idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
520,816 | jsish | 430ea27accd4d4ffddc946c9402e7c9064835a18 | https://github.com/pcmacdon/jsish | https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18 | Release "3.0.7": Fix toPrecision bug "stack overflow #4".
FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de | 0 | Jsi_RC Jsi_FSUnregister(Jsi_Filesystem *fsPtr) {
FSList *fsl = jsiFSList, *flast = NULL;
while (fsl) {
if (fsl->fsPtr == fsPtr) {
if (flast)
flast->next = fsl->next;
else
jsiFSList = fsl->next;
Jsi_Free(fsl);
break;
... | 80,723,876,479,438,970,000,000,000,000,000,000,000 | None | null | [
"CWE-120"
] | CVE-2020-22873 | Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2020-22873 |
520,817 | jsish | 430ea27accd4d4ffddc946c9402e7c9064835a18 | https://github.com/pcmacdon/jsish | https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18 | Release "3.0.7": Fix toPrecision bug "stack overflow #4".
FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de | 0 | static Jsi_RC jsi_ValueToBitset(Jsi_Interp *interp, Jsi_OptionSpec* spec, Jsi_Value *inValue, const char *inStr, void *record, Jsi_Wide flags)
{
// TODO: change this to not use byte instead of int...
int i, argc, n;
char *s =(((char*)record) + spec->offset);
char **argv;
const char *cp, **list = (co... | 195,635,772,770,759,900,000,000,000,000,000,000,000 | None | null | [
"CWE-120"
] | CVE-2020-22873 | Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2020-22873 |
520,818 | jsish | 430ea27accd4d4ffddc946c9402e7c9064835a18 | https://github.com/pcmacdon/jsish | https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18 | Release "3.0.7": Fix toPrecision bug "stack overflow #4".
FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de | 0 | static Jsi_RC SqliteConstructor(Jsi_Interp *interp, Jsi_Value *args, Jsi_Value *_this,
Jsi_Value **ret, Jsi_Func *funcPtr)
{
Jsi_RC rc = JSI_ERROR;
/* void *cd = clientData; */
int flags;
char *zErrMsg;
const char *zFile = NULL, *vfs = 0;
/* In normal use, each JSI ... | 328,822,905,687,274,100,000,000,000,000,000,000,000 | None | null | [
"CWE-120"
] | CVE-2020-22873 | Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2020-22873 |
520,819 | jsish | 430ea27accd4d4ffddc946c9402e7c9064835a18 | https://github.com/pcmacdon/jsish | https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18 | Release "3.0.7": Fix toPrecision bug "stack overflow #4".
FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de | 0 | int Jsi_Scandir(Jsi_Interp *interp, Jsi_Value* path, Jsi_Dirent ***namelist,
int (*filter)(const Jsi_Dirent *), int (*compar)(const Jsi_Dirent **, const Jsi_Dirent**))
{
void *data;
Jsi_Filesystem *fsPtr = Jsi_FilesystemForPath(interp, path, &data);
if (fsPtr == NULL || !fsPtr->scandirProc) return -1;
... | 98,927,031,629,546,230,000,000,000,000,000,000,000 | None | null | [
"CWE-120"
] | CVE-2020-22873 | Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2020-22873 |
520,820 | jsish | 430ea27accd4d4ffddc946c9402e7c9064835a18 | https://github.com/pcmacdon/jsish | https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18 | Release "3.0.7": Fix toPrecision bug "stack overflow #4".
FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de | 0 | char* Jsi_NormalPath(Jsi_Interp *interp, const char *path, Jsi_DString *dStr) {
char prefix[3] = "";
char cdbuf[PATH_MAX];
Jsi_DSInit(dStr);
if (!path || !path[0]) return NULL;
if (*path == '/')
Jsi_DSAppend(dStr, path, NULL);
#ifdef __WIN32 /* TODO: add proper handling for windows paths. *... | 4,524,698,911,385,806,500,000,000,000,000,000,000 | None | null | [
"CWE-120"
] | CVE-2020-22873 | Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2020-22873 |
520,821 | jsish | 430ea27accd4d4ffddc946c9402e7c9064835a18 | https://github.com/pcmacdon/jsish | https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18 | Release "3.0.7": Fix toPrecision bug "stack overflow #4".
FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de | 0 | void Jsi_TreeSearchDone(Jsi_TreeSearch *searchPtr)
{
if (searchPtr->Ptrs != searchPtr->staticPtrs)
Jsi_Free(searchPtr->Ptrs);
searchPtr->Ptrs = searchPtr->staticPtrs;
searchPtr->top = 0;
} | 152,258,907,704,951,750,000,000,000,000,000,000,000 | None | null | [
"CWE-120"
] | CVE-2020-22873 | Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2020-22873 |
520,822 | jsish | 430ea27accd4d4ffddc946c9402e7c9064835a18 | https://github.com/pcmacdon/jsish | https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18 | Release "3.0.7": Fix toPrecision bug "stack overflow #4".
FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de | 0 | bool Jsi_NumberIsNormal(Jsi_Number a) { return (fpclassify(a) == FP_ZERO || isnormal(a)); } | 185,520,048,852,753,400,000,000,000,000,000,000,000 | None | null | [
"CWE-120"
] | CVE-2020-22873 | Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2020-22873 |
520,823 | jsish | 430ea27accd4d4ffddc946c9402e7c9064835a18 | https://github.com/pcmacdon/jsish | https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18 | Release "3.0.7": Fix toPrecision bug "stack overflow #4".
FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de | 0 | static Jsi_RC jsi_AliasFree(Jsi_Interp *interp, Jsi_HashEntry *hPtr, void *data) {
/* TODO: deal with other copies of func may be floating around (refCount). */
AliasCmd *ac = (AliasCmd *)data;
if (!ac) return JSI_ERROR;
SIGASSERT(ac,ALIASCMD);
if (ac->func)
Jsi_DecrRefCount(ac->dinterp, ac-... | 218,799,581,343,029,660,000,000,000,000,000,000,000 | None | null | [
"CWE-120"
] | CVE-2020-22873 | Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2020-22873 |
520,824 | jsish | 430ea27accd4d4ffddc946c9402e7c9064835a18 | https://github.com/pcmacdon/jsish | https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18 | Release "3.0.7": Fix toPrecision bug "stack overflow #4".
FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de | 0 | const char* jsi_opcode_string(uint opCode)
{
if (opCode >= (sizeof(jsi_op_names)/sizeof(jsi_op_names[0])))
return "NULL";
return jsi_op_names[opCode];
} | 270,775,758,774,835,640,000,000,000,000,000,000,000 | None | null | [
"CWE-120"
] | CVE-2020-22873 | Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2020-22873 |
520,825 | jsish | 430ea27accd4d4ffddc946c9402e7c9064835a18 | https://github.com/pcmacdon/jsish | https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18 | Release "3.0.7": Fix toPrecision bug "stack overflow #4".
FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de | 0 | int Jsi_Access(Jsi_Interp *interp, Jsi_Value* path, int mode) {
void *data;
Jsi_Filesystem *fsPtr = Jsi_FilesystemForPath(interp, path, &data);
if (fsPtr == NULL || !fsPtr->accessProc) return -1;
if (interp->isSafe && fsPtr && fsPtr == &jsiFilesystem) {
int aflag = (mode&W_OK ? JSI_INTACCESS_WRI... | 186,867,692,718,159,160,000,000,000,000,000,000,000 | None | null | [
"CWE-120"
] | CVE-2020-22873 | Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2020-22873 |
520,826 | jsish | 430ea27accd4d4ffddc946c9402e7c9064835a18 | https://github.com/pcmacdon/jsish | https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18 | Release "3.0.7": Fix toPrecision bug "stack overflow #4".
FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de | 0 | static Jsi_OpCodes *code_jfalse(int off) { JSI_NEW_CODES(0,OP_JFALSE, off); } | 219,065,136,698,585,260,000,000,000,000,000,000,000 | None | null | [
"CWE-120"
] | CVE-2020-22873 | Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2020-22873 |
520,827 | jsish | 430ea27accd4d4ffddc946c9402e7c9064835a18 | https://github.com/pcmacdon/jsish | https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18 | Release "3.0.7": Fix toPrecision bug "stack overflow #4".
FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de | 0 | static Jsi_OpCodes *code_ret(jsi_Pstate *p, jsi_Pline *line, int n) { JSI_NEW_CODESLN(0,OP_RET, n); } | 66,046,521,816,693,670,000,000,000,000,000,000,000 | None | null | [
"CWE-120"
] | CVE-2020-22873 | Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2020-22873 |
520,828 | jsish | 430ea27accd4d4ffddc946c9402e7c9064835a18 | https://github.com/pcmacdon/jsish | https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18 | Release "3.0.7": Fix toPrecision bug "stack overflow #4".
FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de | 0 | char *Jsi_ValueArrayIndexToStr(Jsi_Interp *interp, Jsi_Value *args, int index, int *lenPtr)
{
Jsi_Value *arg = Jsi_ValueArrayIndex(interp, args, index);
if (!arg)
return NULL;
char *res = Jsi_ValueString(interp, arg, lenPtr);
if (res)
return res;
res = (char*)Jsi_ValueToString(interp... | 218,128,720,555,327,700,000,000,000,000,000,000,000 | None | null | [
"CWE-120"
] | CVE-2020-22873 | Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2020-22873 |
520,829 | jsish | 430ea27accd4d4ffddc946c9402e7c9064835a18 | https://github.com/pcmacdon/jsish | https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18 | Release "3.0.7": Fix toPrecision bug "stack overflow #4".
FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de | 0 | Jsi_Db* Jsi_DbNew(const char *zFile, int inFlags /* JSI_DBI_* */)
{
if (!jsi_dbVfsPtr) {
printf( "Sqlite unsupported\n");
return NULL;
}
return jsi_dbVfsPtr->dbNew(zFile, inFlags);
} | 710,917,260,666,666,500,000,000,000,000,000,000 | None | null | [
"CWE-120"
] | CVE-2020-22873 | Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2020-22873 |
520,830 | jsish | 430ea27accd4d4ffddc946c9402e7c9064835a18 | https://github.com/pcmacdon/jsish | https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18 | Release "3.0.7": Fix toPrecision bug "stack overflow #4".
FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de | 0 | static Jsi_RC jsiInterpDelete(Jsi_Interp* interp, void *unused)
{
SIGASSERT(interp,INTERP);
bool isMainInt = (interp == jsiIntData.mainInterp);
int mainFlag = (isMainInt ? 2 : 1);
if (isMainInt)
DeleteAllInterps();
if (interp->opts.initProc)
(*interp->opts.initProc)(interp, mainFlag)... | 86,529,672,574,519,680,000,000,000,000,000,000,000 | None | null | [
"CWE-120"
] | CVE-2020-22873 | Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2020-22873 |
520,831 | jsish | 430ea27accd4d4ffddc946c9402e7c9064835a18 | https://github.com/pcmacdon/jsish | https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18 | Release "3.0.7": Fix toPrecision bug "stack overflow #4".
FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de | 0 | static Jsi_RC SqliteBackupCmd(Jsi_Interp *interp, Jsi_Value *args, Jsi_Value *_this,
Jsi_Value **ret, Jsi_Func *funcPtr)
{
Jsi_Db *jdb;
Jsi_RC rv = JSI_OK;
int rc;
const char *zDestFile;
const char *zSrcDb;
sqlite3 *pDest;
sqlite3_backup *pBackup;
if (!(jdb = ... | 45,298,365,520,330,980,000,000,000,000,000,000,000 | None | null | [
"CWE-120"
] | CVE-2020-22873 | Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2020-22873 |
520,832 | jsish | 430ea27accd4d4ffddc946c9402e7c9064835a18 | https://github.com/pcmacdon/jsish | https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18 | Release "3.0.7": Fix toPrecision bug "stack overflow #4".
FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de | 0 | static Jsi_RC jsi_wsFileRead(Jsi_Interp *interp, Jsi_Value *name, Jsi_DString *dStr, jsi_wsCmdObj *cmdPtr, jsi_wsPss *pss) {
Jsi_StatBuf sb;
Jsi_RC rc = JSI_ERROR;
int n = Jsi_Stat(interp, name, &sb);
if (!n && sb.st_size>0) {
char fdir[PATH_MAX];
const char* cr = cmdPtr->curRoot, *fpath... | 134,515,354,387,194,060,000,000,000,000,000,000,000 | None | null | [
"CWE-120"
] | CVE-2020-22873 | Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2020-22873 |
520,833 | jsish | 430ea27accd4d4ffddc946c9402e7c9064835a18 | https://github.com/pcmacdon/jsish | https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18 | Release "3.0.7": Fix toPrecision bug "stack overflow #4".
FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de | 0 | static Jsi_OpCodes *code_not() { JSI_NEW_CODES(0,OP_NOT, 0); } | 153,728,191,345,898,490,000,000,000,000,000,000,000 | None | null | [
"CWE-120"
] | CVE-2020-22873 | Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2020-22873 |
520,834 | jsish | 430ea27accd4d4ffddc946c9402e7c9064835a18 | https://github.com/pcmacdon/jsish | https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18 | Release "3.0.7": Fix toPrecision bug "stack overflow #4".
FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de | 0 | Jsi_Value* Jsi_ValueMakeBlob(Jsi_Interp *interp, Jsi_Value **vPtr, unsigned char *s, int len) {
Jsi_Value *v = (vPtr?*vPtr:NULL);
if (!v)
v = Jsi_ValueNew(interp);
else
Jsi_ValueReset(interp, vPtr);
Jsi_Obj *obj = Jsi_ObjNewType(interp, JSI_OT_STRING);
Jsi_ValueMakeObject(interp, &v,... | 51,532,919,170,752,640,000,000,000,000,000,000,000 | None | null | [
"CWE-120"
] | CVE-2020-22873 | Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2020-22873 |
520,835 | jsish | 430ea27accd4d4ffddc946c9402e7c9064835a18 | https://github.com/pcmacdon/jsish | https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18 | Release "3.0.7": Fix toPrecision bug "stack overflow #4".
FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de | 0 | static void dbOutputQuotedString(Jsi_DString *dStr, const char *z) {
int i;
int nSingle = 0;
for(i=0; z[i]; i++) {
if( z[i]=='\'' ) nSingle++;
}
if( nSingle==0 ) {
Jsi_DSAppend(dStr,"'", z, "'", NULL);
} else {
Jsi_DSAppend(dStr,"'", NULL);
while( *z ) {
... | 242,145,618,564,523,600,000,000,000,000,000,000,000 | None | null | [
"CWE-120"
] | CVE-2020-22873 | Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2020-22873 |
520,836 | jsish | 430ea27accd4d4ffddc946c9402e7c9064835a18 | https://github.com/pcmacdon/jsish | https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18 | Release "3.0.7": Fix toPrecision bug "stack overflow #4".
FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de | 0 | static Jsi_TreeEntry* maximum_node(Jsi_TreeEntry* n) {
Assert (n != NULL);
while (n->right != NULL) {
n = n->right;
}
return n;
} | 102,096,612,285,266,430,000,000,000,000,000,000,000 | None | null | [
"CWE-120"
] | CVE-2020-22873 | Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2020-22873 |
520,837 | jsish | 430ea27accd4d4ffddc946c9402e7c9064835a18 | https://github.com/pcmacdon/jsish | https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18 | Release "3.0.7": Fix toPrecision bug "stack overflow #4".
FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de | 0 | static Jsi_RC jsi_AliasCreateCmd(Jsi_Interp* interp, const char* key, AliasCmd* ac) {
if (Jsi_InterpGone(interp))
return JSI_ERROR;
key = Jsi_KeyAdd(interp, key);
Jsi_Value *cmd = jsi_CommandCreate(interp, key, jsi_AliasInvoke, NULL, 0, 0);
if (!cmd)
return Jsi_LogBug("command create fai... | 318,525,960,491,245,800,000,000,000,000,000,000,000 | None | null | [
"CWE-120"
] | CVE-2020-22873 | Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2020-22873 |
520,838 | jsish | 430ea27accd4d4ffddc946c9402e7c9064835a18 | https://github.com/pcmacdon/jsish | https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18 | Release "3.0.7": Fix toPrecision bug "stack overflow #4".
FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de | 0 | int Jsi_Rename(Jsi_Interp *interp, Jsi_Value *src, Jsi_Value *dst) {
void *data;
Jsi_Filesystem *fsPtr = Jsi_FilesystemForPath(interp, src, &data);
if (fsPtr != Jsi_FilesystemForPath(interp, src, &data)) return -1;
if (fsPtr == NULL || !fsPtr->renameProc) return -1;
return fsPtr->renameProc(interp, ... | 209,467,734,178,921,730,000,000,000,000,000,000,000 | None | null | [
"CWE-120"
] | CVE-2020-22873 | Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2020-22873 |
520,839 | jsish | 430ea27accd4d4ffddc946c9402e7c9064835a18 | https://github.com/pcmacdon/jsish | https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18 | Release "3.0.7": Fix toPrecision bug "stack overflow #4".
FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de | 0 | static Jsi_Value* dbGetValueGet(Jsi_Interp *interp, sqlite3_value *pIn)
{
Jsi_Value *v = Jsi_ValueNew(interp);
switch (sqlite3_value_type(pIn)) {
case SQLITE_BLOB: {
int bytes;
bytes = sqlite3_value_bytes(pIn);
const char *zBlob = (char*) sqlite3_value_blob(pIn);
if(!zBlob ) ... | 215,067,176,074,266,000,000,000,000,000,000,000,000 | None | null | [
"CWE-120"
] | CVE-2020-22873 | Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2020-22873 |
520,840 | jsish | 430ea27accd4d4ffddc946c9402e7c9064835a18 | https://github.com/pcmacdon/jsish | https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18 | Release "3.0.7": Fix toPrecision bug "stack overflow #4".
FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de | 0 | static Jsi_RC SqliteRestoreCmd(Jsi_Interp *interp, Jsi_Value *args, Jsi_Value *_this,
Jsi_Value **ret, Jsi_Func *funcPtr)
{
Jsi_Db *jdb;
const char *zSrcFile;
const char *zDestDb;
sqlite3 *pSrc;
sqlite3_backup *pBackup;
int nTimeout = 0;
int rc;
if (!(jdb = d... | 64,242,374,379,968,130,000,000,000,000,000,000,000 | None | null | [
"CWE-120"
] | CVE-2020-22873 | Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2020-22873 |
520,841 | jsish | 430ea27accd4d4ffddc946c9402e7c9064835a18 | https://github.com/pcmacdon/jsish | https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18 | Release "3.0.7": Fix toPrecision bug "stack overflow #4".
FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de | 0 | Jsi_HashEntryNew(Jsi_Hash *tablePtr, const void *key, bool *newPtr)
{
if (tablePtr->opts.lockHashProc && (*tablePtr->opts.lockHashProc)(tablePtr, 1) != JSI_OK)
return NULL;
Jsi_HashEntry *hPtr = (*((tablePtr)->createProc))(tablePtr, key, newPtr);
#ifdef JSI_HAS_SIG_HASHENTRY
SIGINIT(hPtr, HASHENTRY... | 224,846,975,247,741,500,000,000,000,000,000,000,000 | None | null | [
"CWE-120"
] | CVE-2020-22873 | Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2020-22873 |
520,842 | jsish | 430ea27accd4d4ffddc946c9402e7c9064835a18 | https://github.com/pcmacdon/jsish | https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18 | Release "3.0.7": Fix toPrecision bug "stack overflow #4".
FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de | 0 | Jsi_RC Jsi_ValueInsert(Jsi_Interp *interp, Jsi_Value *target, const char *key, Jsi_Value *val, int flags)
{
if (target == NULL)
target = interp->csc;
if (target->vt != JSI_VT_OBJECT) {
if (interp->strict)
Jsi_LogWarn("Target is not object");
return JSI_ERROR;
}
target... | 330,836,422,110,134,700,000,000,000,000,000,000,000 | None | null | [
"CWE-120"
] | CVE-2020-22873 | Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2020-22873 |
520,843 | jsish | 430ea27accd4d4ffddc946c9402e7c9064835a18 | https://github.com/pcmacdon/jsish | https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18 | Release "3.0.7": Fix toPrecision bug "stack overflow #4".
FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de | 0 | Jsi_Value* jsi_ValueMakeBlobDup(Jsi_Interp *interp, Jsi_Value **ret, unsigned char *s, int len) {
if (len<0) len = Jsi_Strlen((char*)s);
uchar *dp = (uchar*)Jsi_Malloc(len+1);
memcpy(dp, s, len);
dp[len] = 0;
return Jsi_ValueMakeBlob(interp, ret, dp, len);
} | 71,343,373,577,338,490,000,000,000,000,000,000,000 | None | null | [
"CWE-120"
] | CVE-2020-22873 | Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2020-22873 |
520,844 | jsish | 430ea27accd4d4ffddc946c9402e7c9064835a18 | https://github.com/pcmacdon/jsish | https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18 | Release "3.0.7": Fix toPrecision bug "stack overflow #4".
FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de | 0 | static void dbEvalRowInfo(
DbEvalContext *p, /* Evaluation context */
int *pnCol, /* OUT: Number of column names */
char ***papColName, /* OUT: Array of column names */
int **papColType
) {
/* Compute column names */
// Jsi_Interp *interp = p->jdb->int... | 73,264,534,785,316,380,000,000,000,000,000,000,000 | None | null | [
"CWE-120"
] | CVE-2020-22873 | Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2020-22873 |
520,845 | jsish | 430ea27accd4d4ffddc946c9402e7c9064835a18 | https://github.com/pcmacdon/jsish | https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18 | Release "3.0.7": Fix toPrecision bug "stack overflow #4".
FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de | 0 | static Jsi_OpCodes *code_scatch(jsi_Pstate *p, jsi_Pline *line, const char *var) { JSI_NEW_CODESLN(0,OP_SCATCH, var); } | 124,937,028,650,948,280,000,000,000,000,000,000 | None | null | [
"CWE-120"
] | CVE-2020-22873 | Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2020-22873 |
520,846 | jsish | 430ea27accd4d4ffddc946c9402e7c9064835a18 | https://github.com/pcmacdon/jsish | https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18 | Release "3.0.7": Fix toPrecision bug "stack overflow #4".
FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de | 0 | void Jsi_RegExpFree(Jsi_Regex* re) {
regfree(&re->reg);
_JSI_MEMCLEAR(re);
Jsi_Free(re);
} | 124,637,505,591,240,360,000,000,000,000,000,000,000 | None | null | [
"CWE-120"
] | CVE-2020-22873 | Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2020-22873 |
520,847 | jsish | 430ea27accd4d4ffddc946c9402e7c9064835a18 | https://github.com/pcmacdon/jsish | https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18 | Release "3.0.7": Fix toPrecision bug "stack overflow #4".
FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de | 0 | static Jsi_OpCodes *code_eval(jsi_Pstate *p, jsi_Pline *line, int argc, Jsi_OpCodes *c) {
jsi_FreeOpcodes(c); // Eliminate leak of unused opcodes.
JSI_NEW_CODESLN(0,OP_EVAL, argc);
} | 151,237,612,472,150,300,000,000,000,000,000,000,000 | None | null | [
"CWE-120"
] | CVE-2020-22873 | Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2020-22873 |
520,848 | jsish | 430ea27accd4d4ffddc946c9402e7c9064835a18 | https://github.com/pcmacdon/jsish | https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18 | Release "3.0.7": Fix toPrecision bug "stack overflow #4".
FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de | 0 | int Jsi_DecrRefCount(Jsi_Interp* interp, Jsi_Value *v) {
SIGASSERT(v,VALUE);
if (v->refCnt<=0) {
#ifdef JSI_MEM_DEBUG
fprintf(stderr, "Value decr with ref %d: VD.Idx=%d\n", v->refCnt, v->VD.Idx);
#endif
return -2;
}
int ref;
jsi_DebugValue(v,"Decr", jsi_DebugValueCallIdx(), interp);
... | 254,347,709,165,450,930,000,000,000,000,000,000,000 | None | null | [
"CWE-120"
] | CVE-2020-22873 | Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2020-22873 |
520,849 | jsish | 430ea27accd4d4ffddc946c9402e7c9064835a18 | https://github.com/pcmacdon/jsish | https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18 | Release "3.0.7": Fix toPrecision bug "stack overflow #4".
FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de | 0 | static void NormalizeUnixPath(Jsi_Interp *interp, char *path) {
char **argv; int argc, i;
if (!Jsi_Strstr(path, "./")) return;
Jsi_DString dStr = {}, eStr = {};
if (path[0] != '/' && Jsi_Strstr(path, "..")) {
char *npath = Jsi_GetCwd(interp, &eStr);
if (npath && Jsi_Strcmp(npath,"/")) {
... | 146,308,528,084,068,800,000,000,000,000,000,000,000 | None | null | [
"CWE-120"
] | CVE-2020-22873 | Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2020-22873 |
520,850 | jsish | 430ea27accd4d4ffddc946c9402e7c9064835a18 | https://github.com/pcmacdon/jsish | https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18 | Release "3.0.7": Fix toPrecision bug "stack overflow #4".
FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de | 0 | void dbTypeNameHashInit(Jsi_Db *jdb) {
Jsi_Interp *interp = jdb->interp;
Jsi_Hash *hPtr = jdb->typeNameHash = Jsi_HashNew(interp, JSI_KEYS_STRING, NULL);
Jsi_HashSet(hPtr, (void*)"blob", (void*)JSI_OPTION_STRBUF);
Jsi_HashSet(hPtr, (void*)"string", (void*)JSI_OPTION_STRING);
Jsi_HashSet(hPtr, (void*... | 168,891,833,501,740,860,000,000,000,000,000,000,000 | None | null | [
"CWE-120"
] | CVE-2020-22873 | Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2020-22873 |
520,851 | jsish | 430ea27accd4d4ffddc946c9402e7c9064835a18 | https://github.com/pcmacdon/jsish | https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18 | Release "3.0.7": Fix toPrecision bug "stack overflow #4".
FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de | 0 | static int jsi_FSWriteProc(Jsi_Channel chan, const char *buf, int size) {
return fwrite(buf, 1, size, _JSI_GETFP(chan,0));
} | 37,911,761,756,014,330,000,000,000,000,000,000,000 | None | null | [
"CWE-120"
] | CVE-2020-22873 | Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2020-22873 |
520,852 | jsish | 430ea27accd4d4ffddc946c9402e7c9064835a18 | https://github.com/pcmacdon/jsish | https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18 | Release "3.0.7": Fix toPrecision bug "stack overflow #4".
FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de | 0 | static Jsi_OpCodes *code_unref() { JSI_NEW_CODES(0,OP_UNREF, 0); } | 278,720,852,800,359,400,000,000,000,000,000,000,000 | None | null | [
"CWE-120"
] | CVE-2020-22873 | Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2020-22873 |
520,853 | jsish | 430ea27accd4d4ffddc946c9402e7c9064835a18 | https://github.com/pcmacdon/jsish | https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18 | Release "3.0.7": Fix toPrecision bug "stack overflow #4".
FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de | 0 | static Jsi_RC FilesysWriteCmd(Jsi_Interp *interp, Jsi_Value *args, Jsi_Value *_this,
Jsi_Value **ret, Jsi_Func *funcPtr)
{
int sum = 0, n, m;
UdfGet(udf, _this, funcPtr);
char *buf = Jsi_ValueArrayIndexToStr(interp, args, 0, &m);
if (!udf->filename) {
goto bail;
}
while (m > 0 && s... | 210,108,322,658,213,640,000,000,000,000,000,000,000 | None | null | [
"CWE-120"
] | CVE-2020-22873 | Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2020-22873 |
520,854 | jsish | 430ea27accd4d4ffddc946c9402e7c9064835a18 | https://github.com/pcmacdon/jsish | https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18 | Release "3.0.7": Fix toPrecision bug "stack overflow #4".
FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de | 0 | static jsi_JmpPopInfo *jpinfo_new(int off, int topop)
{
jsi_JmpPopInfo *r = (jsi_JmpPopInfo *)Jsi_Calloc(1, sizeof(*r));
r->off = off;
r->topop = topop;
return r;
} | 163,845,800,481,626,500,000,000,000,000,000,000,000 | None | null | [
"CWE-120"
] | CVE-2020-22873 | Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2020-22873 |
520,966 | retdec | 517298bafaaff0a8e3dd60dd055a67c41b545807 | https://github.com/avast/retdec | https://github.com/avast/retdec/commit/517298bafaaff0a8e3dd60dd055a67c41b545807 | Try to fix issue #637
Reference: https://github.com/avast/retdec/issues/637 | 0 | llvm::SwitchInst* Decoder::transformToSwitch(
llvm::CallInst* pseudo,
llvm::Value* val,
llvm::BasicBlock* defaultBb,
const std::vector<llvm::BasicBlock*>& cases)
{
unsigned numCases = 0;
for (auto* c : cases)
{
if (c != defaultBb)
{
++numCases;
}
}
// If we do not do this, this can happen:
// "I... | 339,697,549,952,328,130,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2020-23907 | An issue was discovered in retdec v3.3. In function canSplitFunctionOn() of ir_modifications.cpp, there is a possible out of bounds read due to a heap buffer overflow. The impact is: Deny of Service, Memory Disclosure, and Possible Code Execution. | https://nvd.nist.gov/vuln/detail/CVE-2020-23907 |
520,967 | retdec | 517298bafaaff0a8e3dd60dd055a67c41b545807 | https://github.com/avast/retdec | https://github.com/avast/retdec/commit/517298bafaaff0a8e3dd60dd055a67c41b545807 | Try to fix issue #637
Reference: https://github.com/avast/retdec/issues/637 | 0 | bool Decoder::canSplitFunctionOn(llvm::BasicBlock* bb)
{
for (auto* u : bb->users())
{
// All users must be unconditional branch instructions.
//
auto* br = dyn_cast<BranchInst>(u);
if (br == nullptr || br->isConditional())
{
LOG << "\t\t\t\t\t\t" << "!CAN : user not uncond for "
<< llvmObjToString(... | 172,558,044,285,921,060,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2020-23907 | An issue was discovered in retdec v3.3. In function canSplitFunctionOn() of ir_modifications.cpp, there is a possible out of bounds read due to a heap buffer overflow. The impact is: Deny of Service, Memory Disclosure, and Possible Code Execution. | https://nvd.nist.gov/vuln/detail/CVE-2020-23907 |
520,968 | retdec | 517298bafaaff0a8e3dd60dd055a67c41b545807 | https://github.com/avast/retdec | https://github.com/avast/retdec/commit/517298bafaaff0a8e3dd60dd055a67c41b545807 | Try to fix issue #637
Reference: https://github.com/avast/retdec/issues/637 | 0 | llvm::Function* Decoder::splitFunctionOn(
utils::Address addr,
llvm::BasicBlock* splitOnBb)
{
LOG << "\t\t\t\t" << "S: splitFunctionOn @ " << addr << " on "
<< splitOnBb->getName().str() << std::endl;
if (splitOnBb->getPrevNode() == nullptr)
{
LOG << "\t\t\t\t" << "S: BB first @ " << addr << std::endl;
r... | 337,843,546,095,104,400,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2020-23907 | An issue was discovered in retdec v3.3. In function canSplitFunctionOn() of ir_modifications.cpp, there is a possible out of bounds read due to a heap buffer overflow. The impact is: Deny of Service, Memory Disclosure, and Possible Code Execution. | https://nvd.nist.gov/vuln/detail/CVE-2020-23907 |
520,969 | retdec | 517298bafaaff0a8e3dd60dd055a67c41b545807 | https://github.com/avast/retdec | https://github.com/avast/retdec/commit/517298bafaaff0a8e3dd60dd055a67c41b545807 | Try to fix issue #637
Reference: https://github.com/avast/retdec/issues/637 | 0 | llvm::CallInst* Decoder::transformToCondCall(
llvm::CallInst* pseudo,
llvm::Value* cond,
llvm::Function* callee,
llvm::BasicBlock* falseBb)
{
auto* oldBb = pseudo->getParent();
auto* newBb = oldBb->splitBasicBlock(pseudo);
// We do NOT want to name or give address to this block.
auto* oldTerm = oldBb->getT... | 163,582,491,722,408,650,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2020-23907 | An issue was discovered in retdec v3.3. In function canSplitFunctionOn() of ir_modifications.cpp, there is a possible out of bounds read due to a heap buffer overflow. The impact is: Deny of Service, Memory Disclosure, and Possible Code Execution. | https://nvd.nist.gov/vuln/detail/CVE-2020-23907 |
520,970 | retdec | 517298bafaaff0a8e3dd60dd055a67c41b545807 | https://github.com/avast/retdec | https://github.com/avast/retdec/commit/517298bafaaff0a8e3dd60dd055a67c41b545807 | Try to fix issue #637
Reference: https://github.com/avast/retdec/issues/637 | 0 | llvm::Function* Decoder::splitFunctionOn(utils::Address addr)
{
if (auto* bb = getBasicBlockAtAddress(addr))
{
LOG << "\t\t\t\t" << "S: splitFunctionOn @ " << addr << std::endl;
return bb->getPrevNode()
? splitFunctionOn(addr, bb)
: bb->getParent();
}
// There is an instruction at address, but not BB ->... | 234,169,634,988,335,030,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2020-23907 | An issue was discovered in retdec v3.3. In function canSplitFunctionOn() of ir_modifications.cpp, there is a possible out of bounds read due to a heap buffer overflow. The impact is: Deny of Service, Memory Disclosure, and Possible Code Execution. | https://nvd.nist.gov/vuln/detail/CVE-2020-23907 |
520,971 | retdec | 517298bafaaff0a8e3dd60dd055a67c41b545807 | https://github.com/avast/retdec | https://github.com/avast/retdec/commit/517298bafaaff0a8e3dd60dd055a67c41b545807 | Try to fix issue #637
Reference: https://github.com/avast/retdec/issues/637 | 0 | llvm::GlobalVariable* Decoder::getCallReturnObject()
{
if (_config->getConfig().architecture.isX86_32())
{
return _abi->getRegister(X86_REG_EAX);
}
else if (_config->getConfig().architecture.isX86_64())
{
return _abi->getRegister(X86_REG_RAX);
}
else if (_config->getConfig().architecture.isMipsOrPic32())
{
... | 179,506,904,574,203,230,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2020-23907 | An issue was discovered in retdec v3.3. In function canSplitFunctionOn() of ir_modifications.cpp, there is a possible out of bounds read due to a heap buffer overflow. The impact is: Deny of Service, Memory Disclosure, and Possible Code Execution. | https://nvd.nist.gov/vuln/detail/CVE-2020-23907 |
520,972 | retdec | 517298bafaaff0a8e3dd60dd055a67c41b545807 | https://github.com/avast/retdec | https://github.com/avast/retdec/commit/517298bafaaff0a8e3dd60dd055a67c41b545807 | Try to fix issue #637
Reference: https://github.com/avast/retdec/issues/637 | 0 | void Decoder::getOrCreateCallTarget(
utils::Address addr,
llvm::Function*& tFnc,
llvm::BasicBlock*& tBb)
{
tBb = nullptr;
tFnc = nullptr;
if (auto* f = getFunctionAtAddress(addr))
{
tFnc = f;
tBb = tFnc->empty() ? nullptr : &tFnc->front();
LOG << "\t\t\t\t" << "F: getFunctionAtAddress() @ " << addr << ... | 248,275,155,997,215,700,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2020-23907 | An issue was discovered in retdec v3.3. In function canSplitFunctionOn() of ir_modifications.cpp, there is a possible out of bounds read due to a heap buffer overflow. The impact is: Deny of Service, Memory Disclosure, and Possible Code Execution. | https://nvd.nist.gov/vuln/detail/CVE-2020-23907 |
520,973 | retdec | 517298bafaaff0a8e3dd60dd055a67c41b545807 | https://github.com/avast/retdec | https://github.com/avast/retdec/commit/517298bafaaff0a8e3dd60dd055a67c41b545807 | Try to fix issue #637
Reference: https://github.com/avast/retdec/issues/637 | 0 | llvm::ReturnInst* Decoder::transformToReturn(llvm::CallInst* pseudo)
{
auto* term = pseudo->getParent()->getTerminator();
assert(pseudo->getNextNode() == term);
auto* r = ReturnInst::Create(
pseudo->getModule()->getContext(),
UndefValue::get(pseudo->getFunction()->getReturnType()),
term);
term->eraseFromPa... | 246,227,948,483,677,530,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2020-23907 | An issue was discovered in retdec v3.3. In function canSplitFunctionOn() of ir_modifications.cpp, there is a possible out of bounds read due to a heap buffer overflow. The impact is: Deny of Service, Memory Disclosure, and Possible Code Execution. | https://nvd.nist.gov/vuln/detail/CVE-2020-23907 |
520,974 | retdec | 517298bafaaff0a8e3dd60dd055a67c41b545807 | https://github.com/avast/retdec | https://github.com/avast/retdec/commit/517298bafaaff0a8e3dd60dd055a67c41b545807 | Try to fix issue #637
Reference: https://github.com/avast/retdec/issues/637 | 0 | llvm::BranchInst* Decoder::transformToBranch(
llvm::CallInst* pseudo,
llvm::BasicBlock* branchee)
{
auto* term = pseudo->getParent()->getTerminator();
assert(pseudo->getNextNode() == term);
auto* br = BranchInst::Create(branchee, term);
term->eraseFromParent();
return br;
} | 10,461,997,993,435,795,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2020-23907 | An issue was discovered in retdec v3.3. In function canSplitFunctionOn() of ir_modifications.cpp, there is a possible out of bounds read due to a heap buffer overflow. The impact is: Deny of Service, Memory Disclosure, and Possible Code Execution. | https://nvd.nist.gov/vuln/detail/CVE-2020-23907 |
520,975 | retdec | 517298bafaaff0a8e3dd60dd055a67c41b545807 | https://github.com/avast/retdec | https://github.com/avast/retdec/commit/517298bafaaff0a8e3dd60dd055a67c41b545807 | Try to fix issue #637
Reference: https://github.com/avast/retdec/issues/637 | 0 | llvm::CallInst* Decoder::transformToCall(
llvm::CallInst* pseudo,
llvm::Function* callee)
{
auto* c = CallInst::Create(callee);
c->insertAfter(pseudo);
if (auto* retObj = getCallReturnObject())
{
auto* cc = cast<Instruction>(
IrModifier::convertValueToTypeAfter(c, retObj->getValueType(), c));
auto* s =... | 206,281,456,132,457,940,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2020-23907 | An issue was discovered in retdec v3.3. In function canSplitFunctionOn() of ir_modifications.cpp, there is a possible out of bounds read due to a heap buffer overflow. The impact is: Deny of Service, Memory Disclosure, and Possible Code Execution. | https://nvd.nist.gov/vuln/detail/CVE-2020-23907 |
520,976 | retdec | 517298bafaaff0a8e3dd60dd055a67c41b545807 | https://github.com/avast/retdec | https://github.com/avast/retdec/commit/517298bafaaff0a8e3dd60dd055a67c41b545807 | Try to fix issue #637
Reference: https://github.com/avast/retdec/issues/637 | 0 | bool Decoder::canSplitFunctionOn(
utils::Address addr,
llvm::BasicBlock* splitBb,
std::set<llvm::BasicBlock*>& newFncStarts)
{
newFncStarts.insert(splitBb);
auto* f = splitBb->getParent();
auto fAddr = getFunctionAddress(f);
auto fSzIt = _fnc2sz.find(f);
if (fSzIt != _fnc2sz.end())
{
if (fAddr <= addr &... | 52,757,457,497,306,000,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2020-23907 | An issue was discovered in retdec v3.3. In function canSplitFunctionOn() of ir_modifications.cpp, there is a possible out of bounds read due to a heap buffer overflow. The impact is: Deny of Service, Memory Disclosure, and Possible Code Execution. | https://nvd.nist.gov/vuln/detail/CVE-2020-23907 |
520,977 | retdec | 517298bafaaff0a8e3dd60dd055a67c41b545807 | https://github.com/avast/retdec | https://github.com/avast/retdec/commit/517298bafaaff0a8e3dd60dd055a67c41b545807 | Try to fix issue #637
Reference: https://github.com/avast/retdec/issues/637 | 0 | void Decoder::getOrCreateBranchTarget(
utils::Address addr,
llvm::BasicBlock*& tBb,
llvm::Function*& tFnc,
llvm::Instruction* from)
{
tBb = nullptr;
tFnc = nullptr;
auto* fromFnc = from->getFunction();
if (auto* bb = getBasicBlockAtAddress(addr))
{
tBb = bb;
LOG << "\t\t\t\t" << "B: getBasicBlockAtAd... | 160,056,055,851,785,500,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2020-23907 | An issue was discovered in retdec v3.3. In function canSplitFunctionOn() of ir_modifications.cpp, there is a possible out of bounds read due to a heap buffer overflow. The impact is: Deny of Service, Memory Disclosure, and Possible Code Execution. | https://nvd.nist.gov/vuln/detail/CVE-2020-23907 |
520,978 | retdec | 517298bafaaff0a8e3dd60dd055a67c41b545807 | https://github.com/avast/retdec | https://github.com/avast/retdec/commit/517298bafaaff0a8e3dd60dd055a67c41b545807 | Try to fix issue #637
Reference: https://github.com/avast/retdec/issues/637 | 0 | llvm::BranchInst* Decoder::transformToCondBranch(
llvm::CallInst* pseudo,
llvm::Value* cond,
llvm::BasicBlock* trueBb,
llvm::BasicBlock* falseBb)
{
auto* term = pseudo->getParent()->getTerminator();
assert(pseudo->getNextNode() == term);
auto* br = BranchInst::Create(trueBb, falseBb, cond, term);
term->eras... | 38,531,308,295,983,030,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2020-23907 | An issue was discovered in retdec v3.3. In function canSplitFunctionOn() of ir_modifications.cpp, there is a possible out of bounds read due to a heap buffer overflow. The impact is: Deny of Service, Memory Disclosure, and Possible Code Execution. | https://nvd.nist.gov/vuln/detail/CVE-2020-23907 |
520,979 | oocborrt | 539851c66778f68a244633985f6f8d0df94ea3b3 | https://github.com/objsys/oocborrt | https://github.com/objsys/oocborrt/commit/539851c66778f68a244633985f6f8d0df94ea3b3 | fixed missing return status test error | 0 | static int cborTagNotSupp (OSCTXT* pctxt, OSOCTET tag)
{
char numbuf[10];
char errtext[80];
rtxUIntToCharStr (tag, numbuf, sizeof(numbuf), 0);
rtxStrJoin (errtext, sizeof(errtext), "CBOR tag ", numbuf, 0, 0, 0);
rtxErrAddStrParm (pctxt, errtext);
return RTERR_NOTSUPP;
}
| 91,433,931,882,296,370,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2020-24753 | A memory corruption vulnerability in Objective Open CBOR Run-time (oocborrt) in versions before 2020-08-12 could allow an attacker to execute code via crafted Concise Binary Object Representation (CBOR) input to the cbor2json decoder. An uncaught error while decoding CBOR Major Type 3 text strings leads to the use of a... | https://nvd.nist.gov/vuln/detail/CVE-2020-24753 |
520,980 | oocborrt | 539851c66778f68a244633985f6f8d0df94ea3b3 | https://github.com/objsys/oocborrt | https://github.com/objsys/oocborrt/commit/539851c66778f68a244633985f6f8d0df94ea3b3 | fixed missing return status test error | 0 | static int cborElemNameToJson (OSCTXT* pCborCtxt, OSCTXT* pJsonCtxt)
{
char* pElemName = 0;
OSOCTET ub;
int ret;
/* Read byte from stream */
ret = rtxReadBytes (pCborCtxt, &ub, 1);
if (0 != ret) return LOG_RTERR (pCborCtxt, ret);
/* Decode element name (note: only string type is current... | 309,262,024,382,791,750,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2020-24753 | A memory corruption vulnerability in Objective Open CBOR Run-time (oocborrt) in versions before 2020-08-12 could allow an attacker to execute code via crafted Concise Binary Object Representation (CBOR) input to the cbor2json decoder. An uncaught error while decoding CBOR Major Type 3 text strings leads to the use of a... | https://nvd.nist.gov/vuln/detail/CVE-2020-24753 |
520,981 | oocborrt | 539851c66778f68a244633985f6f8d0df94ea3b3 | https://github.com/objsys/oocborrt | https://github.com/objsys/oocborrt/commit/539851c66778f68a244633985f6f8d0df94ea3b3 | fixed missing return status test error | 0 | int main (int argc, char** argv)
{
OSCTXT jsonCtxt, cborCtxt;
OSOCTET* pMsgBuf = 0;
size_t msglen;
OSBOOL verbose = FALSE;
const char* filename = "message.cbor";
const char* outfname = "message.json";
int ret;
/* Process command line arguments */
if (argc... | 94,464,297,602,423,210,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2020-24753 | A memory corruption vulnerability in Objective Open CBOR Run-time (oocborrt) in versions before 2020-08-12 could allow an attacker to execute code via crafted Concise Binary Object Representation (CBOR) input to the cbor2json decoder. An uncaught error while decoding CBOR Major Type 3 text strings leads to the use of a... | https://nvd.nist.gov/vuln/detail/CVE-2020-24753 |
520,982 | oocborrt | 539851c66778f68a244633985f6f8d0df94ea3b3 | https://github.com/objsys/oocborrt | https://github.com/objsys/oocborrt/commit/539851c66778f68a244633985f6f8d0df94ea3b3 | fixed missing return status test error | 0 | static int cbor2json (OSCTXT* pCborCtxt, OSCTXT* pJsonCtxt)
{
int ret = 0;
OSOCTET tag, ub;
/* Read byte from stream */
ret = rtxReadBytes (pCborCtxt, &ub, 1);
if (0 != ret) return LOG_RTERR (pCborCtxt, ret);
tag = ub >> 5;
/* Switch on tag value */
switch (tag) {
case OSRTCBOR_... | 182,192,642,033,756,700,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2020-24753 | A memory corruption vulnerability in Objective Open CBOR Run-time (oocborrt) in versions before 2020-08-12 could allow an attacker to execute code via crafted Concise Binary Object Representation (CBOR) input to the cbor2json decoder. An uncaught error while decoding CBOR Major Type 3 text strings leads to the use of a... | https://nvd.nist.gov/vuln/detail/CVE-2020-24753 |
521,499 | sqlcipher | cb71f53e8cea4802509f182fa5bead0ac6ab0e7f | https://github.com/sqlcipher/sqlcipher | https://github.com/sqlcipher/sqlcipher/commit/cb71f53e8cea4802509f182fa5bead0ac6ab0e7f | fix sqlcipher_export handling of NULL parameters | 0 | int sqlcipher_codec_pragma(sqlite3* db, int iDb, Parse *pParse, const char *zLeft, const char *zRight) {
struct Db *pDb = &db->aDb[iDb];
codec_ctx *ctx = NULL;
int rc;
if(pDb->pBt) {
ctx = (codec_ctx*) sqlite3PagerGetCodec(pDb->pBt->pBt->pPager);
}
CODEC_TRACE("sqlcipher_codec_pragma: entered db=%p iD... | 210,718,390,088,926,000,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2021-3119 | Zetetic SQLCipher 4.x before 4.4.3 has a NULL pointer dereferencing issue related to sqlcipher_export in crypto.c and sqlite3StrICmp in sqlite3.c. This may allow an attacker to perform a remote denial of service attack. For example, an SQL injection can be used to execute the crafted SQL command sequence, which causes ... | https://nvd.nist.gov/vuln/detail/CVE-2021-3119 |
521,500 | sqlcipher | cb71f53e8cea4802509f182fa5bead0ac6ab0e7f | https://github.com/sqlcipher/sqlcipher | https://github.com/sqlcipher/sqlcipher/commit/cb71f53e8cea4802509f182fa5bead0ac6ab0e7f | fix sqlcipher_export handling of NULL parameters | 0 | void sqlite3_activate_see(const char* in) {
/* do nothing, security enhancements are always active */
} | 240,603,999,562,817,100,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2021-3119 | Zetetic SQLCipher 4.x before 4.4.3 has a NULL pointer dereferencing issue related to sqlcipher_export in crypto.c and sqlite3StrICmp in sqlite3.c. This may allow an attacker to perform a remote denial of service attack. For example, an SQL injection can be used to execute the crafted SQL command sequence, which causes ... | https://nvd.nist.gov/vuln/detail/CVE-2021-3119 |
521,501 | sqlcipher | cb71f53e8cea4802509f182fa5bead0ac6ab0e7f | https://github.com/sqlcipher/sqlcipher | https://github.com/sqlcipher/sqlcipher/commit/cb71f53e8cea4802509f182fa5bead0ac6ab0e7f | fix sqlcipher_export handling of NULL parameters | 0 | int sqlite3CodecAttach(sqlite3* db, int nDb, const void *zKey, int nKey) {
struct Db *pDb = &db->aDb[nDb];
CODEC_TRACE("sqlite3CodecAttach: entered db=%p, nDb=%d zKey=%s, nKey=%d\n", db, nDb, (char *)zKey, nKey);
if(nKey && zKey && pDb->pBt) {
int rc;
Pager *pPager = pDb->pBt->pBt->pPager;
sqlite3_... | 86,282,026,045,468,520,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2021-3119 | Zetetic SQLCipher 4.x before 4.4.3 has a NULL pointer dereferencing issue related to sqlcipher_export in crypto.c and sqlite3StrICmp in sqlite3.c. This may allow an attacker to perform a remote denial of service attack. For example, an SQL injection can be used to execute the crafted SQL command sequence, which causes ... | https://nvd.nist.gov/vuln/detail/CVE-2021-3119 |
521,502 | sqlcipher | cb71f53e8cea4802509f182fa5bead0ac6ab0e7f | https://github.com/sqlcipher/sqlcipher | https://github.com/sqlcipher/sqlcipher/commit/cb71f53e8cea4802509f182fa5bead0ac6ab0e7f | fix sqlcipher_export handling of NULL parameters | 0 | static int sqlcipher_finalize(sqlite3 *db, sqlite3_stmt *pStmt, char **pzErrMsg){
int rc;
rc = sqlite3VdbeFinalize((Vdbe*)pStmt);
if( rc ){
sqlite3SetString(pzErrMsg, db, sqlite3_errmsg(db));
}
return rc;
} | 150,989,832,449,633,320,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2021-3119 | Zetetic SQLCipher 4.x before 4.4.3 has a NULL pointer dereferencing issue related to sqlcipher_export in crypto.c and sqlite3StrICmp in sqlite3.c. This may allow an attacker to perform a remote denial of service attack. For example, an SQL injection can be used to execute the crafted SQL command sequence, which causes ... | https://nvd.nist.gov/vuln/detail/CVE-2021-3119 |
521,503 | sqlcipher | cb71f53e8cea4802509f182fa5bead0ac6ab0e7f | https://github.com/sqlcipher/sqlcipher | https://github.com/sqlcipher/sqlcipher/commit/cb71f53e8cea4802509f182fa5bead0ac6ab0e7f | fix sqlcipher_export handling of NULL parameters | 0 | static int codec_set_pass_key(sqlite3* db, int nDb, const void *zKey, int nKey, int for_ctx) {
struct Db *pDb = &db->aDb[nDb];
CODEC_TRACE("codec_set_pass_key: entered db=%p nDb=%d zKey=%s nKey=%d for_ctx=%d\n", db, nDb, (char *)zKey, nKey, for_ctx);
if(pDb->pBt) {
codec_ctx *ctx = (codec_ctx*) sqlite3PagerGe... | 113,965,764,517,113,100,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2021-3119 | Zetetic SQLCipher 4.x before 4.4.3 has a NULL pointer dereferencing issue related to sqlcipher_export in crypto.c and sqlite3StrICmp in sqlite3.c. This may allow an attacker to perform a remote denial of service attack. For example, an SQL injection can be used to execute the crafted SQL command sequence, which causes ... | https://nvd.nist.gov/vuln/detail/CVE-2021-3119 |
521,504 | sqlcipher | cb71f53e8cea4802509f182fa5bead0ac6ab0e7f | https://github.com/sqlcipher/sqlcipher | https://github.com/sqlcipher/sqlcipher/commit/cb71f53e8cea4802509f182fa5bead0ac6ab0e7f | fix sqlcipher_export handling of NULL parameters | 0 | static int sqlcipher_execExecSql(sqlite3 *db, char **pzErrMsg, const char *zSql){
sqlite3_stmt *pStmt;
int rc;
rc = sqlite3_prepare(db, zSql, -1, &pStmt, 0);
if( rc!=SQLITE_OK ) return rc;
while( SQLITE_ROW==sqlite3_step(pStmt) ){
rc = sqlcipher_execSql(db, pzErrMsg, (char*)sqlite3_column_text(pStmt, 0)... | 73,930,657,758,115,480,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2021-3119 | Zetetic SQLCipher 4.x before 4.4.3 has a NULL pointer dereferencing issue related to sqlcipher_export in crypto.c and sqlite3StrICmp in sqlite3.c. This may allow an attacker to perform a remote denial of service attack. For example, an SQL injection can be used to execute the crafted SQL command sequence, which causes ... | https://nvd.nist.gov/vuln/detail/CVE-2021-3119 |
521,505 | sqlcipher | cb71f53e8cea4802509f182fa5bead0ac6ab0e7f | https://github.com/sqlcipher/sqlcipher | https://github.com/sqlcipher/sqlcipher/commit/cb71f53e8cea4802509f182fa5bead0ac6ab0e7f | fix sqlcipher_export handling of NULL parameters | 0 | static void codec_vdbe_return_string(Parse *pParse, const char *zLabel, const char *value, int value_type){
Vdbe *v = sqlite3GetVdbe(pParse);
sqlite3VdbeSetNumCols(v, 1);
sqlite3VdbeSetColName(v, 0, COLNAME_NAME, zLabel, SQLITE_STATIC);
sqlite3VdbeAddOp4(v, OP_String8, 0, 1, 0, value, value_type);
sqlite3Vdbe... | 17,568,490,585,757,700,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2021-3119 | Zetetic SQLCipher 4.x before 4.4.3 has a NULL pointer dereferencing issue related to sqlcipher_export in crypto.c and sqlite3StrICmp in sqlite3.c. This may allow an attacker to perform a remote denial of service attack. For example, an SQL injection can be used to execute the crafted SQL command sequence, which causes ... | https://nvd.nist.gov/vuln/detail/CVE-2021-3119 |
521,506 | sqlcipher | cb71f53e8cea4802509f182fa5bead0ac6ab0e7f | https://github.com/sqlcipher/sqlcipher | https://github.com/sqlcipher/sqlcipher/commit/cb71f53e8cea4802509f182fa5bead0ac6ab0e7f | fix sqlcipher_export handling of NULL parameters | 0 | void sqlcipher_exportFunc(sqlite3_context *context, int argc, sqlite3_value **argv) {
sqlite3 *db = sqlite3_context_db_handle(context);
const char* targetDb, *sourceDb;
int targetDb_idx = 0;
u64 saved_flags = db->flags; /* Saved value of the db->flags */
u32 saved_mDbFlags = db->mDbFlags; /* Sa... | 291,673,322,331,677,800,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2021-3119 | Zetetic SQLCipher 4.x before 4.4.3 has a NULL pointer dereferencing issue related to sqlcipher_export in crypto.c and sqlite3StrICmp in sqlite3.c. This may allow an attacker to perform a remote denial of service attack. For example, an SQL injection can be used to execute the crafted SQL command sequence, which causes ... | https://nvd.nist.gov/vuln/detail/CVE-2021-3119 |
521,507 | sqlcipher | cb71f53e8cea4802509f182fa5bead0ac6ab0e7f | https://github.com/sqlcipher/sqlcipher | https://github.com/sqlcipher/sqlcipher/commit/cb71f53e8cea4802509f182fa5bead0ac6ab0e7f | fix sqlcipher_export handling of NULL parameters | 0 | int sqlite3_key(sqlite3 *db, const void *pKey, int nKey) {
CODEC_TRACE("sqlite3_key entered: db=%p pKey=%s nKey=%d\n", db, (char *)pKey, nKey);
return sqlite3_key_v2(db, "main", pKey, nKey);
} | 55,890,209,071,705,450,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2021-3119 | Zetetic SQLCipher 4.x before 4.4.3 has a NULL pointer dereferencing issue related to sqlcipher_export in crypto.c and sqlite3StrICmp in sqlite3.c. This may allow an attacker to perform a remote denial of service attack. For example, an SQL injection can be used to execute the crafted SQL command sequence, which causes ... | https://nvd.nist.gov/vuln/detail/CVE-2021-3119 |
521,508 | sqlcipher | cb71f53e8cea4802509f182fa5bead0ac6ab0e7f | https://github.com/sqlcipher/sqlcipher | https://github.com/sqlcipher/sqlcipher/commit/cb71f53e8cea4802509f182fa5bead0ac6ab0e7f | fix sqlcipher_export handling of NULL parameters | 0 | static int codec_set_btree_to_codec_pagesize(sqlite3 *db, Db *pDb, codec_ctx *ctx) {
int rc, page_sz, reserve_sz;
page_sz = sqlcipher_codec_ctx_get_pagesize(ctx);
reserve_sz = sqlcipher_codec_ctx_get_reservesize(ctx);
CODEC_TRACE("codec_set_btree_to_codec_pagesize: sqlite3BtreeSetPageSize() size=%d reserve=%... | 231,366,181,439,557,500,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2021-3119 | Zetetic SQLCipher 4.x before 4.4.3 has a NULL pointer dereferencing issue related to sqlcipher_export in crypto.c and sqlite3StrICmp in sqlite3.c. This may allow an attacker to perform a remote denial of service attack. For example, an SQL injection can be used to execute the crafted SQL command sequence, which causes ... | https://nvd.nist.gov/vuln/detail/CVE-2021-3119 |
521,509 | sqlcipher | cb71f53e8cea4802509f182fa5bead0ac6ab0e7f | https://github.com/sqlcipher/sqlcipher | https://github.com/sqlcipher/sqlcipher/commit/cb71f53e8cea4802509f182fa5bead0ac6ab0e7f | fix sqlcipher_export handling of NULL parameters | 0 | static void* sqlite3Codec(void *iCtx, void *data, Pgno pgno, int mode) {
codec_ctx *ctx = (codec_ctx *) iCtx;
int offset = 0, rc = 0;
int page_sz = sqlcipher_codec_ctx_get_pagesize(ctx);
unsigned char *pData = (unsigned char *) data;
void *buffer = sqlcipher_codec_ctx_get_data(ctx);
int plaintext_header_sz... | 120,525,436,105,512,950,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2021-3119 | Zetetic SQLCipher 4.x before 4.4.3 has a NULL pointer dereferencing issue related to sqlcipher_export in crypto.c and sqlite3StrICmp in sqlite3.c. This may allow an attacker to perform a remote denial of service attack. For example, an SQL injection can be used to execute the crafted SQL command sequence, which causes ... | https://nvd.nist.gov/vuln/detail/CVE-2021-3119 |
521,510 | sqlcipher | cb71f53e8cea4802509f182fa5bead0ac6ab0e7f | https://github.com/sqlcipher/sqlcipher | https://github.com/sqlcipher/sqlcipher/commit/cb71f53e8cea4802509f182fa5bead0ac6ab0e7f | fix sqlcipher_export handling of NULL parameters | 0 | int sqlite3_rekey_v2(sqlite3 *db, const char *zDb, const void *pKey, int nKey) {
CODEC_TRACE("sqlite3_rekey_v2: entered db=%p zDb=%s pKey=%s, nKey=%d\n", db, zDb, (char *)pKey, nKey);
if(db && pKey && nKey) {
int db_index = sqlcipher_find_db_index(db, zDb);
struct Db *pDb = &db->aDb[db_index];
CODEC_TRA... | 54,074,107,687,568,530,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2021-3119 | Zetetic SQLCipher 4.x before 4.4.3 has a NULL pointer dereferencing issue related to sqlcipher_export in crypto.c and sqlite3StrICmp in sqlite3.c. This may allow an attacker to perform a remote denial of service attack. For example, an SQL injection can be used to execute the crafted SQL command sequence, which causes ... | https://nvd.nist.gov/vuln/detail/CVE-2021-3119 |
521,511 | sqlcipher | cb71f53e8cea4802509f182fa5bead0ac6ab0e7f | https://github.com/sqlcipher/sqlcipher | https://github.com/sqlcipher/sqlcipher/commit/cb71f53e8cea4802509f182fa5bead0ac6ab0e7f | fix sqlcipher_export handling of NULL parameters | 0 | static void sqlite3FreeCodecArg(void *pCodecArg) {
codec_ctx *ctx = (codec_ctx *) pCodecArg;
if(pCodecArg == NULL) return;
sqlcipher_codec_ctx_free(&ctx); /* wipe and free allocated memory for the context */
sqlcipher_deactivate(); /* cleanup related structures, OpenSSL etc, when codec is detatched */
} | 193,060,164,115,461,920,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2021-3119 | Zetetic SQLCipher 4.x before 4.4.3 has a NULL pointer dereferencing issue related to sqlcipher_export in crypto.c and sqlite3StrICmp in sqlite3.c. This may allow an attacker to perform a remote denial of service attack. For example, an SQL injection can be used to execute the crafted SQL command sequence, which causes ... | https://nvd.nist.gov/vuln/detail/CVE-2021-3119 |
521,512 | sqlcipher | cb71f53e8cea4802509f182fa5bead0ac6ab0e7f | https://github.com/sqlcipher/sqlcipher | https://github.com/sqlcipher/sqlcipher/commit/cb71f53e8cea4802509f182fa5bead0ac6ab0e7f | fix sqlcipher_export handling of NULL parameters | 0 | static int sqlcipher_execSql(sqlite3 *db, char **pzErrMsg, const char *zSql){
sqlite3_stmt *pStmt;
VVA_ONLY( int rc; )
if( !zSql ){
return SQLITE_NOMEM;
}
if( SQLITE_OK!=sqlite3_prepare(db, zSql, -1, &pStmt, 0) ){
sqlite3SetString(pzErrMsg, db, sqlite3_errmsg(db));
return sqlite3_errcode(db);
}
... | 160,233,460,793,917,870,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2021-3119 | Zetetic SQLCipher 4.x before 4.4.3 has a NULL pointer dereferencing issue related to sqlcipher_export in crypto.c and sqlite3StrICmp in sqlite3.c. This may allow an attacker to perform a remote denial of service attack. For example, an SQL injection can be used to execute the crafted SQL command sequence, which causes ... | https://nvd.nist.gov/vuln/detail/CVE-2021-3119 |
521,513 | sqlcipher | cb71f53e8cea4802509f182fa5bead0ac6ab0e7f | https://github.com/sqlcipher/sqlcipher | https://github.com/sqlcipher/sqlcipher/commit/cb71f53e8cea4802509f182fa5bead0ac6ab0e7f | fix sqlcipher_export handling of NULL parameters | 0 | int sqlite3_rekey(sqlite3 *db, const void *pKey, int nKey) {
CODEC_TRACE("sqlite3_rekey entered: db=%p pKey=%s nKey=%d\n", db, (char *)pKey, nKey);
return sqlite3_rekey_v2(db, "main", pKey, nKey);
} | 191,606,247,726,643,400,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2021-3119 | Zetetic SQLCipher 4.x before 4.4.3 has a NULL pointer dereferencing issue related to sqlcipher_export in crypto.c and sqlite3StrICmp in sqlite3.c. This may allow an attacker to perform a remote denial of service attack. For example, an SQL injection can be used to execute the crafted SQL command sequence, which causes ... | https://nvd.nist.gov/vuln/detail/CVE-2021-3119 |
521,514 | sqlcipher | cb71f53e8cea4802509f182fa5bead0ac6ab0e7f | https://github.com/sqlcipher/sqlcipher | https://github.com/sqlcipher/sqlcipher/commit/cb71f53e8cea4802509f182fa5bead0ac6ab0e7f | fix sqlcipher_export handling of NULL parameters | 0 | int sqlite3_key_v2(sqlite3 *db, const char *zDb, const void *pKey, int nKey) {
CODEC_TRACE("sqlite3_key_v2: entered db=%p zDb=%s pKey=%s nKey=%d\n", db, zDb, (char *)pKey, nKey);
/* attach key if db and pKey are not null and nKey is > 0 */
if(db && pKey && nKey) {
int db_index = sqlcipher_find_db_index(db, zD... | 263,859,736,813,268,150,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2021-3119 | Zetetic SQLCipher 4.x before 4.4.3 has a NULL pointer dereferencing issue related to sqlcipher_export in crypto.c and sqlite3StrICmp in sqlite3.c. This may allow an attacker to perform a remote denial of service attack. For example, an SQL injection can be used to execute the crafted SQL command sequence, which causes ... | https://nvd.nist.gov/vuln/detail/CVE-2021-3119 |
521,515 | sqlcipher | cb71f53e8cea4802509f182fa5bead0ac6ab0e7f | https://github.com/sqlcipher/sqlcipher | https://github.com/sqlcipher/sqlcipher/commit/cb71f53e8cea4802509f182fa5bead0ac6ab0e7f | fix sqlcipher_export handling of NULL parameters | 0 | int sqlcipher_find_db_index(sqlite3 *db, const char *zDb) {
int db_index;
if(zDb == NULL){
return 0;
}
for(db_index = 0; db_index < db->nDb; db_index++) {
struct Db *pDb = &db->aDb[db_index];
if(strcmp(pDb->zDbSName, zDb) == 0) {
return db_index;
}
}
return 0;
} | 321,382,141,115,475,200,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2021-3119 | Zetetic SQLCipher 4.x before 4.4.3 has a NULL pointer dereferencing issue related to sqlcipher_export in crypto.c and sqlite3StrICmp in sqlite3.c. This may allow an attacker to perform a remote denial of service attack. For example, an SQL injection can be used to execute the crafted SQL command sequence, which causes ... | https://nvd.nist.gov/vuln/detail/CVE-2021-3119 |
521,516 | sqlcipher | cb71f53e8cea4802509f182fa5bead0ac6ab0e7f | https://github.com/sqlcipher/sqlcipher | https://github.com/sqlcipher/sqlcipher/commit/cb71f53e8cea4802509f182fa5bead0ac6ab0e7f | fix sqlcipher_export handling of NULL parameters | 0 | void sqlite3CodecGetKey(sqlite3* db, int nDb, void **zKey, int *nKey) {
struct Db *pDb = &db->aDb[nDb];
CODEC_TRACE("sqlite3CodecGetKey: entered db=%p, nDb=%d\n", db, nDb);
if( pDb->pBt ) {
codec_ctx *ctx = (codec_ctx*) sqlite3PagerGetCodec(pDb->pBt->pBt->pPager);
if(ctx) {
/* pass back the key... | 79,918,361,212,436,000,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2021-3119 | Zetetic SQLCipher 4.x before 4.4.3 has a NULL pointer dereferencing issue related to sqlcipher_export in crypto.c and sqlite3StrICmp in sqlite3.c. This may allow an attacker to perform a remote denial of service attack. For example, an SQL injection can be used to execute the crafted SQL command sequence, which causes ... | https://nvd.nist.gov/vuln/detail/CVE-2021-3119 |
522,366 | node-lmdb | 97760104c0fd311206b88aecd91fa1f59fe2b85a | https://github.com/Venemo/node-lmdb | https://github.com/Venemo/node-lmdb/commit/97760104c0fd311206b88aecd91fa1f59fe2b85a | Perform argument check for putString | 0 | NAN_METHOD(TxnWrap::reset) {
Nan::HandleScope scope;
TxnWrap *tw = Nan::ObjectWrap::Unwrap<TxnWrap>(info.This());
if (!tw->txn) {
return Nan::ThrowError("The transaction is already closed.");
}
mdb_txn_reset(tw->txn);
} | 60,457,954,544,277,010,000,000,000,000,000,000,000 | None | null | [
"NVD-CWE-noinfo"
] | CVE-2022-21164 | The package node-lmdb before 0.9.7 are vulnerable to Denial of Service (DoS) when defining a non-invokable ToString value, which will cause a crash during type check. | https://nvd.nist.gov/vuln/detail/CVE-2022-21164 |
522,367 | node-lmdb | 97760104c0fd311206b88aecd91fa1f59fe2b85a | https://github.com/Venemo/node-lmdb | https://github.com/Venemo/node-lmdb/commit/97760104c0fd311206b88aecd91fa1f59fe2b85a | Perform argument check for putString | 0 | NAN_METHOD(TxnWrap::getStringUnsafe) {
return getCommon(info, valToStringUnsafe);
} | 236,338,861,112,838,170,000,000,000,000,000,000,000 | None | null | [
"NVD-CWE-noinfo"
] | CVE-2022-21164 | The package node-lmdb before 0.9.7 are vulnerable to Denial of Service (DoS) when defining a non-invokable ToString value, which will cause a crash during type check. | https://nvd.nist.gov/vuln/detail/CVE-2022-21164 |
522,368 | node-lmdb | 97760104c0fd311206b88aecd91fa1f59fe2b85a | https://github.com/Venemo/node-lmdb | https://github.com/Venemo/node-lmdb/commit/97760104c0fd311206b88aecd91fa1f59fe2b85a | Perform argument check for putString | 0 | TxnWrap::~TxnWrap() {
// Close if not closed already
if (this->txn) {
mdb_txn_abort(txn);
this->removeFromEnvWrap();
}
} | 123,930,430,147,199,690,000,000,000,000,000,000,000 | None | null | [
"NVD-CWE-noinfo"
] | CVE-2022-21164 | The package node-lmdb before 0.9.7 are vulnerable to Denial of Service (DoS) when defining a non-invokable ToString value, which will cause a crash during type check. | https://nvd.nist.gov/vuln/detail/CVE-2022-21164 |
522,369 | node-lmdb | 97760104c0fd311206b88aecd91fa1f59fe2b85a | https://github.com/Venemo/node-lmdb | https://github.com/Venemo/node-lmdb/commit/97760104c0fd311206b88aecd91fa1f59fe2b85a | Perform argument check for putString | 0 | NAN_METHOD(TxnWrap::renew) {
Nan::HandleScope scope;
TxnWrap *tw = Nan::ObjectWrap::Unwrap<TxnWrap>(info.This());
if (!tw->txn) {
return Nan::ThrowError("The transaction is already closed.");
}
int rc = mdb_txn_renew(tw->txn);
if (rc != 0) {
return throwLmdbError(rc);
}
} | 34,879,962,823,629,910,000,000,000,000,000,000,000 | None | null | [
"NVD-CWE-noinfo"
] | CVE-2022-21164 | The package node-lmdb before 0.9.7 are vulnerable to Denial of Service (DoS) when defining a non-invokable ToString value, which will cause a crash during type check. | https://nvd.nist.gov/vuln/detail/CVE-2022-21164 |
522,370 | node-lmdb | 97760104c0fd311206b88aecd91fa1f59fe2b85a | https://github.com/Venemo/node-lmdb | https://github.com/Venemo/node-lmdb/commit/97760104c0fd311206b88aecd91fa1f59fe2b85a | Perform argument check for putString | 0 | NAN_METHOD(TxnWrap::getBinaryUnsafe) {
return getCommon(info, valToBinaryUnsafe);
} | 124,596,560,158,399,750,000,000,000,000,000,000,000 | None | null | [
"NVD-CWE-noinfo"
] | CVE-2022-21164 | The package node-lmdb before 0.9.7 are vulnerable to Denial of Service (DoS) when defining a non-invokable ToString value, which will cause a crash during type check. | https://nvd.nist.gov/vuln/detail/CVE-2022-21164 |
522,371 | node-lmdb | 97760104c0fd311206b88aecd91fa1f59fe2b85a | https://github.com/Venemo/node-lmdb | https://github.com/Venemo/node-lmdb/commit/97760104c0fd311206b88aecd91fa1f59fe2b85a | Perform argument check for putString | 0 | TxnWrap::TxnWrap(MDB_env *env, MDB_txn *txn) {
this->env = env;
this->txn = txn;
this->flags = 0;
} | 3,318,558,263,858,188,000,000,000,000,000,000,000 | None | null | [
"NVD-CWE-noinfo"
] | CVE-2022-21164 | The package node-lmdb before 0.9.7 are vulnerable to Denial of Service (DoS) when defining a non-invokable ToString value, which will cause a crash during type check. | https://nvd.nist.gov/vuln/detail/CVE-2022-21164 |
522,372 | node-lmdb | 97760104c0fd311206b88aecd91fa1f59fe2b85a | https://github.com/Venemo/node-lmdb | https://github.com/Venemo/node-lmdb/commit/97760104c0fd311206b88aecd91fa1f59fe2b85a | Perform argument check for putString | 0 | NAN_METHOD(TxnWrap::putString) {
if (!info[2]->IsString())
return Nan::ThrowError("Value must be a string.");
return putCommon(info, [](Nan::NAN_METHOD_ARGS_TYPE info, MDB_val &data) -> void {
CustomExternalStringResource::writeTo(Local<String>::Cast(info[2]), &data);
}, [](MDB_val &data) ->... | 74,502,503,904,513,100,000,000,000,000,000,000,000 | None | null | [
"NVD-CWE-noinfo"
] | CVE-2022-21164 | The package node-lmdb before 0.9.7 are vulnerable to Denial of Service (DoS) when defining a non-invokable ToString value, which will cause a crash during type check. | https://nvd.nist.gov/vuln/detail/CVE-2022-21164 |
522,373 | node-lmdb | 97760104c0fd311206b88aecd91fa1f59fe2b85a | https://github.com/Venemo/node-lmdb | https://github.com/Venemo/node-lmdb/commit/97760104c0fd311206b88aecd91fa1f59fe2b85a | Perform argument check for putString | 0 | NAN_METHOD(TxnWrap::putNumber) {
return putCommon(info, [](Nan::NAN_METHOD_ARGS_TYPE info, MDB_val &data) -> void {
auto numberLocal = Nan::To<v8::Number>(info[2]).ToLocalChecked();
numberToPut = numberLocal->Value();
data.mv_size = sizeof(double);
data.mv_data = &numberToPut;
}... | 161,110,328,495,980,290,000,000,000,000,000,000,000 | None | null | [
"NVD-CWE-noinfo"
] | CVE-2022-21164 | The package node-lmdb before 0.9.7 are vulnerable to Denial of Service (DoS) when defining a non-invokable ToString value, which will cause a crash during type check. | https://nvd.nist.gov/vuln/detail/CVE-2022-21164 |
522,374 | node-lmdb | 97760104c0fd311206b88aecd91fa1f59fe2b85a | https://github.com/Venemo/node-lmdb | https://github.com/Venemo/node-lmdb/commit/97760104c0fd311206b88aecd91fa1f59fe2b85a | Perform argument check for putString | 0 | NAN_METHOD(TxnWrap::del) {
Nan::HandleScope scope;
// Check argument count
auto argCount = info.Length();
if (argCount < 2 || argCount > 4) {
return Nan::ThrowError("Invalid number of arguments to cursor.del, should be: (a) <dbi>, <key> (b) <dbi>, <key>, <options> (c) <dbi>, <key>, <data> (... | 167,750,490,431,939,200,000,000,000,000,000,000,000 | None | null | [
"NVD-CWE-noinfo"
] | CVE-2022-21164 | The package node-lmdb before 0.9.7 are vulnerable to Denial of Service (DoS) when defining a non-invokable ToString value, which will cause a crash during type check. | https://nvd.nist.gov/vuln/detail/CVE-2022-21164 |
522,375 | node-lmdb | 97760104c0fd311206b88aecd91fa1f59fe2b85a | https://github.com/Venemo/node-lmdb | https://github.com/Venemo/node-lmdb/commit/97760104c0fd311206b88aecd91fa1f59fe2b85a | Perform argument check for putString | 0 | NAN_METHOD(TxnWrap::abort) {
Nan::HandleScope scope;
TxnWrap *tw = Nan::ObjectWrap::Unwrap<TxnWrap>(info.This());
if (!tw->txn) {
return Nan::ThrowError("The transaction is already closed.");
}
mdb_txn_abort(tw->txn);
tw->removeFromEnvWrap();
tw->txn = nullptr;
} | 299,871,228,575,706,400,000,000,000,000,000,000,000 | None | null | [
"NVD-CWE-noinfo"
] | CVE-2022-21164 | The package node-lmdb before 0.9.7 are vulnerable to Denial of Service (DoS) when defining a non-invokable ToString value, which will cause a crash during type check. | https://nvd.nist.gov/vuln/detail/CVE-2022-21164 |
522,376 | node-lmdb | 97760104c0fd311206b88aecd91fa1f59fe2b85a | https://github.com/Venemo/node-lmdb | https://github.com/Venemo/node-lmdb/commit/97760104c0fd311206b88aecd91fa1f59fe2b85a | Perform argument check for putString | 0 | NAN_METHOD(TxnWrap::ctor) {
Nan::HandleScope scope;
EnvWrap *ew = Nan::ObjectWrap::Unwrap<EnvWrap>(Local<Object>::Cast(info[0]));
int flags = 0;
if (info[1]->IsObject()) {
Local<Object> options = Local<Object>::Cast(info[1]);
// Get flags from options
setFlagFromValue(&flags,... | 182,791,328,426,997,030,000,000,000,000,000,000,000 | None | null | [
"NVD-CWE-noinfo"
] | CVE-2022-21164 | The package node-lmdb before 0.9.7 are vulnerable to Denial of Service (DoS) when defining a non-invokable ToString value, which will cause a crash during type check. | https://nvd.nist.gov/vuln/detail/CVE-2022-21164 |
522,377 | node-lmdb | 97760104c0fd311206b88aecd91fa1f59fe2b85a | https://github.com/Venemo/node-lmdb | https://github.com/Venemo/node-lmdb/commit/97760104c0fd311206b88aecd91fa1f59fe2b85a | Perform argument check for putString | 0 | NAN_METHOD(TxnWrap::getBoolean) {
return getCommon(info, valToBoolean);
} | 223,508,738,397,270,870,000,000,000,000,000,000,000 | None | null | [
"NVD-CWE-noinfo"
] | CVE-2022-21164 | The package node-lmdb before 0.9.7 are vulnerable to Denial of Service (DoS) when defining a non-invokable ToString value, which will cause a crash during type check. | https://nvd.nist.gov/vuln/detail/CVE-2022-21164 |
522,378 | node-lmdb | 97760104c0fd311206b88aecd91fa1f59fe2b85a | https://github.com/Venemo/node-lmdb | https://github.com/Venemo/node-lmdb/commit/97760104c0fd311206b88aecd91fa1f59fe2b85a | Perform argument check for putString | 0 | NAN_METHOD(TxnWrap::getBinary) {
return getCommon(info, valToBinary);
} | 204,473,871,683,747,200,000,000,000,000,000,000,000 | None | null | [
"NVD-CWE-noinfo"
] | CVE-2022-21164 | The package node-lmdb before 0.9.7 are vulnerable to Denial of Service (DoS) when defining a non-invokable ToString value, which will cause a crash during type check. | https://nvd.nist.gov/vuln/detail/CVE-2022-21164 |
522,379 | node-lmdb | 97760104c0fd311206b88aecd91fa1f59fe2b85a | https://github.com/Venemo/node-lmdb | https://github.com/Venemo/node-lmdb/commit/97760104c0fd311206b88aecd91fa1f59fe2b85a | Perform argument check for putString | 0 | NAN_METHOD(TxnWrap::commit) {
Nan::HandleScope scope;
TxnWrap *tw = Nan::ObjectWrap::Unwrap<TxnWrap>(info.This());
if (!tw->txn) {
return Nan::ThrowError("The transaction is already closed.");
}
int rc = mdb_txn_commit(tw->txn);
tw->removeFromEnvWrap();
tw->txn = nullptr;
if ... | 87,809,197,599,161,280,000,000,000,000,000,000,000 | None | null | [
"NVD-CWE-noinfo"
] | CVE-2022-21164 | The package node-lmdb before 0.9.7 are vulnerable to Denial of Service (DoS) when defining a non-invokable ToString value, which will cause a crash during type check. | https://nvd.nist.gov/vuln/detail/CVE-2022-21164 |
522,380 | node-lmdb | 97760104c0fd311206b88aecd91fa1f59fe2b85a | https://github.com/Venemo/node-lmdb | https://github.com/Venemo/node-lmdb/commit/97760104c0fd311206b88aecd91fa1f59fe2b85a | Perform argument check for putString | 0 | void TxnWrap::removeFromEnvWrap() {
if (this->ew) {
if (this->ew->currentWriteTxn == this) {
this->ew->currentWriteTxn = nullptr;
}
else {
auto it = std::find(ew->readTxns.begin(), ew->readTxns.end(), this);
if (it != ew->readTxns.end()) {
... | 99,122,763,629,656,950,000,000,000,000,000,000,000 | None | null | [
"NVD-CWE-noinfo"
] | CVE-2022-21164 | The package node-lmdb before 0.9.7 are vulnerable to Denial of Service (DoS) when defining a non-invokable ToString value, which will cause a crash during type check. | https://nvd.nist.gov/vuln/detail/CVE-2022-21164 |
522,381 | node-lmdb | 97760104c0fd311206b88aecd91fa1f59fe2b85a | https://github.com/Venemo/node-lmdb | https://github.com/Venemo/node-lmdb/commit/97760104c0fd311206b88aecd91fa1f59fe2b85a | Perform argument check for putString | 0 | Nan::NAN_METHOD_RETURN_TYPE TxnWrap::getCommon(Nan::NAN_METHOD_ARGS_TYPE info, Local<Value> (*successFunc)(MDB_val&)) {
Nan::HandleScope scope;
if (info.Length() != 2 && info.Length() != 3) {
return Nan::ThrowError("Invalid number of arguments to cursor.get");
}
TxnWrap *tw = Nan::ObjectWr... | 231,543,547,489,732,560,000,000,000,000,000,000,000 | None | null | [
"NVD-CWE-noinfo"
] | CVE-2022-21164 | The package node-lmdb before 0.9.7 are vulnerable to Denial of Service (DoS) when defining a non-invokable ToString value, which will cause a crash during type check. | https://nvd.nist.gov/vuln/detail/CVE-2022-21164 |
522,382 | node-lmdb | 97760104c0fd311206b88aecd91fa1f59fe2b85a | https://github.com/Venemo/node-lmdb | https://github.com/Venemo/node-lmdb/commit/97760104c0fd311206b88aecd91fa1f59fe2b85a | Perform argument check for putString | 0 | NAN_METHOD(TxnWrap::getNumber) {
return getCommon(info, valToNumber);
} | 76,876,237,783,665,510,000,000,000,000,000,000,000 | None | null | [
"NVD-CWE-noinfo"
] | CVE-2022-21164 | The package node-lmdb before 0.9.7 are vulnerable to Denial of Service (DoS) when defining a non-invokable ToString value, which will cause a crash during type check. | https://nvd.nist.gov/vuln/detail/CVE-2022-21164 |
522,383 | node-lmdb | 97760104c0fd311206b88aecd91fa1f59fe2b85a | https://github.com/Venemo/node-lmdb | https://github.com/Venemo/node-lmdb/commit/97760104c0fd311206b88aecd91fa1f59fe2b85a | Perform argument check for putString | 0 | Nan::NAN_METHOD_RETURN_TYPE TxnWrap::putCommon(Nan::NAN_METHOD_ARGS_TYPE info, void (*fillFunc)(Nan::NAN_METHOD_ARGS_TYPE info, MDB_val&), void (*freeData)(MDB_val&)) {
Nan::HandleScope scope;
if (info.Length() != 3 && info.Length() != 4) {
return Nan::ThrowError("Invalid number of arguments to txn... | 80,758,908,337,401,980,000,000,000,000,000,000,000 | None | null | [
"NVD-CWE-noinfo"
] | CVE-2022-21164 | The package node-lmdb before 0.9.7 are vulnerable to Denial of Service (DoS) when defining a non-invokable ToString value, which will cause a crash during type check. | https://nvd.nist.gov/vuln/detail/CVE-2022-21164 |
522,384 | node-lmdb | 97760104c0fd311206b88aecd91fa1f59fe2b85a | https://github.com/Venemo/node-lmdb | https://github.com/Venemo/node-lmdb/commit/97760104c0fd311206b88aecd91fa1f59fe2b85a | Perform argument check for putString | 0 | NAN_METHOD(TxnWrap::putBinary) {
return putCommon(info, [](Nan::NAN_METHOD_ARGS_TYPE info, MDB_val &data) -> void {
data.mv_size = node::Buffer::Length(info[2]);
data.mv_data = node::Buffer::Data(info[2]);
}, [](MDB_val &) -> void {
// The data is owned by the node::Buffer so we don't ne... | 31,124,891,366,588,017,000,000,000,000,000,000,000 | None | null | [
"NVD-CWE-noinfo"
] | CVE-2022-21164 | The package node-lmdb before 0.9.7 are vulnerable to Denial of Service (DoS) when defining a non-invokable ToString value, which will cause a crash during type check. | https://nvd.nist.gov/vuln/detail/CVE-2022-21164 |
522,385 | node-lmdb | 97760104c0fd311206b88aecd91fa1f59fe2b85a | https://github.com/Venemo/node-lmdb | https://github.com/Venemo/node-lmdb/commit/97760104c0fd311206b88aecd91fa1f59fe2b85a | Perform argument check for putString | 0 | NAN_METHOD(TxnWrap::getString) {
return getCommon(info, valToString);
} | 225,893,783,809,469,350,000,000,000,000,000,000,000 | None | null | [
"NVD-CWE-noinfo"
] | CVE-2022-21164 | The package node-lmdb before 0.9.7 are vulnerable to Denial of Service (DoS) when defining a non-invokable ToString value, which will cause a crash during type check. | https://nvd.nist.gov/vuln/detail/CVE-2022-21164 |
522,386 | node-lmdb | 97760104c0fd311206b88aecd91fa1f59fe2b85a | https://github.com/Venemo/node-lmdb | https://github.com/Venemo/node-lmdb/commit/97760104c0fd311206b88aecd91fa1f59fe2b85a | Perform argument check for putString | 0 | NAN_METHOD(TxnWrap::putBoolean) {
return putCommon(info, [](Nan::NAN_METHOD_ARGS_TYPE info, MDB_val &data) -> void {
auto booleanLocal = Nan::To<v8::Boolean>(info[2]).ToLocalChecked();
booleanToPut = booleanLocal->Value();
data.mv_size = sizeof(bool);
data.mv_data = &booleanToPut;
... | 249,464,519,442,557,060,000,000,000,000,000,000,000 | None | null | [
"NVD-CWE-noinfo"
] | CVE-2022-21164 | The package node-lmdb before 0.9.7 are vulnerable to Denial of Service (DoS) when defining a non-invokable ToString value, which will cause a crash during type check. | https://nvd.nist.gov/vuln/detail/CVE-2022-21164 |
522,442 | maddy | 7ee6a39c6a1939b376545f030a5efd6f90913583 | https://github.com/foxcpp/maddy | https://github.com/foxcpp/maddy/commit/7ee6a39c6a1939b376545f030a5efd6f90913583 | auth/pam: Check for account/password expiry
See GHSA-6cp7-g972-w9m9. Thanks Youssef Rebahi-Gilbert (ysf) for
reporting the issue. | 0 | static int conv_func(int num_msg, const struct pam_message **msg, struct pam_response **resp, void *appdata_ptr) {
*resp = (struct pam_response*)appdata_ptr;
return PAM_SUCCESS;
} | 223,400,127,245,454,900,000,000,000,000,000,000,000 | None | null | [
"CWE-613"
] | CVE-2022-24732 | Maddy Mail Server is an open source SMTP compatible email server. Versions of maddy prior to 0.5.4 do not implement password expiry or account expiry checking when authenticating using PAM. Users are advised to upgrade. Users unable to upgrade should manually remove expired accounts via existing filtering mechanisms. | https://nvd.nist.gov/vuln/detail/CVE-2022-24732 |
522,443 | maddy | 7ee6a39c6a1939b376545f030a5efd6f90913583 | https://github.com/foxcpp/maddy | https://github.com/foxcpp/maddy/commit/7ee6a39c6a1939b376545f030a5efd6f90913583 | auth/pam: Check for account/password expiry
See GHSA-6cp7-g972-w9m9. Thanks Youssef Rebahi-Gilbert (ysf) for
reporting the issue. | 0 | struct error_obj run_pam_auth(const char *username, char *password) {
// PAM frees pam_response for us.
struct pam_response *reply = malloc(sizeof(struct pam_response));
if (reply == NULL) {
struct error_obj ret_val;
ret_val.status = 2;
ret_val.func_name = "malloc";
ret_val.e... | 311,322,554,352,065,030,000,000,000,000,000,000,000 | None | null | [
"CWE-613"
] | CVE-2022-24732 | Maddy Mail Server is an open source SMTP compatible email server. Versions of maddy prior to 0.5.4 do not implement password expiry or account expiry checking when authenticating using PAM. Users are advised to upgrade. Users unable to upgrade should manually remove expired accounts via existing filtering mechanisms. | https://nvd.nist.gov/vuln/detail/CVE-2022-24732 |
0 | openssl | ca989269a2876bae79393bd54c3e72d49975fc75 | https://github.com/openssl/openssl | https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=ca989269a2876bae79393bd54c3e72d49975fc75 | Use version in SSL_METHOD not SSL structure.
When deciding whether to use TLS 1.2 PRF and record hash algorithms
use the version number in the corresponding SSL_METHOD structure
instead of the SSL structure. The SSL structure version is sometimes
inaccurate. Note: OpenSSL 1.0.2 and later effectively do this already.
(... | 1 | long ssl_get_algorithm2(SSL *s)
{
long alg2 = s->s3->tmp.new_cipher->algorithm2;
if (TLS1_get_version(s) >= TLS1_2_VERSION &&
alg2 == (SSL_HANDSHAKE_MAC_DEFAULT|TLS1_PRF))
return SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256;
return alg2;
}
| 255,087,747,659,226,950,000,000,000,000,000,000,000 | None | null | [
"CWE-310"
] | CVE-2013-6449 | The ssl_get_algorithm2 function in ssl/s3_lib.c in OpenSSL before 1.0.2 obtains a certain version number from an incorrect data structure, which allows remote attackers to cause a denial of service (daemon crash) via crafted traffic from a TLS 1.2 client. | https://nvd.nist.gov/vuln/detail/CVE-2013-6449 |
157,856 | openssl | ca989269a2876bae79393bd54c3e72d49975fc75 | https://github.com/openssl/openssl | https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=ca989269a2876bae79393bd54c3e72d49975fc75 | Use version in SSL_METHOD not SSL structure.
When deciding whether to use TLS 1.2 PRF and record hash algorithms
use the version number in the corresponding SSL_METHOD structure
instead of the SSL structure. The SSL structure version is sometimes
inaccurate. Note: OpenSSL 1.0.2 and later effectively do this already.
(... | 0 | long ssl_get_algorithm2(SSL *s)
{
long alg2 = s->s3->tmp.new_cipher->algorithm2;
if (s->method->version == TLS1_2_VERSION &&
alg2 == (SSL_HANDSHAKE_MAC_DEFAULT|TLS1_PRF))
return SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256;
return alg2;
}
| 185,448,168,336,389,570,000,000,000,000,000,000,000 | None | null | [
"CWE-310"
] | CVE-2013-6449 | The ssl_get_algorithm2 function in ssl/s3_lib.c in OpenSSL before 1.0.2 obtains a certain version number from an incorrect data structure, which allows remote attackers to cause a denial of service (daemon crash) via crafted traffic from a TLS 1.2 client. | https://nvd.nist.gov/vuln/detail/CVE-2013-6449 |
1 | savannah | 190cef6eed37d0e73a73c1e205eb31d45ab60a3c | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commitdiff;h=190cef6eed37d0e73a73c1e205eb31d45ab60a3c | None | 1 | gnutls_session_get_data (gnutls_session_t session,
void *session_data, size_t * session_data_size)
{
gnutls_datum_t psession;
int ret;
if (session->internals.resumable == RESUME_FALSE)
return GNUTLS_E_INVALID_SESSION;
psession.data = session_data;
ret = _gnutls_session_pack (s... | 266,005,388,725,654,380,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-4128 | Buffer overflow in the gnutls_session_get_data function in lib/gnutls_session.c in GnuTLS 2.12.x before 2.12.14 and 3.x before 3.0.7, when used on a client that performs nonstandard session resumption, allows remote TLS servers to cause a denial of service (application crash) via a large SessionTicket. | https://nvd.nist.gov/vuln/detail/CVE-2011-4128 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.