task_id stringlengths 8 10 | docker_image stringlengths 17 19 | basedir stringclasses 157
values | target_functions listlengths 1 3 | crash_type stringclasses 85
values | project_name stringclasses 157
values | sanitizer stringclasses 3
values | sanitizer_output stringlengths 1.13k 6.5M | language stringclasses 2
values | vuln_commit stringlengths 40 40 | fix stringlengths 69 110 | vulnerability_description stringlengths 38 824 ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
arvo:5577 | n132/arvo:5577-vul | /src/open62541 | [
{
"end_line": 56,
"function_name": "removeSession",
"start_line": 33,
"target_file": "/src/open62541/src/server/ua_session_manager.c"
}
] | Heap-use-after-free WRITE 8 | open62541 | asan | Reading 2520 bytes from /tmp/poc
======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/fuzz_binary_message < INPUT_FILE
or
/out/fuzz_binary_message INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute th... | cpp | 01f78374285f16749452ba84289356fc85e4ab22 | https://github.com/open62541/open62541/commit/a6d732b4050e902d9bba3acfa7bf72e30fa4dcc6 | null |
arvo:55818 | n132/arvo:55818-vul | /src/hunspell | [
{
"end_line": 1565,
"function_name": "AffixMgr::setcminmax",
"start_line": 1550,
"target_file": "/src/hunspell/src/hunspell/affixmgr.cxx"
}
] | Stack-buffer-underflow READ 1 | hunspell | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3171476752
INFO: Loaded 1 modules (17516 inline 8-bit counters): 17516 [0x8a3d78, 0x8a81e4),
INFO: Loaded 1 PC tables (17516 PCs): 17516 [0x7dc618,0x820cd8),
/out/affdicfuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
====================... | cpp | dbfc3656efd1217b1ae242d9f60f26ccf94b34b4 | https://github.com/hunspell/hunspell/commit/1cb9ba1f695624ee0a823fac6d9dbd83b6a7066a | null |
arvo:55874 | n132/arvo:55874-vul | /src/libavc | [
{
"end_line": 1665,
"function_name": "isvcd_parse_sps",
"start_line": 1096,
"target_file": "/src/libavc/decoder/svc/isvcd_parse_headers.c"
}
] | Heap-buffer-overflow READ 16 | libavc | asan | =================================================================
==2279==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x619000005dad at pc 0x0000005c5408 bp 0x7fff9e7554e0 sp 0x7fff9e7554d8
READ of size 16 at 0x619000005dad thread T0
SCARINESS: 36 (multi-byte-read-heap-buffer-overflow-far-from-bounds)
... | cpp | 764ab7b702142762bfa9c4e93427c6e494ff7940 | https://github.com/ittiam-systems/libavc/commit/8739b7da75f305ab391eb36c613210c23243fe5b | null |
arvo:55876 | n132/arvo:55876-vul | /src/libavc | [
{
"end_line": 1665,
"function_name": "isvcd_parse_sps",
"start_line": 1096,
"target_file": "/src/libavc/decoder/svc/isvcd_parse_headers.c"
}
] | UNKNOWN READ | libavc | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 134076288
INFO: Loaded 1 modules (16557 inline 8-bit counters): 16557 [0x9d9b70, 0x9ddc1d),
INFO: Loaded 1 PC tables (16557 PCs): 16557 [0x93e480,0x97ef50),
/out/svc_dec_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
MemorySanitizer:DEA... | cpp | 764ab7b702142762bfa9c4e93427c6e494ff7940 | https://github.com/ittiam-systems/libavc/commit/8739b7da75f305ab391eb36c613210c23243fe5b | null |
arvo:55877 | n132/arvo:55877-vul | /src/libavc | [
{
"end_line": 1665,
"function_name": "isvcd_parse_sps",
"start_line": 1096,
"target_file": "/src/libavc/decoder/svc/isvcd_parse_headers.c"
}
] | Heap-buffer-overflow WRITE 1 | libavc | asan | =================================================================
==2279==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61100000594c at pc 0x00000058448e bp 0x7fff1e0d1020 sp 0x7fff1e0d1018
WRITE of size 1 at 0x61100000594c thread T0
SCARINESS: 31 (1-byte-write-heap-buffer-overflow)
#0 0x58448d in isvc... | cpp | 764ab7b702142762bfa9c4e93427c6e494ff7940 | https://github.com/ittiam-systems/libavc/commit/8739b7da75f305ab391eb36c613210c23243fe5b | null |
arvo:55886 | n132/arvo:55886-vul | /src/mosquitto | [
{
"end_line": 175,
"function_name": "config__add_listener",
"start_line": 144,
"target_file": "/src/mosquitto/src/conf.c"
}
] | Heap-use-after-free READ 2 | mosquitto | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1309876256
INFO: Loaded 1 modules (10232 inline 8-bit counters): 10232 [0x70ca38, 0x70f230),
INFO: Loaded 1 PC tables (10232 PCs): 10232 [0x70f230,0x7371b0),
/out/broker_fuzz_test_config: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
174429919... | cpp | be688e883b734fc421e1dc1931a349b4d9afea49 | https://github.com/eclipse/mosquitto/commit/1df253e4e3c48079a196788dbacc9c1364c92162 | A vulnerability exists where a mixed default/non-default listener configuration in the listener config could cause a crash on startup. This affects only very unusual configurations. |
arvo:55905 | n132/arvo:55905-vul | /src/libavc | [
{
"end_line": 1665,
"function_name": "isvcd_parse_sps",
"start_line": 1096,
"target_file": "/src/libavc/decoder/svc/isvcd_parse_headers.c"
}
] | Heap-buffer-overflow READ 4 | libavc | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1450786119
INFO: Loaded 1 modules (16891 inline 8-bit counters): 16891 [0x851a5d0, 0x851e7cb),
INFO: Loaded 1 PC tables (16891 PCs): 16891 [0x847e9a4,0x849f97c),
/out/svc_dec_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==============... | cpp | 764ab7b702142762bfa9c4e93427c6e494ff7940 | https://github.com/ittiam-systems/libavc/commit/8739b7da75f305ab391eb36c613210c23243fe5b | null |
arvo:55910 | n132/arvo:55910-vul | /src/freeradius-server | [
{
"end_line": 968,
"function_name": "fr_tacacs_decode",
"start_line": 342,
"target_file": "/src/freeradius-server/src/protocols/tacacs/decode.c"
}
] | Heap-buffer-overflow READ 1 | freeradius-server | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3906339780
INFO: Loaded 3 modules (19873 inline 8-bit counters): 19082 [0x7fab9133bf00, 0x7fab9134098a), 738 [0x7fab90f40d50, 0x7fab90f41032), 53 [0x5f0600, 0x5f0635),
INFO: Loaded 3 PC tables (19873 PCs): 19082 [0x7fab91340990,0x7fab9138b230), 738 ... | c | c297f3525a60da93487108c8fe1be3851827d4c8 | https://github.com/FreeRADIUS/freeradius-server/commit/f186a56705574338ef3f9ea2445891be41a4b759 | null |
arvo:55911 | n132/arvo:55911-vul | /src/libavc | [
{
"end_line": 1665,
"function_name": "isvcd_parse_sps",
"start_line": 1096,
"target_file": "/src/libavc/decoder/svc/isvcd_parse_headers.c"
}
] | Heap-buffer-overflow READ 1 | libavc | asan | =================================================================
==2280==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61d000003a88 at pc 0x000000589d4b bp 0x7ffc11175e30 sp 0x7ffc11175e28
READ of size 1 at 0x61d000003a88 thread T0
SCARINESS: 22 (1-byte-read-heap-buffer-overflow-far-from-bounds)
#0 0x... | cpp | 764ab7b702142762bfa9c4e93427c6e494ff7940 | https://github.com/ittiam-systems/libavc/commit/8739b7da75f305ab391eb36c613210c23243fe5b | null |
arvo:55933 | n132/arvo:55933-vul | /src/binutils-gdb | [
{
"end_line": 981,
"function_name": "_bfd_ecoff_slurp_symbol_table",
"start_line": 843,
"target_file": "/src/binutils-gdb/bfd/ecoff.c"
}
] | Heap-buffer-overflow WRITE 8 | binutils-gdb | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/fuzz_nm
=================================================================
==83637==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x621000018ed0 at pc 0x000000b9cc64 bp 0x7ffc4e2e7310 sp 0x7ffc4e2e7308
WRITE of size 8 at 0x6210000... | cpp | 77be7257442b1ca19deba8ec0e424f0faf53321f | https://github.com/bminor/binutils-gdb/commit/0d2f72332c7606fa3181b54dceef82d1af403624 | A buffer overflow exists in _bfd_ecoff_slurp_symbol_table in ecoff.c due to missing bounds checks on internal_sym.iss, which can lead to out-of-bounds memory access. The function lacks proper validation of input sizes, making it vulnerable to buffer overflows. |
arvo:55950 | n132/arvo:55950-vul | /src/mosquitto | [
{
"end_line": 110,
"function_name": "mosquitto_validate_utf8",
"start_line": 24,
"target_file": "/src/mosquitto/lib/utf8_mosq.c"
}
] | Heap-buffer-overflow READ 1 | mosquitto | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3382427068
INFO: Loaded 1 modules (41 inline 8-bit counters): 41 [0x5eaf00, 0x5eaf29),
INFO: Loaded 1 PC tables (41 PCs): 41 [0x5eaf30,0x5eb1c0),
/out/lib_fuzz_utf8: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
===============================... | cpp | 11cb25ee00ed858394fbf4103be2254ce13805e7 | https://github.com/eclipse/mosquitto/commit/769c94a10373db28ff0d63f25e6d382f5db3ec3c | null |
arvo:55964 | n132/arvo:55964-vul | /src/libavc | [
{
"end_line": 409,
"function_name": "isvcd_pic_reset_ctxt",
"start_line": 360,
"target_file": "/src/libavc/decoder/svc/isvcd_nal_parse.c"
}
] | Heap-buffer-overflow READ 4 | libavc | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/svc_dec_fuzzer
=================================================================
==2261==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x7fe83aff9800 at pc 0x0000005f8b88 bp 0x7ffe171f8570 sp 0x7ffe171f8568
READ of size 4 at 0x7f... | cpp | 8b8c7e390d00e5f6e8b354051680e5acd6c9a912 | https://github.com/ittiam-systems/libavc/commit/764ab7b702142762bfa9c4e93427c6e494ff7940 | A non-vcl buffer overflow occurs in the nal_parse function. |
arvo:55982 | n132/arvo:55982-vul | /src/freeradius-server | [
{
"end_line": 965,
"function_name": "fr_tacacs_decode",
"start_line": 340,
"target_file": "/src/freeradius-server/src/protocols/tacacs/decode.c"
}
] | Stack-buffer-overflow WRITE {*} | freeradius-server | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3586529230
INFO: Loaded 3 modules (19901 inline 8-bit counters): 19082 [0x7f9b228fcf00, 0x7f9b2290198a), 766 [0x7f9b22501ee8, 0x7f9b225021e6), 53 [0x5f0600, 0x5f0635),
INFO: Loaded 3 PC tables (19901 PCs): 19082 [0x7f9b22901990,0x7f9b2294c230), 766 ... | c | 8e3e3144fbbb3272fd86bcf0e4f03e0e68093b4d | https://github.com/FreeRADIUS/freeradius-server/commit/e9896af945d36f9548089164a8077cb368a4ad8f | null |
arvo:55985 | n132/arvo:55985-vul | /src/binutils-gdb | [
{
"end_line": 985,
"function_name": "_bfd_ecoff_slurp_symbol_table",
"start_line": 842,
"target_file": "/src/binutils-gdb/bfd/ecoff.c"
}
] | UNKNOWN READ | binutils-gdb | asan | AddressSanitizer:DEADLYSIGNAL
=================================================================
==78699==ERROR: AddressSanitizer: SEGV on unknown address 0x621514bd35b9 (pc 0x7fe414c5cc12 bp 0x7ffc3abf9e90 sp 0x7ffc3abf9658 T0)
==78699==The signal is caused by a READ memory access.
SCARINESS: 20 (wild-addr-read)
#0... | cpp | 72d225ef9cc7d475db188581da33b056df3191fd | https://github.com/bminor/binutils-gdb/commit/c91714309754e27f7f3a6ffc08ba61739c418532 | The vulnerability allows unused pointers to escape the UPDATE_RAW_END sanity checks in ecoff.c, potentially resulting in overflows. Additionally, the local sym fdr isymBase and csym values in the _bfd_ecoff_slurp_symbolic_info function are not properly sanity checked, which can lead to unsafe pointer usage and memory i... |
arvo:56150 | n132/arvo:56150-vul | /src/serenity | [
{
"end_line": 607,
"function_name": "read_start_of_scan",
"start_line": 548,
"target_file": "/src/serenity/Userland/Libraries/LibGfx/JPEGLoader.cpp"
}
] | Bad-cast | serenity | ubsan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2774324601
INFO: Loaded 1 modules (34180 inline 8-bit counters): 34180 [0x7738c8, 0x77be4c),
INFO: Loaded 1 PC tables (34180 PCs): 34180 [0x77be50,0x801690),
/out/FuzzJPEGLoader: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
/src/serenity/Meta... | cpp | 947698f29fb54b0e0e5f87b63ba7353cc704530f | https://github.com/SerenityOS/serenity/commit/ae124c19efb5fda789f399b9207d84359fe4599a | LibGfx incorrectly assumes that a scan includes all components for the image. A scan can contain fewer components than the full image, and if there are multiple components, they must follow the ordering of the frame header. This can lead to improper handling when looping over image components and skipping those that do... |
arvo:56157 | n132/arvo:56157-vul | /src/librabbitmq | [
{
"end_line": 24,
"function_name": "LLVMFuzzerTestOneInput",
"start_line": 12,
"target_file": "/src/librabbitmq/fuzz/fuzz_url.c"
}
] | Use-after-poison READ 5 | librabbitmq | asan | =================================================================
==927==ERROR: AddressSanitizer: use-after-poison on address 0x7fbed7dfd816 at pc 0x0000004dc445 bp 0x7ffd8120b590 sp 0x7ffd8120b588
READ of size 1 at 0x7fbed7dfd816 thread T0
SCARINESS: 22 (1-byte-read-use-after-poison)
#0 0x4dc444 in find_delim /src... | c | cb04afb806447d509e7722776e8533c5069571a3 | https://github.com/alanxz/rabbitmq-c/commit/a78737482b3f5e9359c303099107644d7ee48e07 | null |
arvo:56176 | n132/arvo:56176-vul | /src/libavc | [
{
"end_line": 884,
"function_name": "isvcd_parse_subset_sps",
"start_line": 126,
"target_file": "/src/libavc/decoder/svc/isvcd_parse_headers.c"
}
] | Use-of-uninitialized-value | libavc | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1950193256
INFO: Loaded 1 modules (16667 inline 8-bit counters): 16667 [0x9ddb60, 0x9e1c7b),
INFO: Loaded 1 PC tables (16667 PCs): 16667 [0x942550,0x983700),
/out/svc_dec_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==2266==WARNING: M... | c | a7c8d4764346a0c03626d6a9ffcf64aa762acf0e | https://github.com/ittiam-systems/libavc/commit/5fabd43f6af6c5f432c543b8a84e690dfa31a3b2 | null |
arvo:56210 | n132/arvo:56210-vul | /src/libavc | [
{
"end_line": 884,
"function_name": "isvcd_parse_subset_sps",
"start_line": 126,
"target_file": "/src/libavc/decoder/svc/isvcd_parse_headers.c"
}
] | Heap-buffer-overflow READ 1 | libavc | asan | =================================================================
==2279==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x613000008f36 at pc 0x00000057b6cf bp 0x7fffca61a030 sp 0x7fffca61a028
READ of size 1 at 0x613000008f36 thread T0
SCARINESS: 22 (1-byte-read-heap-buffer-overflow-far-from-bounds)
#0 0x... | cpp | a7c8d4764346a0c03626d6a9ffcf64aa762acf0e | https://github.com/ittiam-systems/libavc/commit/5fabd43f6af6c5f432c543b8a84e690dfa31a3b2 | null |
arvo:56277 | n132/arvo:56277-vul | /src/binutils-gdb | [
{
"end_line": 2423,
"function_name": "lookup_line",
"start_line": 1878,
"target_file": "/src/binutils-gdb/bfd/ecofflink.c"
}
] | UNKNOWN READ | binutils-gdb | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/fuzz_addr2line
BFD: /tmp/libfuzzer.83637: no group info for section ''
/tmp/libfuzzer.83637: no group info for section ''
BFD: /tmp/libfuzzer.83637: no group info for section ''
/tmp/libfuzzer.83637: no group info for section ''
AddressSani... | cpp | 3f316bf83bc59299e96e1395793e6493d3ab9581 | https://github.com/bminor/binutils-gdb/commit/f6389c5a793648f1b12cc791b8957cf6d1752222 | The ECOFF support in ecofflink.c lacks sufficient bounds checking in functions such as mk_fdrtab and lookup_line. The code uses "long" for counts and sizes, which can lead to issues with signed integer overflow and improper handling of string offsets and symbol indices. This can result in vulnerabilities due to inadequ... |
arvo:56455 | n132/arvo:56455-vul | /src/harfbuzz | [
{
"end_line": 119,
"function_name": "LLVMFuzzerTestOneInput",
"start_line": 46,
"target_file": "/src/harfbuzz/test/fuzzing/hb-subset-fuzzer.cc"
}
] | Heap-buffer-overflow READ 4 | harfbuzz | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3811444627
INFO: Loaded 1 modules (93778 inline 8-bit counters): 93778 [0x8c50590, 0x8c673e2),
INFO: Loaded 1 PC tables (93778 PCs): 93778 [0x8c673e4,0x8d1e674),
/out/hb-subset-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
============... | cpp | 5226d697338756e661c951af28c19b9a69b4ff93 | https://github.com/harfbuzz/harfbuzz/commit/2d33a6b4dfdcd751eba242637c863d810a4a803c | null |
arvo:56469 | n132/arvo:56469-vul | /src/mupdf | [
{
"end_line": 126,
"function_name": "pdf_load_page_tree_internal",
"start_line": 104,
"target_file": "/src/mupdf/source/pdf/pdf-page.c"
}
] | Use-of-uninitialized-value | mupdf | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3549084358
INFO: Loaded 1 modules (158649 inline 8-bit counters): 158649 [0x42125c1, 0x423917a),
INFO: Loaded 1 PC tables (158649 PCs): 158649 [0x1ee13b0,0x214cf40),
/out/pdf_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
error: cannot ... | cpp | 14fe6e23252fa475016df7120a6c70d28bf85c3f | https://github.com/ArtifexSoftware/mupdf/commit/9054d993d2b035c78e61b54a8bd5515bb494e042 | The forward page map is implemented as a list of object numbers, which causes pdf_lookup_page_obj to resolve the object and return a borrowed reference to the required object. However, code that calls this function often assumes it will receive a borrowed reference to an indirection object pointing to the page object, ... |
arvo:56513 | n132/arvo:56513-vul | /src/mruby | [
{
"end_line": 361,
"function_name": "mrb_format_float",
"start_line": 78,
"target_file": "/src/mruby/src/fmt_fp.c"
}
] | Use-of-uninitialized-value | mruby | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3013550729
INFO: Loaded 1 modules (24470 inline 8-bit counters): 24470 [0x9cf699, 0x9d562f),
INFO: Loaded 1 PC tables (24470 PCs): 24470 [0x90b4b8,0x96ae18),
/out/mruby_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==2287==WARNING: Mem... | c | 31c99eb99b52d7469bbe3f46863fcfe1bff36cfe | https://github.com/mruby/mruby/commit/956d0c51271d453f2d66cbe8fc5626f00035d151 | A vulnerability exists in fmt_fp.c within the mrb_format_float function, where the "%e" format specifier does not enforce a minimum precision of 1. |
arvo:56515 | n132/arvo:56515-vul | /src/cyclonedds | [
{
"end_line": 110,
"function_name": "LLVMFuzzerTestOneInput",
"start_line": 40,
"target_file": "/src/cyclonedds/fuzz/fuzz_type_object/fuzz_type_object.c"
}
] | UNKNOWN WRITE | cyclonedds | ubsan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 695104779
INFO: Loaded 1 modules (34592 inline 8-bit counters): 34592 [0x777a78, 0x780198),
INFO: Loaded 1 PC tables (34592 PCs): 34592 [0x650df8,0x6d7ff8),
/out/fuzz_type_object: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
UndefinedBehavior... | c | aa35c3cc3de6fdb57c475c6ac404d306f874639c | https://github.com/eclipse-cyclonedds/cyclonedds/commit/090b62ee46e8af9c539b2881aa36787e1de08079 | The error handling for ddsi_type_ref_proxy in the type object test in test_typeobj.c is insufficient, potentially leading to security vulnerabilities. |
arvo:5652 | n132/arvo:5652-vul | /src/open62541 | [
{
"end_line": 282,
"function_name": "Service_ActivateSession",
"start_line": 232,
"target_file": "/src/open62541/src/server/ua_services_session.c"
}
] | Heap-use-after-free READ 8 | open62541 | asan | Reading 964 bytes from /tmp/poc
======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/fuzz_binary_message < INPUT_FILE
or
/out/fuzz_binary_message INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute thi... | cpp | c54a3e26439600a075c5ac427da1aae0f0781655 | https://github.com/open62541/open62541/commit/3d4b8666b02ecea0045c2ba8ae4c46a3f766c765 | null |
arvo:56544 | n132/arvo:56544-vul | /src/ghostpdl | [
{
"end_line": 4612,
"function_name": "pdf14_fill_stroke_path",
"start_line": 4506,
"target_file": "/src/ghostpdl/base/gdevp14.c"
}
] | Heap-buffer-overflow WRITE {*} | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 76866910
INFO: Loaded 3 modules (224310 inline 8-bit counters): 13672 [0x7fecd2f169e0, 0x7fecd2f19f48), 959 [0x7fecd2f77a40, 0x7fecd2f77dff), 209679 [0x383b1d0, 0x386e4df),
INFO: Loaded 3 PC tables (224310 PCs): 13672 [0x7fecd2f19f48,0x7fecd2f4f5c8)... | cpp | b2992b7fa5dfae682c3c6f8fccb6b16733978e48 | https://github.com/ArtifexSoftware/ghostpdl/commit/f62a3f606db3163b85666a0b8997e52987c87e97 | null |
arvo:56554 | n132/arvo:56554-vul | /src/mruby | [
{
"end_line": 172,
"function_name": "mrb_debug_get_position",
"start_line": 159,
"target_file": "/src/mruby/src/debug.c"
}
] | Use-of-uninitialized-value | mruby | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 4136035985
INFO: Loaded 1 modules (24267 inline 8-bit counters): 24267 [0x9f45b9, 0x9fa484),
INFO: Loaded 1 PC tables (24267 PCs): 24267 [0x92e358,0x98d008),
/out/mruby_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==2300==WARNING: Mem... | c | ce86040a0fbd11b3d00df5ee96d55f005c5b38c9 | https://github.com/mruby/mruby/commit/31c99eb99b52d7469bbe3f46863fcfe1bff36cfe | null |
arvo:56687 | n132/arvo:56687-vul | /src/mruby | [
{
"end_line": 1664,
"function_name": "mrb_init_io",
"start_line": 1617,
"target_file": "/src/mruby/mrbgems/mruby-io/src/io.c"
}
] | UNKNOWN READ | mruby | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2373020415
INFO: Loaded 1 modules (23602 inline 8-bit counters): 23602 [0x96c6d0, 0x972302),
INFO: Loaded 1 PC tables (23602 PCs): 23602 [0x83a118,0x896438),
/out/mruby_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
line 100:18: warning... | c | d0659b089f3d9eb8b7969bc2c006032d10076d8b | https://github.com/mruby/mruby/commit/af59e30710ea72aa479e6d26ae5c6951d1954d11 | null |
arvo:56781 | n132/arvo:56781-vul | /src/opensc | [
{
"end_line": 158,
"function_name": "cosm_delete_file",
"start_line": 119,
"target_file": "/src/opensc/src/pkcs15init/pkcs15-oberthur.c"
}
] | Index-out-of-bounds | opensc | ubsan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3176867118
INFO: Loaded 1 modules (109040 inline 8-bit counters): 109040 [0x11599b0, 0x11743a0),
INFO: Loaded 1 PC tables (109040 PCs): 109040 [0xd1c408,0xec6308),
/out/fuzz_pkcs15init: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
sc.c:467:61... | c | eac9f21202377cb2b34246f2920504dfbd92b139 | https://github.com/OpenSC/OpenSC/commit/d0a2bdaac5dcecc905c7aad6579c46624cc0ebde | null |
arvo:56820 | n132/arvo:56820-vul | /src/wireshark | [
{
"end_line": 2219,
"function_name": "dissect_oran_c_section",
"start_line": 1097,
"target_file": "/src/wireshark/epan/dissectors/packet-oran.c"
}
] | Index-out-of-bounds | wireshark | ubsan | oss-fuzzshark: disabling: ip
oss-fuzzshark: disabling: udplite
oss-fuzzshark: disabling: ospf
oss-fuzzshark: disabling: bgp
oss-fuzzshark: disabling: dhcp
oss-fuzzshark: disabling: json
oss-fuzzshark: disabling: snort
oss-fuzzshark: configured for dissector: udp in table: ip.proto
INFO: Running with entropic power sche... | c | 2a7e4982a55b0d8e1a22f42cf6bb1e410daa92c0 | https://github.com/wireshark/wireshark/commit/9a63e4cf79052a7897db2f8f239b7a5249155f7e | null |
arvo:56936 | n132/arvo:56936-vul | /src/wireshark | [
{
"end_line": 266,
"function_name": "dissect_gsmrlp",
"start_line": 203,
"target_file": "/src/wireshark/epan/dissectors/packet-gsm_rlp.c"
}
] | Heap-buffer-overflow READ 1 | wireshark | asan | oss-fuzzshark: disabling: ip
oss-fuzzshark: disabling: udplite
oss-fuzzshark: disabling: ospf
oss-fuzzshark: disabling: bgp
oss-fuzzshark: disabling: dhcp
oss-fuzzshark: disabling: json
oss-fuzzshark: disabling: snort
oss-fuzzshark: configured for dissector: udp in table: ip.proto
Accepting input from '/tmp/poc'
Usage ... | c | b911cf286f495ba068c77b8b2b3445d1a325a819 | https://github.com/wireshark/wireshark/commit/450aa4e580314cdd55733858c72dcd4828a234b0 | A vulnerability exists in packet-gsm_rlp where the code reads beyond the captured length when computing the FCS. |
arvo:56990 | n132/arvo:56990-vul | /src/wireshark | [
{
"end_line": 2226,
"function_name": "dissect_oran_c_section",
"start_line": 1099,
"target_file": "/src/wireshark/epan/dissectors/packet-oran.c"
}
] | UNKNOWN READ | wireshark | asan | oss-fuzzshark: disabling: udp
oss-fuzzshark: disabling: udplite
oss-fuzzshark: disabling: ospf
oss-fuzzshark: disabling: bgp
oss-fuzzshark: disabling: dhcp
oss-fuzzshark: disabling: json
oss-fuzzshark: disabling: snort
oss-fuzzshark: configured for dissector: ip
INFO: Running with entropic power schedule (0xFF, 100).
I... | c | 8bc487ea762da0f565695e9e9e33b58f14d9f31d | https://github.com/wireshark/wireshark/commit/5f2c523703f3f8caf2c954c1bd1cf1e3c3f9e0c9 | A vulnerability exists in the ORAN FH CUS Ext11 implementation where improper handling of the array index occurs if there are 0 bundles, potentially leading to out-of-bounds access. |
arvo:56991 | n132/arvo:56991-vul | /src/mruby | [
{
"end_line": 1358,
"function_name": "mrb_field_write_barrier",
"start_line": 1339,
"target_file": "/src/mruby/src/gc.c"
}
] | Heap-use-after-free READ 4 | mruby | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/mruby_proto_fuzzer
[libprotobuf WARNING /src/LPM/external.protobuf/src/external.protobuf/src/google/protobuf/text_format.cc:352] Warning parsing text-format ruby_fuzzer.Function: 1134:18: Message type "ruby_fuzzer.StatementSeq" has no field... | cpp | ccca6ec45895020b0b32b99652fb1b3cbbc42e93 | https://github.com/mruby/mruby/commit/8d1192f8a28034b1931a41e8c55cd86715101d0c | A vulnerability exists in gc.c within the mrb_field_write_barrier function, where the condition does not account for the possibility that Minor GC may be suspended with the MRB_GC_STATE_SWEEP state. |
arvo:57001 | n132/arvo:57001-vul | /src/assimp | [
{
"end_line": 331,
"function_name": "OFFImporter::InternReadFile",
"start_line": 108,
"target_file": "/src/assimp/code/AssetLib/OFF/OFFLoader.cpp"
}
] | UNKNOWN WRITE | assimp | asan | Reading 45 bytes from /tmp/poc
Info, T0: Load $$$___magic___$$$.
Info, T0: File extension not known, trying signature-based detection
Info, T0: Found a matching importer for this file format: OFF Importer.
Info, T0: Import root directory is './'
Error, T0: OFF: Vertex index is out of range
Error, T0: OFF: The numbe... | cpp | 4180b1fd080b2cab0a2d3a3149eff1f5163ee888 | https://github.com/assimp/assimp/commit/36dfa3bed31fe220a15648083a78c925fbec0792 | An unknown write occurs in the function Assimp::SortByPTypeProcess::Execute. |
arvo:57061 | n132/arvo:57061-vul | /src/libxslt | [
{
"end_line": 357,
"function_name": "xsltCompMatchAdd",
"start_line": 300,
"target_file": "/src/libxslt/libxslt/pattern.c"
}
] | Heap-double-free | libxslt | asan | Running LLVMFuzzerInitialize ...
continue...
=================================================================
==17834==ERROR: AddressSanitizer: attempting double-free on 0x602000001590 in thread T0:
SCARINESS: 42 (double-free)
#0 0x49f8c2 in free /src/llvm-project/compiler-rt/lib/asan/asan_malloc_linux.cpp:52:3
... | c | f13329a622f0370bf1eb72ef99229e8faf46f732 | https://gitlab.gnome.org/GNOME/libxslt.gitac9d752240d399db1d7c09f2ef4008200a272c8c | A double free vulnerability exists in the xsltCompMatchAdd function due to improper handling of memory allocation failures. |
arvo:57077 | n132/arvo:57077-vul | /src/libxml2 | [
{
"end_line": 837,
"function_name": "xmlCurrentChar",
"start_line": 698,
"target_file": "/src/libxml2/parserInternals.c"
}
] | Global-buffer-overflow READ 1 | libxml2 | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/xinclude
=================================================================
==10547==ERROR: AddressSanitizer: global-buffer-overflow on address 0x000000852f9f at pc 0x00000056ba63 bp 0x7ffee6882fb0 sp 0x7ffee6882fa8
READ of size 1 at 0x00000... | c | 4b3452d17123631ec43d532b83dc182c1a638fed | https://gitlab.gnome.org/GNOME/libxml2/-/commit/ca2bfecea9c23f8d2e11741fff7c6a5372c56bb8 | null |
arvo:57080 | n132/arvo:57080-vul | /src/libxml2 | [
{
"end_line": 837,
"function_name": "xmlCurrentChar",
"start_line": 698,
"target_file": "/src/libxml2/parserInternals.c"
}
] | Global-buffer-overflow READ 1 | libxml2 | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3164410884
INFO: Loaded 1 modules (52514 inline 8-bit counters): 52514 [0xad7b30, 0xae4852),
INFO: Loaded 1 PC tables (52514 PCs): 52514 [0x960110,0xa2d330),
/out/xinclude: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
========================... | c | 4b3452d17123631ec43d532b83dc182c1a638fed | https://gitlab.gnome.org/GNOME/libxml2/-/commit/ca2bfecea9c23f8d2e11741fff7c6a5372c56bb8 | null |
arvo:57084 | n132/arvo:57084-vul | /src/libxml2 | [
{
"end_line": 837,
"function_name": "xmlCurrentChar",
"start_line": 698,
"target_file": "/src/libxml2/parserInternals.c"
}
] | Global-buffer-overflow READ 1 | libxml2 | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1950158454
INFO: Loaded 1 modules (52509 inline 8-bit counters): 52509 [0x874d4c0, 0x875a1dd),
INFO: Loaded 1 PC tables (52509 PCs): 52509 [0x863db1c,0x86a4404),
/out/schema: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
======================... | c | 4b3452d17123631ec43d532b83dc182c1a638fed | https://gitlab.gnome.org/GNOME/libxml2/-/commit/ca2bfecea9c23f8d2e11741fff7c6a5372c56bb8 | null |
arvo:57089 | n132/arvo:57089-vul | /src/libxml2 | [
{
"end_line": 3170,
"function_name": "htmlParseScript",
"start_line": 3097,
"target_file": "/src/libxml2/HTMLparser.c"
}
] | Global-buffer-overflow READ 1 | libxml2 | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 39997470
INFO: Loaded 1 modules (52493 inline 8-bit counters): 52493 [0x874d4c0, 0x875a1cd),
INFO: Loaded 1 PC tables (52493 PCs): 52493 [0x863db3c,0x86a43a4),
/out/html: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==========================... | c | 1a91392c62e40eaa920b8a406c659da3f1ccf2f5 | https://gitlab.gnome.org/GNOME/libxml2/-/commit/8090e5856465c0b8e26e2a080f4b498f37fa83ab | null |
arvo:57105 | n132/arvo:57105-vul | /src/libraw | [
{
"end_line": 887,
"function_name": "LibRaw::parseAdobeRAFMakernote",
"start_line": 105,
"target_file": "/src/libraw/src/metadata/fuji.cpp"
}
] | UNKNOWN READ | libraw | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/libraw_nef_fuzzer
AddressSanitizer:DEADLYSIGNAL
=================================================================
==54004==ERROR: AddressSanitizer: SEGV on unknown address 0x7feb7ddfa7fd (pc 0x000000504abd bp 0x7ffd5d72a8d0 sp 0x7ffd5d72a8b... | cpp | 443b7fb51e1ca89a1178180258a0f10ed353617d | https://github.com/libraw/libraw/commit/f2998bacc3d06484769150bfbc8df379a4f81f2c | null |
arvo:57110 | n132/arvo:57110-vul | /src/libxml2 | [
{
"end_line": 837,
"function_name": "xmlCurrentChar",
"start_line": 698,
"target_file": "/src/libxml2/parserInternals.c"
}
] | Global-buffer-overflow READ 1 | libxml2 | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2437780186
INFO: Loaded 1 modules (52506 inline 8-bit counters): 52506 [0xad7b40, 0xae485a),
INFO: Loaded 1 PC tables (52506 PCs): 52506 [0x960110,0xa2d2b0),
/out/schema: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==========================... | c | 4b3452d17123631ec43d532b83dc182c1a638fed | https://gitlab.gnome.org/GNOME/libxml2/-/commit/ca2bfecea9c23f8d2e11741fff7c6a5372c56bb8 | null |
arvo:57202 | n132/arvo:57202-vul | /src/p11-kit | [
{
"end_line": 3421,
"function_name": "base_C_MessageSignFinal",
"start_line": 3412,
"target_file": "/src/p11-kit/p11-kit/virtual.c"
}
] | Global-buffer-overflow READ 8 | p11-kit | asan | =================================================================
==24471==ERROR: AddressSanitizer: global-buffer-overflow on address 0x00000098fa78 at pc 0x0000004e8c7c bp 0x7ffec7801ff0 sp 0x7ffec7801fe8
READ of size 8 at 0x00000098fa78 thread T0
SCARINESS: 23 (8-byte-read-global-buffer-overflow)
#0 0x4e8c7b in b... | c | cb531a61afc0e3c0f2174fa1bf026e993c76ea89 | https://github.com/p11-glue/p11-kit/commit/d7c318845405fa7ea33154082b437e4a87ee3699 | null |
arvo:57209 | n132/arvo:57209-vul | /src/arrow | [
{
"end_line": 692,
"function_name": "ValidateRunEndEncoded",
"start_line": 641,
"target_file": "/src/arrow/cpp/src/arrow/array/validate.cc"
}
] | UNKNOWN READ | arrow | ubsan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2049760309
INFO: Loaded 1 modules (352193 inline 8-bit counters): 352193 [0x169fca0, 0x16f5c61),
INFO: Loaded 1 PC tables (352193 PCs): 352193 [0x16f5c68,0x1c55878),
/out/arrow-ipc-file-fuzz: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
Undef... | cpp | 0ead719bdcc90bdeee4d225f7bb9dab1c458eccf | https://github.com/apache/arrow/commit/02bc24cd531ae7597dc5c93c85293870c57d8b73 | Sending a REE array with an invalid null buffer through IPC to the C++ implementation causes a crash if the array is validated in the Validate() function. |
arvo:57224 | n132/arvo:57224-vul | /src/libxml2 | [
{
"end_line": 3259,
"function_name": "htmlParseCharDataInternal",
"start_line": 3187,
"target_file": "/src/libxml2/HTMLparser.c"
}
] | Global-buffer-overflow READ 1 | libxml2 | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2002051291
INFO: Loaded 1 modules (52300 inline 8-bit counters): 52300 [0x87484c0, 0x875510c),
INFO: Loaded 1 PC tables (52300 PCs): 52300 [0x8639b3c,0x869fd9c),
/out/html: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
========================... | c | 9ef2a9abf357f747c2fb03841b7f479cc0dfd3ef | https://gitlab.gnome.org/GNOME/libxml2/-/commit/067986fa674f0811614dab4c4572f5f7ff483400 | null |
arvo:57288 | n132/arvo:57288-vul | /src/libxml2 | [
{
"end_line": 3170,
"function_name": "htmlParseScript",
"start_line": 3097,
"target_file": "/src/libxml2/HTMLparser.c"
}
] | Global-buffer-overflow READ 1 | libxml2 | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/html
=================================================================
==10548==ERROR: AddressSanitizer: global-buffer-overflow on address 0x000000852fa3 at pc 0x000000620822 bp 0x7ffce6d42250 sp 0x7ffce6d42248
READ of size 1 at 0x000000852... | c | 1a91392c62e40eaa920b8a406c659da3f1ccf2f5 | https://gitlab.gnome.org/GNOME/libxml2/-/commit/8090e5856465c0b8e26e2a080f4b498f37fa83ab | null |
arvo:57323 | n132/arvo:57323-vul | /src/arrow | [
{
"end_line": 700,
"function_name": "ValidateRunEndEncoded",
"start_line": 641,
"target_file": "/src/arrow/cpp/src/arrow/array/validate.cc"
}
] | Object-size | arrow | ubsan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1787789123
INFO: Loaded 1 modules (352253 inline 8-bit counters): 352253 [0x16a0d70, 0x16f6d6d),
INFO: Loaded 1 PC tables (352253 PCs): 352253 [0x16f6d70,0x1c56d40),
/out/arrow-ipc-stream-fuzz: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
/sr... | cpp | 509735ce7076d74e19217e5c4671566e3e4550a3 | https://github.com/apache/arrow/commit/0e5af04bc776a852c414bf39f82a77886538e474 | null |
arvo:57333 | n132/arvo:57333-vul | /src/libavc | [
{
"end_line": 854,
"function_name": "ih264e_encode",
"start_line": 203,
"target_file": "/src/libavc/encoder/ih264e_encode.c"
}
] | Use-of-uninitialized-value | libavc | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1155717500
INFO: Loaded 1 modules (7979 inline 8-bit counters): 7979 [0x805968, 0x807893),
INFO: Loaded 1 PC tables (7979 PCs): 7979 [0x78fb58,0x7aee08),
/out/avc_enc_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==3317==WARNING: Memor... | cpp | 9783b509ac174fb51e510548ba1953e3997f07ab | https://github.com/ittiam-systems/libavc/commit/ba34616a119952074bf32bbb8ae2b93e1d8500c2 | The s_inp_buf and s_out_buf structures on the stack in ih264e_encode() can be accessed uninitialized, leading to a security vulnerability due to the use of uninitialized memory. |
arvo:57369 | n132/arvo:57369-vul | /src/ndpi | [
{
"end_line": 1788,
"function_name": "ndpi_is_valid_vxlan",
"start_line": 1748,
"target_file": "/src/ndpi/example/reader_util.c"
}
] | Heap-buffer-overflow READ 1 | ndpi | asan | =================================================================
==12917==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6040000aec81 at pc 0x0000004f5c6f bp 0x7ffc1dca17b0 sp 0x7ffc1dca17a8
READ of size 1 at 0x6040000aec81 thread T0
SCARINESS: 12 (1-byte-read-heap-buffer-overflow)
#0 0x4f5c6e in ndpi_... | c | ddb9aa0f95ba263361b9be2ba0a122ea1e001be9 | https://github.com/ntop/nDPI/commit/04a426feef3399a2354b4aa10ee2a28cf107fb45 | A heap-buffer-overflow vulnerability exists in the VXLAN de-tunneling logic of ndpiReader. Specifically, the function ndpi_is_valid_vxlan in ndpi/example/reader_util.c can read out of bounds, leading to a 1-byte heap buffer overflow when processing certain packets. This issue is triggered during packet processing in nd... |
arvo:5740 | n132/arvo:5740-vul | /src/imagemagick | [
{
"end_line": 1151,
"function_name": "ParseGeometry",
"start_line": 839,
"target_file": "/src/imagemagick/MagickCore/geometry.c"
}
] | Use-of-uninitialized-value | imagemagick | msan | INFO: Seed: 2242967240
INFO: Loaded 1 modules (52467 inline 8-bit counters): 52467 [0x16d5f98, 0x16e2c8b),
INFO: Loaded 1 PC tables (52467 PCs): 52467 [0x133b090,0x1407fc0),
/out/encoder_miff_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==62778==WARNING: MemorySanitizer: use-of-uninitialized-value
... | cpp | 0017e695e6fa71744997e18056ed4e022e0133a8 | https://github.com/imagemagick/imagemagick/commit/40c374be9af667f4c284c038ec2a83489b29fb57 | A use-of-uninitialized-value vulnerability exists in the ParseGeometry() function. |
arvo:57410 | n132/arvo:57410-vul | /src/libxml2 | [
{
"end_line": 1048,
"function_name": "xmlDetectEBCDIC",
"start_line": 993,
"target_file": "/src/libxml2/parserInternals.c"
}
] | Use-of-uninitialized-value | libxml2 | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2471977415
INFO: Loaded 1 modules (52254 inline 8-bit counters): 52254 [0xcfba47, 0xd08665),
INFO: Loaded 1 PC tables (52254 PCs): 52254 [0xbc1830,0xc8da10),
/out/valid: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==10552==WARNING: MemorySan... | c | 7fbd454d9f70f0f0c0a0c27a7d541fed4d038c2a | https://gitlab.gnome.org/GNOME/libxml2/-/commit/3660229219c12d5a44f8539d25fb5c428480ce3f | A buffer overread occurs in the xmlDetectEBCDIC function in the parser, potentially leading to security issues. |
arvo:57426 | n132/arvo:57426-vul | /src/serenity | [
{
"end_line": 1172,
"function_name": "TextDescriptionTagData::from_bytes",
"start_line": 1032,
"target_file": "/src/serenity/Userland/Libraries/LibGfx/ICC/TagTypes.cpp"
}
] | Heap-buffer-overflow READ 1 | serenity | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1430027087
INFO: Loaded 1 modules (14795 inline 8-bit counters): 14795 [0x5956e0, 0x5990ab),
INFO: Loaded 1 PC tables (14795 PCs): 14795 [0x5990b0,0x5d2d60),
/out/FuzzICCProfile: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==================... | cpp | 4b995542c4f7ae8f2e71fdf01b346b734b8fcf3a | https://github.com/SerenityOS/serenity/commit/c1d7a51391839e77fce4b466026353acae74ba02 | A vulnerability exists in LibGfx/ICC where creating `TextDescriptionTagData` does not validate that the offsets used cannot overflow, which can lead to possible buffer overruns. |
arvo:57436 | n132/arvo:57436-vul | /src/libxslt | [
{
"end_line": 362,
"function_name": "xsltCompileAttr",
"start_line": 176,
"target_file": "/src/libxslt/libxslt/attrvt.c"
}
] | Use-of-uninitialized-value | libxslt | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3324577305
INFO: Loaded 1 modules (40224 inline 8-bit counters): 40224 [0xb3e517, 0xb48237),
INFO: Loaded 1 PC tables (40224 PCs): 40224 [0xa3f708,0xadc908),
/out/xslt: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==17783==WARNING: MemorySani... | c | f80ae929fa9e80d66d4c42108c6fb2456ce14b8b | https://gitlab.gnome.org/GNOME/libxslt.git075b6087785d7ba3dd6904f117ef9d0b9aa36a2b | A use-after-free vulnerability exists in the xsltCompileAttr function due to improper handling of memory allocation failures. |
arvo:57448 | n132/arvo:57448-vul | /src/ndpi | [
{
"end_line": 762,
"function_name": "processCertificateElements",
"start_line": 363,
"target_file": "/src/ndpi/src/lib/protocols/tls.c"
}
] | UNKNOWN WRITE | ndpi | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2994405051
INFO: Loaded 1 modules (18570 inline 8-bit counters): 18570 [0xae5640, 0xae9eca),
INFO: Loaded 1 PC tables (18570 PCs): 18570 [0xae9ed0,0xb32770),
/out/fuzz_tls_certificate: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
AddressSanit... | c | 9ea8a5783950d6697da9a771c62ccc7bec5e682b | https://github.com/ntop/nDPI/commit/6e0cd162254e54ee2ca349455f39786fe039b811 | null |
arvo:57521 | n132/arvo:57521-vul | /src/libxml2 | [
{
"end_line": 1252,
"function_name": "xmlSwitchInputEncoding",
"start_line": 1152,
"target_file": "/src/libxml2/parserInternals.c"
}
] | Use-of-uninitialized-value | libxml2 | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2669459328
INFO: Loaded 1 modules (52245 inline 8-bit counters): 52245 [0xcfba49, 0xd0865e),
INFO: Loaded 1 PC tables (52245 PCs): 52245 [0xbc1850,0xc8d9a0),
/out/html: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==10551==WARNING: MemorySani... | c | 1061537efdf3874c91fd50d18f98c4b8a3518e52 | https://gitlab.gnome.org/GNOME/libxml2/-/commit/0e42adce77a9c115402d7f24d8d3b0130f841ed1 | A vulnerability in the parser allows a buffer overread in htmlParseHTMLAttribute if switching encodings fails. The parser does not halt properly in this scenario, leading to potential security risks. |
arvo:57580 | n132/arvo:57580-vul | /src/arrow | [
{
"end_line": 700,
"function_name": "ValidateRunEndEncoded",
"start_line": 641,
"target_file": "/src/arrow/cpp/src/arrow/array/validate.cc"
}
] | UNKNOWN READ | arrow | ubsan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 756076147
INFO: Loaded 1 modules (352253 inline 8-bit counters): 352253 [0x16a0d70, 0x16f6d6d),
INFO: Loaded 1 PC tables (352253 PCs): 352253 [0x16f6d70,0x1c56d40),
/out/arrow-ipc-stream-fuzz: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
Unde... | cpp | 509735ce7076d74e19217e5c4671566e3e4550a3 | https://github.com/apache/arrow/commit/0e5af04bc776a852c414bf39f82a77886538e474 | null |
arvo:57586 | n132/arvo:57586-vul | /src/libredwg | [
{
"end_line": 2922,
"function_name": "bit_utf8_to_TU",
"start_line": 2840,
"target_file": "/src/libredwg/src/bits.c"
}
] | Heap-buffer-overflow READ 1 | libredwg | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2200824303
INFO: Loaded 1 modules (568451 inline 8-bit counters): 568451 [0x4a116e0, 0x4a9c363),
INFO: Loaded 1 PC tables (568451 PCs): 568451 [0x3ecc9c8,0x47791f8),
/out/llvmfuzz: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
================... | c | 5363f2eaaa83a7692652a019e475e9259ce49422 | https://github.com/LibreDWG/libredwg/commit/c1ed1d91e28a6ddc7a9b5479d4795d58fb6be0ca | null |
arvo:57587 | n132/arvo:57587-vul | /src/libredwg | [
{
"end_line": 2922,
"function_name": "bit_utf8_to_TU",
"start_line": 2840,
"target_file": "/src/libredwg/src/bits.c"
}
] | Heap-buffer-overflow WRITE 2 | libredwg | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3915339386
INFO: Loaded 1 modules (568451 inline 8-bit counters): 568451 [0x4a116e0, 0x4a9c363),
INFO: Loaded 1 PC tables (568451 PCs): 568451 [0x3ecc9c8,0x47791f8),
/out/llvmfuzz: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
================... | c | 5363f2eaaa83a7692652a019e475e9259ce49422 | https://github.com/LibreDWG/libredwg/commit/c1ed1d91e28a6ddc7a9b5479d4795d58fb6be0ca | null |
arvo:57589 | n132/arvo:57589-vul | /src/libredwg | [
{
"end_line": 2922,
"function_name": "bit_utf8_to_TU",
"start_line": 2840,
"target_file": "/src/libredwg/src/bits.c"
}
] | Heap-buffer-overflow READ 1 | libredwg | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3080183543
INFO: Loaded 1 modules (568451 inline 8-bit counters): 568451 [0x4a116e0, 0x4a9c363),
INFO: Loaded 1 PC tables (568451 PCs): 568451 [0x3ecc9c8,0x47791f8),
/out/llvmfuzz: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
================... | c | 5363f2eaaa83a7692652a019e475e9259ce49422 | https://github.com/LibreDWG/libredwg/commit/c1ed1d91e28a6ddc7a9b5479d4795d58fb6be0ca | null |
arvo:57656 | n132/arvo:57656-vul | /src/assimp | [
{
"end_line": 111,
"function_name": "DefaultIOSystem::Exists",
"start_line": 95,
"target_file": "/src/assimp/code/Common/DefaultIOSystem.cpp"
}
] | Heap-use-after-free READ 8 | assimp | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1596618807
INFO: Loaded 1 modules (246732 inline 8-bit counters): 246732 [0x2092020, 0x20ce3ec),
INFO: Loaded 1 PC tables (246732 PCs): 246732 [0x20ce3f0,0x24920b0),
/out/assimp_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
Info, T0: ... | cpp | e86f1acb9b11e317fe81124cbd38972da04f98d7 | https://github.com/assimp/assimp/commit/d03ab3ef276e4ee8fe4705100c3d1516eea338fc | null |
arvo:57672 | n132/arvo:57672-vul | /src/mruby | [
{
"end_line": 411,
"function_name": "mrb_env_unshare",
"start_line": 371,
"target_file": "/src/mruby/src/vm.c"
}
] | Heap-use-after-free READ 1 | mruby | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3394394283
INFO: Loaded 1 modules (23888 inline 8-bit counters): 23888 [0x96ea50, 0x9747a0),
INFO: Loaded 1 PC tables (23888 PCs): 23888 [0x83ad98,0x898298),
/out/mruby_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
line 87:18: warning:... | c | 9369679e3656760dd4b281ceed30949db5b1a612 | https://github.com/mruby/mruby/commit/93648fc954c0133acc6e89860ba49f78ca60460f | A write barrier bug exists in the mrb_env_unshare function in gc.c. |
arvo:57703 | n132/arvo:57703-vul | /src/mruby | [
{
"end_line": 1251,
"function_name": "clear_all_old",
"start_line": 1235,
"target_file": "/src/mruby/src/gc.c"
}
] | Heap-use-after-free READ 4 | mruby | asan | INFO: found LLVMFuzzerCustomMutator (0x56efb0). Disabling -len_control by default.
INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 565549257
INFO: Loaded 1 modules (28093 inline 8-bit counters): 28093 [0xbb83b8, 0xbbf175),
INFO: Loaded 1 PC tables (28093 PCs): 28093 [0xa14308,0xa81ed8),
/out/mru... | cpp | 0bb08718b8cab3d6c63d5762ab2dca5417ddf17c | https://github.com/mruby/mruby/commit/b47c8b738ae3e400ec02269fae9857222218e9d5 | null |
arvo:57745 | n132/arvo:57745-vul | /src/ghostpdl | [
{
"end_line": 642,
"function_name": "pdfi_set_blackgeneration",
"start_line": 582,
"target_file": "/src/ghostpdl/pdf/pdf_gstate.c"
}
] | Stack-buffer-overflow WRITE 4 | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3301931342
INFO: Loaded 3 modules (188117 inline 8-bit counters): 13708 [0x7f66d9ed89e0, 0x7f66d9edbf6c), 959 [0x7f66d9f39a40, 0x7f66d9f39dff), 173450 [0x3191d60, 0x31bc2ea),
INFO: Loaded 3 PC tables (188117 PCs): 13708 [0x7f66d9edbf70,0x7f66d9f1183... | cpp | 64175a080a39883a0c2ad1850eb4c9a36a54a319 | https://github.com/ArtifexSoftware/ghostpdl/commit/7eced55b5700c0d2aa2e102ed78f10b0ce755a64 | null |
arvo:57880 | n132/arvo:57880-vul | /src/ghostpdl | [
{
"end_line": 2870,
"function_name": "pdfi_read_cff_font",
"start_line": 2234,
"target_file": "/src/ghostpdl/pdf/pdf_font1C.c"
}
] | UNKNOWN READ | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2836678821
INFO: Loaded 3 modules (225693 inline 8-bit counters): 13708 [0x7f4a8a6609e0, 0x7f4a8a663f6c), 959 [0x7f4a8a6c1a40, 0x7f4a8a6c1dff), 211026 [0x383a2f0, 0x386db42),
INFO: Loaded 3 PC tables (225693 PCs): 13708 [0x7f4a8a663f70,0x7f4a8a69983... | cpp | 91943811904f562b101b0ac410da60974b4186f2 | https://github.com/ArtifexSoftware/ghostpdl/commit/acaa21f68ede3ae8fca48136fa95ee32de6533b2 | A vulnerability exists in GhostPDF where checking the size of a table can result in a 32-bit integer overflow. Specifically, the variable toffs can be set to a value near 2^32-1, and when a valid tlen is added, the sum overflows a 32-bit value. This allows the check intended to ensure the table is entirely contained wi... |
arvo:58108 | n132/arvo:58108-vul | /src/mosquitto | [
{
"end_line": 241,
"function_name": "dynsec_clients__config_load",
"start_line": 108,
"target_file": "/src/mosquitto/plugins/dynamic-security/clients.c"
}
] | Heap-use-after-free READ 8 | mosquitto | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1989019729
INFO: Loaded 1 modules (12937 inline 8-bit counters): 12937 [0x752d78, 0x756001),
INFO: Loaded 1 PC tables (12937 PCs): 12937 [0x756008,0x788898),
/out/dynsec_fuzz_load: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
================... | cpp | 3c6ad454895f7a07082d44c1241ed3c89c8eaf08 | https://github.com/eclipse/mosquitto/commit/56462c122925f716865827cc5505f671c2933aca | null |
arvo:5820 | n132/arvo:5820-vul | /src/imagemagick | [
{
"end_line": 1151,
"function_name": "ParseGeometry",
"start_line": 839,
"target_file": "/src/imagemagick/MagickCore/geometry.c"
}
] | Use-of-uninitialized-value | imagemagick | msan | INFO: Seed: 129821402
INFO: Loaded 1 modules (52581 inline 8-bit counters): 52581 [0x16ddfb8, 0x16ead1d),
INFO: Loaded 1 PC tables (52581 PCs): 52581 [0x1341690,0x140ece0),
/out/encoder_pattern_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==62790==WARNING: MemorySanitizer: use-of-uninitialized-value
... | cpp | 9a2799300860f0f690f28433288ff9397539f20a | https://github.com/imagemagick/imagemagick/commit/be70cc9701a19290cb3eaa3fe9f57d192ad4136c | null |
arvo:58278 | n132/arvo:58278-vul | /src/libavc | [
{
"end_line": 489,
"function_name": "isvcd_mv_pred_ref_tfr_nby2_epmb",
"start_line": 179,
"target_file": "/src/libavc/decoder/svc/isvcd_process_epslice.c"
}
] | Heap-use-after-free READ 16 | libavc | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 541099929
INFO: Loaded 1 modules (16671 inline 8-bit counters): 16671 [0x8a1fd0, 0x8a60ef),
INFO: Loaded 1 PC tables (16671 PCs): 16671 [0x804fa8,0x846198),
/out/svc_dec_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
===================... | cpp | f8ae418b38e8ac52cf87425d27cb20925607debc | https://github.com/ittiam-systems/libavc/commit/84f955dd77e42ffb57cb05a869cb8c8bf68f1e13 | An out of range reference index occurs during base mode flag processing in svcdec. |
arvo:58291 | n132/arvo:58291-vul | /src/libssh2 | [
{
"end_line": 618,
"function_name": "packet_authagent_open",
"start_line": 460,
"target_file": "/src/libssh2/src/packet.c"
}
] | Heap-buffer-overflow READ 1 | libssh2 | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1179313593
INFO: Loaded 1 modules (4084 inline 8-bit counters): 4084 [0x6d04f0, 0x6d14e4),
INFO: Loaded 1 PC tables (4084 PCs): 4084 [0x66ce30,0x67cd70),
/out/ssh2_client_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==================... | cpp | a790d3784eca821aeaee0b5db54cbf037780676f | https://github.com/libssh2/libssh2/commit/88a960a86b9ffbabd17a4bbcf767e26514c4678e | null |
arvo:58295 | n132/arvo:58295-vul | /src/cpython3 | [
{
"end_line": 2498,
"function_name": "tok_get_normal_mode",
"start_line": 1633,
"target_file": "/src/cpython3/Parser/tokenizer.c"
}
] | Heap-buffer-overflow WRITE 1 | cpython3 | asan | Running LLVMFuzzerInitialize ...
continue...
=================================================================
==27956==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x62a00000b1f4 at pc 0x000000dad564 bp 0x7ffd8c738650 sp 0x7ffd8c738648
WRITE of size 1 at 0x62a00000b1f4 thread T0
SCARINESS: 31 (1-byte-write... | cpp | 2d526cd32fe8b286aae38956648e508070729f8f | https://github.com/python/cpython/commit/5078eedc5b18f0d208af6e30f60b33419132d1b6 | An off by 1 error exists in the f string tokenizer, which can lead to incorrect parsing of f-strings. |
arvo:58364 | n132/arvo:58364-vul | /src/faad2 | [
{
"end_line": 386,
"function_name": "decode_sce_lfe",
"start_line": 325,
"target_file": "/src/faad2/libfaad/syntax.c"
}
] | Index-out-of-bounds | faad2 | ubsan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2897332323
INFO: Loaded 1 modules (5298 inline 8-bit counters): 5298 [0x5979e0, 0x598e92),
INFO: Loaded 1 PC tables (5298 PCs): 5298 [0x544e40,0x559960),
/out/fuzz_decode: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
syntax.c:372:13: runtime ... | c | c4fb9abbba38e6d5a9c8c5f8fc998dc0324ad0d1 | https://github.com/knik0/faad2/commit/135b37882f57a4883851ccb5be9363795f10fb9b | An "Index-out-of-bounds" vulnerability exists where, in some cases, the result of the `program_config_element` function is ignored in accordance with 14496-4: 5.6.4.1.2.1.3, which states that program_configuration_element()'s in access units shall be ignored. The only check in that method ensures that the number of cha... |
arvo:5843 | n132/arvo:5843-vul | /src/librawspeed | [
{
"end_line": 142,
"function_name": "RawDecoder::decodeUncompressed",
"start_line": 57,
"target_file": "/src/librawspeed/src/librawspeed/decoders/RawDecoder.cpp"
}
] | Use-of-uninitialized-value | librawspeed | msan | INFO: Seed: 2919482628
INFO: Loaded 1 modules (12104 inline 8-bit counters): 12104 [0xc83e20, 0xc86d68),
INFO: Loaded 1 PC tables (12104 PCs): 12104 [0xc86d68,0xcb61e8),
/out/TiffDecoderFuzzer-PefDecoder: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
Uninitialized bytes in __msan_check_mem_is_initialized at of... | cpp | 6075628a141c7081fb528082d7296bdcec490bab | https://github.com/darktable-org/rawspeed/commit/e542162d9a96ad3bc7c05abace119cbbf2b184bc | The vulnerability exists in PefDecoder within the RawDecoder::decodeUncompressed() function, where exceptions are caught, potentially allowing security issues to go unnoticed. |
arvo:58452 | n132/arvo:58452-vul | /src/faad2 | [
{
"end_line": 691,
"function_name": "quant_to_spec",
"start_line": 553,
"target_file": "/src/faad2/libfaad/specrec.c"
}
] | Use-of-uninitialized-value | faad2 | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3094171661
INFO: Loaded 1 modules (4738 inline 8-bit counters): 4738 [0x6b9446, 0x6ba6c8),
INFO: Loaded 1 PC tables (4738 PCs): 4738 [0x660230,0x672a50),
/out/fuzz_decode: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==9615==WARNING: MemorySa... | c | d59ee831e1ef2412a9f4f4aae7fe51575a436ebb | https://github.com/knik0/faad2/commit/d7aa650f3c04aa344ab236d784394c8f6d8d59ee | A use-of-uninitialized-value vulnerability exists in the function lt_update_state, where in some cases the variables spec1 and spec2 are only transformed but never filled. This can lead to undefined behavior, especially when handling streams with num_swb == 0, as there is not enough evidence to reject such streams. |
arvo:58479 | n132/arvo:58479-vul | /src/assimp | [
{
"end_line": 313,
"function_name": "MDLImporter::SizeCheck",
"start_line": 291,
"target_file": "/src/assimp/code/AssetLib/MDL/MDLLoader.cpp"
}
] | UNKNOWN READ | assimp | ubsan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2048142404
INFO: Loaded 1 modules (263682 inline 8-bit counters): 263682 [0x18f5140, 0x1935742),
INFO: Loaded 1 PC tables (263682 PCs): 263682 [0x1935748,0x1d3b768),
/out/assimp_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
Info, T0: ... | cpp | aa5b41446c446bdf2150094f530e50d9091e79be | https://github.com/assimp/assimp/commit/df9c5cdb9f69e88354a78ca1a4667508c1a2a275 | A vulnerability exists in Assimp::MDLImporter::InternReadFile_Quake1 that allows an unknown read, potentially leading to undefined behavior or security issues. |
arvo:58502 | n132/arvo:58502-vul | /src/hdf5 | [
{
"end_line": 1560,
"function_name": "H5O__chunk_deserialize",
"start_line": 1199,
"target_file": "/src/hdf5/src/H5Ocache.c"
}
] | Heap-buffer-overflow READ {*} | hdf5 | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2870204512
INFO: Loaded 1 modules (79474 inline 8-bit counters): 79474 [0x11ba440, 0x11cdab2),
INFO: Loaded 1 PC tables (79474 PCs): 79474 [0x11cdab8,0x13041d8),
/out/h5_extended_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==========... | c | a0340338e53d4b34127a7e5356b28b1640f9414c | https://github.com/HDFGroup/hdf5/commit/07e94155a7d456d663fe19a38851556117b5e315 | null |
arvo:58577 | n132/arvo:58577-vul | /src/mruby | [
{
"end_line": 1251,
"function_name": "clear_all_old",
"start_line": 1235,
"target_file": "/src/mruby/src/gc.c"
}
] | Heap-use-after-free READ 4 | mruby | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2548017922
INFO: Loaded 1 modules (23888 inline 8-bit counters): 23888 [0x96ea50, 0x9747a0),
INFO: Loaded 1 PC tables (23888 PCs): 23888 [0x83ad98,0x898298),
/out/mruby_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
to_f
!
succ!
strip
t... | c | 0bb08718b8cab3d6c63d5762ab2dca5417ddf17c | https://github.com/mruby/mruby/commit/b47c8b738ae3e400ec02269fae9857222218e9d5 | null |
arvo:58660 | n132/arvo:58660-vul | /src/harfbuzz | [
{
"end_line": 1060,
"function_name": "hb_subset_plan_t::hb_subset_plan_t",
"start_line": 949,
"target_file": "/src/harfbuzz/src/hb-subset-plan.cc"
}
] | UNKNOWN WRITE | harfbuzz | asan | AddressSanitizer:DEADLYSIGNAL
=================================================================
==851==ERROR: AddressSanitizer: SEGV on unknown address 0x62180000517f (pc 0x000000d8ff24 bp 0x7ffcbaa2dee0 sp 0x7ffcbaa2dca0 T0)
==851==The signal is caused by a WRITE memory access.
SCARINESS: 30 (wild-addr-write)
#0 0... | cpp | 5f5660fc5d80a0ce84066206e8e9bad6e20a24d4 | https://github.com/harfbuzz/harfbuzz/commit/cda646a598207642721b753ef5abcebb2525f61b | null |
arvo:58663 | n132/arvo:58663-vul | /src/harfbuzz | [
{
"end_line": 1060,
"function_name": "hb_subset_plan_t::hb_subset_plan_t",
"start_line": 949,
"target_file": "/src/harfbuzz/src/hb-subset-plan.cc"
}
] | UNKNOWN WRITE | harfbuzz | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3508568606
INFO: Loaded 1 modules (94904 inline 8-bit counters): 94904 [0xebad70, 0xed2028),
INFO: Loaded 1 PC tables (94904 PCs): 94904 [0xed2028,0x1044ba8),
/out/hb-subset-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
AddressSanitize... | cpp | 5f5660fc5d80a0ce84066206e8e9bad6e20a24d4 | https://github.com/harfbuzz/harfbuzz/commit/cda646a598207642721b753ef5abcebb2525f61b | null |
arvo:58671 | n132/arvo:58671-vul | /src/harfbuzz | [
{
"end_line": 1060,
"function_name": "hb_subset_plan_t::hb_subset_plan_t",
"start_line": 949,
"target_file": "/src/harfbuzz/src/hb-subset-plan.cc"
}
] | UNKNOWN WRITE | harfbuzz | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 4220592216
INFO: Loaded 1 modules (94904 inline 8-bit counters): 94904 [0xebad70, 0xed2028),
INFO: Loaded 1 PC tables (94904 PCs): 94904 [0xed2028,0x1044ba8),
/out/hb-subset-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
AddressSanitize... | cpp | 5f5660fc5d80a0ce84066206e8e9bad6e20a24d4 | https://github.com/harfbuzz/harfbuzz/commit/cda646a598207642721b753ef5abcebb2525f61b | null |
arvo:58723 | n132/arvo:58723-vul | /src/mruby | [
{
"end_line": 1251,
"function_name": "clear_all_old",
"start_line": 1235,
"target_file": "/src/mruby/src/gc.c"
}
] | Heap-use-after-free READ 1 | mruby | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 47706760
INFO: Loaded 1 modules (23888 inline 8-bit counters): 23888 [0x96ea50, 0x9747a0),
INFO: Loaded 1 PC tables (23888 PCs): 23888 [0x83ad98,0x898298),
/out/mruby_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
[:"(", :"$", :";", :"=... | c | 0bb08718b8cab3d6c63d5762ab2dca5417ddf17c | https://github.com/mruby/mruby/commit/b47c8b738ae3e400ec02269fae9857222218e9d5 | null |
arvo:5873 | n132/arvo:5873-vul | /src/bloaty | [
{
"end_line": 98,
"function_name": "DisassembleFindReferences",
"start_line": 48,
"target_file": "/src/bloaty/src/disassemble.cc"
}
] | Heap-buffer-overflow READ 4 | bloaty | asan | INFO: Seed: 1554002161
INFO: Loaded 1 modules (86342 inline 8-bit counters): 86342 [0x169f410, 0x16b4556),
INFO: Loaded 1 PC tables (86342 PCs): 86342 [0x11acdb0,0x12fe210),
/out/fuzz_target: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==621==... | cpp | a950a61921c3aaaf31e27fad1727a1ddf528df1e | https://github.com/google/bloaty/commit/18384d6c6cbb666d08d08c0dabc4a0d1b7623f6f | null |
arvo:58779 | n132/arvo:58779-vul | /src/glog | [
{
"end_line": 625,
"function_name": "ParseNumber",
"start_line": 589,
"target_file": "/src/glog/src/demangle.cc"
}
] | UNKNOWN READ | glog | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3379225824
INFO: Loaded 1 modules (1149 inline 8-bit counters): 1149 [0x6b3a38, 0x6b3eb5),
INFO: Loaded 1 PC tables (1149 PCs): 1149 [0x6b3eb8,0x6b8688),
/out/fuzz_demangle: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
AddressSanitizer:DEADLY... | cpp | 27bf2b2fd396dae160b0449224bc227eb3edbc31 | https://github.com/google/glog/commit/7ba2f7bc02cdbab9314f3804c698ec78e20c441e | null |
arvo:5878 | n132/arvo:5878-vul | /src/openthread | [
{
"end_line": 586,
"function_name": "Leader::RlocLookup",
"start_line": 433,
"target_file": "/src/openthread/src/core/thread/network_data_leader_ftd.cpp"
}
] | Stack-buffer-overflow READ 2 | openthread | asan | INFO: Seed: 3453912439
INFO: Loaded 1 modules (12488 inline 8-bit counters): 12488 [0xa1a9f0, 0xa1dab8),
INFO: Loaded 1 PC tables (12488 PCs): 12488 [0x763370,0x793ff0),
/out/ip6-send-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==15914... | cpp | d0c983f0a4c845cfbbf2808b4e2f7b8a1433af41 | https://github.com/openthread/openthread/commit/9ec07205cc17c2de80b06a8b1e181abde4fdbb1e | null |
arvo:58832 | n132/arvo:58832-vul | /src/wireshark | [
{
"end_line": 995,
"function_name": "dissect_le_credit_based_connrequest",
"start_line": 817,
"target_file": "/src/wireshark/epan/dissectors/packet-btl2cap.c"
}
] | UNKNOWN READ | wireshark | asan | oss-fuzzshark: disabling: ip
oss-fuzzshark: disabling: udplite
oss-fuzzshark: disabling: ospf
oss-fuzzshark: disabling: bgp
oss-fuzzshark: disabling: dhcp
oss-fuzzshark: disabling: json
oss-fuzzshark: disabling: snort
oss-fuzzshark: configured for dissector: udp in table: ip.proto
INFO: Running with entropic power sche... | c | 1b243050c33e7077f7faf5fd56eb26ecdbb19704 | https://github.com/wireshark/wireshark/commit/ba1084daac619e9f342c9b27fa40650fb6ea0c09 | A crash occurs in epan/dissectors/packet-btl2cap.c at line 2929 due to keys added to wmem_tree not having exactly the same length. |
arvo:58932 | n132/arvo:58932-vul | /src/opensc | [
{
"end_line": 81,
"function_name": "cflex_delete_file",
"start_line": 51,
"target_file": "/src/opensc/src/pkcs15init/pkcs15-cflex.c"
}
] | Stack-buffer-overflow READ 1 | opensc | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/fuzz_pkcs15init
=================================================================
==42091==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7fc42912d160 at pc 0x00000054b4fa bp 0x7ffc25874960 sp 0x7ffc25874958
READ of size 1 at 0... | c | 6226a625c35923a911d26eacb2b904901bfe24ce | https://github.com/OpenSC/OpenSC/commit/c449a181a6988cc1e8dc8764d23574e48cdc3fa6 | A vulnerability exists in pkcs15-cflex where the path length is not checked, which can lead to an underflow. |
arvo:59056 | n132/arvo:59056-vul | /src/assimp | [
{
"end_line": 220,
"function_name": "Scope::Scope",
"start_line": 179,
"target_file": "/src/assimp/code/AssetLib/FBX/FBXParser.cpp"
}
] | Invalid-free | assimp | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2856227050
INFO: Loaded 1 modules (243524 inline 8-bit counters): 243524 [0x20856f0, 0x20c0e34),
INFO: Loaded 1 PC tables (243524 PCs): 243524 [0x20c0e38,0x2478278),
/out/assimp_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
Info, T0: ... | cpp | 3a02de4d280d282b31d0a05e54b7ed9b4014a476 | https://github.com/assimp/assimp/commit/5c45cdc0adb50e3b169cada0ea5ce0126d04184a | An invalid-free vulnerability exists in Assimp::FBX::Scope::Scope. |
arvo:59072 | n132/arvo:59072-vul | /src/php-src | [
{
"end_line": 2087,
"function_name": "concat_function",
"start_line": 1940,
"target_file": "/src/php-src/Zend/zend_operators.c"
}
] | Heap-use-after-free READ 4 | php-src | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1756986809
INFO: Loaded 1 modules (147388 inline 8-bit counters): 147388 [0x1b66120, 0x1b8a0dc),
INFO: Loaded 1 PC tables (147388 PCs): 147388 [0x1b8a0e0,0x1dc9ca0),
/out/php-fuzz-execute: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
========... | cpp | 5c741644d177d521e35168c63891cb43e018f65b | https://github.com/php/php-src/commit/7790ee8736a316f037c18c436d7d2d7a1118abaf | A use-after-free vulnerability exists in concat_function, which occurs when an out-of-memory error is triggered. |
arvo:59148 | n132/arvo:59148-vul | /src/binutils-gdb | [
{
"end_line": 1471,
"function_name": "_bfd_stab_section_find_nearest_line",
"start_line": 944,
"target_file": "/src/binutils-gdb/bfd/syms.c"
}
] | Heap-buffer-overflow READ 1 | binutils-gdb | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/fuzz_addr2line
BFD: /tmp/libfuzzer.83761: unrecognized storage class 32 for *UND* symbol ` '
BFD: /tmp/libfuzzer.83761: warning: line number table read failed
/tmp/libfuzzer.83761: /tmp/libfuzzer.83761: file truncated
??:0
??:0
=====... | cpp | cb3f0ff4795381fb19e128a85e258149ebed9cd6 | https://github.com/bminor/binutils-gdb/commit/0bbd2b1ad0426aee86445cd7f0c86667624da7ca | A vulnerability exists in syms.c within the _bfd_stab_section_find_nearest_line function, where the reloc address sanity check calculation can overflow due to an incomplete fix. The stabsize variable is a non-zero multiple of 12, so stabsize - 4 cannot underflow. This issue can lead to segmentation faults. |
arvo:59167 | n132/arvo:59167-vul | /src/wireshark | [
{
"end_line": 1094,
"function_name": "fragment_reassembled_single",
"start_line": 1063,
"target_file": "/src/wireshark/epan/reassemble.c"
}
] | Heap-use-after-free READ 6 | wireshark | asan | oss-fuzzshark: disabling: ip
oss-fuzzshark: disabling: udplite
oss-fuzzshark: disabling: ospf
oss-fuzzshark: disabling: bgp
oss-fuzzshark: disabling: dhcp
oss-fuzzshark: disabling: json
oss-fuzzshark: disabling: snort
oss-fuzzshark: configured for dissector: udp in table: ip.proto
INFO: Running with entropic power sche... | cpp | 512557a3284354c188b43feeb044161fc9e9ba8f | https://github.com/wireshark/wireshark/commit/285a4cb39eb3d066103ba4a8976ca46b2ea41bc2 | null |
arvo:59173 | n132/arvo:59173-vul | /src/wireshark | [
{
"end_line": 1094,
"function_name": "fragment_reassembled_single",
"start_line": 1063,
"target_file": "/src/wireshark/epan/reassemble.c"
}
] | Heap-use-after-free READ 6 | wireshark | asan | oss-fuzzshark: disabling: udp
oss-fuzzshark: disabling: udplite
oss-fuzzshark: disabling: ospf
oss-fuzzshark: disabling: bgp
oss-fuzzshark: disabling: dhcp
oss-fuzzshark: disabling: json
oss-fuzzshark: disabling: snort
oss-fuzzshark: configured for dissector: ip
INFO: Running with entropic power schedule (0xFF, 100).
I... | cpp | 512557a3284354c188b43feeb044161fc9e9ba8f | https://github.com/wireshark/wireshark/commit/285a4cb39eb3d066103ba4a8976ca46b2ea41bc2 | null |
arvo:5935 | n132/arvo:5935-vul | /src/openthread | [
{
"end_line": 888,
"function_name": "Leader::AddService",
"start_line": 859,
"target_file": "/src/openthread/src/core/thread/network_data_leader_ftd.cpp"
}
] | Stack-buffer-overflow READ 1 | openthread | asan | INFO: Seed: 2459268482
INFO: Loaded 1 modules (12490 inline 8-bit counters): 12490 [0xa1a9f0, 0xa1daba),
INFO: Loaded 1 PC tables (12490 PCs): 12490 [0x7633b0,0x794050),
/out/ip6-send-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==15972... | cpp | cc8579fb3f99130f2ce2b1aaf5c1821218b821c0 | https://github.com/openthread/openthread/commit/56bf6a79f773419d21e0426915c7b3a3951d1bdf | null |
arvo:59390 | n132/arvo:59390-vul | /src/mupdf | [
{
"end_line": 1347,
"function_name": "fz_load_bmp_subimage_count",
"start_line": 1306,
"target_file": "/src/mupdf/source/fitz/load-bmp.c"
}
] | Use-of-uninitialized-value | mupdf | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1688678494
INFO: Loaded 1 modules (160615 inline 8-bit counters): 160615 [0x4268ac1, 0x428fe28),
INFO: Loaded 1 PC tables (160615 PCs): 160615 [0x1f2cde0,0x21a0450),
/out/pdf_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==910==WARNING... | cpp | 57f42f35b5366a5bfa653550f511a1d0a4ba5567 | https://github.com/ArtifexSoftware/mupdf/commit/3f3de914a38ef440cf99c4b0c6f0f043c5fdffbe | A vulnerability exists in the BMP array header parsing code where the remaining data size is not checked before parsing in the relevant function. This can lead to out-of-bounds reads or crashes when handling malformed BMP files. |
arvo:59428 | n132/arvo:59428-vul | /src/libredwg | [
{
"end_line": 12130,
"function_name": "dxf_blocks_read",
"start_line": 11944,
"target_file": "/src/libredwg/src/in_dxf.c"
}
] | Heap-double-free | libredwg | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1866503614
INFO: Loaded 1 modules (646709 inline 8-bit counters): 646709 [0x529efa0, 0x533cdd5),
INFO: Loaded 1 PC tables (646709 PCs): 646709 [0x4615c58,0x4ff3fa8),
/out/llvmfuzz: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
================... | c | 3a37ad736c87393c9f88396f03f0ba69a54fcf9b | https://github.com/LibreDWG/libredwg/commit/b031cfed70f6a9578326cc6b4a07d173eeb1d30d | A double-free vulnerability exists in indxf when handling INVALIDDWG cases. If dxfname is allocated and an import error occurs later, the memory may be freed twice. |
arvo:59438 | n132/arvo:59438-vul | /src/file | [
{
"end_line": 145,
"function_name": "simh_parse",
"start_line": 109,
"target_file": "/src/file/src/is_simh.c"
}
] | Use-after-poison READ 4 | file | asan | Running LLVMFuzzerInitialize ...
continue...
=================================================================
==10957==ERROR: AddressSanitizer: use-after-poison on address 0x7f06884e8803 at pc 0x000000524e3f bp 0x7ffcb9666420 sp 0x7ffcb9666418
READ of size 4 at 0x7f06884e8803 thread T0
SCARINESS: 27 (4-byte-read-use-a... | cpp | 010240c20874aa8bebff72645893d64d95de439c | https://github.com/file/file/commit/c7eddddfd5d99821ea52e52e24468b43282c8f90 | null |
arvo:59457 | n132/arvo:59457-vul | /src/openexr | [
{
"end_line": 754,
"function_name": "LossyDctDecoder_execute",
"start_line": 218,
"target_file": "/src/openexr/src/lib/OpenEXRCore/internal_dwa_decoder.h"
}
] | Heap-buffer-overflow READ 2 | openexr | asan | =================================================================
==1502==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x606000000120 at pc 0x000000969718 bp 0x7fffe8e82bd0 sp 0x7fffe8e82bc8
READ of size 2 at 0x606000000120 thread T0
SCARINESS: 14 (2-byte-read-heap-buffer-overflow)
#0 0x969717 in LossyD... | cpp | 83c57cb4b99e7755dce10262bbb584077a93c2e4 | https://github.com/AcademySoftwareFoundation/openexr/commit/54dd0411dd9670cc9ff0daf54d19ad277524a7b9 | A corrupt number of DC components stored in the dwa subheader causes a cascade of errors, resulting in out of bounds access. The vulnerability arises from not properly tracking how many DC components have been read and failing to detect when the count is exceeded. |
arvo:59532 | n132/arvo:59532-vul | /src/lldpd | [
{
"end_line": 1339,
"function_name": "lldp_decode",
"start_line": 593,
"target_file": "/src/lldpd/src/daemon/protocols/lldp.c"
}
] | Use-of-uninitialized-value | lldpd | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3360325583
INFO: Loaded 1 modules (7662 inline 8-bit counters): 7662 [0x55cd77d74529, 0x55cd77d76317),
INFO: Loaded 1 PC tables (7662 PCs): 7662 [0x55cd77d76318,0x55cd77d941f8),
/out/fuzz_lldp: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==2... | c | 5cf30bef31fc4ece2dc687f6945750d05cebf74e | https://github.com/lldpd/lldpd/commit/83f0eddcfb7fb1d0a825136e3929f8847cd85a62 | null |
arvo:59543 | n132/arvo:59543-vul | /src/libavc | [
{
"end_line": 2650,
"function_name": "ih264e_process_thread",
"start_line": 2520,
"target_file": "/src/libavc/encoder/ih264e_process.c"
}
] | UNKNOWN READ | libavc | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2598502393
INFO: Loaded 1 modules (8016 inline 8-bit counters): 8016 [0x76fc00, 0x771b50),
INFO: Loaded 1 PC tables (8016 PCs): 8016 [0x6f7520,0x716a20),
/out/avc_enc_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
AddressSanitizer:DEADL... | cpp | a75597f2402949d941bdabfd3c52ee8dee4b6a4d | https://github.com/ittiam-systems/libavc/commit/30858f49ad57b9a888e6768b0ae1558e5f895176 | A vulnerability exists in libavcenc where, if entropy encoding encounters an error, the rate control (rc) module updates and resets the bitstream context at the end of each row. When rc decides to skip a frame due to vbv overflow, the context is reset and the frame is marked for skip. However, other threads remain unaw... |
arvo:59631 | n132/arvo:59631-vul | /src/PcapPlusPlus | [
{
"end_line": 118,
"function_name": "assign",
"start_line": 115,
"target_file": "/src/PcapPlusPlus/Packet++/header/NflogLayer.h"
}
] | UNKNOWN READ | PcapPlusPlus | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2962954187
INFO: Loaded 1 modules (27421 inline 8-bit counters): 27421 [0xc0f888, 0xc163a5),
INFO: Loaded 1 PC tables (27421 PCs): 27421 [0xc163a8,0xc81578),
/out/FuzzTarget: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
MemorySanitizer:DEADLY... | cpp | 843765f594a3d0c494c2c64e5c2b786f02122ccc | https://github.com/seladb/PcapPlusPlus/commit/6986e81f6fa441a56c4effe2bf2f177ca892255e | null |
arvo:59650 | n132/arvo:59650-vul | /src/PcapPlusPlus | [
{
"end_line": 304,
"function_name": "getNextTLVRecord",
"start_line": 284,
"target_file": "/src/PcapPlusPlus/Packet++/header/TLVData.h"
}
] | Heap-buffer-overflow READ 4 | PcapPlusPlus | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1477831293
INFO: Loaded 1 modules (35878 inline 8-bit counters): 35878 [0xab28e8, 0xabb50e),
INFO: Loaded 1 PC tables (35878 PCs): 35878 [0xabb510,0xb47770),
/out/FuzzTarget: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
======================... | cpp | 59bb2d12ec7e0b90b6fc4746da0a44f4dc64825b | https://github.com/seladb/PcapPlusPlus/commit/0725fa175ab2a7cb78a6c48d3b4d113eb7221810 | A heap-buffer-overflow (read) vulnerability exists in the TcpLayer::isDataValid function. |
arvo:59701 | n132/arvo:59701-vul | /src/libxml2 | [
{
"end_line": 577,
"function_name": "xmlParserGrow",
"start_line": 536,
"target_file": "/src/libxml2/parserInternals.c"
}
] | Global-buffer-overflow READ 1 | libxml2 | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3545818354
INFO: Loaded 1 modules (51774 inline 8-bit counters): 51774 [0x873c510, 0x8748f4e),
INFO: Loaded 1 PC tables (51774 PCs): 51774 [0x862e41c,0x869360c),
/out/xml: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=========================... | c | 20f5c73457df065df21bf25aa081a0a4cd028046 | https://gitlab.gnome.org/GNOME/libxml2/-/commit/b236b7a588ac2973a057ec578011cdc17c26f16d | null |
arvo:59706 | n132/arvo:59706-vul | /src/libxml2 | [
{
"end_line": 577,
"function_name": "xmlParserGrow",
"start_line": 536,
"target_file": "/src/libxml2/parserInternals.c"
}
] | Global-buffer-overflow READ {*} | libxml2 | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/xslt
=================================================================
==18177==ERROR: AddressSanitizer: global-buffer-overflow on address 0x00000077c560 at pc 0x00000049efc1 bp 0x7ffc1428f140 sp 0x7ffc1428e910
READ of size 3467 at 0x000000... | c | 20f5c73457df065df21bf25aa081a0a4cd028046 | https://gitlab.gnome.org/GNOME/libxml2/-/commit/b236b7a588ac2973a057ec578011cdc17c26f16d | null |
arvo:59718 | n132/arvo:59718-vul | /src/libxml2 | [
{
"end_line": 577,
"function_name": "xmlParserGrow",
"start_line": 536,
"target_file": "/src/libxml2/parserInternals.c"
}
] | Global-buffer-overflow READ 1 | libxml2 | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1789841797
INFO: Loaded 1 modules (51765 inline 8-bit counters): 51765 [0x873c520, 0x8748f55),
INFO: Loaded 1 PC tables (51765 PCs): 51765 [0x862e43c,0x86935e4),
/out/html: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
========================... | c | 20f5c73457df065df21bf25aa081a0a4cd028046 | https://gitlab.gnome.org/GNOME/libxml2/-/commit/b236b7a588ac2973a057ec578011cdc17c26f16d | null |
arvo:59809 | n132/arvo:59809-vul | /src/PcapPlusPlus | [
{
"end_line": 273,
"function_name": "getFirstTLVRecord",
"start_line": 260,
"target_file": "/src/PcapPlusPlus/Packet++/header/TLVData.h"
}
] | UNKNOWN READ | PcapPlusPlus | ubsan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 795403120
INFO: Loaded 1 modules (43903 inline 8-bit counters): 43903 [0x908f88, 0x913b07),
INFO: Loaded 1 PC tables (43903 PCs): 43903 [0x913b08,0x9bf2f8),
/out/FuzzTarget: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
UndefinedBehaviorSaniti... | cpp | 65974d73c33aaede1bf3c18a353ea2209d1912a0 | https://github.com/seladb/PcapPlusPlus/commit/59bb2d12ec7e0b90b6fc4746da0a44f4dc64825b | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.