"end_line": 51,
"function_name": "FuzzTool",
"start_line": 14,
"target_file": "/src/WasmEdge/lib/driver/fuzzTool.cpp"
}
] | Segv on unknown address | WasmEdge | asan | AddressSanitizer:DEADLYSIGNAL
=================================================================
==7627==ERROR: AddressSanitizer: SEGV on unknown address (pc 0x7facfe8e354c bp 0x7ffc8d9a0670 sp 0x7ffc8d9a0610 T0)
==7627==The signal is caused by a READ memory access.
==7627==Hint: this fault was caused by a dereference o... | cpp | fa8103ad6c471d7d584958dd77fa0fd44aa5de0e | https://github.com/WasmEdge/WasmEdge/commit/9ba5f8faeacc35ea41033a4e384bef9cc18e9f5c | null |
arvo:63949 | n132/arvo:63949-vul | /src/opensc | [
{
"end_line": 71,
"function_name": "iasecc_parse_acls",
"start_line": 42,
"target_file": "/src/opensc/src/libopensc/iasecc-sdo.c"
}
] | Heap-buffer-overflow READ 1 | opensc | asan | =================================================================
==42075==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000000514 at pc 0x0000008aa992 bp 0x7ffe78fc0c00 sp 0x7ffe78fc0bf8
READ of size 1 at 0x602000000514 thread T0
SCARINESS: 12 (1-byte-read-heap-buffer-overflow)
#0 0x8aa991 in iasec... | c | d9a73533c2ddf89a2056619185216d5035fd4d91 | https://github.com/OpenSC/OpenSC/commit/8fc2c20c3f895569eeb58328bb882aec07325d3b | null |
arvo:63972 | n132/arvo:63972-vul | /src/lcms | [
{
"end_line": 1159,
"function_name": "CheckOne",
"start_line": 1146,
"target_file": "/src/lcms/src/cmsvirt.c"
}
] | Index-out-of-bounds | lcms | ubsan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 433332054
INFO: Loaded 1 modules (11057 inline 8-bit counters): 11057 [0x6081d8, 0x60ad09),
INFO: Loaded 1 PC tables (11057 PCs): 11057 [0x580ef0,0x5ac200),
/out/cms_virtual_profile_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
cmsvirt... | c | fef7796becfa273a6b5a36697812148db05e4859 | https://github.com/mm2/Little-CMS/commit/6491e2e722c893b258e07565da9e0a1233321bcb | null |
arvo:64079 | n132/arvo:64079-vul | /src/serenity | [
{
"end_line": 737,
"function_name": "MultiLocalizedUnicodeTagData::from_bytes",
"start_line": 673,
"target_file": "/src/serenity/Userland/Libraries/LibGfx/ICC/TagTypes.cpp"
}
] | UNKNOWN READ | serenity | ubsan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2037740357
INFO: Loaded 1 modules (20869 inline 8-bit counters): 20869 [0x474f28, 0x47a0ad),
INFO: Loaded 1 PC tables (20869 PCs): 20869 [0x47a0b0,0x4cb900),
/out/FuzzICCProfile: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
UndefinedBehaviorS... | cpp | f9068c7f2e72f2aefbdb464caaa2e7ea15dc16cd | https://github.com/SerenityOS/serenity/commit/10624a2beb3b5e185cf10e6d11877555e84979ed | A vulnerability exists in LibGfx/ICC where a `MultiLocalizedUnicodeTagData` object with incorrect length or offset fields can cause a buffer overflow during creation. |
arvo:64110 | n132/arvo:64110-vul | /src/PcapPlusPlus | [
{
"end_line": 345,
"function_name": "IPv4Layer::parseNextLayer",
"start_line": 240,
"target_file": "/src/PcapPlusPlus/Packet++/src/IPv4Layer.cpp"
}
] | Heap-buffer-overflow WRITE 2 | PcapPlusPlus | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2289862487
INFO: Loaded 1 modules (37620 inline 8-bit counters): 37620 [0xae3ea8, 0xaed19c),
INFO: Loaded 1 PC tables (37620 PCs): 37620 [0xaed1a0,0xb800e0),
/out/FuzzTarget: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
Read 0 packets success... | cpp | 98143666674d8d50ffed878d8d91c48c9567706c | https://github.com/seladb/PcapPlusPlus/commit/a0ecc6dad71f445c95936697c7ee15997d5761b2 | null |
arvo:64117 | n132/arvo:64117-vul | /src/PcapPlusPlus | [
{
"end_line": 478,
"function_name": "light_get_next_packet",
"start_line": 377,
"target_file": "/src/PcapPlusPlus/3rdParty/LightPcapNg/LightPcapNg/src/light_pcapng_ext.c"
}
] | UNKNOWN READ | PcapPlusPlus | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2795982395
INFO: Loaded 1 modules (11605 inline 8-bit counters): 11605 [0x93fcf8, 0x942a4d),
INFO: Loaded 1 PC tables (11605 PCs): 11605 [0x942a50,0x96ffa0),
/out/FuzzWriterNg: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
MemorySanitizer:DEAD... | cpp | 8240a53dcdd216d0bfd938c2aefbe5a99430b94f | https://github.com/seladb/PcapPlusPlus/commit/1ff377c5de22caf9907fcc31f3f71ea138346155 | null |
arvo:64124 | n132/arvo:64124-vul | /src/PcapPlusPlus | [
{
"end_line": 1414,
"function_name": "SSLClientHelloMessage::getCipherSuiteID",
"start_line": 1396,
"target_file": "/src/PcapPlusPlus/Packet++/src/SSLHandshake.cpp"
}
] | Heap-buffer-overflow READ 2 | PcapPlusPlus | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1394614891
INFO: Loaded 1 modules (37620 inline 8-bit counters): 37620 [0xae3ea8, 0xaed19c),
INFO: Loaded 1 PC tables (37620 PCs): 37620 [0xaed1a0,0xb800e0),
/out/FuzzTarget: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
Read 0 packets success... | cpp | 641232e657ea712d8a94b9816b2fa97f388edb5c | https://github.com/seladb/PcapPlusPlus/commit/98143666674d8d50ffed878d8d91c48c9567706c | null |
arvo:64127 | n132/arvo:64127-vul | /src/PcapPlusPlus | [
{
"end_line": 647,
"function_name": "SomeIpSdLayer::isDataValid",
"start_line": 634,
"target_file": "/src/PcapPlusPlus/Packet++/src/SomeIpSdLayer.cpp"
}
] | Heap-buffer-overflow READ 4 | PcapPlusPlus | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3204569634
INFO: Loaded 1 modules (37636 inline 8-bit counters): 37636 [0xae3ea8, 0xaed1ac),
INFO: Loaded 1 PC tables (37636 PCs): 37636 [0xaed1b0,0xb801f0),
/out/FuzzTarget: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
Read 0 packets success... | cpp | 5f1895a7b496fa78a2927bd5fe610ab619a3f49b | https://github.com/seladb/PcapPlusPlus/commit/6a5cb61eba4f082f7dcd4e87031520102e1babdf | null |
arvo:64165 | n132/arvo:64165-vul | /src/serenity | [
{
"end_line": 80,
"function_name": "Cmap::subtable",
"start_line": 65,
"target_file": "/src/serenity/Userland/Libraries/LibGfx/Font/OpenType/Cmap.cpp"
}
] | Heap-buffer-overflow READ 1 | serenity | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1922627486
INFO: Loaded 1 modules (55552 inline 8-bit counters): 55552 [0xe8f4f0, 0xe9cdf0),
INFO: Loaded 1 PC tables (55552 PCs): 55552 [0xe9cdf0,0xf75df0),
/out/FuzzTTF: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=========================... | cpp | 10757b7787c69776a0f8a23818fd61a4877f52ee | https://github.com/SerenityOS/serenity/commit/e1b438bb1ab2e49a7a472a71efa5e2d32c4829e6 | LibGfx does not properly ensure that the Cmap subtable offset is within the expected range. The previous check only verifies that the first byte of the EncodingRecord offset is within range, but the actual read is 4 bytes wide, which can lead to out-of-bounds access. |
arvo:64166 | n132/arvo:64166-vul | /src/lcms | [
{
"end_line": 1377,
"function_name": "WriteOutputLUT",
"start_line": 1265,
"target_file": "/src/lcms/src/cmsps2.c"
}
] | Heap-buffer-overflow READ 4 | lcms | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 43447606
INFO: Loaded 1 modules (8147 inline 8-bit counters): 8147 [0x835e7f0, 0x83607c3),
INFO: Loaded 1 PC tables (8147 PCs): 8147 [0x82da5e8,0x82ea480),
/out/cms_postscript_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=============... | c | dbb4a1a4fbb4fe3708155cfa15947ccd2c3d290b | https://github.com/mm2/Little-CMS/commit/1176e61afea4b58c5f92c6f226cdb7b1c76797d5 | A vulnerability exists where wrong parameters on CRD creation are not detected, potentially allowing invalid or malicious input to be processed. |
arvo:64181 | n132/arvo:64181-vul | /src/opensc | [
{
"end_line": 308,
"function_name": "setcos_new_file",
"start_line": 254,
"target_file": "/src/opensc/src/pkcs15init/pkcs15-setcos.c"
}
] | Invalid-free | opensc | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/fuzz_pkcs15init
=================================================================
==42058==ERROR: AddressSanitizer: attempting free on address which was not malloc()-ed: 0x000001000002 in thread T0
SCARINESS: 40 (bad-free)
#0 0x4a10d2 i... | c | 9d1662d95b5c525f12be358760c26516ac8f7998 | https://github.com/OpenSC/OpenSC/commit/4013a807492568bf9907cfb3df41f130ac83c7b9 | The setcos function in setcos.c writes beyond the end of the fixed 16-byte path->value buffer when attempting to append 2 more bytes. This buffer overrun writes into the ACL block and causes a crash during cleanup. |
arvo:64290 | n132/arvo:64290-vul | /src/wireshark | [
{
"end_line": 1777,
"function_name": "dissect_zcl_read_attr_struct",
"start_line": 1747,
"target_file": "/src/wireshark/epan/dissectors/packet-zbee-zcl.c"
}
] | Global-buffer-overflow READ 4 | wireshark | asan | oss-fuzzshark: disabling: udp
oss-fuzzshark: disabling: udplite
oss-fuzzshark: disabling: ospf
oss-fuzzshark: disabling: bgp
oss-fuzzshark: disabling: dhcp
oss-fuzzshark: disabling: json
oss-fuzzshark: disabling: snort
oss-fuzzshark: configured for dissector: ip
INFO: Running with entropic power schedule (0xFF, 100).
I... | c | 3e86238f7e6d7ab1829efb305b9098bf86deb808 | https://github.com/wireshark/wireshark/commit/a9b0dc0aa7e5d6e0ddc8ee4010106fc2a44dc8d9 | null |
arvo:64363 | n132/arvo:64363-vul | /src/wireshark | [
{
"end_line": 1777,
"function_name": "dissect_zcl_read_attr_struct",
"start_line": 1747,
"target_file": "/src/wireshark/epan/dissectors/packet-zbee-zcl.c"
}
] | Global-buffer-overflow READ 4 | wireshark | asan | oss-fuzzshark: disabling: ip
oss-fuzzshark: disabling: udplite
oss-fuzzshark: disabling: ospf
oss-fuzzshark: disabling: bgp
oss-fuzzshark: disabling: dhcp
oss-fuzzshark: disabling: json
oss-fuzzshark: disabling: snort
oss-fuzzshark: configured for dissector: udp in table: ip.proto
Accepting input from '/tmp/poc'
Usage ... | c | 3e86238f7e6d7ab1829efb305b9098bf86deb808 | https://github.com/wireshark/wireshark/commit/a9b0dc0aa7e5d6e0ddc8ee4010106fc2a44dc8d9 | null |
arvo:64425 | n132/arvo:64425-vul | /src/PcapPlusPlus | [
{
"end_line": 106,
"function_name": "SipLayer::parseNextLayer",
"start_line": 84,
"target_file": "/src/PcapPlusPlus/Packet++/src/SipLayer.cpp"
}
] | UNKNOWN READ | PcapPlusPlus | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3619248014
INFO: Loaded 1 modules (29586 inline 8-bit counters): 29586 [0xc6d318, 0xc746aa),
INFO: Loaded 1 PC tables (29586 PCs): 29586 [0xc746b0,0xce7fd0),
/out/FuzzTarget: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
Read 0 packets success... | cpp | c47c819e3ad013265961562e9e9f3844c5dfaa19 | https://github.com/seladb/PcapPlusPlus/commit/983869a36685728a93e68f523c722ec930fb89f8 | null |
arvo:64431 | n132/arvo:64431-vul | /src/libavc | [
{
"end_line": 1620,
"function_name": "isvcd_parse_sps",
"start_line": 1078,
"target_file": "/src/libavc/decoder/svc/isvcd_parse_headers.c"
}
] | Heap-buffer-overflow WRITE 1 | libavc | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2879014107
INFO: Loaded 1 modules (16794 inline 8-bit counters): 16794 [0x8a4150, 0x8a82ea),
INFO: Loaded 1 PC tables (16794 PCs): 16794 [0x807228,0x848bc8),
/out/svc_dec_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==================... | cpp | 0d29250b990430ca0d7346459c11ca053380bbb5 | https://github.com/ittiam-systems/libavc/commit/28727baf58aa7c8983769aff1ceecb3121a26ee6 | null |
arvo:64522 | n132/arvo:64522-vul | /src/opensc | [
{
"end_line": 63,
"function_name": "asn1_decode_des_params",
"start_line": 42,
"target_file": "/src/opensc/src/libopensc/pkcs15-algo.c"
}
] | Stack-buffer-overflow READ 8 | opensc | asan | =================================================================
==42076==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7f01a9773fb0 at pc 0x0000005e303e bp 0x7ffe51a14880 sp 0x7ffe51a14878
READ of size 8 at 0x7f01a9773fb0 thread T0
SCARINESS: 38 (8-byte-read-stack-buffer-overflow)
#0 0x5e303d in asn... | c | 6d1fcd9cf82c6501089898066656fbe6737f3ced | https://github.com/OpenSC/OpenSC/commit/2fb0d735b433a7d5618865be5280e41e78362b5e | A stack buffer overflow occurs in the pkcs15 module while parsing the DES initialization vector (iv). |
arvo:6457 | n132/arvo:6457-vul | /src/imagemagick | [
{
"end_line": 1173,
"function_name": "WritePCDImage",
"start_line": 1084,
"target_file": "/src/imagemagick/coders/pcd.c"
}
] | Bad-free | imagemagick | asan | INFO: Seed: 255370699
INFO: Loaded 1 modules (53124 inline 8-bit counters): 53124 [0x1279aa8, 0x1286a2c),
INFO: Loaded 1 PC tables (53124 PCs): 53124 [0xded4f0,0xebcd30),
/out/encoder_pcd_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
Magick: delegate library support not built-in 'none' (Freetype) @ war... | cpp | 69c4513a4fb5f71421a21643edb53de53d3864a6 | https://github.com/imagemagick/imagemagick/commit/4cd61940efb573150303c73c2be4079133da042f | null |
arvo:64570 | n132/arvo:64570-vul | /src/wolfmqtt | [
{
"end_line": 855,
"function_name": "MqttDecode_ConnectAck",
"start_line": 801,
"target_file": "/src/wolfmqtt/src/mqtt_packet.c"
}
] | UNKNOWN READ | wolfmqtt | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 778291487
INFO: Loaded 1 modules (22717 inline 8-bit counters): 22717 [0x85d918, 0x8631d5),
INFO: Loaded 1 PC tables (22717 PCs): 22717 [0x78fa20,0x7e85f0),
/out/wolfmqtt-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
AddressSanitizer:D... | cpp | ebe65ad7fd87769eb3431a7dcef77813be9e4bd8 | https://github.com/wolfSSL/wolfMQTT/commit/96c69d875b91fba9ac501f1376144bf662644252 | null |
arvo:64579 | n132/arvo:64579-vul | /src/php-src | [
{
"end_line": 3966,
"function_name": "_zend_update_type_info",
"start_line": 2524,
"target_file": "/src/php-src/Zend/Optimizer/zend_inference.c"
}
] | Heap-use-after-free READ 4 | php-src | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1531525013
INFO: Loaded 2 modules (177533 inline 8-bit counters): 142915 [0x1b63e40, 0x1b86c83), 34618 [0x7f4226063670, 0x7f422606bdaa),
INFO: Loaded 2 PC tables (177533 PCs): 142915 [0x1b86c88,0x1db50b8), 34618 [0x7f422606bdb0,0x7f42260f3150),
/ou... | cpp | 9a69bb2d582ed127fb2a82273e9f9b9d6d6e4612 | https://github.com/php/php-src/commit/1e55c9760178f9d5e1de8b251537b3e8ccf44feb | null |
arvo:64638 | n132/arvo:64638-vul | /src/radare2 | [
{
"end_line": 327,
"function_name": "r_bin_xcoff_init_ldsyms",
"start_line": 302,
"target_file": "/src/radare2/libr/bin/format/coff/coff.c"
}
] | Heap-buffer-overflow READ 4 | radare2 | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1415283906
INFO: Loaded 1 modules (264187 inline 8-bit counters): 264187 [0x2d3a280, 0x2d7aa7b),
INFO: Loaded 1 PC tables (264187 PCs): 264187 [0x2d7aa80,0x3182a30),
/out/ia_fuzz: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================... | cpp | 4d3ff5ff214123d692582a48b0e3a4f04a96f08c | https://github.com/radareorg/radare2/commit/bb40f2ac075e5605970f159f5438dc001a92f9f3 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.