idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
252,971
nDPI
7ce478a58b4dd29a8d1e6f4e9df2f778613d9202
https://github.com/ntop/nDPI
https://github.com/ntop/nDPI/commit/7ce478a58b4dd29a8d1e6f4e9df2f778613d9202
ssh: fixing unsigned overflow leading to heap overflow cf GHSL-2020-051
0
static u_int16_t concat_hash_string(struct ndpi_packet_struct *packet, char *buf, u_int8_t client_hash) { u_int32_t offset = 22, buf_out_len = 0; if(offset+sizeof(u_int32_t) >= packet->payload_packet_len) goto invalid_payload; u_int32_t len = ntohl(*(u_int32_t*)&packet->payload[offset]); offset += 4;...
305,118,570,856,768,630,000,000,000,000,000,000,000
ssh.c
116,649,129,995,467,670,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2020-11939
In nDPI through 3.2 Stable, the SSH protocol dissector has multiple KEXINIT integer overflows that result in a controlled remote heap overflow in concat_hash_string in ssh.c. Due to the granular nature of the overflow primitive and the ability to control both the contents and layout of the nDPI library's heap memory th...
https://nvd.nist.gov/vuln/detail/CVE-2020-11939
197,126
gpac
87afe070cd6866df7fe80f11b26ef75161de85e0
https://github.com/gpac/gpac
https://github.com/gpac/gpac/commit/87afe070cd6866df7fe80f11b26ef75161de85e0
fixed #1734
1
GF_Err HintFile(GF_ISOFile *file, u32 MTUSize, u32 max_ptime, u32 rtp_rate, u32 base_flags, Bool copy_data, Bool interleave, Bool regular_iod, Bool single_group, Bool hint_no_offset) { GF_ESD *esd; GF_InitialObjectDescriptor *iod; u32 i, val, res, streamType; u32 sl_mode, prev_ocr, single_ocr, nb_done, tot_bw, bw, ...
204,950,326,892,951,700,000,000,000,000,000,000,000
main.c
146,764,505,750,340,260,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2021-31257
The HintFile function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command.
https://nvd.nist.gov/vuln/detail/CVE-2021-31257
253,418
gpac
87afe070cd6866df7fe80f11b26ef75161de85e0
https://github.com/gpac/gpac
https://github.com/gpac/gpac/commit/87afe070cd6866df7fe80f11b26ef75161de85e0
fixed #1734
0
GF_Err HintFile(GF_ISOFile *file, u32 MTUSize, u32 max_ptime, u32 rtp_rate, u32 base_flags, Bool copy_data, Bool interleave, Bool regular_iod, Bool single_group, Bool hint_no_offset) { GF_ESD *esd; GF_InitialObjectDescriptor *iod; u32 i, val, res, streamType; u32 sl_mode, prev_ocr, single_ocr, nb_done, tot_bw, bw, ...
188,740,914,255,405,500,000,000,000,000,000,000,000
main.c
298,967,071,785,704,200,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2021-31257
The HintFile function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command.
https://nvd.nist.gov/vuln/detail/CVE-2021-31257
197,127
lepton
6a5ceefac1162783fffd9506a3de39c85c725761
https://github.com/dropbox/lepton
https://github.com/dropbox/lepton/commit/6a5ceefac1162783fffd9506a3de39c85c725761
fix #111
1
bool read_ujpg( void ) { using namespace IOUtil; using namespace Sirikata; // colldata.start_decoder_worker_thread(std::bind(&simple_decoder, &colldata, str_in)); unsigned char ujpg_mrk[ 64 ]; // this is where we will enable seccomp, before reading user data write_byte_bill(Billing::HEADER, true,...
23,962,241,303,848,227,000,000,000,000,000,000,000
jpgcoder.cc
317,206,061,460,321,170,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2018-20820
read_ujpg in jpgcoder.cc in Dropbox Lepton 1.2.1 allows attackers to cause a denial-of-service (application runtime crash because of an integer overflow) via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2018-20820
253,474
lepton
6a5ceefac1162783fffd9506a3de39c85c725761
https://github.com/dropbox/lepton
https://github.com/dropbox/lepton/commit/6a5ceefac1162783fffd9506a3de39c85c725761
fix #111
0
bool read_ujpg( void ) { using namespace IOUtil; using namespace Sirikata; // colldata.start_decoder_worker_thread(std::bind(&simple_decoder, &colldata, str_in)); unsigned char ujpg_mrk[ 64 ]; // this is where we will enable seccomp, before reading user data write_byte_bill(Billing::HEADER, true,...
295,970,260,975,063,250,000,000,000,000,000,000,000
jpgcoder.cc
313,953,252,136,084,800,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2018-20820
read_ujpg in jpgcoder.cc in Dropbox Lepton 1.2.1 allows attackers to cause a denial-of-service (application runtime crash because of an integer overflow) via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2018-20820
197,134
LibRaw
e47384546b43d0fd536e933249047bc397a4d88b
https://github.com/LibRaw/LibRaw
https://github.com/LibRaw/LibRaw/commit/e47384546b43d0fd536e933249047bc397a4d88b
Secunia Advisory SA83050: possible infinite loop in parse_minolta()
1
void CLASS parse_minolta(int base) { int save, tag, len, offset, high = 0, wide = 0, i, c; short sorder = order; fseek(ifp, base, SEEK_SET); if (fgetc(ifp) || fgetc(ifp) - 'M' || fgetc(ifp) - 'R') return; order = fgetc(ifp) * 0x101; offset = base + get4() + 8; while ((save = ftell(ifp)) < offset) {...
291,626,000,582,475,400,000,000,000,000,000,000,000
dcraw.c
14,327,791,662,469,230,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2018-5813
An error within the "parse_minolta()" function (dcraw/dcraw.c) in LibRaw versions prior to 0.18.11 can be exploited to trigger an infinite loop via a specially crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2018-5813
253,663
LibRaw
e47384546b43d0fd536e933249047bc397a4d88b
https://github.com/LibRaw/LibRaw
https://github.com/LibRaw/LibRaw/commit/e47384546b43d0fd536e933249047bc397a4d88b
Secunia Advisory SA83050: possible infinite loop in parse_minolta()
0
void CLASS parse_minolta(int base) { int save, tag, len, offset, high = 0, wide = 0, i, c; short sorder = order; fseek(ifp, base, SEEK_SET); if (fgetc(ifp) || fgetc(ifp) - 'M' || fgetc(ifp) - 'R') return; order = fgetc(ifp) * 0x101; offset = base + get4() + 8; #ifdef LIBRAW_LIBRARY_BUILD if(offset>if...
244,392,798,637,168,530,000,000,000,000,000,000,000
dcraw.c
192,267,252,051,739,200,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2018-5813
An error within the "parse_minolta()" function (dcraw/dcraw.c) in LibRaw versions prior to 0.18.11 can be exploited to trigger an infinite loop via a specially crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2018-5813
197,137
fbthrift
c5d6e07588cd03061bc54d451a7fa6e84883d62b
https://github.com/facebook/fbthrift
https://github.com/facebook/fbthrift/commit/c5d6e07588cd03061bc54d451a7fa6e84883d62b
Throw on bad types during skipping data Summary: The current code silently returns on bad types. In case when we have an invalid data, we may get a container of a large size with a bad type, this would lead to us running long loop doing nothing (though we already can say that the data is invalid). The new code would ...
1
void skip(Protocol_& prot, TType arg_type) { switch (arg_type) { case TType::T_BOOL: { bool boolv; prot.readBool(boolv); return; } case TType::T_BYTE: { int8_t bytev; prot.readByte(bytev); return; } case TType::T_I16: { int16_t i16; prot.readI16(i16)...
20,884,842,580,766,967,000,000,000,000,000,000,000
None
null
[ "CWE-703" ]
CVE-2019-3558
Python Facebook Thrift servers would not error upon receiving messages with containers of fields of unknown type. As a result, malicious clients could send short messages which would take a long time for the server to parse, potentially leading to denial of service. This issue affects Facebook Thrift prior to v2019.02....
https://nvd.nist.gov/vuln/detail/CVE-2019-3558
253,787
fbthrift
c5d6e07588cd03061bc54d451a7fa6e84883d62b
https://github.com/facebook/fbthrift
https://github.com/facebook/fbthrift/commit/c5d6e07588cd03061bc54d451a7fa6e84883d62b
Throw on bad types during skipping data Summary: The current code silently returns on bad types. In case when we have an invalid data, we may get a container of a large size with a bad type, this would lead to us running long loop doing nothing (though we already can say that the data is invalid). The new code would ...
0
void skip(Protocol_& prot, TType arg_type) { switch (arg_type) { case TType::T_BOOL: { bool boolv; prot.readBool(boolv); return; } case TType::T_BYTE: { int8_t bytev; prot.readByte(bytev); return; } case TType::T_I16: { int16_t i16; prot.readI16(i16)...
140,635,818,320,978,700,000,000,000,000,000,000,000
None
null
[ "CWE-703" ]
CVE-2019-3558
Python Facebook Thrift servers would not error upon receiving messages with containers of fields of unknown type. As a result, malicious clients could send short messages which would take a long time for the server to parse, potentially leading to denial of service. This issue affects Facebook Thrift prior to v2019.02....
https://nvd.nist.gov/vuln/detail/CVE-2019-3558
197,145
tensorflow
c57c0b9f3a4f8684f3489dd9a9ec627ad8b599f5
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/c57c0b9f3a4f8684f3489dd9a9ec627ad8b599f5
Fix the segfault in `tf.raw_ops.SparseCountSparseOutput`. PiperOrigin-RevId: 369264941 Change-Id: I23a96a15b8370c01ee21ba3841e1c7dcbf55e93d
1
void Compute(OpKernelContext* context) override { const Tensor& indices = context->input(0); const Tensor& values = context->input(1); const Tensor& shape = context->input(2); const Tensor& weights = context->input(3); bool use_weights = weights.NumElements() > 0; OP_REQUIRES(context, TensorS...
190,489,503,956,419,350,000,000,000,000,000,000,000
count_ops.cc
121,588,050,180,998,330,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2021-29521
TensorFlow is an end-to-end open source platform for machine learning. Specifying a negative dense shape in `tf.raw_ops.SparseCountSparseOutput` results in a segmentation fault being thrown out from the standard library as `std::vector` invariants are broken. This is because the implementation(https://github.com/tensor...
https://nvd.nist.gov/vuln/detail/CVE-2021-29521
254,048
tensorflow
c57c0b9f3a4f8684f3489dd9a9ec627ad8b599f5
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/c57c0b9f3a4f8684f3489dd9a9ec627ad8b599f5
Fix the segfault in `tf.raw_ops.SparseCountSparseOutput`. PiperOrigin-RevId: 369264941 Change-Id: I23a96a15b8370c01ee21ba3841e1c7dcbf55e93d
0
void Compute(OpKernelContext* context) override { const Tensor& indices = context->input(0); const Tensor& values = context->input(1); const Tensor& shape = context->input(2); const Tensor& weights = context->input(3); bool use_weights = weights.NumElements() > 0; OP_REQUIRES(context, TensorS...
86,708,936,283,314,160,000,000,000,000,000,000,000
count_ops.cc
62,835,234,415,593,940,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2021-29521
TensorFlow is an end-to-end open source platform for machine learning. Specifying a negative dense shape in `tf.raw_ops.SparseCountSparseOutput` results in a segmentation fault being thrown out from the standard library as `std::vector` invariants are broken. This is because the implementation(https://github.com/tensor...
https://nvd.nist.gov/vuln/detail/CVE-2021-29521
197,161
gpac
7f060bbb72966cae80d6fee338d0b07fa3fc06e1
https://github.com/gpac/gpac
https://github.com/gpac/gpac/commit/7f060bbb72966cae80d6fee338d0b07fa3fc06e1
fixed #2159
1
int avi_parse_input_file(avi_t *AVI, int getIndex) { int i, rate, scale, idx_type; s64 n; unsigned char *hdrl_data; u64 header_offset=0; int hdrl_len=0; int nvi, nai[AVI_MAX_TRACKS], ioff; u64 tot[AVI_MAX_TRACKS]; u32 j; int lasttag = 0; int vids_strh_seen = 0; int vids_strf_seen = 0; int auds_strh_seen = 0...
182,814,472,798,175,270,000,000,000,000,000,000,000
avilib.c
162,156,913,617,448,900,000,000,000,000,000,000,000
[ "CWE-835" ]
CVE-2022-1222
Inf loop in GitHub repository gpac/gpac prior to 2.1.0-DEV.
https://nvd.nist.gov/vuln/detail/CVE-2022-1222
254,202
gpac
7f060bbb72966cae80d6fee338d0b07fa3fc06e1
https://github.com/gpac/gpac
https://github.com/gpac/gpac/commit/7f060bbb72966cae80d6fee338d0b07fa3fc06e1
fixed #2159
0
int avi_parse_input_file(avi_t *AVI, int getIndex) { int rate, scale, idx_type; s64 n, i; unsigned char *hdrl_data; u64 header_offset=0; int hdrl_len=0; int nvi, nai[AVI_MAX_TRACKS], ioff; u64 tot[AVI_MAX_TRACKS]; u32 j; int lasttag = 0; int vids_strh_seen = 0; int vids_strf_seen = 0; int auds_strh_seen = 0...
112,695,742,349,006,270,000,000,000,000,000,000,000
avilib.c
226,521,080,014,180,300,000,000,000,000,000,000,000
[ "CWE-835" ]
CVE-2022-1222
Inf loop in GitHub repository gpac/gpac prior to 2.1.0-DEV.
https://nvd.nist.gov/vuln/detail/CVE-2022-1222
197,168
radare2
e9ce0d64faf19fa4e9c260250fbdf25e3c11e152
https://github.com/radare/radare2
https://github.com/radareorg/radare2/commit/e9ce0d64faf19fa4e9c260250fbdf25e3c11e152
Fix #10498 - Fix crash in fuzzed java files (#10511)
1
R_API RBinJavaAttrInfo *r_bin_java_line_number_table_attr_new(ut8 *buffer, ut64 sz, ut64 buf_offset) { ut32 i = 0; ut64 curpos, offset = 0; RBinJavaLineNumberAttribute *lnattr; RBinJavaAttrInfo *attr = r_bin_java_default_attr_new (buffer, sz, buf_offset); if (!attr) { return NULL; } offset += 6; attr->type = ...
36,968,382,688,590,454,000,000,000,000,000,000,000
class.c
99,954,488,010,862,210,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-14017
The r_bin_java_annotation_new function in shlr/java/class.c in radare2 2.7.0 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted .class file because of missing input validation in r_bin_java_line_number_table_attr_new.
https://nvd.nist.gov/vuln/detail/CVE-2018-14017
254,492
radare2
e9ce0d64faf19fa4e9c260250fbdf25e3c11e152
https://github.com/radare/radare2
https://github.com/radareorg/radare2/commit/e9ce0d64faf19fa4e9c260250fbdf25e3c11e152
Fix #10498 - Fix crash in fuzzed java files (#10511)
0
R_API RBinJavaAttrInfo *r_bin_java_line_number_table_attr_new(ut8 *buffer, ut64 sz, ut64 buf_offset) { ut32 i = 0; ut64 curpos, offset = 0; RBinJavaLineNumberAttribute *lnattr; RBinJavaAttrInfo *attr = r_bin_java_default_attr_new (buffer, sz, buf_offset); if (!attr) { return NULL; } offset += 6; attr->type = ...
97,814,754,759,456,600,000,000,000,000,000,000,000
class.c
72,856,353,359,130,070,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-14017
The r_bin_java_annotation_new function in shlr/java/class.c in radare2 2.7.0 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted .class file because of missing input validation in r_bin_java_line_number_table_attr_new.
https://nvd.nist.gov/vuln/detail/CVE-2018-14017
197,180
linux
26c191788f18129af0eb32a358cdaea0c7479626
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/26c191788f18129af0eb32a358cdaea0c7479626
mm: pmd_read_atomic: fix 32bit PAE pmd walk vs pmd_populate SMP race condition When holding the mmap_sem for reading, pmd_offset_map_lock should only run on a pmd_t that has been read atomically from the pmdp pointer, otherwise we may read only half of it leading to this crash. PID: 11679 TASK: f06e8000 CPU: 3 CO...
1
static inline int pmd_none_or_trans_huge_or_clear_bad(pmd_t *pmd) { /* depend on compiler for an atomic pmd read */ pmd_t pmdval = *pmd; /* * The barrier will stabilize the pmdval in a register or on * the stack so that it will stop changing under the code. */ #ifdef CONFIG_TRANSPARENT_HUGEPAGE barrier(); #en...
145,487,643,779,028,000,000,000,000,000,000,000,000
pgtable.h
150,671,296,046,232,630,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2012-2373
The Linux kernel before 3.4.5 on the x86 platform, when Physical Address Extension (PAE) is enabled, does not properly use the Page Middle Directory (PMD), which allows local users to cause a denial of service (panic) via a crafted application that triggers a race condition.
https://nvd.nist.gov/vuln/detail/CVE-2012-2373
254,949
linux
26c191788f18129af0eb32a358cdaea0c7479626
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/26c191788f18129af0eb32a358cdaea0c7479626
mm: pmd_read_atomic: fix 32bit PAE pmd walk vs pmd_populate SMP race condition When holding the mmap_sem for reading, pmd_offset_map_lock should only run on a pmd_t that has been read atomically from the pmdp pointer, otherwise we may read only half of it leading to this crash. PID: 11679 TASK: f06e8000 CPU: 3 CO...
0
static inline int pmd_none_or_trans_huge_or_clear_bad(pmd_t *pmd) { pmd_t pmdval = pmd_read_atomic(pmd); /* * The barrier will stabilize the pmdval in a register or on * the stack so that it will stop changing under the code. */ #ifdef CONFIG_TRANSPARENT_HUGEPAGE barrier(); #endif if (pmd_none(pmdval)) retu...
66,400,466,559,137,100,000,000,000,000,000,000,000
pgtable.h
165,079,195,324,499,040,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2012-2373
The Linux kernel before 3.4.5 on the x86 platform, when Physical Address Extension (PAE) is enabled, does not properly use the Page Middle Directory (PMD), which allows local users to cause a denial of service (panic) via a crafted application that triggers a race condition.
https://nvd.nist.gov/vuln/detail/CVE-2012-2373
197,182
qpdf
8249a26d69f72b9cda584c14cc3f12769985e481
https://github.com/qpdf/qpdf
https://github.com/qpdf/qpdf/commit/8249a26d69f72b9cda584c14cc3f12769985e481
Fix infinite loop in QPDFWriter (fixes #143)
1
QPDFWriter::enqueueObject(QPDFObjectHandle object) { if (object.isIndirect()) { if (object.getOwningQPDF() != &(this->pdf)) { QTC::TC("qpdf", "QPDFWriter foreign object"); throw std::logic_error( "QPDFObjectHandle from different QPDF found while writing." ...
39,684,514,263,104,694,000,000,000,000,000,000,000
QPDFWriter.cc
646,471,579,170,893,200,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2017-18183
An issue was discovered in QPDF before 7.0.0. There is an infinite loop in the QPDFWriter::enqueueObject() function in libqpdf/QPDFWriter.cc.
https://nvd.nist.gov/vuln/detail/CVE-2017-18183
254,987
qpdf
8249a26d69f72b9cda584c14cc3f12769985e481
https://github.com/qpdf/qpdf
https://github.com/qpdf/qpdf/commit/8249a26d69f72b9cda584c14cc3f12769985e481
Fix infinite loop in QPDFWriter (fixes #143)
0
QPDFWriter::enqueueObject(QPDFObjectHandle object) { if (object.isIndirect()) { if (object.getOwningQPDF() != &(this->pdf)) { QTC::TC("qpdf", "QPDFWriter foreign object"); throw std::logic_error( "QPDFObjectHandle from different QPDF found while writing." ...
43,681,743,633,978,980,000,000,000,000,000,000,000
QPDFWriter.cc
181,649,698,167,519,400,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2017-18183
An issue was discovered in QPDF before 7.0.0. There is an infinite loop in the QPDFWriter::enqueueObject() function in libqpdf/QPDFWriter.cc.
https://nvd.nist.gov/vuln/detail/CVE-2017-18183
197,187
libebml
b66ca475be967547af9a3784e720fbbacd381be6
https://github.com/Matroska-Org/libebml
https://github.com/Matroska-Org/libebml/commit/b66ca475be967547af9a3784e720fbbacd381be6
Exit the max size loop when there's nothing left possible to find DataStream.getFilePointer() is not correct in this context. It might force to exit too early.
1
EbmlElement * EbmlElement::FindNextElement(IOCallback & DataStream, const EbmlSemanticContext & Context, int & UpperLevel, uint64 MaxDataSize, bool AllowDummyElt, unsigned int MaxLowerLevel) { int PossibleID_Length = 0; binary PossibleIdNSize[16]; int PossibleSizeLength;...
274,815,472,480,988,570,000,000,000,000,000,000,000
EbmlElement.cpp
78,244,485,862,717,870,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-13615
libebml before 1.3.6, as used in the MKV module in VideoLAN VLC Media Player binaries before 3.0.3, has a heap-based buffer over-read in EbmlElement::FindNextElement.
https://nvd.nist.gov/vuln/detail/CVE-2019-13615
255,042
libebml
b66ca475be967547af9a3784e720fbbacd381be6
https://github.com/Matroska-Org/libebml
https://github.com/Matroska-Org/libebml/commit/b66ca475be967547af9a3784e720fbbacd381be6
Exit the max size loop when there's nothing left possible to find DataStream.getFilePointer() is not correct in this context. It might force to exit too early.
0
EbmlElement * EbmlElement::FindNextElement(IOCallback & DataStream, const EbmlSemanticContext & Context, int & UpperLevel, uint64 MaxDataSize, bool AllowDummyElt, unsigned int MaxLowerLevel) { int PossibleID_Length = 0; binary PossibleIdNSize[16]; int PossibleSizeLength;...
199,624,769,106,325,700,000,000,000,000,000,000,000
EbmlElement.cpp
255,747,108,633,907,800,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-13615
libebml before 1.3.6, as used in the MKV module in VideoLAN VLC Media Player binaries before 3.0.3, has a heap-based buffer over-read in EbmlElement::FindNextElement.
https://nvd.nist.gov/vuln/detail/CVE-2019-13615
197,189
ImageMagick
eedd0c35bb2d8af7aa05f215689fdebd11633fa1
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/eedd0c35bb2d8af7aa05f215689fdebd11633fa1
Prevent buffer overflow in SIXEL, PDB, MAP, and CALS coders (bug report from Donghai Zhu)
1
static MagickBooleanType WritePDBImage(const ImageInfo *image_info,Image *image, ExceptionInfo *exception) { const char *comment; int bits; MagickBooleanType status; PDBImage pdb_image; PDBInfo pdb_info; QuantumInfo *quantum_info; register const Quantum *p; register ...
279,062,322,735,339,700,000,000,000,000,000,000,000
pdb.c
21,599,980,401,787,287,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2016-10054
Buffer overflow in the WriteMAPImage function in coders/map.c in ImageMagick before 6.9.5-8 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2016-10054
255,068
ImageMagick
eedd0c35bb2d8af7aa05f215689fdebd11633fa1
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/eedd0c35bb2d8af7aa05f215689fdebd11633fa1
Prevent buffer overflow in SIXEL, PDB, MAP, and CALS coders (bug report from Donghai Zhu)
0
static MagickBooleanType WritePDBImage(const ImageInfo *image_info,Image *image, ExceptionInfo *exception) { const char *comment; int bits; MagickBooleanType status; PDBImage pdb_image; PDBInfo pdb_info; QuantumInfo *quantum_info; register const Quantum *p; register ...
309,202,052,134,530,030,000,000,000,000,000,000,000
pdb.c
77,881,582,407,780,980,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2016-10054
Buffer overflow in the WriteMAPImage function in coders/map.c in ImageMagick before 6.9.5-8 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2016-10054
197,199
tensorflow
0575b640091680cfb70f4dd93e70658de43b94f9
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/0575b640091680cfb70f4dd93e70658de43b94f9
Prevent division by 0 in LSH projection. PiperOrigin-RevId: 387225857 Change-Id: Iaeb572a763618c64f503e0026f6dd9fd769bf50c
1
TfLiteStatus Resize(TfLiteContext* context, TfLiteNode* node) { auto* params = reinterpret_cast<TfLiteLSHProjectionParams*>(node->builtin_data); TF_LITE_ENSURE(context, NumInputs(node) == 2 || NumInputs(node) == 3); TF_LITE_ENSURE_EQ(context, NumOutputs(node), 1); const TfLiteTensor* hash; TF_LITE_ENSU...
256,390,673,687,195,580,000,000,000,000,000,000,000
lsh_projection.cc
153,559,093,443,118,610,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2021-37691
TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can craft a TFLite model that would trigger a division by zero error in LSH [implementation](https://github.com/tensorflow/tensorflow/blob/149562d49faa709ea80df1d99fc41d005b81082a/tensorflow/lite/kernels/lsh_projecti...
https://nvd.nist.gov/vuln/detail/CVE-2021-37691
255,132
tensorflow
0575b640091680cfb70f4dd93e70658de43b94f9
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/0575b640091680cfb70f4dd93e70658de43b94f9
Prevent division by 0 in LSH projection. PiperOrigin-RevId: 387225857 Change-Id: Iaeb572a763618c64f503e0026f6dd9fd769bf50c
0
TfLiteStatus Resize(TfLiteContext* context, TfLiteNode* node) { auto* params = reinterpret_cast<TfLiteLSHProjectionParams*>(node->builtin_data); TF_LITE_ENSURE(context, NumInputs(node) == 2 || NumInputs(node) == 3); TF_LITE_ENSURE_EQ(context, NumOutputs(node), 1); const TfLiteTensor* hash; TF_LITE_ENSU...
61,047,529,744,970,490,000,000,000,000,000,000,000
lsh_projection.cc
253,963,266,268,271,630,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2021-37691
TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can craft a TFLite model that would trigger a division by zero error in LSH [implementation](https://github.com/tensorflow/tensorflow/blob/149562d49faa709ea80df1d99fc41d005b81082a/tensorflow/lite/kernels/lsh_projecti...
https://nvd.nist.gov/vuln/detail/CVE-2021-37691
197,203
hhvm
65c95a01541dd2fbc9c978ac53bed235b5376686
https://github.com/facebook/hhvm
https://github.com/facebook/hhvm/commit/65c95a01541dd2fbc9c978ac53bed235b5376686
ZipArchive::extractTo bug 70350 Summary:Don't allow upward directory traversal when extracting zip archive files. Files in zip files with `..` or starting at main root `/` should be normalized to something where the file being extracted winds up within the directory or a subdirectory where the actual extraction is ta...
1
static bool extractFileTo(zip* zip, const std::string &file, std::string& to, char* buf, size_t len) { auto sep = file.rfind('/'); if (sep != std::string::npos) { auto path = to + file.substr(0, sep); if (!HHVM_FN(is_dir)(path) && !HHVM_FN(mkdir)(path, 0777, true)) { return f...
13,898,185,252,544,740,000,000,000,000,000,000,000
ext_zip.cpp
155,306,919,412,043,480,000,000,000,000,000,000,000
[ "CWE-22" ]
CVE-2014-9767
Directory traversal vulnerability in the ZipArchive::extractTo function in ext/zip/php_zip.c in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13 and ext/zip/ext_zip.cpp in HHVM before 3.12.1 allows remote attackers to create arbitrary empty directories via a crafted ZIP archive.
https://nvd.nist.gov/vuln/detail/CVE-2014-9767
255,314
hhvm
65c95a01541dd2fbc9c978ac53bed235b5376686
https://github.com/facebook/hhvm
https://github.com/facebook/hhvm/commit/65c95a01541dd2fbc9c978ac53bed235b5376686
ZipArchive::extractTo bug 70350 Summary:Don't allow upward directory traversal when extracting zip archive files. Files in zip files with `..` or starting at main root `/` should be normalized to something where the file being extracted winds up within the directory or a subdirectory where the actual extraction is ta...
0
static bool extractFileTo(zip* zip, const std::string &file, std::string& to, char* buf, size_t len) { struct zip_stat zipStat; // Verify the file to be extracted is actually in the zip file if (zip_stat(zip, file.c_str(), 0, &zipStat) != 0) { return false; } auto clean_file = ...
149,449,384,430,228,100,000,000,000,000,000,000,000
ext_zip.cpp
8,306,773,405,976,529,000,000,000,000,000,000,000
[ "CWE-22" ]
CVE-2014-9767
Directory traversal vulnerability in the ZipArchive::extractTo function in ext/zip/php_zip.c in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13 and ext/zip/ext_zip.cpp in HHVM before 3.12.1 allows remote attackers to create arbitrary empty directories via a crafted ZIP archive.
https://nvd.nist.gov/vuln/detail/CVE-2014-9767
197,232
njs
222d6fdcf0c6485ec8e175f3a7b70d650c234b4e
https://github.com/nginx/njs
https://github.com/nginx/njs/commit/222d6fdcf0c6485ec8e175f3a7b70d650c234b4e
Fixed njs_vmcode_interpreter() when "toString" conversion fails. Previously, while interpreting a user function, njs_vmcode_interpreter() might return prematurely when an error happens. This is not correct because the current frame has to be unwound (or exception caught) first. The fix is exit through only 5 appropr...
1
njs_vmcode_interpreter(njs_vm_t *vm, u_char *pc, void *promise_cap, void *async_ctx) { u_char *catch; double num, exponent; int32_t i32; uint32_t u32; njs_str_t string; njs_uint_t ...
286,455,519,617,131,670,000,000,000,000,000,000,000
njs_vmcode.c
42,172,727,494,157,793,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2022-29369
Nginx NJS v0.7.2 was discovered to contain a segmentation violation via njs_lvlhsh_bucket_find at njs_lvlhsh.c.
https://nvd.nist.gov/vuln/detail/CVE-2022-29369
255,717
njs
222d6fdcf0c6485ec8e175f3a7b70d650c234b4e
https://github.com/nginx/njs
https://github.com/nginx/njs/commit/222d6fdcf0c6485ec8e175f3a7b70d650c234b4e
Fixed njs_vmcode_interpreter() when "toString" conversion fails. Previously, while interpreting a user function, njs_vmcode_interpreter() might return prematurely when an error happens. This is not correct because the current frame has to be unwound (or exception caught) first. The fix is exit through only 5 appropr...
0
njs_vmcode_interpreter(njs_vm_t *vm, u_char *pc, void *promise_cap, void *async_ctx) { u_char *catch; double num, exponent; int32_t i32; uint32_t u32; njs_str_t string; njs_uint_t ...
92,429,476,583,501,520,000,000,000,000,000,000,000
njs_vmcode.c
46,247,608,200,013,710,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2022-29369
Nginx NJS v0.7.2 was discovered to contain a segmentation violation via njs_lvlhsh_bucket_find at njs_lvlhsh.c.
https://nvd.nist.gov/vuln/detail/CVE-2022-29369
197,241
ImageMagick
bfb7915d4b2e11acb6a819e451c382dc645277db
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/bfb7915d4b2e11acb6a819e451c382dc645277db
https://github.com/ImageMagick/ImageMagick/issues/553
1
static Image *ReadMATImage(const ImageInfo *image_info,ExceptionInfo *exception) { Image *image, *image2=NULL, *rotated_image; register Quantum *q; unsigned int status; MATHeader MATLAB_HDR; size_t size; size_t CellType; QuantumInfo *quantum_info; ImageInfo *clone_info; int i; ssize_t ldblk; u...
170,010,179,054,958,210,000,000,000,000,000,000,000
mat.c
21,411,120,556,536,383,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2017-12667
ImageMagick 7.0.6-1 has a memory leak vulnerability in ReadMATImage in coders\mat.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-12667
255,804
ImageMagick
bfb7915d4b2e11acb6a819e451c382dc645277db
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/bfb7915d4b2e11acb6a819e451c382dc645277db
https://github.com/ImageMagick/ImageMagick/issues/553
0
static Image *ReadMATImage(const ImageInfo *image_info,ExceptionInfo *exception) { Image *image, *image2=NULL, *rotated_image; register Quantum *q; unsigned int status; MATHeader MATLAB_HDR; size_t size; size_t CellType; QuantumInfo *quantum_info; ImageInfo *clone_info; int i; ssize_t ldblk; u...
293,943,238,025,077,700,000,000,000,000,000,000,000
mat.c
291,028,961,151,700,070,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2017-12667
ImageMagick 7.0.6-1 has a memory leak vulnerability in ReadMATImage in coders\mat.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-12667
197,244
tensorflow
67784700869470d65d5f2ef20aeb5e97c31673cb
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/67784700869470d65d5f2ef20aeb5e97c31673cb
Prevent division by 0 in `QuantizedBiasAdd`. PiperOrigin-RevId: 370117454 Change-Id: I3804e2ac8dcc6d3afcc92e27853e2325a017ca4d
1
void Compute(OpKernelContext* context) override { const Tensor& input = context->input(0); const Tensor& bias = context->input(1); const float input_min = context->input(2).flat<float>()(0); const float input_max = context->input(3).flat<float>()(0); const float bias_min = context->input(4).flat<f...
168,934,142,025,237,570,000,000,000,000,000,000,000
quantized_bias_add_op.cc
230,724,270,983,057,300,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2021-29546
TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger an integer division by zero undefined behavior in `tf.raw_ops.QuantizedBiasAdd`. This is because the implementation of the Eigen kernel(https://github.com/tensorflow/tensorflow/blob/61bca8bd5ba8a68b2d97435ddfafcdf2b85672cd/te...
https://nvd.nist.gov/vuln/detail/CVE-2021-29546
255,874
tensorflow
67784700869470d65d5f2ef20aeb5e97c31673cb
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/67784700869470d65d5f2ef20aeb5e97c31673cb
Prevent division by 0 in `QuantizedBiasAdd`. PiperOrigin-RevId: 370117454 Change-Id: I3804e2ac8dcc6d3afcc92e27853e2325a017ca4d
0
void Compute(OpKernelContext* context) override { const Tensor& input = context->input(0); const Tensor& bias = context->input(1); const float input_min = context->input(2).flat<float>()(0); const float input_max = context->input(3).flat<float>()(0); const float bias_min = context->input(4).flat<f...
136,893,415,407,876,330,000,000,000,000,000,000,000
quantized_bias_add_op.cc
196,399,606,718,658,150,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2021-29546
TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger an integer division by zero undefined behavior in `tf.raw_ops.QuantizedBiasAdd`. This is because the implementation of the Eigen kernel(https://github.com/tensorflow/tensorflow/blob/61bca8bd5ba8a68b2d97435ddfafcdf2b85672cd/te...
https://nvd.nist.gov/vuln/detail/CVE-2021-29546
197,245
u-boot
5d14ee4e53a81055d34ba280cb8fd90330f22a96
https://github.com/u-boot/u-boot
https://github.com/u-boot/u-boot/commit/5d14ee4e53a81055d34ba280cb8fd90330f22a96
CVE-2019-14196: nfs: fix unbounded memcpy with a failed length check at nfs_lookup_reply This patch adds a check to rpc_pkt.u.reply.data at nfs_lookup_reply. Signed-off-by: Cheng Liu <liucheng32@huawei.com> Reported-by: Fermín Serna <fermin@semmle.com> Acked-by: Joe Hershberger <joe.hershberger@ni.com>
1
static int nfs_lookup_reply(uchar *pkt, unsigned len) { struct rpc_t rpc_pkt; debug("%s\n", __func__); memcpy(&rpc_pkt.u.data[0], pkt, len); if (ntohl(rpc_pkt.u.reply.id) > rpc_id) return -NFS_RPC_ERR; else if (ntohl(rpc_pkt.u.reply.id) < rpc_id) return -NFS_RPC_DROP; if (rpc_pkt.u.reply.rstatus || ...
175,393,033,798,933,700,000,000,000,000,000,000,000
nfs.c
306,096,762,258,887,520,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2022-30767
nfs_lookup_reply in net/nfs.c in Das U-Boot through 2022.04 (and through 2022.07-rc2) has an unbounded memcpy with a failed length check, leading to a buffer overflow. NOTE: this issue exists because of an incorrect fix for CVE-2019-14196.
https://nvd.nist.gov/vuln/detail/CVE-2022-30767
255,891
u-boot
5d14ee4e53a81055d34ba280cb8fd90330f22a96
https://github.com/u-boot/u-boot
https://github.com/u-boot/u-boot/commit/5d14ee4e53a81055d34ba280cb8fd90330f22a96
CVE-2019-14196: nfs: fix unbounded memcpy with a failed length check at nfs_lookup_reply This patch adds a check to rpc_pkt.u.reply.data at nfs_lookup_reply. Signed-off-by: Cheng Liu <liucheng32@huawei.com> Reported-by: Fermín Serna <fermin@semmle.com> Acked-by: Joe Hershberger <joe.hershberger@ni.com>
0
static int nfs_lookup_reply(uchar *pkt, unsigned len) { struct rpc_t rpc_pkt; debug("%s\n", __func__); memcpy(&rpc_pkt.u.data[0], pkt, len); if (ntohl(rpc_pkt.u.reply.id) > rpc_id) return -NFS_RPC_ERR; else if (ntohl(rpc_pkt.u.reply.id) < rpc_id) return -NFS_RPC_DROP; if (rpc_pkt.u.reply.rstatus || ...
66,169,846,120,933,175,000,000,000,000,000,000,000
nfs.c
114,322,917,047,956,380,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2022-30767
nfs_lookup_reply in net/nfs.c in Das U-Boot through 2022.04 (and through 2022.07-rc2) has an unbounded memcpy with a failed length check, leading to a buffer overflow. NOTE: this issue exists because of an incorrect fix for CVE-2019-14196.
https://nvd.nist.gov/vuln/detail/CVE-2022-30767
197,265
mruby
ff3a5ebed6ffbe3e70481531cfb969b497aa73ad
https://github.com/mruby/mruby
https://github.com/mruby/mruby/commit/ff3a5ebed6ffbe3e70481531cfb969b497aa73ad
vm.c: should check type before hash access. Since the operand of double splat (`**`) may not be a hash, simple assertion (previous code since d42a64e) was not enough for this case.
1
mrb_vm_exec(mrb_state *mrb, const struct RProc *proc, const mrb_code *pc) { /* mrb_assert(MRB_PROC_CFUNC_P(proc)) */ const mrb_irep *irep = proc->body.irep; const mrb_pool_value *pool = irep->pool; const mrb_sym *syms = irep->syms; mrb_code insn; int ai = mrb_gc_arena_save(mrb); struct mrb_jmpbuf *prev_jm...
40,355,757,585,165,720,000,000,000,000,000,000,000
None
null
[ "CWE-94" ]
CVE-2022-0630
Out-of-bounds Read in Homebrew mruby prior to 3.2.
https://nvd.nist.gov/vuln/detail/CVE-2022-0630
256,190
mruby
ff3a5ebed6ffbe3e70481531cfb969b497aa73ad
https://github.com/mruby/mruby
https://github.com/mruby/mruby/commit/ff3a5ebed6ffbe3e70481531cfb969b497aa73ad
vm.c: should check type before hash access. Since the operand of double splat (`**`) may not be a hash, simple assertion (previous code since d42a64e) was not enough for this case.
0
mrb_vm_exec(mrb_state *mrb, const struct RProc *proc, const mrb_code *pc) { /* mrb_assert(MRB_PROC_CFUNC_P(proc)) */ const mrb_irep *irep = proc->body.irep; const mrb_pool_value *pool = irep->pool; const mrb_sym *syms = irep->syms; mrb_code insn; int ai = mrb_gc_arena_save(mrb); struct mrb_jmpbuf *prev_jm...
328,761,082,779,574,520,000,000,000,000,000,000,000
vm.c
245,302,474,447,219,380,000,000,000,000,000,000,000
[ "CWE-94" ]
CVE-2022-0630
Out-of-bounds Read in Homebrew mruby prior to 3.2.
https://nvd.nist.gov/vuln/detail/CVE-2022-0630
197,268
folly
8e927ee48b114c8a2f90d0cbd5ac753795a6761f
https://github.com/facebook/folly
https://github.com/facebook/folly/commit/8e927ee48b114c8a2f90d0cbd5ac753795a6761f
Flush secureRandom buffer on fork Summary: On fork, flush the secureRandom buffer, so that we don't share entropy between the parent and child. Reviewed By: ricklavoie Differential Revision: D9196474 fbshipit-source-id: 12ff8488d814466186df61328a5f1d4000beb27f
1
BufferedRandomDevice::BufferedRandomDevice(size_t bufferSize) : bufferSize_(bufferSize), buffer_(new unsigned char[bufferSize]), ptr_(buffer_.get() + bufferSize) { // refill on first use }
333,690,537,657,707,900,000,000,000,000,000,000,000
Random.cpp
104,763,720,907,080,690,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2018-6337
folly::secureRandom will re-use a buffer between parent and child processes when fork() is called. That will result in multiple forked children producing repeat (or similar) results. This affects HHVM 3.26 prior to 3.26.3 and the folly library between v2017.12.11.00 and v2018.08.09.00.
https://nvd.nist.gov/vuln/detail/CVE-2018-6337
256,203
folly
8e927ee48b114c8a2f90d0cbd5ac753795a6761f
https://github.com/facebook/folly
https://github.com/facebook/folly/commit/8e927ee48b114c8a2f90d0cbd5ac753795a6761f
Flush secureRandom buffer on fork Summary: On fork, flush the secureRandom buffer, so that we don't share entropy between the parent and child. Reviewed By: ricklavoie Differential Revision: D9196474 fbshipit-source-id: 12ff8488d814466186df61328a5f1d4000beb27f
0
BufferedRandomDevice::BufferedRandomDevice(size_t bufferSize) : bufferSize_(bufferSize), buffer_(new unsigned char[bufferSize]), ptr_(buffer_.get() + bufferSize) { // refill on first use call_once(flag, [this]() { detail::AtFork::registerHandler( this, /*prepare*/ []() { return true; },...
318,680,405,672,216,050,000,000,000,000,000,000,000
Random.cpp
135,357,240,942,157,330,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2018-6337
folly::secureRandom will re-use a buffer between parent and child processes when fork() is called. That will result in multiple forked children producing repeat (or similar) results. This affects HHVM 3.26 prior to 3.26.3 and the folly library between v2017.12.11.00 and v2018.08.09.00.
https://nvd.nist.gov/vuln/detail/CVE-2018-6337
197,275
FFmpeg
7150f9575671f898382c370acae35f9087a30ba1
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/7150f9575671f898382c370acae35f9087a30ba1
avcodec/dnxhddec: check and propagate function return value Similar to CVE-2013-0868, here return value check for 'init_vlc' is needed. crafted DNxHD data can cause unspecified impact. Reviewed-by: Paul B Mahol <onemda@gmail.com> Signed-off-by: James Almer <jamrial@gmail.com>
1
static int dnxhd_init_vlc(DNXHDContext *ctx, uint32_t cid, int bitdepth) { if (cid != ctx->cid) { const CIDEntry *cid_table = ff_dnxhd_get_cid_table(cid); if (!cid_table) { av_log(ctx->avctx, AV_LOG_ERROR, "unsupported cid %"PRIu32"\n", cid); return AVERROR(ENOSYS); ...
228,872,422,139,476,770,000,000,000,000,000,000,000
dnxhddec.c
74,187,829,426,165,405,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2021-38114
libavcodec/dnxhddec.c in FFmpeg 4.4 does not check the return value of the init_vlc function, a similar issue to CVE-2013-0868.
https://nvd.nist.gov/vuln/detail/CVE-2021-38114
256,261
FFmpeg
7150f9575671f898382c370acae35f9087a30ba1
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/7150f9575671f898382c370acae35f9087a30ba1
avcodec/dnxhddec: check and propagate function return value Similar to CVE-2013-0868, here return value check for 'init_vlc' is needed. crafted DNxHD data can cause unspecified impact. Reviewed-by: Paul B Mahol <onemda@gmail.com> Signed-off-by: James Almer <jamrial@gmail.com>
0
static int dnxhd_init_vlc(DNXHDContext *ctx, uint32_t cid, int bitdepth) { int ret; if (cid != ctx->cid) { const CIDEntry *cid_table = ff_dnxhd_get_cid_table(cid); if (!cid_table) { av_log(ctx->avctx, AV_LOG_ERROR, "unsupported cid %"PRIu32"\n", cid); return AVERROR(ENOS...
125,330,292,610,795,950,000,000,000,000,000,000,000
dnxhddec.c
64,757,760,924,864,085,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2021-38114
libavcodec/dnxhddec.c in FFmpeg 4.4 does not check the return value of the init_vlc function, a similar issue to CVE-2013-0868.
https://nvd.nist.gov/vuln/detail/CVE-2021-38114
197,276
uftpd
455b47d3756aed162d2d0ef7f40b549f3b5b30fe
https://github.com/troglobit/uftpd
https://github.com/troglobit/uftpd/commit/455b47d3756aed162d2d0ef7f40b549f3b5b30fe
FTP/TFTP: Fix directory traversal regression, reported by Aaron Esau Signed-off-by: Joachim Nilsson <troglobit@gmail.com>
1
char *compose_path(ctrl_t *ctrl, char *path) { struct stat st; static char rpath[PATH_MAX]; char *name, *ptr; char dir[PATH_MAX] = { 0 }; strlcpy(dir, ctrl->cwd, sizeof(dir)); DBG("Compose path from cwd: %s, arg: %s", ctrl->cwd, path ?: ""); if (!path || !strlen(path)) goto check; if (path) { if (path[0] ...
232,884,872,620,448,500,000,000,000,000,000,000,000
common.c
323,139,752,167,784,340,000,000,000,000,000,000,000
[ "CWE-22" ]
CVE-2020-5221
In uftpd before 2.11, it is possible for an unauthenticated user to perform a directory traversal attack using multiple different FTP commands and read and write to arbitrary locations on the filesystem due to the lack of a well-written chroot jail in compose_abspath(). This has been fixed in version 2.11
https://nvd.nist.gov/vuln/detail/CVE-2020-5221
256,271
uftpd
455b47d3756aed162d2d0ef7f40b549f3b5b30fe
https://github.com/troglobit/uftpd
https://github.com/troglobit/uftpd/commit/455b47d3756aed162d2d0ef7f40b549f3b5b30fe
FTP/TFTP: Fix directory traversal regression, reported by Aaron Esau Signed-off-by: Joachim Nilsson <troglobit@gmail.com>
0
char *compose_path(ctrl_t *ctrl, char *path) { struct stat st; static char rpath[PATH_MAX]; char *name, *ptr; char dir[PATH_MAX] = { 0 }; strlcpy(dir, ctrl->cwd, sizeof(dir)); DBG("Compose path from cwd: %s, arg: %s", ctrl->cwd, path ?: ""); if (!path || !strlen(path)) goto check; if (path) { if (path[0] ...
8,378,340,990,506,518,000,000,000,000,000,000,000
common.c
202,216,236,885,619,800,000,000,000,000,000,000,000
[ "CWE-22" ]
CVE-2020-5221
In uftpd before 2.11, it is possible for an unauthenticated user to perform a directory traversal attack using multiple different FTP commands and read and write to arbitrary locations on the filesystem due to the lack of a well-written chroot jail in compose_abspath(). This has been fixed in version 2.11
https://nvd.nist.gov/vuln/detail/CVE-2020-5221
197,314
ytnef
f98f5d4adc1c4bd4033638f6167c1bb95d642f89
https://github.com/Yeraze/ytnef
https://github.com/Yeraze/ytnef/commit/f98f5d4adc1c4bd4033638f6167c1bb95d642f89
BugFix - data length Even tho this is a "LONG" type, it's actually only 4 bytes. Typecasting it to a long* caused a dereference beyond the end of the allocated region. issues#28
1
void MAPIPrint(MAPIProps *p) { int j, i, index, h, x; DDWORD *ddword_ptr; DDWORD ddword_tmp; dtr thedate; MAPIProperty *mapi; variableLength *mapidata; variableLength vlTemp; int found; for (j = 0; j < p->count; j++) { mapi = &(p->properties[j]); printf(" #%i: Type: [", j); switch (PROP...
286,381,960,866,207,050,000,000,000,000,000,000,000
ytnef.c
19,437,460,197,353,687,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2017-6800
An issue was discovered in ytnef before 1.9.2. An invalid memory access (heap-based buffer over-read) can occur during handling of LONG data types, related to MAPIPrint() in libytnef.
https://nvd.nist.gov/vuln/detail/CVE-2017-6800
256,483
ytnef
f98f5d4adc1c4bd4033638f6167c1bb95d642f89
https://github.com/Yeraze/ytnef
https://github.com/Yeraze/ytnef/commit/f98f5d4adc1c4bd4033638f6167c1bb95d642f89
BugFix - data length Even tho this is a "LONG" type, it's actually only 4 bytes. Typecasting it to a long* caused a dereference beyond the end of the allocated region. issues#28
0
void MAPIPrint(MAPIProps *p) { int j, i, index, h, x; DDWORD *ddword_ptr; DDWORD ddword_tmp; dtr thedate; MAPIProperty *mapi; variableLength *mapidata; variableLength vlTemp; int found; for (j = 0; j < p->count; j++) { mapi = &(p->properties[j]); printf(" #%i: Type: [", j); switch (PROP...
285,861,814,014,575,000,000,000,000,000,000,000,000
ytnef.c
168,485,647,867,116,590,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2017-6800
An issue was discovered in ytnef before 1.9.2. An invalid memory access (heap-based buffer over-read) can occur during handling of LONG data types, related to MAPIPrint() in libytnef.
https://nvd.nist.gov/vuln/detail/CVE-2017-6800
197,325
exiv2
e925bc5addd881543fa503470c8a859e112cca62
https://github.com/Exiv2/exiv2
https://github.com/Exiv2/exiv2/commit/e925bc5addd881543fa503470c8a859e112cca62
Fix integer overflow by checking size against header_size Note that the problem occurs when data_size is less than header_size what causes a buffer overflow in &data[i] Co-Authored-By: D4N <dan.cermak@cgc-instruments.com>
1
long WebPImage::getHeaderOffset(byte *data, long data_size, byte *header, long header_size) { long pos = -1; for (long i=0; i < data_size - header_size; i++) { if (memcmp(header, &data[i], header_size) == 0) { pos = i; b...
188,667,667,130,256,500,000,000,000,000,000,000,000
webpimage.cpp
188,228,762,631,251,350,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2019-14982
In Exiv2 before v0.27.2, there is an integer overflow vulnerability in the WebPImage::getHeaderOffset function in webpimage.cpp. It can lead to a buffer overflow vulnerability and a crash.
https://nvd.nist.gov/vuln/detail/CVE-2019-14982
256,931
exiv2
e925bc5addd881543fa503470c8a859e112cca62
https://github.com/Exiv2/exiv2
https://github.com/Exiv2/exiv2/commit/e925bc5addd881543fa503470c8a859e112cca62
Fix integer overflow by checking size against header_size Note that the problem occurs when data_size is less than header_size what causes a buffer overflow in &data[i] Co-Authored-By: D4N <dan.cermak@cgc-instruments.com>
0
long WebPImage::getHeaderOffset(byte* data, long data_size, byte* header, long header_size) { if (data_size < header_size) { return -1; } long pos = -1; for (long i=0; i < data_size - header_size; i++) { if (memcmp(header, &data[i], header_size) == 0) { pos = ...
203,589,531,512,520,800,000,000,000,000,000,000,000
webpimage.cpp
37,303,076,579,972,948,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2019-14982
In Exiv2 before v0.27.2, there is an integer overflow vulnerability in the WebPImage::getHeaderOffset function in webpimage.cpp. It can lead to a buffer overflow vulnerability and a crash.
https://nvd.nist.gov/vuln/detail/CVE-2019-14982
197,332
gpac
9ea93a2ec8f555ceed1ee27294cf94822f14f10f
https://github.com/gpac/gpac
https://github.com/gpac/gpac/commit/9ea93a2ec8f555ceed1ee27294cf94822f14f10f
fixed #2165
1
static u8 BS_ReadByte(GF_BitStream *bs) { Bool is_eos; if (bs->bsmode == GF_BITSTREAM_READ) { u8 res; if (bs->position >= bs->size) { if (bs->EndOfStream) bs->EndOfStream(bs->par); if (!bs->overflow_state) bs->overflow_state = 1; return 0; } res = bs->original[bs->position++]; if (bs->remove_emul_...
258,348,097,499,616,580,000,000,000,000,000,000,000
bitstream.c
242,741,403,566,242,370,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2022-29339
In GPAC 2.1-DEV-rev87-g053aae8-master, function BS_ReadByte() in utils/bitstream.c has a failed assertion, which causes a Denial of Service. This vulnerability was fixed in commit 9ea93a2.
https://nvd.nist.gov/vuln/detail/CVE-2022-29339
257,027
gpac
9ea93a2ec8f555ceed1ee27294cf94822f14f10f
https://github.com/gpac/gpac
https://github.com/gpac/gpac/commit/9ea93a2ec8f555ceed1ee27294cf94822f14f10f
fixed #2165
0
static u8 BS_ReadByte(GF_BitStream *bs) { Bool is_eos; if (bs->bsmode == GF_BITSTREAM_READ) { u8 res; if (bs->position >= bs->size) { if (bs->EndOfStream) bs->EndOfStream(bs->par); if (!bs->overflow_state) bs->overflow_state = 1; return 0; } res = bs->original[bs->position++]; if (bs->remove_emul_...
54,595,576,418,796,970,000,000,000,000,000,000,000
bitstream.c
243,955,531,271,416,000,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2022-29339
In GPAC 2.1-DEV-rev87-g053aae8-master, function BS_ReadByte() in utils/bitstream.c has a failed assertion, which causes a Denial of Service. This vulnerability was fixed in commit 9ea93a2.
https://nvd.nist.gov/vuln/detail/CVE-2022-29339
197,362
tensorflow
482da92095c4d48f8784b1f00dda4f81c28d2988
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/482da92095c4d48f8784b1f00dda4f81c28d2988
Ensure non-empty padding_value input to tf.raw_ops.MatrixDiagPartV2, if a padding_value is input PiperOrigin-RevId: 388314614 Change-Id: If0b51ad58d5d8543a6be6ce8f42ae4755c80d55f
1
void Compute(OpKernelContext* context) override { const Tensor& input = context->input(0); // MatrixDiagPart and MatrixDiagPartV2 both use this OpKernel. // MatrixDiagPart only has one input, so we have to check the number of // inputs before reading additional parameters in MatrixDiagV2. int32_t...
180,063,321,346,241,300,000,000,000,000,000,000,000
matrix_diag_op.cc
240,679,363,651,112,140,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2021-37643
TensorFlow is an end-to-end open source platform for machine learning. If a user does not provide a valid padding value to `tf.raw_ops.MatrixDiagPartOp`, then the code triggers a null pointer dereference (if input is empty) or produces invalid behavior, ignoring all values after the first. The [implementation](https://...
https://nvd.nist.gov/vuln/detail/CVE-2021-37643
257,499
tensorflow
482da92095c4d48f8784b1f00dda4f81c28d2988
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/482da92095c4d48f8784b1f00dda4f81c28d2988
Ensure non-empty padding_value input to tf.raw_ops.MatrixDiagPartV2, if a padding_value is input PiperOrigin-RevId: 388314614 Change-Id: If0b51ad58d5d8543a6be6ce8f42ae4755c80d55f
0
void Compute(OpKernelContext* context) override { const Tensor& input = context->input(0); // MatrixDiagPart and MatrixDiagPartV2 both use this OpKernel. // MatrixDiagPart only has one input, so we have to check the number of // inputs before reading additional parameters in MatrixDiagV2. int32_t...
46,487,731,950,673,150,000,000,000,000,000,000,000
matrix_diag_op.cc
193,912,266,163,549,400,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2021-37643
TensorFlow is an end-to-end open source platform for machine learning. If a user does not provide a valid padding value to `tf.raw_ops.MatrixDiagPartOp`, then the code triggers a null pointer dereference (if input is empty) or produces invalid behavior, ignoring all values after the first. The [implementation](https://...
https://nvd.nist.gov/vuln/detail/CVE-2021-37643
197,363
ArduinoJson
5e7b9ec688d79e7b16ec7064e1d37e8481a31e72
https://github.com/bblanchon/ArduinoJson
https://github.com/bblanchon/ArduinoJson/commit/5e7b9ec688d79e7b16ec7064e1d37e8481a31e72
Fix buffer overflow (pull request #81)
1
char *QuotedString::extractFrom(char *input, char **endPtr) { char firstChar = *input; if (!isQuote(firstChar)) { // must start with a quote return NULL; } char stopChar = firstChar; // closing quote is the same as opening quote char *startPtr = input + 1; // skip the quote char *readPtr = star...
123,470,098,655,216,980,000,000,000,000,000,000,000
QuotedString.cpp
312,295,438,448,968,000,000,000,000,000,000,000,000
[ "CWE-415" ]
CVE-2015-4590
The extractFrom function in Internals/QuotedString.cpp in Arduino JSON before 4.5 allows remote attackers to cause a denial of service (crash) via a JSON string with a \ (backslash) followed by a terminator, as demonstrated by "\\\0", which triggers a buffer overflow and over-read.
https://nvd.nist.gov/vuln/detail/CVE-2015-4590
257,522
ArduinoJson
5e7b9ec688d79e7b16ec7064e1d37e8481a31e72
https://github.com/bblanchon/ArduinoJson
https://github.com/bblanchon/ArduinoJson/commit/5e7b9ec688d79e7b16ec7064e1d37e8481a31e72
Fix buffer overflow (pull request #81)
0
char *QuotedString::extractFrom(char *input, char **endPtr) { char *startPtr = input + 1; // skip the quote char *readPtr = startPtr; char *writePtr = startPtr; char c; char firstChar = *input; char stopChar = firstChar; // closing quote is the same as opening quote if (!isQuote(firstChar)) goto ERROR...
334,785,854,878,778,840,000,000,000,000,000,000,000
QuotedString.cpp
113,799,451,480,879,990,000,000,000,000,000,000,000
[ "CWE-415" ]
CVE-2015-4590
The extractFrom function in Internals/QuotedString.cpp in Arduino JSON before 4.5 allows remote attackers to cause a denial of service (crash) via a JSON string with a \ (backslash) followed by a terminator, as demonstrated by "\\\0", which triggers a buffer overflow and over-read.
https://nvd.nist.gov/vuln/detail/CVE-2015-4590
197,364
nginx
b900cc28fcbb4cf5a32ab62f80b59292e1c85b4b
https://github.com/nginx/nginx
https://github.com/nginx/nginx/commit/b900cc28fcbb4cf5a32ab62f80b59292e1c85b4b
Introduced time truncation to December 31, 9999 (ticket #1368). Various buffers are allocated in an assumption that there would be no more than 4 year digits. This might not be true on platforms with 64-bit time_t, as 64-bit time_t is able to represent more than that. Such dates with more than 4 year digits hardly ma...
1
ngx_gmtime(time_t t, ngx_tm_t *tp) { ngx_int_t yday; ngx_uint_t sec, min, hour, mday, mon, year, wday, days, leap; /* the calculation is valid for positive time_t only */ if (t < 0) { t = 0; } days = t / 86400; sec = t % 86400; /* January 1, 1970 was Thursday */ wday ...
19,979,745,359,006,220,000,000,000,000,000,000,000
ngx_times.c
182,729,847,858,526,040,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2017-20005
NGINX before 1.13.6 has a buffer overflow for years that exceed four digits, as demonstrated by a file with a modification date in 1969 that causes an integer overflow (or a false modification date far in the future), when encountered by the autoindex module.
https://nvd.nist.gov/vuln/detail/CVE-2017-20005
257,535
nginx
b900cc28fcbb4cf5a32ab62f80b59292e1c85b4b
https://github.com/nginx/nginx
https://github.com/nginx/nginx/commit/b900cc28fcbb4cf5a32ab62f80b59292e1c85b4b
Introduced time truncation to December 31, 9999 (ticket #1368). Various buffers are allocated in an assumption that there would be no more than 4 year digits. This might not be true on platforms with 64-bit time_t, as 64-bit time_t is able to represent more than that. Such dates with more than 4 year digits hardly ma...
0
ngx_gmtime(time_t t, ngx_tm_t *tp) { ngx_int_t yday; ngx_uint_t sec, min, hour, mday, mon, year, wday, days, leap; /* the calculation is valid for positive time_t only */ if (t < 0) { t = 0; } days = t / 86400; sec = t % 86400; /* * no more than 4 year digits supporte...
273,381,176,423,583,200,000,000,000,000,000,000,000
ngx_times.c
170,752,296,051,460,300,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2017-20005
NGINX before 1.13.6 has a buffer overflow for years that exceed four digits, as demonstrated by a file with a modification date in 1969 that causes an integer overflow (or a false modification date far in the future), when encountered by the autoindex module.
https://nvd.nist.gov/vuln/detail/CVE-2017-20005
197,374
radare2
68338b71a563b24e62617bb629059adc0c94b230
https://github.com/radare/radare2
https://github.com/radareorg/radare2/commit/68338b71a563b24e62617bb629059adc0c94b230
fix #6872
1
static void dex_parse_debug_item(RBinFile *binfile, RBinDexObj *bin, RBinDexClass *c, int MI, int MA, int paddr, int ins_size, int insns_size, char *class_name, int regsz, int debug_info_off) { struct r_bin_t *rbin = binfile->rbin; const ut8 *p4 = r_buf_get_at (binfile->buf, debug_info_off, NULL); ...
6,420,385,247,302,877,000,000,000,000,000,000,000
bin_dex.c
28,439,315,644,437,570,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2017-6415
The dex_parse_debug_item function in libr/bin/p/bin_dex.c in radare2 1.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted DEX file.
https://nvd.nist.gov/vuln/detail/CVE-2017-6415
257,734
radare2
68338b71a563b24e62617bb629059adc0c94b230
https://github.com/radare/radare2
https://github.com/radareorg/radare2/commit/68338b71a563b24e62617bb629059adc0c94b230
fix #6872
0
static void dex_parse_debug_item(RBinFile *binfile, RBinDexObj *bin, RBinDexClass *c, int MI, int MA, int paddr, int ins_size, int insns_size, char *class_name, int regsz, int debug_info_off) { struct r_bin_t *rbin = binfile->rbin; const ut8 *p4 = r_buf_get_at (binfile->buf, debug_info_off, NULL); ...
8,694,805,285,181,804,000,000,000,000,000,000,000
bin_dex.c
20,739,617,211,881,278,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2017-6415
The dex_parse_debug_item function in libr/bin/p/bin_dex.c in radare2 1.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted DEX file.
https://nvd.nist.gov/vuln/detail/CVE-2017-6415
197,398
freeradius-server
ff94dd35673bba1476594299d31ce8293b8bd223
https://github.com/alandekok/freeradius-server
http://github.com/alandekok/freeradius-server/commit/ff94dd35673bba1476594299d31ce8293b8bd223
Do not delete "old" requests until they are free. If the request is in the queue for 30+ seconds, do NOT delete it. Instead, mark it as "STOP PROCESSING", and do "wait_for_child_to_die", which waits for a child thread to pick it up, and acknowledge that it's done. Once it's marked done, we can finally clean it up. T...
1
static void wait_for_child_to_die(void *ctx) { REQUEST *request = ctx; rad_assert(request->magic == REQUEST_MAGIC); /* * If it's still queued (waiting for a thread to pick it * up) OR, it's running AND there's still a child thread * handling it, THEN delay some more. */ if ((request->child_state == REQUES...
337,177,024,170,430,160,000,000,000,000,000,000,000
event.c
269,819,908,251,073,330,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2010-3697
The wait_for_child_to_die function in main/event.c in FreeRADIUS 2.1.x before 2.1.10, in certain circumstances involving long-term database outages, does not properly handle long queue times for requests, which allows remote attackers to cause a denial of service (daemon crash) by sending many requests.
https://nvd.nist.gov/vuln/detail/CVE-2010-3697
258,106
freeradius-server
ff94dd35673bba1476594299d31ce8293b8bd223
https://github.com/alandekok/freeradius-server
http://github.com/alandekok/freeradius-server/commit/ff94dd35673bba1476594299d31ce8293b8bd223
Do not delete "old" requests until they are free. If the request is in the queue for 30+ seconds, do NOT delete it. Instead, mark it as "STOP PROCESSING", and do "wait_for_child_to_die", which waits for a child thread to pick it up, and acknowledge that it's done. Once it's marked done, we can finally clean it up. T...
0
static void wait_for_child_to_die(void *ctx) { REQUEST *request = ctx; rad_assert(request->magic == REQUEST_MAGIC); remove_from_request_hash(request); /* * If it's still queued (waiting for a thread to pick it * up) OR, it's running AND there's still a child thread * handling it, THEN delay some more. */ ...
293,122,411,844,764,000,000,000,000,000,000,000,000
event.c
304,094,101,609,928,860,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2010-3697
The wait_for_child_to_die function in main/event.c in FreeRADIUS 2.1.x before 2.1.10, in certain circumstances involving long-term database outages, does not properly handle long queue times for requests, which allows remote attackers to cause a denial of service (daemon crash) by sending many requests.
https://nvd.nist.gov/vuln/detail/CVE-2010-3697
197,403
fizz
40bbb161e72fb609608d53b9d64c56bb961a6ee2
https://github.com/facebookincubator/fizz
https://github.com/facebookincubator/fizz/commit/40bbb161e72fb609608d53b9d64c56bb961a6ee2
Avoid arithmetic operation on uint16 read from the wire. Summary: This could overflow previously. CVE-2019-3560 Reviewed By: yfeldblum Differential Revision: D14152362 fbshipit-source-id: c0ebb3fc59b49c7c23e6bcb90458c19cd891be65
1
folly::Optional<TLSMessage> PlaintextReadRecordLayer::read( folly::IOBufQueue& buf) { while (true) { folly::io::Cursor cursor(buf.front()); if (buf.empty() || !cursor.canAdvance(kPlaintextHeaderSize)) { return folly::none; } TLSMessage msg; msg.type = static_cast<ContentType>(cursor.re...
212,735,098,031,051,000,000,000,000,000,000,000,000
PlaintextRecordLayer.cpp
261,141,211,815,268,300,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2019-3560
An improperly performed length calculation on a buffer in PlaintextRecordLayer could lead to an infinite loop and denial-of-service based on user input. This issue affected versions of fizz prior to v2019.03.04.00.
https://nvd.nist.gov/vuln/detail/CVE-2019-3560
258,229
fizz
40bbb161e72fb609608d53b9d64c56bb961a6ee2
https://github.com/facebookincubator/fizz
https://github.com/facebookincubator/fizz/commit/40bbb161e72fb609608d53b9d64c56bb961a6ee2
Avoid arithmetic operation on uint16 read from the wire. Summary: This could overflow previously. CVE-2019-3560 Reviewed By: yfeldblum Differential Revision: D14152362 fbshipit-source-id: c0ebb3fc59b49c7c23e6bcb90458c19cd891be65
0
folly::Optional<TLSMessage> PlaintextReadRecordLayer::read( folly::IOBufQueue& buf) { while (true) { folly::io::Cursor cursor(buf.front()); if (buf.empty() || !cursor.canAdvance(kPlaintextHeaderSize)) { return folly::none; } TLSMessage msg; msg.type = static_cast<ContentType>(cursor.re...
339,355,273,169,192,300,000,000,000,000,000,000,000
PlaintextRecordLayer.cpp
208,759,293,813,328,400,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2019-3560
An improperly performed length calculation on a buffer in PlaintextRecordLayer could lead to an infinite loop and denial-of-service based on user input. This issue affected versions of fizz prior to v2019.03.04.00.
https://nvd.nist.gov/vuln/detail/CVE-2019-3560
197,409
radare2
ced0223c7a1b3b5344af315715cd28fe7c0d9ebc
https://github.com/radare/radare2
https://github.com/radareorg/radare2/commit/ced0223c7a1b3b5344af315715cd28fe7c0d9ebc
Fix unmatched array length in core_java.c (issue #16304) (#16313)
1
static int r_cmd_java_call(void *user, const char *input) { RCore *core = (RCore *) user; int res = false; ut32 i = 0; if (strncmp (input, "java", 4)) { return false; } if (input[4] != ' ') { return r_cmd_java_handle_help (core, input); } for (; i < END_CMDS; i++) { //IFDBG r_cons_printf ("Checking cmd: %...
302,967,166,898,851,150,000,000,000,000,000,000,000
core_java.c
151,901,301,081,024,260,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2020-27793
An off-by-one overflow flaw was found in radare2 due to mismatched array length in core_java.c. This could allow an attacker to cause a crash, and perform a denail of service attack.
https://nvd.nist.gov/vuln/detail/CVE-2020-27793
258,312
radare2
ced0223c7a1b3b5344af315715cd28fe7c0d9ebc
https://github.com/radare/radare2
https://github.com/radareorg/radare2/commit/ced0223c7a1b3b5344af315715cd28fe7c0d9ebc
Fix unmatched array length in core_java.c (issue #16304) (#16313)
0
static int r_cmd_java_call(void *user, const char *input) { RCore *core = (RCore *) user; int res = false; ut32 i = 0; if (strncmp (input, "java", 4)) { return false; } if (input[4] != ' ') { return r_cmd_java_handle_help (core, input); } for (; i < END_CMDS - 1; i++) { //IFDBG r_cons_printf ("Checking cm...
256,382,073,760,264,670,000,000,000,000,000,000,000
core_java.c
262,986,827,235,763,250,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2020-27793
An off-by-one overflow flaw was found in radare2 due to mismatched array length in core_java.c. This could allow an attacker to cause a crash, and perform a denail of service attack.
https://nvd.nist.gov/vuln/detail/CVE-2020-27793
197,418
tensorflow
49847ae69a4e1a97ae7f2db5e217c77721e37948
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/49847ae69a4e1a97ae7f2db5e217c77721e37948
Fix division by zero in TFLite padding. PiperOrigin-RevId: 370777494 Change-Id: Ic1331e4a1603b9e4c8aa183012a6c8237410aa0f
1
inline int ComputeOutSize(TfLitePadding padding, int image_size, int filter_size, int stride, int dilation_rate = 1) { int effective_filter_size = (filter_size - 1) * dilation_rate + 1; switch (padding) { case kTfLitePaddingSame: return (image_size + stride - 1) / stride; cas...
339,094,765,917,887,500,000,000,000,000,000,000,000
None
null
[ "CWE-369" ]
CVE-2021-29585
TensorFlow is an end-to-end open source platform for machine learning. The TFLite computation for size of output after padding, `ComputeOutSize`(https://github.com/tensorflow/tensorflow/blob/0c9692ae7b1671c983569e5d3de5565843d500cf/tensorflow/lite/kernels/padding.h#L43-L55), does not check that the `stride` argument is...
https://nvd.nist.gov/vuln/detail/CVE-2021-29585
258,463
tensorflow
49847ae69a4e1a97ae7f2db5e217c77721e37948
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/49847ae69a4e1a97ae7f2db5e217c77721e37948
Fix division by zero in TFLite padding. PiperOrigin-RevId: 370777494 Change-Id: Ic1331e4a1603b9e4c8aa183012a6c8237410aa0f
0
inline int ComputeOutSize(TfLitePadding padding, int image_size, int filter_size, int stride, int dilation_rate = 1) { int effective_filter_size = (filter_size - 1) * dilation_rate + 1; // TODO(b/186448822): This uses 0 since the function has no other way to // report error case if (s...
44,559,053,459,286,960,000,000,000,000,000,000,000
None
null
[ "CWE-369" ]
CVE-2021-29585
TensorFlow is an end-to-end open source platform for machine learning. The TFLite computation for size of output after padding, `ComputeOutSize`(https://github.com/tensorflow/tensorflow/blob/0c9692ae7b1671c983569e5d3de5565843d500cf/tensorflow/lite/kernels/padding.h#L43-L55), does not check that the `stride` argument is...
https://nvd.nist.gov/vuln/detail/CVE-2021-29585
197,420
pure-ftpd
bf6fcd4935e95128cf22af5924cdc8fe5c0579da
https://github.com/jedisct1/pure-ftpd
https://github.com/jedisct1/pure-ftpd/commit/bf6fcd4935e95128cf22af5924cdc8fe5c0579da
pure_strcmp(): len(s2) can be > len(s1) Reported by Antonio Morales from GitHub Security Labs, thanks!
1
int pure_strcmp(const char * const s1, const char * const s2) { return pure_memcmp(s1, s2, strlen(s1) + 1U); }
121,309,845,584,586,850,000,000,000,000,000,000,000
utils.c
196,840,832,067,198,840,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2020-9365
An issue was discovered in Pure-FTPd 1.0.49. An out-of-bounds (OOB) read has been detected in the pure_strcmp function in utils.c.
https://nvd.nist.gov/vuln/detail/CVE-2020-9365
258,471
pure-ftpd
bf6fcd4935e95128cf22af5924cdc8fe5c0579da
https://github.com/jedisct1/pure-ftpd
https://github.com/jedisct1/pure-ftpd/commit/bf6fcd4935e95128cf22af5924cdc8fe5c0579da
pure_strcmp(): len(s2) can be > len(s1) Reported by Antonio Morales from GitHub Security Labs, thanks!
0
int pure_strcmp(const char * const s1, const char * const s2) { const size_t s1_len = strlen(s1); const size_t s2_len = strlen(s2); const size_t len = (s1_len < s2_len) ? s1_len : s2_len; return pure_memcmp(s1, s2, len + 1); }
307,325,257,865,580,570,000,000,000,000,000,000,000
utils.c
172,547,359,997,445,040,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2020-9365
An issue was discovered in Pure-FTPd 1.0.49. An out-of-bounds (OOB) read has been detected in the pure_strcmp function in utils.c.
https://nvd.nist.gov/vuln/detail/CVE-2020-9365
197,454
Bento4
53499d8d4c69142137c7c7f0097a444783fdeb90
https://github.com/axiomatic-systems/Bento4
https://github.com/axiomatic-systems/Bento4/commit/53499d8d4c69142137c7c7f0097a444783fdeb90
fix for #188
1
AP4_HvccAtom::AP4_HvccAtom(AP4_UI32 size, const AP4_UI08* payload) : AP4_Atom(AP4_ATOM_TYPE_HVCC, size) { // make a copy of our configuration bytes unsigned int payload_size = size-AP4_ATOM_HEADER_SIZE; m_RawBytes.SetData(payload, payload_size); // parse the payload m_ConfigurationVersion = p...
331,335,061,636,227,600,000,000,000,000,000,000,000
Ap4HvccAtom.cpp
284,120,992,807,607,550,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2017-14646
The AP4_AvccAtom and AP4_HvccAtom classes in Bento4 version 1.5.0-617 do not properly validate data sizes, leading to a heap-based buffer over-read and application crash in AP4_DataBuffer::SetData in Core/Ap4DataBuffer.cpp.
https://nvd.nist.gov/vuln/detail/CVE-2017-14646
258,984
Bento4
53499d8d4c69142137c7c7f0097a444783fdeb90
https://github.com/axiomatic-systems/Bento4
https://github.com/axiomatic-systems/Bento4/commit/53499d8d4c69142137c7c7f0097a444783fdeb90
fix for #188
0
AP4_HvccAtom::AP4_HvccAtom(AP4_UI32 size, const AP4_UI08* payload) : AP4_Atom(AP4_ATOM_TYPE_HVCC, size) { // make a copy of our configuration bytes unsigned int payload_size = size-AP4_ATOM_HEADER_SIZE; // keep a raw copy if (payload_size < 22) return; m_RawBytes.SetData(payload, payload_size);...
335,912,317,467,293,300,000,000,000,000,000,000,000
Ap4HvccAtom.cpp
91,545,346,318,859,280,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2017-14646
The AP4_AvccAtom and AP4_HvccAtom classes in Bento4 version 1.5.0-617 do not properly validate data sizes, leading to a heap-based buffer over-read and application crash in AP4_DataBuffer::SetData in Core/Ap4DataBuffer.cpp.
https://nvd.nist.gov/vuln/detail/CVE-2017-14646
197,455
Bento4
53499d8d4c69142137c7c7f0097a444783fdeb90
https://github.com/axiomatic-systems/Bento4
https://github.com/axiomatic-systems/Bento4/commit/53499d8d4c69142137c7c7f0097a444783fdeb90
fix for #188
1
AP4_AvccAtom::AP4_AvccAtom(AP4_UI32 size, const AP4_UI08* payload) : AP4_Atom(AP4_ATOM_TYPE_AVCC, size) { // make a copy of our configuration bytes unsigned int payload_size = size-AP4_ATOM_HEADER_SIZE; m_RawBytes.SetData(payload, payload_size); // parse the payload m_ConfigurationVersion = pay...
111,492,234,491,944,000,000,000,000,000,000,000,000
Ap4AvccAtom.cpp
160,048,528,581,776,210,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2017-14646
The AP4_AvccAtom and AP4_HvccAtom classes in Bento4 version 1.5.0-617 do not properly validate data sizes, leading to a heap-based buffer over-read and application crash in AP4_DataBuffer::SetData in Core/Ap4DataBuffer.cpp.
https://nvd.nist.gov/vuln/detail/CVE-2017-14646
258,981
Bento4
53499d8d4c69142137c7c7f0097a444783fdeb90
https://github.com/axiomatic-systems/Bento4
https://github.com/axiomatic-systems/Bento4/commit/53499d8d4c69142137c7c7f0097a444783fdeb90
fix for #188
0
AP4_AvccAtom::AP4_AvccAtom(AP4_UI32 size, const AP4_UI08* payload) : AP4_Atom(AP4_ATOM_TYPE_AVCC, size) { // make a copy of our configuration bytes unsigned int payload_size = size-AP4_ATOM_HEADER_SIZE; m_RawBytes.SetData(payload, payload_size); // parse the payload m_ConfigurationVersion = pay...
184,479,736,074,423,570,000,000,000,000,000,000,000
Ap4AvccAtom.cpp
26,725,286,725,359,955,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2017-14646
The AP4_AvccAtom and AP4_HvccAtom classes in Bento4 version 1.5.0-617 do not properly validate data sizes, leading to a heap-based buffer over-read and application crash in AP4_DataBuffer::SetData in Core/Ap4DataBuffer.cpp.
https://nvd.nist.gov/vuln/detail/CVE-2017-14646
197,456
tensorflow
8a6e874437670045e6c7dc6154c7412b4a2135e2
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/8a6e874437670045e6c7dc6154c7412b4a2135e2
Validate num_elements input in tf.raw_ops.TensorListReserve PiperOrigin-RevId: 383954564 Change-Id: I454bd78eff85bc4f16ddb7e608596971cca47f8f
1
void Compute(OpKernelContext* c) override { PartialTensorShape element_shape; OP_REQUIRES_OK(c, TensorShapeFromTensor(c->input(0), &element_shape)); int32 num_elements = c->input(1).scalar<int32>()(); TensorList output; output.element_shape = element_shape; output.element_dtype = element_dtype...
243,117,580,726,943,050,000,000,000,000,000,000,000
list_kernels.cc
210,360,149,145,833,570,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2021-37644
TensorFlow is an end-to-end open source platform for machine learning. In affected versions providing a negative element to `num_elements` list argument of `tf.raw_ops.TensorListReserve` causes the runtime to abort the process due to reallocating a `std::vector` to have a negative number of elements. The [implementatio...
https://nvd.nist.gov/vuln/detail/CVE-2021-37644
258,998
tensorflow
8a6e874437670045e6c7dc6154c7412b4a2135e2
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/8a6e874437670045e6c7dc6154c7412b4a2135e2
Validate num_elements input in tf.raw_ops.TensorListReserve PiperOrigin-RevId: 383954564 Change-Id: I454bd78eff85bc4f16ddb7e608596971cca47f8f
0
void Compute(OpKernelContext* c) override { PartialTensorShape element_shape; OP_REQUIRES_OK(c, TensorShapeFromTensor(c->input(0), &element_shape)); int32 num_elements = c->input(1).scalar<int32>()(); OP_REQUIRES(c, num_elements >= 0, errors::InvalidArgument("The num_elements to reserv...
277,791,309,071,220,030,000,000,000,000,000,000,000
list_kernels.cc
277,022,414,194,505,200,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2021-37644
TensorFlow is an end-to-end open source platform for machine learning. In affected versions providing a negative element to `num_elements` list argument of `tf.raw_ops.TensorListReserve` causes the runtime to abort the process due to reallocating a `std::vector` to have a negative number of elements. The [implementatio...
https://nvd.nist.gov/vuln/detail/CVE-2021-37644
197,463
tensorflow
a7116dd3913c4a4afd2a3a938573aa7c785fdfc6
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/a7116dd3913c4a4afd2a3a938573aa7c785fdfc6
Validate `MatrixDiagV{2,3}` arguments to prevent breakage. PiperOrigin-RevId: 369056033 Change-Id: Ic2018c297d3dd6f252dc1dd3667f1ed5cb1eaa42
1
void Compute(OpKernelContext* context) override { const Tensor& diagonal = context->input(0); // MatrixDiag and MatrixDiagV2 both use this OpKernel. MatrixDiag only has // one input, so we have to check the number of inputs before reading // additional parameters in MatrixDiagV2. int32 lower_diag...
168,901,046,729,603,980,000,000,000,000,000,000,000
matrix_diag_op.cc
334,644,474,900,792,060,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2021-29515
TensorFlow is an end-to-end open source platform for machine learning. The implementation of `MatrixDiag*` operations(https://github.com/tensorflow/tensorflow/blob/4c4f420e68f1cfaf8f4b6e8e3eb857e9e4c3ff33/tensorflow/core/kernels/linalg/matrix_diag_op.cc#L195-L197) does not validate that the tensor arguments are non-emp...
https://nvd.nist.gov/vuln/detail/CVE-2021-29515
259,054
tensorflow
a7116dd3913c4a4afd2a3a938573aa7c785fdfc6
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/a7116dd3913c4a4afd2a3a938573aa7c785fdfc6
Validate `MatrixDiagV{2,3}` arguments to prevent breakage. PiperOrigin-RevId: 369056033 Change-Id: Ic2018c297d3dd6f252dc1dd3667f1ed5cb1eaa42
0
void Compute(OpKernelContext* context) override { const Tensor& diagonal = context->input(0); // MatrixDiag and MatrixDiagV2 both use this OpKernel. MatrixDiag only has // one input, so we have to check the number of inputs before reading // additional parameters in MatrixDiagV2. int32 lower_diag...
59,169,174,181,965,490,000,000,000,000,000,000,000
matrix_diag_op.cc
163,161,773,486,725,490,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2021-29515
TensorFlow is an end-to-end open source platform for machine learning. The implementation of `MatrixDiag*` operations(https://github.com/tensorflow/tensorflow/blob/4c4f420e68f1cfaf8f4b6e8e3eb857e9e4c3ff33/tensorflow/core/kernels/linalg/matrix_diag_op.cc#L195-L197) does not validate that the tensor arguments are non-emp...
https://nvd.nist.gov/vuln/detail/CVE-2021-29515
197,474
libsixel
cb373ab6614c910407c5e5a93ab935144e62b037
https://github.com/saitoha/libsixel
https://github.com/saitoha/libsixel/commit/cb373ab6614c910407c5e5a93ab935144e62b037
Avoid illegal memory access problem with 1 color paletted png(#73), Thanks to HongxuChen.
1
sixel_dither_new( sixel_dither_t /* out */ **ppdither, /* dither object to be created */ int /* in */ ncolors, /* required colors */ sixel_allocator_t /* in */ *allocator) /* allocator, null if you use default allocator */ { SIXELSTATU...
170,667,451,677,567,100,000,000,000,000,000,000,000
dither.c
174,004,426,209,367,550,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2020-21048
An issue in the dither.c component of libsixel prior to v1.8.4 allows attackers to cause a denial of service (DOS) via a crafted PNG file.
https://nvd.nist.gov/vuln/detail/CVE-2020-21048
259,340
libsixel
cb373ab6614c910407c5e5a93ab935144e62b037
https://github.com/saitoha/libsixel
https://github.com/saitoha/libsixel/commit/cb373ab6614c910407c5e5a93ab935144e62b037
Avoid illegal memory access problem with 1 color paletted png(#73), Thanks to HongxuChen.
0
sixel_dither_new( sixel_dither_t /* out */ **ppdither, /* dither object to be created */ int /* in */ ncolors, /* required colors */ sixel_allocator_t /* in */ *allocator) /* allocator, null if you use default allocator */ { SIXELSTATU...
132,439,007,361,157,970,000,000,000,000,000,000,000
dither.c
212,352,249,689,211,370,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2020-21048
An issue in the dither.c component of libsixel prior to v1.8.4 allows attackers to cause a denial of service (DOS) via a crafted PNG file.
https://nvd.nist.gov/vuln/detail/CVE-2020-21048
197,479
gpac
51cdb67ff7c5f1242ac58c5aa603ceaf1793b788
https://github.com/gpac/gpac
https://github.com/gpac/gpac/commit/51cdb67ff7c5f1242ac58c5aa603ceaf1793b788
add safety in avc/hevc/vvc sps/pps/vps ID check - cf #1720 #1721 #1722
1
static s32 gf_hevc_read_pps_bs_internal(GF_BitStream *bs, HEVCState *hevc) { u32 i; s32 pps_id; HEVC_PPS *pps; //NAL header already read pps_id = gf_bs_read_ue_log(bs, "pps_id"); if ((pps_id < 0) || (pps_id >= 64)) { GF_LOG(GF_LOG_ERROR, GF_LOG_CODING, ("[HEVC] wrong PPS ID %d in PPS\n", pps_id)); return -1...
297,325,802,053,896,670,000,000,000,000,000,000,000
av_parsers.c
289,283,171,604,366,800,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2021-30022
There is a integer overflow in media_tools/av_parsers.c in the gf_avc_read_pps_bs_internal in GPAC 1.0.1. pps_id may be a negative number, so it will not return. However, avc->pps only has 255 unit, so there is an overflow, which results a crash.
https://nvd.nist.gov/vuln/detail/CVE-2021-30022
259,399
gpac
51cdb67ff7c5f1242ac58c5aa603ceaf1793b788
https://github.com/gpac/gpac
https://github.com/gpac/gpac/commit/51cdb67ff7c5f1242ac58c5aa603ceaf1793b788
add safety in avc/hevc/vvc sps/pps/vps ID check - cf #1720 #1721 #1722
0
static s32 gf_hevc_read_pps_bs_internal(GF_BitStream *bs, HEVCState *hevc) { u32 i; s32 pps_id; HEVC_PPS *pps; //NAL header already read pps_id = gf_bs_read_ue_log(bs, "pps_id"); if ((pps_id < 0) || (pps_id >= 64)) { GF_LOG(GF_LOG_ERROR, GF_LOG_CODING, ("[HEVC] wrong PPS ID %d in PPS\n", pps_id)); return -1...
228,395,575,536,952,500,000,000,000,000,000,000,000
av_parsers.c
168,517,587,328,341,010,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2021-30022
There is a integer overflow in media_tools/av_parsers.c in the gf_avc_read_pps_bs_internal in GPAC 1.0.1. pps_id may be a negative number, so it will not return. However, avc->pps only has 255 unit, so there is an overflow, which results a crash.
https://nvd.nist.gov/vuln/detail/CVE-2021-30022
197,492
neomutt
e27b65b3bf8defa34db58919496056caf3850cd4
https://github.com/neomutt/neomutt
https://github.com/neomutt/neomutt/commit/e27b65b3bf8defa34db58919496056caf3850cd4
imap_quote_string make room for quotes
1
void imap_quote_string(char *dest, size_t dlen, const char *src, bool quote_backtick) { const char *quote = "`\"\\"; if (!quote_backtick) quote++; char *pt = dest; const char *s = src; *pt++ = '"'; /* save room for trailing quote-char */ dlen -= 2; for (; *s && dlen; s++) { if (strchr(quote...
117,561,144,693,924,940,000,000,000,000,000,000,000
util.c
210,410,034,595,130,370,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2018-14352
An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap_quote_string in imap/util.c does not leave room for quote characters, leading to a stack-based buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2018-14352
259,467
neomutt
e27b65b3bf8defa34db58919496056caf3850cd4
https://github.com/neomutt/neomutt
https://github.com/neomutt/neomutt/commit/e27b65b3bf8defa34db58919496056caf3850cd4
imap_quote_string make room for quotes
0
void imap_quote_string(char *dest, size_t dlen, const char *src, bool quote_backtick) { const char *quote = "`\"\\"; if (!quote_backtick) quote++; char *pt = dest; const char *s = src; *pt++ = '"'; /* save room for quote-chars */ dlen -= 3; for (; *s && dlen; s++) { if (strchr(quote, *s)) ...
191,207,938,573,933,800,000,000,000,000,000,000,000
util.c
201,682,181,966,853,900,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2018-14352
An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap_quote_string in imap/util.c does not leave room for quote characters, leading to a stack-based buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2018-14352
197,502
ImageMagick
66e283e0a9c141b19fe6c4c39f4a41c0d3188ba8
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/66e283e0a9c141b19fe6c4c39f4a41c0d3188ba8
...
1
static Image *ReadMPCImage(const ImageInfo *image_info,ExceptionInfo *exception) { char cache_filename[MagickPathExtent], id[MagickPathExtent], keyword[MagickPathExtent], *options; const unsigned char *p; GeometryInfo geometry_info; Image *image; int c; LinkedListInfo ...
171,059,761,845,814,600,000,000,000,000,000,000,000
mpc.c
122,879,770,695,522,510,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2017-5507
Memory leak in coders/mpc.c in ImageMagick before 6.9.7-4 and 7.x before 7.0.4-4 allows remote attackers to cause a denial of service (memory consumption) via vectors involving a pixel cache.
https://nvd.nist.gov/vuln/detail/CVE-2017-5507
259,521
ImageMagick
66e283e0a9c141b19fe6c4c39f4a41c0d3188ba8
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/66e283e0a9c141b19fe6c4c39f4a41c0d3188ba8
...
0
static Image *ReadMPCImage(const ImageInfo *image_info,ExceptionInfo *exception) { char cache_filename[MagickPathExtent], id[MagickPathExtent], keyword[MagickPathExtent], *options; const unsigned char *p; GeometryInfo geometry_info; Image *image; int c; LinkedListInfo ...
173,837,340,975,945,260,000,000,000,000,000,000,000
mpc.c
129,988,513,172,456,500,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2017-5507
Memory leak in coders/mpc.c in ImageMagick before 6.9.7-4 and 7.x before 7.0.4-4 allows remote attackers to cause a denial of service (memory consumption) via vectors involving a pixel cache.
https://nvd.nist.gov/vuln/detail/CVE-2017-5507
197,508
linux
bc0b96b54a21246e377122d54569eef71cec535f
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/bc0b96b54a21246e377122d54569eef71cec535f
crypto: Move md5_transform to lib/md5.c We are going to use this for TCP/IP sequence number and fragment ID generation. Signed-off-by: David S. Miller <davem@davemloft.net>
1
static void md5_transform(u32 *hash, u32 const *in) { u32 a, b, c, d; a = hash[0]; b = hash[1]; c = hash[2]; d = hash[3]; MD5STEP(F1, a, b, c, d, in[0] + 0xd76aa478, 7); MD5STEP(F1, d, a, b, c, in[1] + 0xe8c7b756, 12); MD5STEP(F1, c, d, a, b, in[2] + 0x242070db, 17); MD5STEP(F1, b, c, d, a, in[3] + 0xc1bdcee...
13,796,085,130,929,380,000,000,000,000,000,000,000
None
null
[ "CWE-703" ]
CVE-2011-3188
The (1) IPv4 and (2) IPv6 implementations in the Linux kernel before 3.1 use a modified MD4 algorithm to generate sequence numbers and Fragment Identification values, which makes it easier for remote attackers to cause a denial of service (disrupted networking) or hijack network sessions by predicting these values and ...
https://nvd.nist.gov/vuln/detail/CVE-2011-3188
259,588
linux
bc0b96b54a21246e377122d54569eef71cec535f
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/bc0b96b54a21246e377122d54569eef71cec535f
crypto: Move md5_transform to lib/md5.c We are going to use this for TCP/IP sequence number and fragment ID generation. Signed-off-by: David S. Miller <davem@davemloft.net>
0
void md5_transform(__u32 *hash, __u32 const *in) { u32 a, b, c, d; a = hash[0]; b = hash[1]; c = hash[2]; d = hash[3]; MD5STEP(F1, a, b, c, d, in[0] + 0xd76aa478, 7); MD5STEP(F1, d, a, b, c, in[1] + 0xe8c7b756, 12); MD5STEP(F1, c, d, a, b, in[2] + 0x242070db, 17); MD5STEP(F1, b, c, d, a, in[3] + 0xc1bdceee, ...
67,694,714,863,169,235,000,000,000,000,000,000,000
None
null
[ "CWE-703" ]
CVE-2011-3188
The (1) IPv4 and (2) IPv6 implementations in the Linux kernel before 3.1 use a modified MD4 algorithm to generate sequence numbers and Fragment Identification values, which makes it easier for remote attackers to cause a denial of service (disrupted networking) or hijack network sessions by predicting these values and ...
https://nvd.nist.gov/vuln/detail/CVE-2011-3188
197,523
muon
c18663aa171c6cdf03da3e8c70df8663645b97c4
https://github.com/brave/muon
https://github.com/brave/muon/commit/c18663aa171c6cdf03da3e8c70df8663645b97c4
Issue: 15232 AllowScript should use atom::ContentSettingsManager like other Allow* methods in the observer
1
bool ContentSettingsObserver::AllowScript(bool enabled_per_settings) { if (!enabled_per_settings) return false; if (IsScriptDisabledForPreview(render_frame())) return false; if (is_interstitial_page_) return true; blink::WebLocalFrame* frame = render_frame()->GetWebFrame(); const auto it = cached...
237,083,620,463,072,280,000,000,000,000,000,000,000
content_settings_observer.cc
192,287,553,509,190,270,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2018-1000815
Brave Software Inc. Brave version version 0.22.810 to 0.24.0 contains a Other/Unknown vulnerability in function ContentSettingsObserver::AllowScript() in content_settings_observer.cc that can result in Websites can run inline JavaScript even if script is blocked, making attackers easier to track users. This attack appe...
https://nvd.nist.gov/vuln/detail/CVE-2018-1000815
259,855
muon
c18663aa171c6cdf03da3e8c70df8663645b97c4
https://github.com/brave/muon
https://github.com/brave/muon/commit/c18663aa171c6cdf03da3e8c70df8663645b97c4
Issue: 15232 AllowScript should use atom::ContentSettingsManager like other Allow* methods in the observer
0
bool ContentSettingsObserver::AllowScript(bool enabled_per_settings) { if (!enabled_per_settings) return false; if (IsScriptDisabledForPreview(render_frame())) return false; if (is_interstitial_page_) return true; blink::WebLocalFrame* frame = render_frame()->GetWebFrame(); const auto it = cached...
208,473,208,544,848,660,000,000,000,000,000,000,000
content_settings_observer.cc
181,684,349,958,332,650,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2018-1000815
Brave Software Inc. Brave version version 0.22.810 to 0.24.0 contains a Other/Unknown vulnerability in function ContentSettingsObserver::AllowScript() in content_settings_observer.cc that can result in Websites can run inline JavaScript even if script is blocked, making attackers easier to track users. This attack appe...
https://nvd.nist.gov/vuln/detail/CVE-2018-1000815
197,539
vlc
204291467724867b79735c0ee3aeb0dbc2200f97
https://github.com/videolan/vlc
https://github.com/videolan/vlc/commit/204291467724867b79735c0ee3aeb0dbc2200f97
stream_out: rtp: don't use VLA for user controlled data It should fix a possible invalid memory access When streaming ogg-files via rtp, an ogg-file can trigger an invalid write access using an overly long 'configuration' string. The original code attemps to allocate space to hold the string on the stack and hence, ...
1
int rtp_packetize_xiph_config( sout_stream_id_sys_t *id, const char *fmtp, int64_t i_pts ) { if (fmtp == NULL) return VLC_EGENERIC; /* extract base64 configuration from fmtp */ char *start = strstr(fmtp, "configuration="); assert(start != NULL); start += sizeo...
61,906,958,544,646,655,000,000,000,000,000,000,000
rtpfmt.c
67,128,685,027,688,970,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2014-9630
The rtp_packetize_xiph_config function in modules/stream_out/rtpfmt.c in VideoLAN VLC media player before 2.1.6 uses a stack-allocation approach with a size determined by arbitrary input data, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a ...
https://nvd.nist.gov/vuln/detail/CVE-2014-9630
260,560
vlc
204291467724867b79735c0ee3aeb0dbc2200f97
https://github.com/videolan/vlc
https://github.com/videolan/vlc/commit/204291467724867b79735c0ee3aeb0dbc2200f97
stream_out: rtp: don't use VLA for user controlled data It should fix a possible invalid memory access When streaming ogg-files via rtp, an ogg-file can trigger an invalid write access using an overly long 'configuration' string. The original code attemps to allocate space to hold the string on the stack and hence, ...
0
int rtp_packetize_xiph_config( sout_stream_id_sys_t *id, const char *fmtp, int64_t i_pts ) { if (fmtp == NULL) return VLC_EGENERIC; /* extract base64 configuration from fmtp */ char *start = strstr(fmtp, "configuration="); assert(start != NULL); start += sizeo...
180,761,742,555,289,960,000,000,000,000,000,000,000
rtpfmt.c
139,902,113,430,501,560,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2014-9630
The rtp_packetize_xiph_config function in modules/stream_out/rtpfmt.c in VideoLAN VLC media player before 2.1.6 uses a stack-allocation approach with a size determined by arbitrary input data, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a ...
https://nvd.nist.gov/vuln/detail/CVE-2014-9630
197,544
vlc
9bb0353a5c63a7f8c6fc853faa3df4b4df1f5eb5
https://github.com/videolan/vlc
https://github.com/videolan/vlc/commit/9bb0353a5c63a7f8c6fc853faa3df4b4df1f5eb5
codec: schroedinger: fix potential buffer overflow. The variable len is a raw 32 bit value read using GetDWBE. If this value is larger than UINT32_MAX - sizeof(eos), this will cause an integer overflow in the subsequent call to malloc, and finally a buffer overflow when calling memcpy. We fix this by checking len acco...
1
static block_t *Encode( encoder_t *p_enc, picture_t *p_pic ) { encoder_sys_t *p_sys = p_enc->p_sys; block_t *p_block, *p_output_chain = NULL; SchroFrame *p_frame; bool b_go = true; if( !p_pic ) { if( !p_sys->started || p_sys->b_eos_pulled ) return NULL; if( !p_sys->b_eo...
297,922,051,709,535,180,000,000,000,000,000,000,000
schroedinger.c
163,287,996,990,636,630,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2014-9629
Integer overflow in the Encode function in modules/codec/schroedinger.c in VideoLAN VLC media player before 2.1.6 and 2.2.x before 2.2.1 allows remote attackers to conduct buffer overflow attacks and execute arbitrary code via a crafted length value.
https://nvd.nist.gov/vuln/detail/CVE-2014-9629
260,645
vlc
9bb0353a5c63a7f8c6fc853faa3df4b4df1f5eb5
https://github.com/videolan/vlc
https://github.com/videolan/vlc/commit/9bb0353a5c63a7f8c6fc853faa3df4b4df1f5eb5
codec: schroedinger: fix potential buffer overflow. The variable len is a raw 32 bit value read using GetDWBE. If this value is larger than UINT32_MAX - sizeof(eos), this will cause an integer overflow in the subsequent call to malloc, and finally a buffer overflow when calling memcpy. We fix this by checking len acco...
0
static block_t *Encode( encoder_t *p_enc, picture_t *p_pic ) { encoder_sys_t *p_sys = p_enc->p_sys; block_t *p_block, *p_output_chain = NULL; SchroFrame *p_frame; bool b_go = true; if( !p_pic ) { if( !p_sys->started || p_sys->b_eos_pulled ) return NULL; if( !p_sys->b_eo...
184,003,617,845,941,640,000,000,000,000,000,000,000
schroedinger.c
111,512,992,297,961,510,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2014-9629
Integer overflow in the Encode function in modules/codec/schroedinger.c in VideoLAN VLC media player before 2.1.6 and 2.2.x before 2.2.1 allows remote attackers to conduct buffer overflow attacks and execute arbitrary code via a crafted length value.
https://nvd.nist.gov/vuln/detail/CVE-2014-9629
197,573
gpac
22774aa9e62f586319c8f107f5bae950fed900bc
https://github.com/gpac/gpac
https://github.com/gpac/gpac/commit/22774aa9e62f586319c8f107f5bae950fed900bc
fixed potential crash in adts reframer with broken streams - cf #1723
1
GF_Err adts_dmx_process(GF_Filter *filter) { GF_ADTSDmxCtx *ctx = gf_filter_get_udta(filter); GF_FilterPacket *pck, *dst_pck; u8 *data, *output; u8 *start; u32 pck_size, remain, prev_pck_size; u64 cts = GF_FILTER_NO_TS; //always reparse duration if (!ctx->duration.num) adts_dmx_check_dur(filter, ctx); if (...
245,157,112,169,555,560,000,000,000,000,000,000,000
reframe_adts.c
13,070,856,985,201,005,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2021-30019
In the adts_dmx_process function in filters/reframe_adts.c in GPAC 1.0.1, a crafted file may cause ctx->hdr.frame_size to be smaller than ctx->hdr.hdr_size, resulting in size to be a negative number and a heap overflow in the memcpy.
https://nvd.nist.gov/vuln/detail/CVE-2021-30019
261,376
gpac
22774aa9e62f586319c8f107f5bae950fed900bc
https://github.com/gpac/gpac
https://github.com/gpac/gpac/commit/22774aa9e62f586319c8f107f5bae950fed900bc
fixed potential crash in adts reframer with broken streams - cf #1723
0
GF_Err adts_dmx_process(GF_Filter *filter) { GF_ADTSDmxCtx *ctx = gf_filter_get_udta(filter); GF_FilterPacket *pck, *dst_pck; u8 *data, *output; u8 *start; u32 pck_size, remain, prev_pck_size; u64 cts = GF_FILTER_NO_TS; //always reparse duration if (!ctx->duration.num) adts_dmx_check_dur(filter, ctx); if (...
26,709,526,143,636,800,000,000,000,000,000,000,000
reframe_adts.c
318,962,490,957,036,760,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2021-30019
In the adts_dmx_process function in filters/reframe_adts.c in GPAC 1.0.1, a crafted file may cause ctx->hdr.frame_size to be smaller than ctx->hdr.hdr_size, resulting in size to be a negative number and a heap overflow in the memcpy.
https://nvd.nist.gov/vuln/detail/CVE-2021-30019
197,576
libass
f4f48950788b91c6a30029cc28a240b834713ea7
https://github.com/libass/libass
https://github.com/libass/libass/commit/f4f48950788b91c6a30029cc28a240b834713ea7
Fix line wrapping mode 0/3 bugs This fixes two separate bugs: a) Don't move a linebreak into the first symbol. This results in a empty line at the front, which does not help to equalize line lengths at all. Instead, merge line with the second one. b) When moving a linebreak into a symbol that already is a break...
1
wrap_lines_smart(ASS_Renderer *render_priv, double max_text_width) { int i; GlyphInfo *cur, *s1, *e1, *s2, *s3; int last_space; int break_type; int exit; double pen_shift_x; double pen_shift_y; int cur_line; int run_offset; TextInfo *text_info = &render_priv->text_info; last...
265,640,312,431,762,900,000,000,000,000,000,000,000
ass_render.c
256,046,161,915,596,200,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2016-7969
The wrap_lines_smart function in ass_render.c in libass before 0.13.4 allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors, related to "0/3 line wrapping equalization."
https://nvd.nist.gov/vuln/detail/CVE-2016-7969
261,473
libass
f4f48950788b91c6a30029cc28a240b834713ea7
https://github.com/libass/libass
https://github.com/libass/libass/commit/f4f48950788b91c6a30029cc28a240b834713ea7
Fix line wrapping mode 0/3 bugs This fixes two separate bugs: a) Don't move a linebreak into the first symbol. This results in a empty line at the front, which does not help to equalize line lengths at all. Instead, merge line with the second one. b) When moving a linebreak into a symbol that already is a break...
0
wrap_lines_smart(ASS_Renderer *render_priv, double max_text_width) { int i; GlyphInfo *cur, *s1, *e1, *s2, *s3; int last_space; int break_type; int exit; double pen_shift_x; double pen_shift_y; int cur_line; int run_offset; TextInfo *text_info = &render_priv->text_info; last...
8,534,752,724,889,373,000,000,000,000,000,000,000
ass_render.c
93,890,585,765,450,650,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2016-7969
The wrap_lines_smart function in ass_render.c in libass before 0.13.4 allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors, related to "0/3 line wrapping equalization."
https://nvd.nist.gov/vuln/detail/CVE-2016-7969
197,590
tensorflow
f2c3931113eaafe9ef558faaddd48e00a6606235
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/f2c3931113eaafe9ef558faaddd48e00a6606235
Adding more validation checks to _ParallelConcatUpdate to avoid NPE. PiperOrigin-RevId: 402569467 Change-Id: I2db122dab68be2a5e4e8dd3375f5a70c4d2307ec
1
void Compute(OpKernelContext* ctx) override { auto value = ctx->input(0); auto update = ctx->input(1); OP_REQUIRES( ctx, value.dims() == update.dims(), errors::InvalidArgument("value and update shape doesn't match: ", value.shape().DebugString(), " vs. ", ...
98,630,561,184,832,400,000,000,000,000,000,000,000
inplace_ops.cc
1,467,489,029,762,972,500,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2021-41207
TensorFlow is an open source platform for machine learning. In affected versions the implementation of `ParallelConcat` misses some input validation and can produce a division by 0. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2....
https://nvd.nist.gov/vuln/detail/CVE-2021-41207
261,574
tensorflow
f2c3931113eaafe9ef558faaddd48e00a6606235
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/f2c3931113eaafe9ef558faaddd48e00a6606235
Adding more validation checks to _ParallelConcatUpdate to avoid NPE. PiperOrigin-RevId: 402569467 Change-Id: I2db122dab68be2a5e4e8dd3375f5a70c4d2307ec
0
void Compute(OpKernelContext* ctx) override { auto value = ctx->input(0); // Value should be at least rank 1. Also the 0th dimension should be // at least loc_. OP_REQUIRES(ctx, value.dims() >= 1, errors::InvalidArgument("value should be at least rank 1.")); OP_REQUIRES( ct...
196,686,018,469,676,160,000,000,000,000,000,000,000
None
null
[ "CWE-369" ]
CVE-2021-41207
TensorFlow is an open source platform for machine learning. In affected versions the implementation of `ParallelConcat` misses some input validation and can produce a division by 0. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2....
https://nvd.nist.gov/vuln/detail/CVE-2021-41207
197,591
gpac
faa75edde3dfeba1e2cf6ffa48e45a50f1042096
https://github.com/gpac/gpac
https://github.com/gpac/gpac/commit/faa75edde3dfeba1e2cf6ffa48e45a50f1042096
fixed #2213
1
static Fixed lsr_translate_coords(GF_LASeRCodec *lsr, u32 val, u32 nb_bits) { #ifdef GPAC_FIXED_POINT if (val >> (nb_bits-1) ) { s32 neg = (s32) val - (1<<nb_bits); if (neg < -FIX_ONE / 2) return 2 * gf_divfix(INT2FIX(neg/2), lsr->res_factor); return gf_divfix(INT2FIX(neg), lsr->res_factor); } else { if (v...
83,111,933,375,980,730,000,000,000,000,000,000,000
lsr_dec.c
126,283,251,536,549,830,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2022-2454
Integer Overflow or Wraparound in GitHub repository gpac/gpac prior to 2.1-DEV.
https://nvd.nist.gov/vuln/detail/CVE-2022-2454
261,665
gpac
faa75edde3dfeba1e2cf6ffa48e45a50f1042096
https://github.com/gpac/gpac
https://github.com/gpac/gpac/commit/faa75edde3dfeba1e2cf6ffa48e45a50f1042096
fixed #2213
0
static Fixed lsr_translate_coords(GF_LASeRCodec *lsr, u32 val, u32 nb_bits) { if (!nb_bits) return 0; #ifdef GPAC_FIXED_POINT if (val >> (nb_bits-1) ) { s32 neg = (s32) val - (1<<nb_bits); if (neg < -FIX_ONE / 2) return 2 * gf_divfix(INT2FIX(neg/2), lsr->res_factor); return gf_divfix(INT2FIX(neg), lsr->res...
268,943,379,245,099,700,000,000,000,000,000,000,000
lsr_dec.c
174,794,081,698,567,240,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2022-2454
Integer Overflow or Wraparound in GitHub repository gpac/gpac prior to 2.1-DEV.
https://nvd.nist.gov/vuln/detail/CVE-2022-2454
197,650
tensorflow
ff8894044dfae5568ecbf2ed514c1a37dc394f1b
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/ff8894044dfae5568ecbf2ed514c1a37dc394f1b
Add one missing valdiation to `matrix_set_diag_op.cc` PiperOrigin-RevId: 387923408 Change-Id: If6a97b9098c13879400f56c22f91555cdf0ce5d7
1
void Compute(OpKernelContext* context) override { const Tensor& input = context->input(0); const Tensor& diag = context->input(1); // MatrixSetDiag and MatrixSetDiagV2 both use this OpKernel. MatrixSetDiag // only has two inputs, so we have to check the number of inputs before // reading addition...
334,978,766,458,952,920,000,000,000,000,000,000,000
matrix_set_diag_op.cc
255,652,985,875,337,400,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2021-37658
TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can cause undefined behavior via binding a reference to null pointer in all operations of type `tf.raw_ops.MatrixSetDiagV*`. The [implementation](https://github.com/tensorflow/tensorflow/blob/84d053187cb80d975ef2b968...
https://nvd.nist.gov/vuln/detail/CVE-2021-37658