idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
13,231
ghostscript
b326a71659b7837d3acde954b18bda1a6f5e9498
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498
None
0
setcolorspace_nosubst(i_ctx_t * i_ctx_p) { os_ptr op = osp; es_ptr ep; int code, depth; /* Make sure we have an operand... */ check_op(1); /* Check its either a name (base space) or an array */ if (!r_has_type(op, t_name)) if (!r_is_array(op)) return_error(gs_error_type...
125,449,180,024,760,300,000,000,000,000,000,000,000
zcolor.c
161,620,022,692,754,280,000,000,000,000,000,000,000
[ "CWE-704" ]
CVE-2018-16513
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2018-16513
13,232
ghostscript
b326a71659b7837d3acde954b18bda1a6f5e9498
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498
None
0
setdevicecolor_cont(i_ctx_t *i_ctx_p) { os_ptr op = osp; es_ptr ep = esp, pstage; int code = 0, stage, base; pstage = ep; base = (int)ep[-1].value.intval; stage = (int)pstage->value.intval; /* If we get a continuation from a sub-procedure, we will want to come back * here afterward, to...
102,201,916,793,290,340,000,000,000,000,000,000,000
zcolor.c
158,638,101,351,150,040,000,000,000,000,000,000,000
[ "CWE-704" ]
CVE-2018-16513
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2018-16513
13,233
ghostscript
b326a71659b7837d3acde954b18bda1a6f5e9498
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498
None
0
static int setdevicenspace(i_ctx_t * i_ctx_p, ref *devicenspace, int *stage, int *cont, int CIESubst) { os_ptr op = osp; /* required by "push" macro */ int code = 0, num_components, i; ref namesarray, proc, sname, tname, sref; ref_colorspace cspace_old; gs_color_space *pcs; gs_color_space * p...
123,102,614,282,902,620,000,000,000,000,000,000,000
zcolor.c
161,620,022,692,754,280,000,000,000,000,000,000,000
[ "CWE-704" ]
CVE-2018-16513
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2018-16513
13,234
ghostscript
b326a71659b7837d3acde954b18bda1a6f5e9498
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498
None
0
static int setdevicepspace(i_ctx_t * i_ctx_p, ref *r, int *stage, int *cont, int CIESubst) { int code = 0; gs_color_space *pcs; ref bpp; /* The comment in the original PostScript (gs_lev2.ps) said * "DevicePixel is actually a LanguageLevel 3 feature; it is here for * historical reasons." Act...
59,024,604,835,525,020,000,000,000,000,000,000,000
zcolor.c
161,620,022,692,754,280,000,000,000,000,000,000,000
[ "CWE-704" ]
CVE-2018-16513
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2018-16513
13,235
ghostscript
b326a71659b7837d3acde954b18bda1a6f5e9498
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498
None
0
static int setgrayspace(i_ctx_t * i_ctx_p, ref *r, int *stage, int *cont, int CIESubst) { os_ptr op = osp; gs_color_space *pcs; int code=0; ref stref; do { switch (*stage) { case 0: if (istate->use_cie_color.value.boolval && !CIESubst) { byte...
6,073,867,647,214,531,000,000,000,000,000,000,000
zcolor.c
161,620,022,692,754,280,000,000,000,000,000,000,000
[ "CWE-704" ]
CVE-2018-16513
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2018-16513
13,236
ghostscript
b326a71659b7837d3acde954b18bda1a6f5e9498
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498
None
0
static int seticcspace(i_ctx_t * i_ctx_p, ref *r, int *stage, int *cont, int CIESubst) { os_ptr op = osp; ref ICCdict, *tempref, *altref=NULL, *nocie = NULL; int components, code; float range[8]; code = dict_find_string(systemdict, "NOCIE", &nocie); if (code > 0) { if (!r_has_type(n...
164,940,520,349,257,250,000,000,000,000,000,000,000
zcolor.c
158,638,101,351,150,040,000,000,000,000,000,000,000
[ "CWE-704" ]
CVE-2018-16513
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2018-16513
13,237
ghostscript
b326a71659b7837d3acde954b18bda1a6f5e9498
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498
None
0
static int setindexedspace(i_ctx_t * i_ctx_p, ref *r, int *stage, int *cont, int CIESubst) { ref *pproc = &istate->colorspace[0].procs.special.index_proc; int code = 0; uint edepth = ref_stack_count(&e_stack); ref_colorspace cspace_old; ref hival, lookup; gs_color_space *pcs; gs_color_space ...
259,649,911,025,040,500,000,000,000,000,000,000,000
zcolor.c
161,620,022,692,754,280,000,000,000,000,000,000,000
[ "CWE-704" ]
CVE-2018-16513
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2018-16513
13,238
ghostscript
b326a71659b7837d3acde954b18bda1a6f5e9498
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498
None
0
static int setlabspace(i_ctx_t * i_ctx_p, ref *r, int *stage, int *cont, int CIESubst) { /* In this case, we will treat this as an ICC color space, with a CIELAB 16 bit profile */ ref labdict; int code = 0; float range_buff[4], white[3], black[3]; stat...
4,744,299,794,463,887,000,000,000,000,000,000,000
zcolor.c
161,620,022,692,754,280,000,000,000,000,000,000,000
[ "CWE-704" ]
CVE-2018-16513
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2018-16513
13,239
ghostscript
b326a71659b7837d3acde954b18bda1a6f5e9498
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498
None
0
static int setpatternspace(i_ctx_t * i_ctx_p, ref *r, int *stage, int *cont, int CIESubst) { gs_color_space *pcs; gs_color_space *pcs_base; uint edepth = ref_stack_count(&e_stack); int code = 0; if (i_ctx_p->language_level < 2) return_error(gs_error_undefined); *cont = 0; pcs_base ...
18,982,714,458,645,360,000,000,000,000,000,000,000
zcolor.c
161,620,022,692,754,280,000,000,000,000,000,000,000
[ "CWE-704" ]
CVE-2018-16513
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2018-16513
13,240
ghostscript
b326a71659b7837d3acde954b18bda1a6f5e9498
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498
None
0
static int setrgbspace(i_ctx_t * i_ctx_p, ref *r, int *stage, int *cont, int CIESubst) { os_ptr op = osp; gs_color_space *pcs; int code=0; ref stref; do { switch (*stage) { case 0: if (istate->use_cie_color.value.boolval && !CIESubst) { byte ...
71,538,119,594,167,770,000,000,000,000,000,000,000
zcolor.c
161,620,022,692,754,280,000,000,000,000,000,000,000
[ "CWE-704" ]
CVE-2018-16513
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2018-16513
13,241
ghostscript
b326a71659b7837d3acde954b18bda1a6f5e9498
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498
None
0
static int setseparationspace(i_ctx_t * i_ctx_p, ref *sepspace, int *stage, int *cont, int CIESubst) { os_ptr op = osp; /* required by "push" macro */ int code = 0; ref sname, proc; ref name_none, name_all; separation_type sep_type; ref_colorspace cspace_old; gs_color_space *pcs; gs_co...
200,571,175,809,751,400,000,000,000,000,000,000,000
zcolor.c
158,638,101,351,150,040,000,000,000,000,000,000,000
[ "CWE-704" ]
CVE-2018-16513
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2018-16513
13,242
ghostscript
b326a71659b7837d3acde954b18bda1a6f5e9498
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498
None
0
setstrokecolor_cont(i_ctx_t * i_ctx_p) { return zswapcolors(i_ctx_p); }
133,904,829,886,975,650,000,000,000,000,000,000,000
zcolor.c
161,620,022,692,754,280,000,000,000,000,000,000,000
[ "CWE-704" ]
CVE-2018-16513
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2018-16513
13,243
ghostscript
b326a71659b7837d3acde954b18bda1a6f5e9498
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498
None
0
setstrokecolorspace_cont(i_ctx_t * i_ctx_p) { return zswapcolors(i_ctx_p); }
190,093,553,007,210,760,000,000,000,000,000,000,000
zcolor.c
161,620,022,692,754,280,000,000,000,000,000,000,000
[ "CWE-704" ]
CVE-2018-16513
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2018-16513
13,244
ghostscript
b326a71659b7837d3acde954b18bda1a6f5e9498
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498
None
0
static int threecomponent(i_ctx_t * i_ctx_p, ref *space, int *n) { *n = 3; return 0; }
17,309,131,850,701,224,000,000,000,000,000,000,000
zcolor.c
161,620,022,692,754,280,000,000,000,000,000,000,000
[ "CWE-704" ]
CVE-2018-16513
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2018-16513
13,245
ghostscript
b326a71659b7837d3acde954b18bda1a6f5e9498
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498
None
0
static int validate_spaces(i_ctx_t *i_ctx_p, ref *arr, int *depth) { ref space, *sp = &space; int code = 0; PS_colour_space_t *obj; ref_assign(&space, arr); *depth = 0; do { code = get_space_object(i_ctx_p, sp, &obj); if (code < 0) return code; (*depth)++; ...
173,607,376,825,206,740,000,000,000,000,000,000,000
zcolor.c
161,620,022,692,754,280,000,000,000,000,000,000,000
[ "CWE-704" ]
CVE-2018-16513
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2018-16513
13,246
ghostscript
b326a71659b7837d3acde954b18bda1a6f5e9498
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498
None
0
static int validatecalrgbspace(i_ctx_t * i_ctx_p, ref **r) { int code=0; ref *space, calrgbdict; space = *r; if (!r_is_array(space)) return_error(gs_error_typecheck); /* Validate parameters, check we have enough operands */ if (r_size(space) < 2) return_error(gs_error_rangecheck...
291,636,827,448,119,580,000,000,000,000,000,000,000
zcolor.c
161,620,022,692,754,280,000,000,000,000,000,000,000
[ "CWE-704" ]
CVE-2018-16513
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2018-16513
13,247
ghostscript
b326a71659b7837d3acde954b18bda1a6f5e9498
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498
None
0
static int validatecieabcspace(i_ctx_t * i_ctx_p, ref **r) { int code = 0, i; float value[9]; ref CIEdict, *CIEspace = *r, *tempref, valref; if (!r_is_array(CIEspace)) return_error(gs_error_typecheck); /* Validate parameters, check we have enough operands */ if (r_size(CIEspace) != ...
34,943,893,895,604,838,000,000,000,000,000,000,000
zcolor.c
161,620,022,692,754,280,000,000,000,000,000,000,000
[ "CWE-704" ]
CVE-2018-16513
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2018-16513
13,248
ghostscript
b326a71659b7837d3acde954b18bda1a6f5e9498
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498
None
0
static int validatecieaspace(i_ctx_t * i_ctx_p, ref **r) { int code; float value[9]; ref CIEdict, *CIEspace = *r, *tempref; if (!r_is_array(CIEspace)) return_error(gs_error_typecheck); /* Validate parameters, check we have enough operands */ if (r_size(CIEspace) != 2) return...
39,587,262,493,656,334,000,000,000,000,000,000,000
zcolor.c
161,620,022,692,754,280,000,000,000,000,000,000,000
[ "CWE-704" ]
CVE-2018-16513
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2018-16513
13,249
ghostscript
b326a71659b7837d3acde954b18bda1a6f5e9498
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498
None
0
static int validateciedefgspace(i_ctx_t * i_ctx_p, ref **r) { int code = 0, i, j; float value[8]; ref CIEdict, *CIEspace = *r, tempref, arrayref, valref, *pref = &tempref; if (!r_is_array(CIEspace)) return_error(gs_error_typecheck); /* Validate parameters, check we have enough operands ...
69,549,453,545,169,055,000,000,000,000,000,000,000
zcolor.c
161,620,022,692,754,280,000,000,000,000,000,000,000
[ "CWE-704" ]
CVE-2018-16513
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2018-16513
13,250
ghostscript
b326a71659b7837d3acde954b18bda1a6f5e9498
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498
None
0
static int validateciedefspace(i_ctx_t * i_ctx_p, ref **r) { int code = 0, i; float value[6]; ref CIEdict, *pref, *CIEspace = *r, tempref, valref; if (!r_is_array(CIEspace)) return_error(gs_error_typecheck); /* Validate parameters, check we have enough operands */ if (r_size(CIEspac...
31,797,642,257,505,410,000,000,000,000,000,000,000
zcolor.c
161,620,022,692,754,280,000,000,000,000,000,000,000
[ "CWE-704" ]
CVE-2018-16513
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2018-16513
13,251
ghostscript
b326a71659b7837d3acde954b18bda1a6f5e9498
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498
None
0
static int validatedevicenspace(i_ctx_t * i_ctx_p, ref **space) { int i, code = 0; ref *devicenspace = *space, proc; ref nameref, sref, altspace, namesarray, sname; /* Check enough arguments in the space */ if (r_size(devicenspace) < 4) return_error(gs_error_rangecheck); /* Check the na...
55,812,159,981,520,200,000,000,000,000,000,000,000
zcolor.c
161,620,022,692,754,280,000,000,000,000,000,000,000
[ "CWE-704" ]
CVE-2018-16513
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2018-16513
13,252
ghostscript
b326a71659b7837d3acde954b18bda1a6f5e9498
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498
None
0
static int validatedevicepspace(i_ctx_t * i_ctx_p, ref **space) { int code = 0; ref *r = *space, bpp; if (!r_is_array(r)) return_error(gs_error_typecheck); /* Validate parameters, check we have enough operands */ if (r_size(r) != 2) return_error(gs_error_rangecheck); /* Make sur...
336,311,273,571,582,200,000,000,000,000,000,000,000
zcolor.c
161,620,022,692,754,280,000,000,000,000,000,000,000
[ "CWE-704" ]
CVE-2018-16513
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2018-16513
13,253
ghostscript
b326a71659b7837d3acde954b18bda1a6f5e9498
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498
None
0
static int validateiccspace(i_ctx_t * i_ctx_p, ref **r) { int code=0, i, components = 0; ref *space, *tempref, valref, ICCdict, sref; space = *r; if (!r_is_array(space)) return_error(gs_error_typecheck); /* Validate parameters, check we have enough operands */ if (r_size(space) != 2) ...
294,017,925,161,212,460,000,000,000,000,000,000,000
zcolor.c
161,620,022,692,754,280,000,000,000,000,000,000,000
[ "CWE-704" ]
CVE-2018-16513
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2018-16513
13,254
ghostscript
b326a71659b7837d3acde954b18bda1a6f5e9498
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498
None
0
static int validateindexedspace(i_ctx_t * i_ctx_p, ref **space) { int code = 0; ref *r = *space; ref nameref, sref, hival, lookup, altspace; if (!r_is_array(r)) return_error(gs_error_typecheck); /* Validate parameters, check we have enough operands */ if (r_size(r) != 4) return_...
288,734,162,667,476,840,000,000,000,000,000,000,000
zcolor.c
161,620,022,692,754,280,000,000,000,000,000,000,000
[ "CWE-704" ]
CVE-2018-16513
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2018-16513
13,255
ghostscript
b326a71659b7837d3acde954b18bda1a6f5e9498
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498
None
0
static int validatelabspace(i_ctx_t * i_ctx_p, ref **r) { int code=0; ref *space, labdict; space = *r; if (!r_is_array(space)) return_error(gs_error_typecheck); /* Validate parameters, check we have enough operands */ if (r_size(space) < 2) return_error(gs_error_rangecheck); ...
46,320,979,364,447,970,000,000,000,000,000,000,000
zcolor.c
161,620,022,692,754,280,000,000,000,000,000,000,000
[ "CWE-704" ]
CVE-2018-16513
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2018-16513
13,256
ghostscript
b326a71659b7837d3acde954b18bda1a6f5e9498
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498
None
0
static int validatepatternspace(i_ctx_t * i_ctx_p, ref **r) { int code; ref tref; /* since makepattern has already been run, we don't need to do much validation */ if (!r_has_type(*r, t_name)) { if (r_is_array(*r)) { if (r_size(*r) > 1) { code = array_get(imemory, *r...
83,406,521,575,146,070,000,000,000,000,000,000,000
zcolor.c
161,620,022,692,754,280,000,000,000,000,000,000,000
[ "CWE-704" ]
CVE-2018-16513
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2018-16513
13,257
ghostscript
b326a71659b7837d3acde954b18bda1a6f5e9498
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498
None
0
static int validateseparationspace(i_ctx_t * i_ctx_p, ref **space) { int code = 0; ref *sepspace = *space; ref nameref, sref, sname, altspace, tref; if (!r_is_array(sepspace)) return_error(gs_error_typecheck); /* Validate parameters, check we have enough operands */ if (r_size(sepspace)...
13,840,422,847,007,603,000,000,000,000,000,000,000
zcolor.c
161,620,022,692,754,280,000,000,000,000,000,000,000
[ "CWE-704" ]
CVE-2018-16513
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2018-16513
13,258
ghostscript
b326a71659b7837d3acde954b18bda1a6f5e9498
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498
None
0
zcolor_remap_color(i_ctx_t *i_ctx_p) { /* Remap both colors. This should never hurt. */ gs_swapcolors(igs); gx_unset_dev_color(igs); gs_swapcolors(igs); gx_unset_dev_color(igs); return 0; }
93,853,109,019,717,040,000,000,000,000,000,000,000
zcolor.c
161,620,022,692,754,280,000,000,000,000,000,000,000
[ "CWE-704" ]
CVE-2018-16513
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2018-16513
13,259
ghostscript
b326a71659b7837d3acde954b18bda1a6f5e9498
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498
None
0
zcolor_remap_one_finish(i_ctx_t *i_ctx_p) { return zcolor_remap_one_store(i_ctx_p, 0.0); }
93,679,487,300,323,880,000,000,000,000,000,000,000
zcolor.c
161,620,022,692,754,280,000,000,000,000,000,000,000
[ "CWE-704" ]
CVE-2018-16513
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2018-16513
13,260
ghostscript
b326a71659b7837d3acde954b18bda1a6f5e9498
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498
None
0
zcolor_remap_one_signed_finish(i_ctx_t *i_ctx_p) { return zcolor_remap_one_store(i_ctx_p, -1.0); }
82,011,362,238,937,350,000,000,000,000,000,000,000
zcolor.c
161,620,022,692,754,280,000,000,000,000,000,000,000
[ "CWE-704" ]
CVE-2018-16513
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2018-16513
13,261
ghostscript
b326a71659b7837d3acde954b18bda1a6f5e9498
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498
None
0
zcolor_remap_one_store(i_ctx_t *i_ctx_p, double min_value) { int i; gx_transfer_map *pmap = r_ptr(esp, gx_transfer_map); if (ref_stack_count(&o_stack) < transfer_map_size) return_error(gs_error_stackunderflow); for (i = 0; i < transfer_map_size; i++) { double v; int code = ...
8,529,577,523,878,193,000,000,000,000,000,000,000
zcolor.c
158,638,101,351,150,040,000,000,000,000,000,000,000
[ "CWE-704" ]
CVE-2018-16513
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2018-16513
13,262
ghostscript
b326a71659b7837d3acde954b18bda1a6f5e9498
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498
None
0
zcolor_reset_transfer(i_ctx_t *i_ctx_p) { gx_set_effective_transfer(igs); return zcolor_remap_color(i_ctx_p); }
339,820,021,661,780,570,000,000,000,000,000,000,000
zcolor.c
161,620,022,692,754,280,000,000,000,000,000,000,000
[ "CWE-704" ]
CVE-2018-16513
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2018-16513
13,263
ghostscript
b326a71659b7837d3acde954b18bda1a6f5e9498
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498
None
0
zcurrentcmykcolor(i_ctx_t * i_ctx_p) { int code; code = zcurrentcolor(i_ctx_p); if (code < 0) return code; /* Set up for the continuation procedure which will do the work */ /* Make sure the exec stack has enough space */ check_estack(7); push_mark_estack(es_other, colour_cleanup); ...
220,285,344,120,604,730,000,000,000,000,000,000,000
zcolor.c
161,620,022,692,754,280,000,000,000,000,000,000,000
[ "CWE-704" ]
CVE-2018-16513
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2018-16513
13,264
ghostscript
b326a71659b7837d3acde954b18bda1a6f5e9498
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498
None
0
zcurrentrgbcolor(i_ctx_t * i_ctx_p) { int code; code = zcurrentcolor(i_ctx_p); if (code < 0) return code; /* Set up for the continuation procedure which will do the work */ /* Make sure the exec stack has enough space */ check_estack(7); push_mark_estack(es_other, colour_cleanup); ...
40,154,676,620,433,344,000,000,000,000,000,000,000
zcolor.c
161,620,022,692,754,280,000,000,000,000,000,000,000
[ "CWE-704" ]
CVE-2018-16513
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2018-16513
13,265
ghostscript
b326a71659b7837d3acde954b18bda1a6f5e9498
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498
None
0
zincludecolorspace(i_ctx_t * i_ctx_p) { os_ptr op = osp; ref nsref; int code; check_type(*op, t_name); name_string_ref(imemory, op, &nsref); code = gs_includecolorspace(igs, nsref.value.const_bytes, r_size(&nsref)); if (!code) pop(1); return code; }
98,234,919,261,431,560,000,000,000,000,000,000,000
zcolor.c
161,620,022,692,754,280,000,000,000,000,000,000,000
[ "CWE-704" ]
CVE-2018-16513
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2018-16513
13,266
ghostscript
b326a71659b7837d3acde954b18bda1a6f5e9498
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498
None
0
zprocesscolors(i_ctx_t * i_ctx_p) { os_ptr op = osp; push(1); make_int(op, gs_currentdevice(igs)->color_info.num_components); return 0; }
333,381,149,696,498,170,000,000,000,000,000,000,000
zcolor.c
161,620,022,692,754,280,000,000,000,000,000,000,000
[ "CWE-704" ]
CVE-2018-16513
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2018-16513
13,267
ghostscript
b326a71659b7837d3acde954b18bda1a6f5e9498
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498
None
0
zsetcmykcolor(i_ctx_t * i_ctx_p) { os_ptr op = osp; /* required by "push" macro */ int code, i; float values[4]; /* Gather numeric operand value(s) (also checks type) */ code = float_params(op, 4, (float *)&values); if (code < 0) return code; /* Clamp numeric operand range(s) */ ...
50,567,363,780,952,460,000,000,000,000,000,000,000
zcolor.c
161,620,022,692,754,280,000,000,000,000,000,000,000
[ "CWE-704" ]
CVE-2018-16513
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2018-16513
13,268
ghostscript
b326a71659b7837d3acde954b18bda1a6f5e9498
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498
None
0
zsetcolorspace(i_ctx_t * i_ctx_p) { os_ptr op = osp; es_ptr ep; int code, depth; bool is_CIE; /* Make sure we have an operand... */ check_op(1); /* Check its either a name (base space) or an array */ if (!r_has_type(op, t_name)) if (!r_is_array(op)) return_error(gs_...
195,941,685,089,870,280,000,000,000,000,000,000,000
zcolor.c
161,620,022,692,754,280,000,000,000,000,000,000,000
[ "CWE-704" ]
CVE-2018-16513
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2018-16513
13,269
ghostscript
b326a71659b7837d3acde954b18bda1a6f5e9498
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498
None
0
zsetfillcolor(i_ctx_t * i_ctx_p) { return zsetcolor(i_ctx_p); }
277,830,584,500,988,980,000,000,000,000,000,000,000
zcolor.c
161,620,022,692,754,280,000,000,000,000,000,000,000
[ "CWE-704" ]
CVE-2018-16513
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2018-16513
13,270
ghostscript
b326a71659b7837d3acde954b18bda1a6f5e9498
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498
None
0
zsetfillcolorspace(i_ctx_t * i_ctx_p) { return zsetcolorspace(i_ctx_p); }
37,519,148,671,284,702,000,000,000,000,000,000,000
zcolor.c
161,620,022,692,754,280,000,000,000,000,000,000,000
[ "CWE-704" ]
CVE-2018-16513
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2018-16513
13,271
ghostscript
b326a71659b7837d3acde954b18bda1a6f5e9498
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498
None
0
zsetgray(i_ctx_t * i_ctx_p) { os_ptr op = osp; /* required by "push" macro */ float value; int code; /* Gather numeric operand value(s) */ code = float_params(op, 1, &value); if (code < 0) return code; /* Clamp numeric operand range(s) */ if (value < 0) value = 0; ...
6,398,775,369,448,888,000,000,000,000,000,000,000
zcolor.c
161,620,022,692,754,280,000,000,000,000,000,000,000
[ "CWE-704" ]
CVE-2018-16513
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2018-16513
13,272
ghostscript
b326a71659b7837d3acde954b18bda1a6f5e9498
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498
None
0
zsethsbcolor(i_ctx_t * i_ctx_p) { os_ptr op = osp; /* required by "push" macro */ int code, i; float values[3]; /* Gather numeric operand value(s) (also checks type) */ code = float_params(op, 3, (float *)&values); if (code < 0) return code; /* Clamp numeric operand range(s) */ ...
114,829,634,304,202,320,000,000,000,000,000,000,000
zcolor.c
161,620,022,692,754,280,000,000,000,000,000,000,000
[ "CWE-704" ]
CVE-2018-16513
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2018-16513
13,273
ghostscript
b326a71659b7837d3acde954b18bda1a6f5e9498
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498
None
0
zsetrgbcolor(i_ctx_t * i_ctx_p) { os_ptr op = osp; /* required by "push" macro */ int code, i; float values[3]; /* Gather numeric operand value(s) (also checks type) */ code = float_params(op, 3, (float *)&values); if (code < 0) return code; /* Clamp numeric operand range(s) */ ...
314,974,742,352,196,400,000,000,000,000,000,000,000
zcolor.c
161,620,022,692,754,280,000,000,000,000,000,000,000
[ "CWE-704" ]
CVE-2018-16513
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2018-16513
13,274
ghostscript
b326a71659b7837d3acde954b18bda1a6f5e9498
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498
None
0
zsetstrokecolor(i_ctx_t * i_ctx_p) { int code; code = zswapcolors(i_ctx_p); if (code < 0) return code; /* Set up for the continuation procedure which will finish by restoring the fill colour space */ /* Make sure the exec stack has enough space */ check_estack(1); /* Now, the actua...
36,749,744,249,402,570,000,000,000,000,000,000,000
zcolor.c
158,638,101,351,150,040,000,000,000,000,000,000,000
[ "CWE-704" ]
CVE-2018-16513
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2018-16513
13,275
ghostscript
b326a71659b7837d3acde954b18bda1a6f5e9498
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498
None
0
zsetstrokecolorspace(i_ctx_t * i_ctx_p) { int code; code = zswapcolors(i_ctx_p); if (code < 0) return code; /* Set up for the continuation procedure which will finish by restoring the fill colour space */ /* Make sure the exec stack has enough space */ check_estack(1); /* Now, the ...
247,728,083,845,484,600,000,000,000,000,000,000,000
zcolor.c
158,638,101,351,150,040,000,000,000,000,000,000,000
[ "CWE-704" ]
CVE-2018-16513
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2018-16513
13,276
ghostscript
b326a71659b7837d3acde954b18bda1a6f5e9498
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498
None
0
zsettransfer(i_ctx_t * i_ctx_p) { os_ptr op = osp; int code; check_proc(*op); check_ostack(zcolor_remap_one_ostack - 1); check_estack(1 + zcolor_remap_one_estack); istate->transfer_procs.red = istate->transfer_procs.green = istate->transfer_procs.blue = istate->tran...
182,865,095,919,560,650,000,000,000,000,000,000,000
zcolor.c
161,620,022,692,754,280,000,000,000,000,000,000,000
[ "CWE-704" ]
CVE-2018-16513
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2018-16513
13,277
ghostscript
b326a71659b7837d3acde954b18bda1a6f5e9498
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498
None
0
zswapcolors(i_ctx_t * i_ctx_p) { ref_colorspace tmp_cs; ref tmp_pat; tmp_cs = istate->colorspace[0]; istate->colorspace[0] = istate->colorspace[1]; istate->colorspace[1] = tmp_cs; tmp_pat = istate->pattern[0]; istate->pattern[0] = istate->pattern[1]; ...
297,384,633,050,994,170,000,000,000,000,000,000,000
zcolor.c
161,620,022,692,754,280,000,000,000,000,000,000,000
[ "CWE-704" ]
CVE-2018-16513
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2018-16513
13,292
ghostscript
ea735ba37dc0fd5f5622d031830b9a559dec1cc9
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=ea735ba37dc0fd5f5622d031830b9a559dec1cc9
None
0
zsetcolor(i_ctx_t * i_ctx_p) { os_ptr op = osp; es_ptr ep; const gs_color_space * pcs = gs_currentcolorspace(igs); gs_client_color cc; int n_comps, n_numeric_comps, num_offset = 0, code, depth; PS_colour_space_t *space; /* initialize the client ...
151,317,392,453,793,860,000,000,000,000,000,000,000
zcolor.c
240,625,457,164,200,600,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-16510
An issue was discovered in Artifex Ghostscript before 9.24. Incorrect exec stack handling in the "CS" and "SC" PDF primitives could be used by remote attackers able to supply crafted PDFs to crash the interpreter or possibly have unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2018-16510
13,293
savannah
ba6b44f6745b14dce414761a8e4b35d31b176bba
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/wget.git/commit/?id=ba6b44f6745b14dce414761a8e4b35d31b176bba
None
0
calc_rate (wgint bytes, double secs, int *units) { double dlrate; double bibyte = 1000.0; if (!opt.report_bps) bibyte = 1024.0; assert (secs >= 0); assert (bytes >= 0); if (secs == 0) /* If elapsed time is exactly zero, it means we're under the resolution of the timer. This can easily ha...
309,451,795,890,062,500,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-13090
The retr.c:fd_read_body() function is called when processing OK responses. When the response is sent chunked in wget before 1.19.2, the chunk parser uses strtol() to read each chunk's length, but doesn't check that the chunk length is a non-negative number. The code then tries to read the chunk in pieces of 8192 bytes ...
https://nvd.nist.gov/vuln/detail/CVE-2017-13090
13,294
savannah
ba6b44f6745b14dce414761a8e4b35d31b176bba
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/wget.git/commit/?id=ba6b44f6745b14dce414761a8e4b35d31b176bba
None
0
fd_read_hunk (int fd, hunk_terminator_t terminator, long sizehint, long maxsize) { long bufsize = sizehint; char *hunk = xmalloc (bufsize); int tail = 0; /* tail position in HUNK */ assert (!maxsize || maxsize >= bufsize); while (1) { const char *end; int pklen, rdlen, remain...
149,873,434,514,180,780,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-13090
The retr.c:fd_read_body() function is called when processing OK responses. When the response is sent chunked in wget before 1.19.2, the chunk parser uses strtol() to read each chunk's length, but doesn't check that the chunk length is a non-negative number. The code then tries to read the chunk in pieces of 8192 bytes ...
https://nvd.nist.gov/vuln/detail/CVE-2017-13090
13,295
savannah
ba6b44f6745b14dce414761a8e4b35d31b176bba
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/wget.git/commit/?id=ba6b44f6745b14dce414761a8e4b35d31b176bba
None
0
free_urlpos (struct urlpos *l) { while (l) { struct urlpos *next = l->next; if (l->url) url_free (l->url); xfree (l->local_name); xfree (l); l = next; } }
167,385,682,884,158,400,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-13090
The retr.c:fd_read_body() function is called when processing OK responses. When the response is sent chunked in wget before 1.19.2, the chunk parser uses strtol() to read each chunk's length, but doesn't check that the chunk length is a non-negative number. The code then tries to read the chunk in pieces of 8192 bytes ...
https://nvd.nist.gov/vuln/detail/CVE-2017-13090
13,296
savannah
ba6b44f6745b14dce414761a8e4b35d31b176bba
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/wget.git/commit/?id=ba6b44f6745b14dce414761a8e4b35d31b176bba
None
0
getproxy (struct url *u) { char *proxy = NULL; char *rewritten_url; if (!opt.use_proxy) return NULL; if (no_proxy_match (u->host, (const char **)opt.no_proxy)) return NULL; switch (u->scheme) { case SCHEME_HTTP: proxy = opt.http_proxy ? opt.http_proxy : getenv ("http_proxy"); bre...
61,540,123,359,353,150,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-13090
The retr.c:fd_read_body() function is called when processing OK responses. When the response is sent chunked in wget before 1.19.2, the chunk parser uses strtol() to read each chunk's length, but doesn't check that the chunk length is a non-negative number. The code then tries to read the chunk in pieces of 8192 bytes ...
https://nvd.nist.gov/vuln/detail/CVE-2017-13090
13,297
savannah
ba6b44f6745b14dce414761a8e4b35d31b176bba
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/wget.git/commit/?id=ba6b44f6745b14dce414761a8e4b35d31b176bba
None
0
input_file_url (const char *input_file) { static bool first = true; if (input_file && url_has_scheme (input_file) && first) { first = false; return true; } else return false; }
272,920,896,114,129,430,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-13090
The retr.c:fd_read_body() function is called when processing OK responses. When the response is sent chunked in wget before 1.19.2, the chunk parser uses strtol() to read each chunk's length, but doesn't check that the chunk length is a non-negative number. The code then tries to read the chunk in pieces of 8192 bytes ...
https://nvd.nist.gov/vuln/detail/CVE-2017-13090
13,298
savannah
ba6b44f6745b14dce414761a8e4b35d31b176bba
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/wget.git/commit/?id=ba6b44f6745b14dce414761a8e4b35d31b176bba
None
0
limit_bandwidth (wgint bytes, struct ptimer *timer) { double delta_t = ptimer_read (timer) - limit_data.chunk_start; double expected; limit_data.chunk_bytes += bytes; /* Calculate the amount of time we expect downloading the chunk should take. If in reality it took less time, sleep to compensate fo...
126,250,866,824,264,860,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-13090
The retr.c:fd_read_body() function is called when processing OK responses. When the response is sent chunked in wget before 1.19.2, the chunk parser uses strtol() to read each chunk's length, but doesn't check that the chunk length is a non-negative number. The code then tries to read the chunk in pieces of 8192 bytes ...
https://nvd.nist.gov/vuln/detail/CVE-2017-13090
13,299
savannah
ba6b44f6745b14dce414761a8e4b35d31b176bba
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/wget.git/commit/?id=ba6b44f6745b14dce414761a8e4b35d31b176bba
None
0
limit_bandwidth_reset (void) { xzero (limit_data); }
15,062,904,819,119,382,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-13090
The retr.c:fd_read_body() function is called when processing OK responses. When the response is sent chunked in wget before 1.19.2, the chunk parser uses strtol() to read each chunk's length, but doesn't check that the chunk length is a non-negative number. The code then tries to read the chunk in pieces of 8192 bytes ...
https://nvd.nist.gov/vuln/detail/CVE-2017-13090
13,300
savannah
ba6b44f6745b14dce414761a8e4b35d31b176bba
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/wget.git/commit/?id=ba6b44f6745b14dce414761a8e4b35d31b176bba
None
0
line_terminator (const char *start _GL_UNUSED, const char *peeked, int peeklen) { const char *p = memchr (peeked, '\n', peeklen); if (p) /* p+1 because the line must include '\n' */ return p + 1; return NULL; }
128,414,862,913,392,470,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-13090
The retr.c:fd_read_body() function is called when processing OK responses. When the response is sent chunked in wget before 1.19.2, the chunk parser uses strtol() to read each chunk's length, but doesn't check that the chunk length is a non-negative number. The code then tries to read the chunk in pieces of 8192 bytes ...
https://nvd.nist.gov/vuln/detail/CVE-2017-13090
13,301
savannah
ba6b44f6745b14dce414761a8e4b35d31b176bba
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/wget.git/commit/?id=ba6b44f6745b14dce414761a8e4b35d31b176bba
None
0
no_proxy_match (const char *host, const char **no_proxy) { if (!no_proxy) return false; else return sufmatch (no_proxy, host); }
214,656,008,469,847,800,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-13090
The retr.c:fd_read_body() function is called when processing OK responses. When the response is sent chunked in wget before 1.19.2, the chunk parser uses strtol() to read each chunk's length, but doesn't check that the chunk length is a non-negative number. The code then tries to read the chunk in pieces of 8192 bytes ...
https://nvd.nist.gov/vuln/detail/CVE-2017-13090
13,302
savannah
ba6b44f6745b14dce414761a8e4b35d31b176bba
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/wget.git/commit/?id=ba6b44f6745b14dce414761a8e4b35d31b176bba
None
0
printwhat (int n1, int n2) { logputs (LOG_VERBOSE, (n1 == n2) ? _("Giving up.\n\n") : _("Retrying.\n\n")); }
264,171,437,916,334,600,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-13090
The retr.c:fd_read_body() function is called when processing OK responses. When the response is sent chunked in wget before 1.19.2, the chunk parser uses strtol() to read each chunk's length, but doesn't check that the chunk length is a non-negative number. The code then tries to read the chunk in pieces of 8192 bytes ...
https://nvd.nist.gov/vuln/detail/CVE-2017-13090
13,303
savannah
ba6b44f6745b14dce414761a8e4b35d31b176bba
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/wget.git/commit/?id=ba6b44f6745b14dce414761a8e4b35d31b176bba
None
0
retr_rate (wgint bytes, double secs) { static char res[20]; static const char *rate_names[] = {"B/s", "KB/s", "MB/s", "GB/s" }; static const char *rate_names_bits[] = {"b/s", "Kb/s", "Mb/s", "Gb/s" }; int units; double dlrate = calc_rate (bytes, secs, &units); /* Use more digits for smaller numbers (regard...
303,478,846,550,105,770,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-13090
The retr.c:fd_read_body() function is called when processing OK responses. When the response is sent chunked in wget before 1.19.2, the chunk parser uses strtol() to read each chunk's length, but doesn't check that the chunk length is a non-negative number. The code then tries to read the chunk in pieces of 8192 bytes ...
https://nvd.nist.gov/vuln/detail/CVE-2017-13090
13,304
savannah
ba6b44f6745b14dce414761a8e4b35d31b176bba
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/wget.git/commit/?id=ba6b44f6745b14dce414761a8e4b35d31b176bba
None
0
retrieve_from_file (const char *file, bool html, int *count) { uerr_t status; struct urlpos *url_list, *cur_url; struct iri *iri = iri_new(); char *input_file, *url_file = NULL; const char *url = file; status = RETROK; /* Suppose everything is OK. */ *count = 0; /* Reset th...
6,362,759,562,777,174,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-13090
The retr.c:fd_read_body() function is called when processing OK responses. When the response is sent chunked in wget before 1.19.2, the chunk parser uses strtol() to read each chunk's length, but doesn't check that the chunk length is a non-negative number. The code then tries to read the chunk in pieces of 8192 bytes ...
https://nvd.nist.gov/vuln/detail/CVE-2017-13090
13,305
savannah
ba6b44f6745b14dce414761a8e4b35d31b176bba
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/wget.git/commit/?id=ba6b44f6745b14dce414761a8e4b35d31b176bba
None
0
retrieve_url (struct url * orig_parsed, const char *origurl, char **file, char **newloc, const char *refurl, int *dt, bool recursive, struct iri *iri, bool register_status) { uerr_t result; char *url; bool location_changed; bool iri_fallbacked = 0; int dummy; char *mynewloc, *pro...
328,713,513,349,489,200,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-13090
The retr.c:fd_read_body() function is called when processing OK responses. When the response is sent chunked in wget before 1.19.2, the chunk parser uses strtol() to read each chunk's length, but doesn't check that the chunk length is a non-negative number. The code then tries to read the chunk in pieces of 8192 bytes ...
https://nvd.nist.gov/vuln/detail/CVE-2017-13090
13,306
savannah
ba6b44f6745b14dce414761a8e4b35d31b176bba
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/wget.git/commit/?id=ba6b44f6745b14dce414761a8e4b35d31b176bba
None
0
rotate_backups(const char *fname) { #ifdef __VMS # define SEP "_" # define AVS ";*" /* All-version suffix. */ # define AVSL (sizeof (AVS) - 1) #else # define SEP "." # define AVSL 0 #endif int maxlen = strlen (fname) + sizeof (SEP) + numdigit (opt.backups) + AVSL; char *from = alloca (maxlen)...
294,026,260,071,657,720,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-13090
The retr.c:fd_read_body() function is called when processing OK responses. When the response is sent chunked in wget before 1.19.2, the chunk parser uses strtol() to read each chunk's length, but doesn't check that the chunk length is a non-negative number. The code then tries to read the chunk in pieces of 8192 bytes ...
https://nvd.nist.gov/vuln/detail/CVE-2017-13090
13,307
savannah
ba6b44f6745b14dce414761a8e4b35d31b176bba
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/wget.git/commit/?id=ba6b44f6745b14dce414761a8e4b35d31b176bba
None
0
set_local_file (const char **file, const char *default_file) { if (opt.output_document) { if (output_stream_regular) *file = opt.output_document; } else *file = default_file; }
87,212,489,917,141,350,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-13090
The retr.c:fd_read_body() function is called when processing OK responses. When the response is sent chunked in wget before 1.19.2, the chunk parser uses strtol() to read each chunk's length, but doesn't check that the chunk length is a non-negative number. The code then tries to read the chunk in pieces of 8192 bytes ...
https://nvd.nist.gov/vuln/detail/CVE-2017-13090
13,308
savannah
ba6b44f6745b14dce414761a8e4b35d31b176bba
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/wget.git/commit/?id=ba6b44f6745b14dce414761a8e4b35d31b176bba
None
0
sleep_between_retrievals (int count) { static bool first_retrieval = true; if (first_retrieval) { /* Don't sleep before the very first retrieval. */ first_retrieval = false; return; } if (opt.waitretry && count > 1) { /* If opt.waitretry is specified and this is a retry, wait...
88,821,277,517,548,460,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-13090
The retr.c:fd_read_body() function is called when processing OK responses. When the response is sent chunked in wget before 1.19.2, the chunk parser uses strtol() to read each chunk's length, but doesn't check that the chunk length is a non-negative number. The code then tries to read the chunk in pieces of 8192 bytes ...
https://nvd.nist.gov/vuln/detail/CVE-2017-13090
13,309
savannah
ba6b44f6745b14dce414761a8e4b35d31b176bba
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/wget.git/commit/?id=ba6b44f6745b14dce414761a8e4b35d31b176bba
None
0
url_uses_proxy (struct url * u) { bool ret; char *proxy; if (!u) return false; proxy = getproxy (u); ret = proxy != NULL; xfree (proxy); return ret; }
239,828,032,782,237,830,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-13090
The retr.c:fd_read_body() function is called when processing OK responses. When the response is sent chunked in wget before 1.19.2, the chunk parser uses strtol() to read each chunk's length, but doesn't check that the chunk length is a non-negative number. The code then tries to read the chunk in pieces of 8192 bytes ...
https://nvd.nist.gov/vuln/detail/CVE-2017-13090
13,310
savannah
ba6b44f6745b14dce414761a8e4b35d31b176bba
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/wget.git/commit/?id=ba6b44f6745b14dce414761a8e4b35d31b176bba
None
0
zalloc (voidpf opaque, unsigned int items, unsigned int size) { (void) opaque; return (voidpf) xcalloc (items, size); }
48,044,752,433,430,690,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-13090
The retr.c:fd_read_body() function is called when processing OK responses. When the response is sent chunked in wget before 1.19.2, the chunk parser uses strtol() to read each chunk's length, but doesn't check that the chunk length is a non-negative number. The code then tries to read the chunk in pieces of 8192 bytes ...
https://nvd.nist.gov/vuln/detail/CVE-2017-13090
13,311
savannah
ba6b44f6745b14dce414761a8e4b35d31b176bba
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/wget.git/commit/?id=ba6b44f6745b14dce414761a8e4b35d31b176bba
None
0
zfree (voidpf opaque, voidpf address) { (void) opaque; xfree (address); }
4,528,613,452,142,047,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-13090
The retr.c:fd_read_body() function is called when processing OK responses. When the response is sent chunked in wget before 1.19.2, the chunk parser uses strtol() to read each chunk's length, but doesn't check that the chunk length is a non-negative number. The code then tries to read the chunk in pieces of 8192 bytes ...
https://nvd.nist.gov/vuln/detail/CVE-2017-13090
13,370
ghostscript
0d3901189f245232f0161addf215d7268c4d05a3
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=0d3901189f245232f0161addf215d7268c4d05a3
None
0
check_file_permissions(i_ctx_t *i_ctx_p, const char *fname, int len, gx_io_device *iodev, const char *permitgroup) { char fname_reduced[gp_file_name_sizeof]; uint rlen = sizeof(fname_reduced); if (gp_file_name_reduce(fname, len, fname_reduced, &rlen) != gp_combine_success) r...
64,640,629,699,522,050,000,000,000,000,000,000,000
None
null
[]
CVE-2018-15908
In Artifex Ghostscript 9.23 before 2018-08-23, attackers are able to supply malicious PostScript files to bypass .tempfile restrictions and write files.
https://nvd.nist.gov/vuln/detail/CVE-2018-15908
13,371
ghostscript
0d3901189f245232f0161addf215d7268c4d05a3
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=0d3901189f245232f0161addf215d7268c4d05a3
None
0
execfile_cleanup(i_ctx_t *i_ctx_p) { check_ostack(1); *++osp = esp[2]; return zclosefile(i_ctx_p); }
32,290,595,450,673,673,000,000,000,000,000,000,000
None
null
[]
CVE-2018-15908
In Artifex Ghostscript 9.23 before 2018-08-23, attackers are able to supply malicious PostScript files to bypass .tempfile restrictions and write files.
https://nvd.nist.gov/vuln/detail/CVE-2018-15908
13,372
ghostscript
0d3901189f245232f0161addf215d7268c4d05a3
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=0d3901189f245232f0161addf215d7268c4d05a3
None
0
execfile_finish(i_ctx_t *i_ctx_p) { check_ostack(1); esp -= 2; execfile_cleanup(i_ctx_p); return o_pop_estack; }
53,055,284,484,100,290,000,000,000,000,000,000,000
None
null
[]
CVE-2018-15908
In Artifex Ghostscript 9.23 before 2018-08-23, attackers are able to supply malicious PostScript files to bypass .tempfile restrictions and write files.
https://nvd.nist.gov/vuln/detail/CVE-2018-15908
13,373
ghostscript
0d3901189f245232f0161addf215d7268c4d05a3
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=0d3901189f245232f0161addf215d7268c4d05a3
None
0
file_cleanup(i_ctx_t *i_ctx_p) { gx_io_device *iodev = r_ptr(esp + 2, gx_io_device); iodev->procs.enumerate_close(r_ptr(esp + 5, file_enum)); return 0; }
60,715,895,058,148,940,000,000,000,000,000,000,000
None
null
[]
CVE-2018-15908
In Artifex Ghostscript 9.23 before 2018-08-23, attackers are able to supply malicious PostScript files to bypass .tempfile restrictions and write files.
https://nvd.nist.gov/vuln/detail/CVE-2018-15908
13,374
ghostscript
0d3901189f245232f0161addf215d7268c4d05a3
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=0d3901189f245232f0161addf215d7268c4d05a3
None
0
file_continue(i_ctx_t *i_ctx_p) { os_ptr op = osp; es_ptr pscratch = esp - 2; file_enum *pfen = r_ptr(esp - 1, file_enum); int devlen = esp[-3].value.intval; gx_io_device *iodev = r_ptr(esp - 4, gx_io_device); uint len = r_size(pscratch); uint code; if (len < devlen) return_erro...
333,724,299,582,216,170,000,000,000,000,000,000,000
None
null
[]
CVE-2018-15908
In Artifex Ghostscript 9.23 before 2018-08-23, attackers are able to supply malicious PostScript files to bypass .tempfile restrictions and write files.
https://nvd.nist.gov/vuln/detail/CVE-2018-15908
13,375
ghostscript
0d3901189f245232f0161addf215d7268c4d05a3
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=0d3901189f245232f0161addf215d7268c4d05a3
None
0
file_is_tempfile(i_ctx_t *i_ctx_p, const uchar *fname, int len) { ref *SAFETY; ref *tempfiles; ref kname; if (dict_find_string(systemdict, "SAFETY", &SAFETY) <= 0 || dict_find_string(SAFETY, "tempfiles", &tempfiles) <= 0) return false; if (name_ref(imemory, fname, len, &kname, -...
271,616,700,076,594,160,000,000,000,000,000,000,000
None
null
[]
CVE-2018-15908
In Artifex Ghostscript 9.23 before 2018-08-23, attackers are able to supply malicious PostScript files to bypass .tempfile restrictions and write files.
https://nvd.nist.gov/vuln/detail/CVE-2018-15908
13,376
ghostscript
0d3901189f245232f0161addf215d7268c4d05a3
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=0d3901189f245232f0161addf215d7268c4d05a3
None
0
make_invalid_file(i_ctx_t *i_ctx_p, ref * fp) { make_file(fp, avm_invalid_file_entry, ~0, i_ctx_p->invalid_file_stream); }
285,969,683,974,576,400,000,000,000,000,000,000,000
None
null
[]
CVE-2018-15908
In Artifex Ghostscript 9.23 before 2018-08-23, attackers are able to supply malicious PostScript files to bypass .tempfile restrictions and write files.
https://nvd.nist.gov/vuln/detail/CVE-2018-15908
13,377
ghostscript
0d3901189f245232f0161addf215d7268c4d05a3
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=0d3901189f245232f0161addf215d7268c4d05a3
None
0
prefix_is_simple(const char *pstr) { int i; char c; for (i = 0; (c = pstr[i]) != 0; i++) { if (!(c == '-' || c == '_' || (c >= '0' && c <= '9') || (c >= 'A' && c <= 'Z') || (c >= 'a' && c <= 'z'))) return false; } return true; }
73,473,627,103,539,540,000,000,000,000,000,000,000
None
null
[]
CVE-2018-15908
In Artifex Ghostscript 9.23 before 2018-08-23, attackers are able to supply malicious PostScript files to bypass .tempfile restrictions and write files.
https://nvd.nist.gov/vuln/detail/CVE-2018-15908
13,378
ghostscript
0d3901189f245232f0161addf215d7268c4d05a3
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=0d3901189f245232f0161addf215d7268c4d05a3
None
0
zdeletefile(i_ctx_t *i_ctx_p) { os_ptr op = osp; gs_parsed_file_name_t pname; int code = parse_real_file_name(op, &pname, imemory, "deletefile"); if (code < 0) return code; if (pname.iodev == iodev_default(imemory)) { if ((code = check_file_permissions(i_ctx_p, pname.fname, pname.le...
22,559,057,806,888,133,000,000,000,000,000,000,000
None
null
[]
CVE-2018-15908
In Artifex Ghostscript 9.23 before 2018-08-23, attackers are able to supply malicious PostScript files to bypass .tempfile restrictions and write files.
https://nvd.nist.gov/vuln/detail/CVE-2018-15908
13,379
ghostscript
0d3901189f245232f0161addf215d7268c4d05a3
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=0d3901189f245232f0161addf215d7268c4d05a3
None
0
zexecfile(i_ctx_t *i_ctx_p) { os_ptr op = osp; check_type_access(*op, t_file, a_executable | a_read | a_execute); check_estack(4); /* cleanup, file, finish, file */ push_mark_estack(es_other, execfile_cleanup); *++esp = *op; push_op_estack(execfile_finish); return zexec(i_ctx_p);...
270,955,082,830,400,950,000,000,000,000,000,000,000
None
null
[]
CVE-2018-15908
In Artifex Ghostscript 9.23 before 2018-08-23, attackers are able to supply malicious PostScript files to bypass .tempfile restrictions and write files.
https://nvd.nist.gov/vuln/detail/CVE-2018-15908
13,380
ghostscript
0d3901189f245232f0161addf215d7268c4d05a3
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=0d3901189f245232f0161addf215d7268c4d05a3
None
0
zfile(i_ctx_t *i_ctx_p) { os_ptr op = osp; char file_access[4]; gs_parsed_file_name_t pname; int code = parse_file_access_string(op, file_access); stream *s; if (code < 0) return code; code = parse_file_name(op-1, &pname, i_ctx_p->LockFilePermissions, imemory); if (code < 0) ...
257,929,439,913,272,650,000,000,000,000,000,000,000
None
null
[]
CVE-2018-15908
In Artifex Ghostscript 9.23 before 2018-08-23, attackers are able to supply malicious PostScript files to bypass .tempfile restrictions and write files.
https://nvd.nist.gov/vuln/detail/CVE-2018-15908
13,381
ghostscript
0d3901189f245232f0161addf215d7268c4d05a3
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=0d3901189f245232f0161addf215d7268c4d05a3
None
0
zfilenameforall(i_ctx_t *i_ctx_p) { os_ptr op = osp; file_enum *pfen; gx_io_device *iodev = NULL; gs_parsed_file_name_t pname; int code = 0; check_write_type(*op, t_string); check_proc(op[-1]); check_read_type(op[-2], t_string); /* Push a mark, the iodev, devicenamelen, the scratch ...
172,501,702,646,678,640,000,000,000,000,000,000,000
None
null
[]
CVE-2018-15908
In Artifex Ghostscript 9.23 before 2018-08-23, attackers are able to supply malicious PostScript files to bypass .tempfile restrictions and write files.
https://nvd.nist.gov/vuln/detail/CVE-2018-15908
13,382
ghostscript
0d3901189f245232f0161addf215d7268c4d05a3
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=0d3901189f245232f0161addf215d7268c4d05a3
None
0
zfilenamelistseparator(i_ctx_t *i_ctx_p) { os_ptr op = osp; push(1); make_const_string(op, avm_foreign | a_readonly, 1, (const byte *)&gp_file_name_list_separator); return 0; }
72,363,697,945,693,160,000,000,000,000,000,000,000
None
null
[]
CVE-2018-15908
In Artifex Ghostscript 9.23 before 2018-08-23, attackers are able to supply malicious PostScript files to bypass .tempfile restrictions and write files.
https://nvd.nist.gov/vuln/detail/CVE-2018-15908
13,383
ghostscript
0d3901189f245232f0161addf215d7268c4d05a3
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=0d3901189f245232f0161addf215d7268c4d05a3
None
0
zfilenamesplit(i_ctx_t *i_ctx_p) { os_ptr op = osp; check_read_type(*op, t_string); /****** NOT IMPLEMENTED YET ******/ return_error(gs_error_undefined); }
308,168,029,720,086,570,000,000,000,000,000,000,000
None
null
[]
CVE-2018-15908
In Artifex Ghostscript 9.23 before 2018-08-23, attackers are able to supply malicious PostScript files to bypass .tempfile restrictions and write files.
https://nvd.nist.gov/vuln/detail/CVE-2018-15908
13,384
ghostscript
0d3901189f245232f0161addf215d7268c4d05a3
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=0d3901189f245232f0161addf215d7268c4d05a3
None
0
zlibfile(i_ctx_t *i_ctx_p) { os_ptr op = osp; int code; byte cname[DEFAULT_BUFFER_SIZE]; uint clen; gs_parsed_file_name_t pname; stream *s; gx_io_device *iodev_dflt; check_ostack(2); code = parse_file_name(op, &pname, i_ctx_p->LockFilePermissions, imemory); if (code < 0) ...
198,223,944,056,374,150,000,000,000,000,000,000,000
None
null
[]
CVE-2018-15908
In Artifex Ghostscript 9.23 before 2018-08-23, attackers are able to supply malicious PostScript files to bypass .tempfile restrictions and write files.
https://nvd.nist.gov/vuln/detail/CVE-2018-15908
13,385
ghostscript
0d3901189f245232f0161addf215d7268c4d05a3
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=0d3901189f245232f0161addf215d7268c4d05a3
None
0
zrenamefile(i_ctx_t *i_ctx_p) { int code; os_ptr op = osp; gs_parsed_file_name_t pname1, pname2; code = parse_real_file_name(op, &pname2, imemory, "renamefile(to)"); if (code < 0) return code; pname1.fname = 0; code = parse_real_file_name(op - 1, &pname1, imemory, "renamefile(from)...
311,604,776,856,509,460,000,000,000,000,000,000,000
None
null
[]
CVE-2018-15908
In Artifex Ghostscript 9.23 before 2018-08-23, attackers are able to supply malicious PostScript files to bypass .tempfile restrictions and write files.
https://nvd.nist.gov/vuln/detail/CVE-2018-15908
13,386
ghostscript
0d3901189f245232f0161addf215d7268c4d05a3
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=0d3901189f245232f0161addf215d7268c4d05a3
None
0
zstatus(i_ctx_t *i_ctx_p) { os_ptr op = osp; switch (r_type(op)) { case t_file: { stream *s; make_bool(op, (file_is_valid(s, op) ? 1 : 0)); } return 0; case t_string: { gs_parsed_file_name_t pname; ...
249,372,932,293,879,600,000,000,000,000,000,000,000
None
null
[]
CVE-2018-15908
In Artifex Ghostscript 9.23 before 2018-08-23, attackers are able to supply malicious PostScript files to bypass .tempfile restrictions and write files.
https://nvd.nist.gov/vuln/detail/CVE-2018-15908
13,387
drm
9f1f1a2dab38d4ce87a13565cf4dc1b73bef3a5f
https://cgit.freedesktop.org/drm/drm-misc/commit/?id=9f1f1a2dab38d4ce87a13565cf4dc1b73bef3a5f
https://cgit.freedesktop.org/drm/drm-misc/commit/?id=9f1f1a2dab38d4ce87a13565cf4dc1b73bef3a5f
None
0
int __drm_get_edid_firmware_path(char *buf, size_t bufsize) { return scnprintf(buf, bufsize, "%s", edid_firmware); }
167,247,304,375,795,270,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2019-12382
An issue was discovered in drm_load_edid_firmware in drivers/gpu/drm/drm_edid_load.c in the Linux kernel through 5.1.5. There is an unchecked kstrdup of fwstr, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash). NOTE: The vendor disputes this issues as not being a vul...
https://nvd.nist.gov/vuln/detail/CVE-2019-12382
13,388
drm
9f1f1a2dab38d4ce87a13565cf4dc1b73bef3a5f
https://cgit.freedesktop.org/drm/drm-misc/commit/?id=9f1f1a2dab38d4ce87a13565cf4dc1b73bef3a5f
https://cgit.freedesktop.org/drm/drm-misc/commit/?id=9f1f1a2dab38d4ce87a13565cf4dc1b73bef3a5f
None
0
int __drm_set_edid_firmware_path(const char *path) { scnprintf(edid_firmware, sizeof(edid_firmware), "%s", path); return 0; }
2,596,171,284,463,626,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2019-12382
An issue was discovered in drm_load_edid_firmware in drivers/gpu/drm/drm_edid_load.c in the Linux kernel through 5.1.5. There is an unchecked kstrdup of fwstr, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash). NOTE: The vendor disputes this issues as not being a vul...
https://nvd.nist.gov/vuln/detail/CVE-2019-12382
13,389
drm
9f1f1a2dab38d4ce87a13565cf4dc1b73bef3a5f
https://cgit.freedesktop.org/drm/drm-misc/commit/?id=9f1f1a2dab38d4ce87a13565cf4dc1b73bef3a5f
https://cgit.freedesktop.org/drm/drm-misc/commit/?id=9f1f1a2dab38d4ce87a13565cf4dc1b73bef3a5f
None
0
static void *edid_load(struct drm_connector *connector, const char *name, const char *connector_name) { const struct firmware *fw = NULL; const u8 *fwdata; u8 *edid; int fwsize, builtin; int i, valid_extensions = 0; bool print_bad_edid = !connector->bad_edid_counter || (drm_debug & DRM_UT_KMS); builtin = mat...
69,145,133,261,595,560,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2019-12382
An issue was discovered in drm_load_edid_firmware in drivers/gpu/drm/drm_edid_load.c in the Linux kernel through 5.1.5. There is an unchecked kstrdup of fwstr, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash). NOTE: The vendor disputes this issues as not being a vul...
https://nvd.nist.gov/vuln/detail/CVE-2019-12382
13,390
drm
9f1f1a2dab38d4ce87a13565cf4dc1b73bef3a5f
https://cgit.freedesktop.org/drm/drm-misc/commit/?id=9f1f1a2dab38d4ce87a13565cf4dc1b73bef3a5f
https://cgit.freedesktop.org/drm/drm-misc/commit/?id=9f1f1a2dab38d4ce87a13565cf4dc1b73bef3a5f
None
0
static int edid_size(const u8 *edid, int data_size) { if (data_size < EDID_LENGTH) return 0; return (edid[0x7e] + 1) * EDID_LENGTH; }
336,785,181,459,859,870,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2019-12382
An issue was discovered in drm_load_edid_firmware in drivers/gpu/drm/drm_edid_load.c in the Linux kernel through 5.1.5. There is an unchecked kstrdup of fwstr, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash). NOTE: The vendor disputes this issues as not being a vul...
https://nvd.nist.gov/vuln/detail/CVE-2019-12382
13,508
savannah
c265cad1c95b84abfd4e8d861f25926ef13b5d91
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=weechat.git;a=commit;h=c265cad1c95b84abfd4e8d861f25926ef13b5d91
None
0
irc_server_set_prefix_modes_chars (struct t_irc_server *server, const char *prefix) { char *pos; int i, length_modes, length_chars; if (!server || !prefix) return; /* free previous values */ if (server->prefix_modes) { free (server->pr...
139,147,605,210,658,700,000,000,000,000,000,000,000
irc-server.c
148,871,913,653,776,940,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-1428
Wee Enhanced Environment for Chat (aka WeeChat) 0.3.4 and earlier does not properly verify that the server hostname matches the domain name of the subject of an X.509 certificate, which allows man-in-the-middle attackers to spoof an SSL chat server via an arbitrary certificate, related to incorrect use of the GnuTLS AP...
https://nvd.nist.gov/vuln/detail/CVE-2011-1428
13,514
haproxy
7ec765568883b2d4e5a2796adbeb492a22ec9bd4
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commit;h=7ec765568883b2d4e5a2796adbeb492a22ec9bd4
None
0
void buffer_dump(FILE *o, struct buffer *b, int from, int to) { fprintf(o, "Dumping buffer %p\n", b); fprintf(o, " data=%p o=%d i=%d p=%p\n" " relative: p=0x%04x\n", b->data, b->o, b->i, b->p, (unsigned int)(b->p - b->data)); fprintf(o, "Dumping contents from byte %d to ...
226,756,074,562,389,140,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2015-3281
The buffer_slow_realign function in HAProxy 1.5.x before 1.5.14 and 1.6-dev does not properly realign a buffer that is used for pending outgoing data, which allows remote attackers to obtain sensitive information (uninitialized memory contents of previous requests) via a crafted request.
https://nvd.nist.gov/vuln/detail/CVE-2015-3281
13,515
haproxy
7ec765568883b2d4e5a2796adbeb492a22ec9bd4
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commit;h=7ec765568883b2d4e5a2796adbeb492a22ec9bd4
None
0
int buffer_insert_line2(struct buffer *b, char *pos, const char *str, int len) { int delta; delta = len + 2; if (bi_end(b) + delta >= b->data + b->size) return 0; /* no space left */ if (buffer_not_empty(b) && bi_end(b) + delta > bo_ptr(b) && bo_ptr(b) >= bi_end(b)) return 0; /* no space left bef...
213,590,683,596,263,270,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2015-3281
The buffer_slow_realign function in HAProxy 1.5.x before 1.5.14 and 1.6-dev does not properly realign a buffer that is used for pending outgoing data, which allows remote attackers to obtain sensitive information (uninitialized memory contents of previous requests) via a crafted request.
https://nvd.nist.gov/vuln/detail/CVE-2015-3281
13,516
haproxy
7ec765568883b2d4e5a2796adbeb492a22ec9bd4
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commit;h=7ec765568883b2d4e5a2796adbeb492a22ec9bd4
None
0
int buffer_replace2(struct buffer *b, char *pos, char *end, const char *str, int len) { int delta; delta = len - (end - pos); if (bi_end(b) + delta > b->data + b->size) return 0; /* no space left */ if (buffer_not_empty(b) && bi_end(b) + delta > bo_ptr(b) && bo_ptr(b) >= bi_end(b)) return 0; /* n...
334,969,875,149,820,230,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2015-3281
The buffer_slow_realign function in HAProxy 1.5.x before 1.5.14 and 1.6-dev does not properly realign a buffer that is used for pending outgoing data, which allows remote attackers to obtain sensitive information (uninitialized memory contents of previous requests) via a crafted request.
https://nvd.nist.gov/vuln/detail/CVE-2015-3281
13,517
haproxy
7ec765568883b2d4e5a2796adbeb492a22ec9bd4
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commit;h=7ec765568883b2d4e5a2796adbeb492a22ec9bd4
None
0
int init_buffer() { pool2_buffer = create_pool("buffer", sizeof (struct buffer) + global.tune.bufsize, MEM_F_SHARED); return pool2_buffer != NULL; }
63,967,265,063,489,700,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2015-3281
The buffer_slow_realign function in HAProxy 1.5.x before 1.5.14 and 1.6-dev does not properly realign a buffer that is used for pending outgoing data, which allows remote attackers to obtain sensitive information (uninitialized memory contents of previous requests) via a crafted request.
https://nvd.nist.gov/vuln/detail/CVE-2015-3281
13,543
savannah
3f872fe60463a931c5c766dbf8c36870c0023e88
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=quagga.git;a=commitdiff;h=3f872fe60463a931c5c766dbf8c36870c0023e88
None
0
api_opaque_lsa_print (struct lsa_header *data) { struct opaque_lsa { struct lsa_header header; u_char mydata[]; }; struct opaque_lsa *olsa; int opaquelen; int i; ospf_lsa_header_dump (data); olsa = (struct opaque_lsa *) data; opaquelen = ntohs (data->length) - OSPF_LSA_HEADER_SIZE; zlog_...
130,434,259,034,030,000,000,000,000,000,000,000,000
ospf_api.c
14,936,573,712,231,030,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-2236
Stack-based buffer overflow in the new_msg_lsa_change_notify function in the OSPFD API (ospf_api.c) in Quagga before 0.99.22.2, when --enable-opaque-lsa and the -a command line option are used, allows remote attackers to cause a denial of service (crash) via a large LSA.
https://nvd.nist.gov/vuln/detail/CVE-2013-2236
13,544
savannah
3f872fe60463a931c5c766dbf8c36870c0023e88
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=quagga.git;a=commitdiff;h=3f872fe60463a931c5c766dbf8c36870c0023e88
None
0
msg_dup (struct msg *msg) { struct msg *new; assert (msg); new = msg_new (msg->hdr.msgtype, STREAM_DATA (msg->s), ntohl (msg->hdr.msgseq), ntohs (msg->hdr.msglen)); return new; }
254,899,380,917,647,600,000,000,000,000,000,000,000
ospf_api.c
14,936,573,712,231,030,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-2236
Stack-based buffer overflow in the new_msg_lsa_change_notify function in the OSPFD API (ospf_api.c) in Quagga before 0.99.22.2, when --enable-opaque-lsa and the -a command line option are used, allows remote attackers to cause a denial of service (crash) via a large LSA.
https://nvd.nist.gov/vuln/detail/CVE-2013-2236
13,545
savannah
3f872fe60463a931c5c766dbf8c36870c0023e88
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=quagga.git;a=commitdiff;h=3f872fe60463a931c5c766dbf8c36870c0023e88
None
0
msg_fifo_flush (struct msg_fifo *fifo) { struct msg *op; struct msg *next; for (op = fifo->head; op; op = next) { next = op->next; msg_free (op); } fifo->head = fifo->tail = NULL; fifo->count = 0; }
287,099,124,128,760,400,000,000,000,000,000,000,000
ospf_api.c
14,936,573,712,231,030,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-2236
Stack-based buffer overflow in the new_msg_lsa_change_notify function in the OSPFD API (ospf_api.c) in Quagga before 0.99.22.2, when --enable-opaque-lsa and the -a command line option are used, allows remote attackers to cause a denial of service (crash) via a large LSA.
https://nvd.nist.gov/vuln/detail/CVE-2013-2236
13,546
savannah
3f872fe60463a931c5c766dbf8c36870c0023e88
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=quagga.git;a=commitdiff;h=3f872fe60463a931c5c766dbf8c36870c0023e88
None
0
msg_fifo_free (struct msg_fifo *fifo) { msg_fifo_flush (fifo); XFREE (MTYPE_OSPF_API_FIFO, fifo); }
55,246,014,808,040,430,000,000,000,000,000,000,000
ospf_api.c
14,936,573,712,231,030,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-2236
Stack-based buffer overflow in the new_msg_lsa_change_notify function in the OSPFD API (ospf_api.c) in Quagga before 0.99.22.2, when --enable-opaque-lsa and the -a command line option are used, allows remote attackers to cause a denial of service (crash) via a large LSA.
https://nvd.nist.gov/vuln/detail/CVE-2013-2236
13,547
savannah
3f872fe60463a931c5c766dbf8c36870c0023e88
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=quagga.git;a=commitdiff;h=3f872fe60463a931c5c766dbf8c36870c0023e88
None
0
msg_fifo_head (struct msg_fifo *fifo) { return fifo->head; }
64,612,968,300,241,450,000,000,000,000,000,000,000
ospf_api.c
14,936,573,712,231,030,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-2236
Stack-based buffer overflow in the new_msg_lsa_change_notify function in the OSPFD API (ospf_api.c) in Quagga before 0.99.22.2, when --enable-opaque-lsa and the -a command line option are used, allows remote attackers to cause a denial of service (crash) via a large LSA.
https://nvd.nist.gov/vuln/detail/CVE-2013-2236
13,548
savannah
3f872fe60463a931c5c766dbf8c36870c0023e88
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=quagga.git;a=commitdiff;h=3f872fe60463a931c5c766dbf8c36870c0023e88
None
0
msg_fifo_new () { return XCALLOC (MTYPE_OSPF_API_FIFO, sizeof (struct msg_fifo)); }
182,082,531,806,792,200,000,000,000,000,000,000,000
ospf_api.c
14,936,573,712,231,030,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-2236
Stack-based buffer overflow in the new_msg_lsa_change_notify function in the OSPFD API (ospf_api.c) in Quagga before 0.99.22.2, when --enable-opaque-lsa and the -a command line option are used, allows remote attackers to cause a denial of service (crash) via a large LSA.
https://nvd.nist.gov/vuln/detail/CVE-2013-2236
13,549
savannah
3f872fe60463a931c5c766dbf8c36870c0023e88
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=quagga.git;a=commitdiff;h=3f872fe60463a931c5c766dbf8c36870c0023e88
None
0
msg_fifo_pop (struct msg_fifo *fifo) { struct msg *msg; msg = fifo->head; if (msg) { fifo->head = msg->next; if (fifo->head == NULL) fifo->tail = NULL; fifo->count--; } return msg; }
62,212,069,805,203,740,000,000,000,000,000,000,000
ospf_api.c
14,936,573,712,231,030,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-2236
Stack-based buffer overflow in the new_msg_lsa_change_notify function in the OSPFD API (ospf_api.c) in Quagga before 0.99.22.2, when --enable-opaque-lsa and the -a command line option are used, allows remote attackers to cause a denial of service (crash) via a large LSA.
https://nvd.nist.gov/vuln/detail/CVE-2013-2236