idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
13,231 | ghostscript | b326a71659b7837d3acde954b18bda1a6f5e9498 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498 | None | 0 | setcolorspace_nosubst(i_ctx_t * i_ctx_p)
{
os_ptr op = osp;
es_ptr ep;
int code, depth;
/* Make sure we have an operand... */
check_op(1);
/* Check its either a name (base space) or an array */
if (!r_has_type(op, t_name))
if (!r_is_array(op))
return_error(gs_error_type... | 125,449,180,024,760,300,000,000,000,000,000,000,000 | zcolor.c | 161,620,022,692,754,280,000,000,000,000,000,000,000 | [
"CWE-704"
] | CVE-2018-16513 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2018-16513 |
13,232 | ghostscript | b326a71659b7837d3acde954b18bda1a6f5e9498 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498 | None | 0 | setdevicecolor_cont(i_ctx_t *i_ctx_p)
{
os_ptr op = osp;
es_ptr ep = esp, pstage;
int code = 0, stage, base;
pstage = ep;
base = (int)ep[-1].value.intval;
stage = (int)pstage->value.intval;
/* If we get a continuation from a sub-procedure, we will want to come back
* here afterward, to... | 102,201,916,793,290,340,000,000,000,000,000,000,000 | zcolor.c | 158,638,101,351,150,040,000,000,000,000,000,000,000 | [
"CWE-704"
] | CVE-2018-16513 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2018-16513 |
13,233 | ghostscript | b326a71659b7837d3acde954b18bda1a6f5e9498 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498 | None | 0 | static int setdevicenspace(i_ctx_t * i_ctx_p, ref *devicenspace, int *stage, int *cont, int CIESubst)
{
os_ptr op = osp; /* required by "push" macro */
int code = 0, num_components, i;
ref namesarray, proc, sname, tname, sref;
ref_colorspace cspace_old;
gs_color_space *pcs;
gs_color_space * p... | 123,102,614,282,902,620,000,000,000,000,000,000,000 | zcolor.c | 161,620,022,692,754,280,000,000,000,000,000,000,000 | [
"CWE-704"
] | CVE-2018-16513 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2018-16513 |
13,234 | ghostscript | b326a71659b7837d3acde954b18bda1a6f5e9498 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498 | None | 0 | static int setdevicepspace(i_ctx_t * i_ctx_p, ref *r, int *stage, int *cont, int CIESubst)
{
int code = 0;
gs_color_space *pcs;
ref bpp;
/* The comment in the original PostScript (gs_lev2.ps) said
* "DevicePixel is actually a LanguageLevel 3 feature; it is here for
* historical reasons." Act... | 59,024,604,835,525,020,000,000,000,000,000,000,000 | zcolor.c | 161,620,022,692,754,280,000,000,000,000,000,000,000 | [
"CWE-704"
] | CVE-2018-16513 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2018-16513 |
13,235 | ghostscript | b326a71659b7837d3acde954b18bda1a6f5e9498 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498 | None | 0 | static int setgrayspace(i_ctx_t * i_ctx_p, ref *r, int *stage, int *cont, int CIESubst)
{
os_ptr op = osp;
gs_color_space *pcs;
int code=0;
ref stref;
do {
switch (*stage) {
case 0:
if (istate->use_cie_color.value.boolval && !CIESubst) {
byte... | 6,073,867,647,214,531,000,000,000,000,000,000,000 | zcolor.c | 161,620,022,692,754,280,000,000,000,000,000,000,000 | [
"CWE-704"
] | CVE-2018-16513 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2018-16513 |
13,236 | ghostscript | b326a71659b7837d3acde954b18bda1a6f5e9498 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498 | None | 0 | static int seticcspace(i_ctx_t * i_ctx_p, ref *r, int *stage, int *cont, int CIESubst)
{
os_ptr op = osp;
ref ICCdict, *tempref, *altref=NULL, *nocie = NULL;
int components, code;
float range[8];
code = dict_find_string(systemdict, "NOCIE", &nocie);
if (code > 0) {
if (!r_has_type(n... | 164,940,520,349,257,250,000,000,000,000,000,000,000 | zcolor.c | 158,638,101,351,150,040,000,000,000,000,000,000,000 | [
"CWE-704"
] | CVE-2018-16513 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2018-16513 |
13,237 | ghostscript | b326a71659b7837d3acde954b18bda1a6f5e9498 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498 | None | 0 | static int setindexedspace(i_ctx_t * i_ctx_p, ref *r, int *stage, int *cont, int CIESubst)
{
ref *pproc = &istate->colorspace[0].procs.special.index_proc;
int code = 0;
uint edepth = ref_stack_count(&e_stack);
ref_colorspace cspace_old;
ref hival, lookup;
gs_color_space *pcs;
gs_color_space ... | 259,649,911,025,040,500,000,000,000,000,000,000,000 | zcolor.c | 161,620,022,692,754,280,000,000,000,000,000,000,000 | [
"CWE-704"
] | CVE-2018-16513 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2018-16513 |
13,238 | ghostscript | b326a71659b7837d3acde954b18bda1a6f5e9498 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498 | None | 0 | static int setlabspace(i_ctx_t * i_ctx_p, ref *r, int *stage, int *cont,
int CIESubst)
{
/* In this case, we will treat this as an ICC color space, with a
CIELAB 16 bit profile */
ref labdict;
int code = 0;
float range_buff[4], white[3], black[3];
stat... | 4,744,299,794,463,887,000,000,000,000,000,000,000 | zcolor.c | 161,620,022,692,754,280,000,000,000,000,000,000,000 | [
"CWE-704"
] | CVE-2018-16513 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2018-16513 |
13,239 | ghostscript | b326a71659b7837d3acde954b18bda1a6f5e9498 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498 | None | 0 | static int setpatternspace(i_ctx_t * i_ctx_p, ref *r, int *stage, int *cont, int CIESubst)
{
gs_color_space *pcs;
gs_color_space *pcs_base;
uint edepth = ref_stack_count(&e_stack);
int code = 0;
if (i_ctx_p->language_level < 2)
return_error(gs_error_undefined);
*cont = 0;
pcs_base ... | 18,982,714,458,645,360,000,000,000,000,000,000,000 | zcolor.c | 161,620,022,692,754,280,000,000,000,000,000,000,000 | [
"CWE-704"
] | CVE-2018-16513 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2018-16513 |
13,240 | ghostscript | b326a71659b7837d3acde954b18bda1a6f5e9498 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498 | None | 0 | static int setrgbspace(i_ctx_t * i_ctx_p, ref *r, int *stage, int *cont, int CIESubst)
{
os_ptr op = osp;
gs_color_space *pcs;
int code=0;
ref stref;
do {
switch (*stage) {
case 0:
if (istate->use_cie_color.value.boolval && !CIESubst) {
byte ... | 71,538,119,594,167,770,000,000,000,000,000,000,000 | zcolor.c | 161,620,022,692,754,280,000,000,000,000,000,000,000 | [
"CWE-704"
] | CVE-2018-16513 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2018-16513 |
13,241 | ghostscript | b326a71659b7837d3acde954b18bda1a6f5e9498 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498 | None | 0 | static int setseparationspace(i_ctx_t * i_ctx_p, ref *sepspace, int *stage, int *cont, int CIESubst)
{
os_ptr op = osp; /* required by "push" macro */
int code = 0;
ref sname, proc;
ref name_none, name_all;
separation_type sep_type;
ref_colorspace cspace_old;
gs_color_space *pcs;
gs_co... | 200,571,175,809,751,400,000,000,000,000,000,000,000 | zcolor.c | 158,638,101,351,150,040,000,000,000,000,000,000,000 | [
"CWE-704"
] | CVE-2018-16513 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2018-16513 |
13,242 | ghostscript | b326a71659b7837d3acde954b18bda1a6f5e9498 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498 | None | 0 | setstrokecolor_cont(i_ctx_t * i_ctx_p)
{
return zswapcolors(i_ctx_p);
}
| 133,904,829,886,975,650,000,000,000,000,000,000,000 | zcolor.c | 161,620,022,692,754,280,000,000,000,000,000,000,000 | [
"CWE-704"
] | CVE-2018-16513 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2018-16513 |
13,243 | ghostscript | b326a71659b7837d3acde954b18bda1a6f5e9498 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498 | None | 0 | setstrokecolorspace_cont(i_ctx_t * i_ctx_p)
{
return zswapcolors(i_ctx_p);
}
| 190,093,553,007,210,760,000,000,000,000,000,000,000 | zcolor.c | 161,620,022,692,754,280,000,000,000,000,000,000,000 | [
"CWE-704"
] | CVE-2018-16513 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2018-16513 |
13,244 | ghostscript | b326a71659b7837d3acde954b18bda1a6f5e9498 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498 | None | 0 | static int threecomponent(i_ctx_t * i_ctx_p, ref *space, int *n)
{
*n = 3;
return 0;
}
| 17,309,131,850,701,224,000,000,000,000,000,000,000 | zcolor.c | 161,620,022,692,754,280,000,000,000,000,000,000,000 | [
"CWE-704"
] | CVE-2018-16513 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2018-16513 |
13,245 | ghostscript | b326a71659b7837d3acde954b18bda1a6f5e9498 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498 | None | 0 | static int validate_spaces(i_ctx_t *i_ctx_p, ref *arr, int *depth)
{
ref space, *sp = &space;
int code = 0;
PS_colour_space_t *obj;
ref_assign(&space, arr);
*depth = 0;
do {
code = get_space_object(i_ctx_p, sp, &obj);
if (code < 0)
return code;
(*depth)++;
... | 173,607,376,825,206,740,000,000,000,000,000,000,000 | zcolor.c | 161,620,022,692,754,280,000,000,000,000,000,000,000 | [
"CWE-704"
] | CVE-2018-16513 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2018-16513 |
13,246 | ghostscript | b326a71659b7837d3acde954b18bda1a6f5e9498 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498 | None | 0 | static int validatecalrgbspace(i_ctx_t * i_ctx_p, ref **r)
{
int code=0;
ref *space, calrgbdict;
space = *r;
if (!r_is_array(space))
return_error(gs_error_typecheck);
/* Validate parameters, check we have enough operands */
if (r_size(space) < 2)
return_error(gs_error_rangecheck... | 291,636,827,448,119,580,000,000,000,000,000,000,000 | zcolor.c | 161,620,022,692,754,280,000,000,000,000,000,000,000 | [
"CWE-704"
] | CVE-2018-16513 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2018-16513 |
13,247 | ghostscript | b326a71659b7837d3acde954b18bda1a6f5e9498 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498 | None | 0 | static int validatecieabcspace(i_ctx_t * i_ctx_p, ref **r)
{
int code = 0, i;
float value[9];
ref CIEdict, *CIEspace = *r, *tempref, valref;
if (!r_is_array(CIEspace))
return_error(gs_error_typecheck);
/* Validate parameters, check we have enough operands */
if (r_size(CIEspace) != ... | 34,943,893,895,604,838,000,000,000,000,000,000,000 | zcolor.c | 161,620,022,692,754,280,000,000,000,000,000,000,000 | [
"CWE-704"
] | CVE-2018-16513 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2018-16513 |
13,248 | ghostscript | b326a71659b7837d3acde954b18bda1a6f5e9498 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498 | None | 0 | static int validatecieaspace(i_ctx_t * i_ctx_p, ref **r)
{
int code;
float value[9];
ref CIEdict, *CIEspace = *r, *tempref;
if (!r_is_array(CIEspace))
return_error(gs_error_typecheck);
/* Validate parameters, check we have enough operands */
if (r_size(CIEspace) != 2)
return... | 39,587,262,493,656,334,000,000,000,000,000,000,000 | zcolor.c | 161,620,022,692,754,280,000,000,000,000,000,000,000 | [
"CWE-704"
] | CVE-2018-16513 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2018-16513 |
13,249 | ghostscript | b326a71659b7837d3acde954b18bda1a6f5e9498 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498 | None | 0 | static int validateciedefgspace(i_ctx_t * i_ctx_p, ref **r)
{
int code = 0, i, j;
float value[8];
ref CIEdict, *CIEspace = *r, tempref, arrayref, valref, *pref = &tempref;
if (!r_is_array(CIEspace))
return_error(gs_error_typecheck);
/* Validate parameters, check we have enough operands ... | 69,549,453,545,169,055,000,000,000,000,000,000,000 | zcolor.c | 161,620,022,692,754,280,000,000,000,000,000,000,000 | [
"CWE-704"
] | CVE-2018-16513 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2018-16513 |
13,250 | ghostscript | b326a71659b7837d3acde954b18bda1a6f5e9498 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498 | None | 0 | static int validateciedefspace(i_ctx_t * i_ctx_p, ref **r)
{
int code = 0, i;
float value[6];
ref CIEdict, *pref, *CIEspace = *r, tempref, valref;
if (!r_is_array(CIEspace))
return_error(gs_error_typecheck);
/* Validate parameters, check we have enough operands */
if (r_size(CIEspac... | 31,797,642,257,505,410,000,000,000,000,000,000,000 | zcolor.c | 161,620,022,692,754,280,000,000,000,000,000,000,000 | [
"CWE-704"
] | CVE-2018-16513 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2018-16513 |
13,251 | ghostscript | b326a71659b7837d3acde954b18bda1a6f5e9498 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498 | None | 0 | static int validatedevicenspace(i_ctx_t * i_ctx_p, ref **space)
{
int i, code = 0;
ref *devicenspace = *space, proc;
ref nameref, sref, altspace, namesarray, sname;
/* Check enough arguments in the space */
if (r_size(devicenspace) < 4)
return_error(gs_error_rangecheck);
/* Check the na... | 55,812,159,981,520,200,000,000,000,000,000,000,000 | zcolor.c | 161,620,022,692,754,280,000,000,000,000,000,000,000 | [
"CWE-704"
] | CVE-2018-16513 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2018-16513 |
13,252 | ghostscript | b326a71659b7837d3acde954b18bda1a6f5e9498 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498 | None | 0 | static int validatedevicepspace(i_ctx_t * i_ctx_p, ref **space)
{
int code = 0;
ref *r = *space, bpp;
if (!r_is_array(r))
return_error(gs_error_typecheck);
/* Validate parameters, check we have enough operands */
if (r_size(r) != 2)
return_error(gs_error_rangecheck);
/* Make sur... | 336,311,273,571,582,200,000,000,000,000,000,000,000 | zcolor.c | 161,620,022,692,754,280,000,000,000,000,000,000,000 | [
"CWE-704"
] | CVE-2018-16513 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2018-16513 |
13,253 | ghostscript | b326a71659b7837d3acde954b18bda1a6f5e9498 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498 | None | 0 | static int validateiccspace(i_ctx_t * i_ctx_p, ref **r)
{
int code=0, i, components = 0;
ref *space, *tempref, valref, ICCdict, sref;
space = *r;
if (!r_is_array(space))
return_error(gs_error_typecheck);
/* Validate parameters, check we have enough operands */
if (r_size(space) != 2)
... | 294,017,925,161,212,460,000,000,000,000,000,000,000 | zcolor.c | 161,620,022,692,754,280,000,000,000,000,000,000,000 | [
"CWE-704"
] | CVE-2018-16513 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2018-16513 |
13,254 | ghostscript | b326a71659b7837d3acde954b18bda1a6f5e9498 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498 | None | 0 | static int validateindexedspace(i_ctx_t * i_ctx_p, ref **space)
{
int code = 0;
ref *r = *space;
ref nameref, sref, hival, lookup, altspace;
if (!r_is_array(r))
return_error(gs_error_typecheck);
/* Validate parameters, check we have enough operands */
if (r_size(r) != 4)
return_... | 288,734,162,667,476,840,000,000,000,000,000,000,000 | zcolor.c | 161,620,022,692,754,280,000,000,000,000,000,000,000 | [
"CWE-704"
] | CVE-2018-16513 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2018-16513 |
13,255 | ghostscript | b326a71659b7837d3acde954b18bda1a6f5e9498 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498 | None | 0 | static int validatelabspace(i_ctx_t * i_ctx_p, ref **r)
{
int code=0;
ref *space, labdict;
space = *r;
if (!r_is_array(space))
return_error(gs_error_typecheck);
/* Validate parameters, check we have enough operands */
if (r_size(space) < 2)
return_error(gs_error_rangecheck);
... | 46,320,979,364,447,970,000,000,000,000,000,000,000 | zcolor.c | 161,620,022,692,754,280,000,000,000,000,000,000,000 | [
"CWE-704"
] | CVE-2018-16513 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2018-16513 |
13,256 | ghostscript | b326a71659b7837d3acde954b18bda1a6f5e9498 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498 | None | 0 | static int validatepatternspace(i_ctx_t * i_ctx_p, ref **r)
{
int code;
ref tref;
/* since makepattern has already been run, we don't need to do much validation */
if (!r_has_type(*r, t_name)) {
if (r_is_array(*r)) {
if (r_size(*r) > 1) {
code = array_get(imemory, *r... | 83,406,521,575,146,070,000,000,000,000,000,000,000 | zcolor.c | 161,620,022,692,754,280,000,000,000,000,000,000,000 | [
"CWE-704"
] | CVE-2018-16513 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2018-16513 |
13,257 | ghostscript | b326a71659b7837d3acde954b18bda1a6f5e9498 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498 | None | 0 | static int validateseparationspace(i_ctx_t * i_ctx_p, ref **space)
{
int code = 0;
ref *sepspace = *space;
ref nameref, sref, sname, altspace, tref;
if (!r_is_array(sepspace))
return_error(gs_error_typecheck);
/* Validate parameters, check we have enough operands */
if (r_size(sepspace)... | 13,840,422,847,007,603,000,000,000,000,000,000,000 | zcolor.c | 161,620,022,692,754,280,000,000,000,000,000,000,000 | [
"CWE-704"
] | CVE-2018-16513 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2018-16513 |
13,258 | ghostscript | b326a71659b7837d3acde954b18bda1a6f5e9498 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498 | None | 0 | zcolor_remap_color(i_ctx_t *i_ctx_p)
{
/* Remap both colors. This should never hurt. */
gs_swapcolors(igs);
gx_unset_dev_color(igs);
gs_swapcolors(igs);
gx_unset_dev_color(igs);
return 0;
}
| 93,853,109,019,717,040,000,000,000,000,000,000,000 | zcolor.c | 161,620,022,692,754,280,000,000,000,000,000,000,000 | [
"CWE-704"
] | CVE-2018-16513 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2018-16513 |
13,259 | ghostscript | b326a71659b7837d3acde954b18bda1a6f5e9498 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498 | None | 0 | zcolor_remap_one_finish(i_ctx_t *i_ctx_p)
{
return zcolor_remap_one_store(i_ctx_p, 0.0);
}
| 93,679,487,300,323,880,000,000,000,000,000,000,000 | zcolor.c | 161,620,022,692,754,280,000,000,000,000,000,000,000 | [
"CWE-704"
] | CVE-2018-16513 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2018-16513 |
13,260 | ghostscript | b326a71659b7837d3acde954b18bda1a6f5e9498 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498 | None | 0 | zcolor_remap_one_signed_finish(i_ctx_t *i_ctx_p)
{
return zcolor_remap_one_store(i_ctx_p, -1.0);
}
| 82,011,362,238,937,350,000,000,000,000,000,000,000 | zcolor.c | 161,620,022,692,754,280,000,000,000,000,000,000,000 | [
"CWE-704"
] | CVE-2018-16513 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2018-16513 |
13,261 | ghostscript | b326a71659b7837d3acde954b18bda1a6f5e9498 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498 | None | 0 | zcolor_remap_one_store(i_ctx_t *i_ctx_p, double min_value)
{
int i;
gx_transfer_map *pmap = r_ptr(esp, gx_transfer_map);
if (ref_stack_count(&o_stack) < transfer_map_size)
return_error(gs_error_stackunderflow);
for (i = 0; i < transfer_map_size; i++) {
double v;
int code =
... | 8,529,577,523,878,193,000,000,000,000,000,000,000 | zcolor.c | 158,638,101,351,150,040,000,000,000,000,000,000,000 | [
"CWE-704"
] | CVE-2018-16513 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2018-16513 |
13,262 | ghostscript | b326a71659b7837d3acde954b18bda1a6f5e9498 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498 | None | 0 | zcolor_reset_transfer(i_ctx_t *i_ctx_p)
{
gx_set_effective_transfer(igs);
return zcolor_remap_color(i_ctx_p);
}
| 339,820,021,661,780,570,000,000,000,000,000,000,000 | zcolor.c | 161,620,022,692,754,280,000,000,000,000,000,000,000 | [
"CWE-704"
] | CVE-2018-16513 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2018-16513 |
13,263 | ghostscript | b326a71659b7837d3acde954b18bda1a6f5e9498 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498 | None | 0 | zcurrentcmykcolor(i_ctx_t * i_ctx_p)
{
int code;
code = zcurrentcolor(i_ctx_p);
if (code < 0)
return code;
/* Set up for the continuation procedure which will do the work */
/* Make sure the exec stack has enough space */
check_estack(7);
push_mark_estack(es_other, colour_cleanup);
... | 220,285,344,120,604,730,000,000,000,000,000,000,000 | zcolor.c | 161,620,022,692,754,280,000,000,000,000,000,000,000 | [
"CWE-704"
] | CVE-2018-16513 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2018-16513 |
13,264 | ghostscript | b326a71659b7837d3acde954b18bda1a6f5e9498 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498 | None | 0 | zcurrentrgbcolor(i_ctx_t * i_ctx_p)
{
int code;
code = zcurrentcolor(i_ctx_p);
if (code < 0)
return code;
/* Set up for the continuation procedure which will do the work */
/* Make sure the exec stack has enough space */
check_estack(7);
push_mark_estack(es_other, colour_cleanup);
... | 40,154,676,620,433,344,000,000,000,000,000,000,000 | zcolor.c | 161,620,022,692,754,280,000,000,000,000,000,000,000 | [
"CWE-704"
] | CVE-2018-16513 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2018-16513 |
13,265 | ghostscript | b326a71659b7837d3acde954b18bda1a6f5e9498 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498 | None | 0 | zincludecolorspace(i_ctx_t * i_ctx_p)
{
os_ptr op = osp;
ref nsref;
int code;
check_type(*op, t_name);
name_string_ref(imemory, op, &nsref);
code = gs_includecolorspace(igs, nsref.value.const_bytes, r_size(&nsref));
if (!code)
pop(1);
return code;
}
| 98,234,919,261,431,560,000,000,000,000,000,000,000 | zcolor.c | 161,620,022,692,754,280,000,000,000,000,000,000,000 | [
"CWE-704"
] | CVE-2018-16513 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2018-16513 |
13,266 | ghostscript | b326a71659b7837d3acde954b18bda1a6f5e9498 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498 | None | 0 | zprocesscolors(i_ctx_t * i_ctx_p)
{
os_ptr op = osp;
push(1);
make_int(op, gs_currentdevice(igs)->color_info.num_components);
return 0;
}
| 333,381,149,696,498,170,000,000,000,000,000,000,000 | zcolor.c | 161,620,022,692,754,280,000,000,000,000,000,000,000 | [
"CWE-704"
] | CVE-2018-16513 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2018-16513 |
13,267 | ghostscript | b326a71659b7837d3acde954b18bda1a6f5e9498 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498 | None | 0 | zsetcmykcolor(i_ctx_t * i_ctx_p)
{
os_ptr op = osp; /* required by "push" macro */
int code, i;
float values[4];
/* Gather numeric operand value(s) (also checks type) */
code = float_params(op, 4, (float *)&values);
if (code < 0)
return code;
/* Clamp numeric operand range(s) */
... | 50,567,363,780,952,460,000,000,000,000,000,000,000 | zcolor.c | 161,620,022,692,754,280,000,000,000,000,000,000,000 | [
"CWE-704"
] | CVE-2018-16513 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2018-16513 |
13,268 | ghostscript | b326a71659b7837d3acde954b18bda1a6f5e9498 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498 | None | 0 | zsetcolorspace(i_ctx_t * i_ctx_p)
{
os_ptr op = osp;
es_ptr ep;
int code, depth;
bool is_CIE;
/* Make sure we have an operand... */
check_op(1);
/* Check its either a name (base space) or an array */
if (!r_has_type(op, t_name))
if (!r_is_array(op))
return_error(gs_... | 195,941,685,089,870,280,000,000,000,000,000,000,000 | zcolor.c | 161,620,022,692,754,280,000,000,000,000,000,000,000 | [
"CWE-704"
] | CVE-2018-16513 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2018-16513 |
13,269 | ghostscript | b326a71659b7837d3acde954b18bda1a6f5e9498 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498 | None | 0 | zsetfillcolor(i_ctx_t * i_ctx_p)
{
return zsetcolor(i_ctx_p);
}
| 277,830,584,500,988,980,000,000,000,000,000,000,000 | zcolor.c | 161,620,022,692,754,280,000,000,000,000,000,000,000 | [
"CWE-704"
] | CVE-2018-16513 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2018-16513 |
13,270 | ghostscript | b326a71659b7837d3acde954b18bda1a6f5e9498 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498 | None | 0 | zsetfillcolorspace(i_ctx_t * i_ctx_p)
{
return zsetcolorspace(i_ctx_p);
}
| 37,519,148,671,284,702,000,000,000,000,000,000,000 | zcolor.c | 161,620,022,692,754,280,000,000,000,000,000,000,000 | [
"CWE-704"
] | CVE-2018-16513 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2018-16513 |
13,271 | ghostscript | b326a71659b7837d3acde954b18bda1a6f5e9498 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498 | None | 0 | zsetgray(i_ctx_t * i_ctx_p)
{
os_ptr op = osp; /* required by "push" macro */
float value;
int code;
/* Gather numeric operand value(s) */
code = float_params(op, 1, &value);
if (code < 0)
return code;
/* Clamp numeric operand range(s) */
if (value < 0)
value = 0;
... | 6,398,775,369,448,888,000,000,000,000,000,000,000 | zcolor.c | 161,620,022,692,754,280,000,000,000,000,000,000,000 | [
"CWE-704"
] | CVE-2018-16513 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2018-16513 |
13,272 | ghostscript | b326a71659b7837d3acde954b18bda1a6f5e9498 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498 | None | 0 | zsethsbcolor(i_ctx_t * i_ctx_p)
{
os_ptr op = osp; /* required by "push" macro */
int code, i;
float values[3];
/* Gather numeric operand value(s) (also checks type) */
code = float_params(op, 3, (float *)&values);
if (code < 0)
return code;
/* Clamp numeric operand range(s) */
... | 114,829,634,304,202,320,000,000,000,000,000,000,000 | zcolor.c | 161,620,022,692,754,280,000,000,000,000,000,000,000 | [
"CWE-704"
] | CVE-2018-16513 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2018-16513 |
13,273 | ghostscript | b326a71659b7837d3acde954b18bda1a6f5e9498 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498 | None | 0 | zsetrgbcolor(i_ctx_t * i_ctx_p)
{
os_ptr op = osp; /* required by "push" macro */
int code, i;
float values[3];
/* Gather numeric operand value(s) (also checks type) */
code = float_params(op, 3, (float *)&values);
if (code < 0)
return code;
/* Clamp numeric operand range(s) */
... | 314,974,742,352,196,400,000,000,000,000,000,000,000 | zcolor.c | 161,620,022,692,754,280,000,000,000,000,000,000,000 | [
"CWE-704"
] | CVE-2018-16513 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2018-16513 |
13,274 | ghostscript | b326a71659b7837d3acde954b18bda1a6f5e9498 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498 | None | 0 | zsetstrokecolor(i_ctx_t * i_ctx_p)
{
int code;
code = zswapcolors(i_ctx_p);
if (code < 0)
return code;
/* Set up for the continuation procedure which will finish by restoring the fill colour space */
/* Make sure the exec stack has enough space */
check_estack(1);
/* Now, the actua... | 36,749,744,249,402,570,000,000,000,000,000,000,000 | zcolor.c | 158,638,101,351,150,040,000,000,000,000,000,000,000 | [
"CWE-704"
] | CVE-2018-16513 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2018-16513 |
13,275 | ghostscript | b326a71659b7837d3acde954b18bda1a6f5e9498 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498 | None | 0 | zsetstrokecolorspace(i_ctx_t * i_ctx_p)
{
int code;
code = zswapcolors(i_ctx_p);
if (code < 0)
return code;
/* Set up for the continuation procedure which will finish by restoring the fill colour space */
/* Make sure the exec stack has enough space */
check_estack(1);
/* Now, the ... | 247,728,083,845,484,600,000,000,000,000,000,000,000 | zcolor.c | 158,638,101,351,150,040,000,000,000,000,000,000,000 | [
"CWE-704"
] | CVE-2018-16513 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2018-16513 |
13,276 | ghostscript | b326a71659b7837d3acde954b18bda1a6f5e9498 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498 | None | 0 | zsettransfer(i_ctx_t * i_ctx_p)
{
os_ptr op = osp;
int code;
check_proc(*op);
check_ostack(zcolor_remap_one_ostack - 1);
check_estack(1 + zcolor_remap_one_estack);
istate->transfer_procs.red =
istate->transfer_procs.green =
istate->transfer_procs.blue =
istate->tran... | 182,865,095,919,560,650,000,000,000,000,000,000,000 | zcolor.c | 161,620,022,692,754,280,000,000,000,000,000,000,000 | [
"CWE-704"
] | CVE-2018-16513 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2018-16513 |
13,277 | ghostscript | b326a71659b7837d3acde954b18bda1a6f5e9498 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498 | None | 0 | zswapcolors(i_ctx_t * i_ctx_p)
{
ref_colorspace tmp_cs;
ref tmp_pat;
tmp_cs = istate->colorspace[0];
istate->colorspace[0] = istate->colorspace[1];
istate->colorspace[1] = tmp_cs;
tmp_pat = istate->pattern[0];
istate->pattern[0] = istate->pattern[1];
... | 297,384,633,050,994,170,000,000,000,000,000,000,000 | zcolor.c | 161,620,022,692,754,280,000,000,000,000,000,000,000 | [
"CWE-704"
] | CVE-2018-16513 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2018-16513 |
13,292 | ghostscript | ea735ba37dc0fd5f5622d031830b9a559dec1cc9 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=ea735ba37dc0fd5f5622d031830b9a559dec1cc9 | None | 0 | zsetcolor(i_ctx_t * i_ctx_p)
{
os_ptr op = osp;
es_ptr ep;
const gs_color_space * pcs = gs_currentcolorspace(igs);
gs_client_color cc;
int n_comps, n_numeric_comps, num_offset = 0, code, depth;
PS_colour_space_t *space;
/* initialize the client ... | 151,317,392,453,793,860,000,000,000,000,000,000,000 | zcolor.c | 240,625,457,164,200,600,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-16510 | An issue was discovered in Artifex Ghostscript before 9.24. Incorrect exec stack handling in the "CS" and "SC" PDF primitives could be used by remote attackers able to supply crafted PDFs to crash the interpreter or possibly have unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2018-16510 |
13,293 | savannah | ba6b44f6745b14dce414761a8e4b35d31b176bba | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/wget.git/commit/?id=ba6b44f6745b14dce414761a8e4b35d31b176bba | None | 0 | calc_rate (wgint bytes, double secs, int *units)
{
double dlrate;
double bibyte = 1000.0;
if (!opt.report_bps)
bibyte = 1024.0;
assert (secs >= 0);
assert (bytes >= 0);
if (secs == 0)
/* If elapsed time is exactly zero, it means we're under the
resolution of the timer. This can easily ha... | 309,451,795,890,062,500,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2017-13090 | The retr.c:fd_read_body() function is called when processing OK responses. When the response is sent chunked in wget before 1.19.2, the chunk parser uses strtol() to read each chunk's length, but doesn't check that the chunk length is a non-negative number. The code then tries to read the chunk in pieces of 8192 bytes ... | https://nvd.nist.gov/vuln/detail/CVE-2017-13090 |
13,294 | savannah | ba6b44f6745b14dce414761a8e4b35d31b176bba | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/wget.git/commit/?id=ba6b44f6745b14dce414761a8e4b35d31b176bba | None | 0 | fd_read_hunk (int fd, hunk_terminator_t terminator, long sizehint, long maxsize)
{
long bufsize = sizehint;
char *hunk = xmalloc (bufsize);
int tail = 0; /* tail position in HUNK */
assert (!maxsize || maxsize >= bufsize);
while (1)
{
const char *end;
int pklen, rdlen, remain... | 149,873,434,514,180,780,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2017-13090 | The retr.c:fd_read_body() function is called when processing OK responses. When the response is sent chunked in wget before 1.19.2, the chunk parser uses strtol() to read each chunk's length, but doesn't check that the chunk length is a non-negative number. The code then tries to read the chunk in pieces of 8192 bytes ... | https://nvd.nist.gov/vuln/detail/CVE-2017-13090 |
13,295 | savannah | ba6b44f6745b14dce414761a8e4b35d31b176bba | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/wget.git/commit/?id=ba6b44f6745b14dce414761a8e4b35d31b176bba | None | 0 | free_urlpos (struct urlpos *l)
{
while (l)
{
struct urlpos *next = l->next;
if (l->url)
url_free (l->url);
xfree (l->local_name);
xfree (l);
l = next;
}
}
| 167,385,682,884,158,400,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2017-13090 | The retr.c:fd_read_body() function is called when processing OK responses. When the response is sent chunked in wget before 1.19.2, the chunk parser uses strtol() to read each chunk's length, but doesn't check that the chunk length is a non-negative number. The code then tries to read the chunk in pieces of 8192 bytes ... | https://nvd.nist.gov/vuln/detail/CVE-2017-13090 |
13,296 | savannah | ba6b44f6745b14dce414761a8e4b35d31b176bba | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/wget.git/commit/?id=ba6b44f6745b14dce414761a8e4b35d31b176bba | None | 0 | getproxy (struct url *u)
{
char *proxy = NULL;
char *rewritten_url;
if (!opt.use_proxy)
return NULL;
if (no_proxy_match (u->host, (const char **)opt.no_proxy))
return NULL;
switch (u->scheme)
{
case SCHEME_HTTP:
proxy = opt.http_proxy ? opt.http_proxy : getenv ("http_proxy");
bre... | 61,540,123,359,353,150,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2017-13090 | The retr.c:fd_read_body() function is called when processing OK responses. When the response is sent chunked in wget before 1.19.2, the chunk parser uses strtol() to read each chunk's length, but doesn't check that the chunk length is a non-negative number. The code then tries to read the chunk in pieces of 8192 bytes ... | https://nvd.nist.gov/vuln/detail/CVE-2017-13090 |
13,297 | savannah | ba6b44f6745b14dce414761a8e4b35d31b176bba | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/wget.git/commit/?id=ba6b44f6745b14dce414761a8e4b35d31b176bba | None | 0 | input_file_url (const char *input_file)
{
static bool first = true;
if (input_file
&& url_has_scheme (input_file)
&& first)
{
first = false;
return true;
}
else
return false;
}
| 272,920,896,114,129,430,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2017-13090 | The retr.c:fd_read_body() function is called when processing OK responses. When the response is sent chunked in wget before 1.19.2, the chunk parser uses strtol() to read each chunk's length, but doesn't check that the chunk length is a non-negative number. The code then tries to read the chunk in pieces of 8192 bytes ... | https://nvd.nist.gov/vuln/detail/CVE-2017-13090 |
13,298 | savannah | ba6b44f6745b14dce414761a8e4b35d31b176bba | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/wget.git/commit/?id=ba6b44f6745b14dce414761a8e4b35d31b176bba | None | 0 | limit_bandwidth (wgint bytes, struct ptimer *timer)
{
double delta_t = ptimer_read (timer) - limit_data.chunk_start;
double expected;
limit_data.chunk_bytes += bytes;
/* Calculate the amount of time we expect downloading the chunk
should take. If in reality it took less time, sleep to
compensate fo... | 126,250,866,824,264,860,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2017-13090 | The retr.c:fd_read_body() function is called when processing OK responses. When the response is sent chunked in wget before 1.19.2, the chunk parser uses strtol() to read each chunk's length, but doesn't check that the chunk length is a non-negative number. The code then tries to read the chunk in pieces of 8192 bytes ... | https://nvd.nist.gov/vuln/detail/CVE-2017-13090 |
13,299 | savannah | ba6b44f6745b14dce414761a8e4b35d31b176bba | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/wget.git/commit/?id=ba6b44f6745b14dce414761a8e4b35d31b176bba | None | 0 | limit_bandwidth_reset (void)
{
xzero (limit_data);
}
| 15,062,904,819,119,382,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2017-13090 | The retr.c:fd_read_body() function is called when processing OK responses. When the response is sent chunked in wget before 1.19.2, the chunk parser uses strtol() to read each chunk's length, but doesn't check that the chunk length is a non-negative number. The code then tries to read the chunk in pieces of 8192 bytes ... | https://nvd.nist.gov/vuln/detail/CVE-2017-13090 |
13,300 | savannah | ba6b44f6745b14dce414761a8e4b35d31b176bba | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/wget.git/commit/?id=ba6b44f6745b14dce414761a8e4b35d31b176bba | None | 0 | line_terminator (const char *start _GL_UNUSED, const char *peeked, int peeklen)
{
const char *p = memchr (peeked, '\n', peeklen);
if (p)
/* p+1 because the line must include '\n' */
return p + 1;
return NULL;
}
| 128,414,862,913,392,470,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2017-13090 | The retr.c:fd_read_body() function is called when processing OK responses. When the response is sent chunked in wget before 1.19.2, the chunk parser uses strtol() to read each chunk's length, but doesn't check that the chunk length is a non-negative number. The code then tries to read the chunk in pieces of 8192 bytes ... | https://nvd.nist.gov/vuln/detail/CVE-2017-13090 |
13,301 | savannah | ba6b44f6745b14dce414761a8e4b35d31b176bba | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/wget.git/commit/?id=ba6b44f6745b14dce414761a8e4b35d31b176bba | None | 0 | no_proxy_match (const char *host, const char **no_proxy)
{
if (!no_proxy)
return false;
else
return sufmatch (no_proxy, host);
}
| 214,656,008,469,847,800,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2017-13090 | The retr.c:fd_read_body() function is called when processing OK responses. When the response is sent chunked in wget before 1.19.2, the chunk parser uses strtol() to read each chunk's length, but doesn't check that the chunk length is a non-negative number. The code then tries to read the chunk in pieces of 8192 bytes ... | https://nvd.nist.gov/vuln/detail/CVE-2017-13090 |
13,302 | savannah | ba6b44f6745b14dce414761a8e4b35d31b176bba | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/wget.git/commit/?id=ba6b44f6745b14dce414761a8e4b35d31b176bba | None | 0 | printwhat (int n1, int n2)
{
logputs (LOG_VERBOSE, (n1 == n2) ? _("Giving up.\n\n") : _("Retrying.\n\n"));
}
| 264,171,437,916,334,600,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2017-13090 | The retr.c:fd_read_body() function is called when processing OK responses. When the response is sent chunked in wget before 1.19.2, the chunk parser uses strtol() to read each chunk's length, but doesn't check that the chunk length is a non-negative number. The code then tries to read the chunk in pieces of 8192 bytes ... | https://nvd.nist.gov/vuln/detail/CVE-2017-13090 |
13,303 | savannah | ba6b44f6745b14dce414761a8e4b35d31b176bba | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/wget.git/commit/?id=ba6b44f6745b14dce414761a8e4b35d31b176bba | None | 0 | retr_rate (wgint bytes, double secs)
{
static char res[20];
static const char *rate_names[] = {"B/s", "KB/s", "MB/s", "GB/s" };
static const char *rate_names_bits[] = {"b/s", "Kb/s", "Mb/s", "Gb/s" };
int units;
double dlrate = calc_rate (bytes, secs, &units);
/* Use more digits for smaller numbers (regard... | 303,478,846,550,105,770,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2017-13090 | The retr.c:fd_read_body() function is called when processing OK responses. When the response is sent chunked in wget before 1.19.2, the chunk parser uses strtol() to read each chunk's length, but doesn't check that the chunk length is a non-negative number. The code then tries to read the chunk in pieces of 8192 bytes ... | https://nvd.nist.gov/vuln/detail/CVE-2017-13090 |
13,304 | savannah | ba6b44f6745b14dce414761a8e4b35d31b176bba | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/wget.git/commit/?id=ba6b44f6745b14dce414761a8e4b35d31b176bba | None | 0 | retrieve_from_file (const char *file, bool html, int *count)
{
uerr_t status;
struct urlpos *url_list, *cur_url;
struct iri *iri = iri_new();
char *input_file, *url_file = NULL;
const char *url = file;
status = RETROK; /* Suppose everything is OK. */
*count = 0; /* Reset th... | 6,362,759,562,777,174,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2017-13090 | The retr.c:fd_read_body() function is called when processing OK responses. When the response is sent chunked in wget before 1.19.2, the chunk parser uses strtol() to read each chunk's length, but doesn't check that the chunk length is a non-negative number. The code then tries to read the chunk in pieces of 8192 bytes ... | https://nvd.nist.gov/vuln/detail/CVE-2017-13090 |
13,305 | savannah | ba6b44f6745b14dce414761a8e4b35d31b176bba | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/wget.git/commit/?id=ba6b44f6745b14dce414761a8e4b35d31b176bba | None | 0 | retrieve_url (struct url * orig_parsed, const char *origurl, char **file,
char **newloc, const char *refurl, int *dt, bool recursive,
struct iri *iri, bool register_status)
{
uerr_t result;
char *url;
bool location_changed;
bool iri_fallbacked = 0;
int dummy;
char *mynewloc, *pro... | 328,713,513,349,489,200,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2017-13090 | The retr.c:fd_read_body() function is called when processing OK responses. When the response is sent chunked in wget before 1.19.2, the chunk parser uses strtol() to read each chunk's length, but doesn't check that the chunk length is a non-negative number. The code then tries to read the chunk in pieces of 8192 bytes ... | https://nvd.nist.gov/vuln/detail/CVE-2017-13090 |
13,306 | savannah | ba6b44f6745b14dce414761a8e4b35d31b176bba | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/wget.git/commit/?id=ba6b44f6745b14dce414761a8e4b35d31b176bba | None | 0 | rotate_backups(const char *fname)
{
#ifdef __VMS
# define SEP "_"
# define AVS ";*" /* All-version suffix. */
# define AVSL (sizeof (AVS) - 1)
#else
# define SEP "."
# define AVSL 0
#endif
int maxlen = strlen (fname) + sizeof (SEP) + numdigit (opt.backups) + AVSL;
char *from = alloca (maxlen)... | 294,026,260,071,657,720,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2017-13090 | The retr.c:fd_read_body() function is called when processing OK responses. When the response is sent chunked in wget before 1.19.2, the chunk parser uses strtol() to read each chunk's length, but doesn't check that the chunk length is a non-negative number. The code then tries to read the chunk in pieces of 8192 bytes ... | https://nvd.nist.gov/vuln/detail/CVE-2017-13090 |
13,307 | savannah | ba6b44f6745b14dce414761a8e4b35d31b176bba | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/wget.git/commit/?id=ba6b44f6745b14dce414761a8e4b35d31b176bba | None | 0 | set_local_file (const char **file, const char *default_file)
{
if (opt.output_document)
{
if (output_stream_regular)
*file = opt.output_document;
}
else
*file = default_file;
}
| 87,212,489,917,141,350,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2017-13090 | The retr.c:fd_read_body() function is called when processing OK responses. When the response is sent chunked in wget before 1.19.2, the chunk parser uses strtol() to read each chunk's length, but doesn't check that the chunk length is a non-negative number. The code then tries to read the chunk in pieces of 8192 bytes ... | https://nvd.nist.gov/vuln/detail/CVE-2017-13090 |
13,308 | savannah | ba6b44f6745b14dce414761a8e4b35d31b176bba | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/wget.git/commit/?id=ba6b44f6745b14dce414761a8e4b35d31b176bba | None | 0 | sleep_between_retrievals (int count)
{
static bool first_retrieval = true;
if (first_retrieval)
{
/* Don't sleep before the very first retrieval. */
first_retrieval = false;
return;
}
if (opt.waitretry && count > 1)
{
/* If opt.waitretry is specified and this is a retry, wait... | 88,821,277,517,548,460,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2017-13090 | The retr.c:fd_read_body() function is called when processing OK responses. When the response is sent chunked in wget before 1.19.2, the chunk parser uses strtol() to read each chunk's length, but doesn't check that the chunk length is a non-negative number. The code then tries to read the chunk in pieces of 8192 bytes ... | https://nvd.nist.gov/vuln/detail/CVE-2017-13090 |
13,309 | savannah | ba6b44f6745b14dce414761a8e4b35d31b176bba | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/wget.git/commit/?id=ba6b44f6745b14dce414761a8e4b35d31b176bba | None | 0 | url_uses_proxy (struct url * u)
{
bool ret;
char *proxy;
if (!u)
return false;
proxy = getproxy (u);
ret = proxy != NULL;
xfree (proxy);
return ret;
}
| 239,828,032,782,237,830,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2017-13090 | The retr.c:fd_read_body() function is called when processing OK responses. When the response is sent chunked in wget before 1.19.2, the chunk parser uses strtol() to read each chunk's length, but doesn't check that the chunk length is a non-negative number. The code then tries to read the chunk in pieces of 8192 bytes ... | https://nvd.nist.gov/vuln/detail/CVE-2017-13090 |
13,310 | savannah | ba6b44f6745b14dce414761a8e4b35d31b176bba | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/wget.git/commit/?id=ba6b44f6745b14dce414761a8e4b35d31b176bba | None | 0 | zalloc (voidpf opaque, unsigned int items, unsigned int size)
{
(void) opaque;
return (voidpf) xcalloc (items, size);
}
| 48,044,752,433,430,690,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2017-13090 | The retr.c:fd_read_body() function is called when processing OK responses. When the response is sent chunked in wget before 1.19.2, the chunk parser uses strtol() to read each chunk's length, but doesn't check that the chunk length is a non-negative number. The code then tries to read the chunk in pieces of 8192 bytes ... | https://nvd.nist.gov/vuln/detail/CVE-2017-13090 |
13,311 | savannah | ba6b44f6745b14dce414761a8e4b35d31b176bba | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/wget.git/commit/?id=ba6b44f6745b14dce414761a8e4b35d31b176bba | None | 0 | zfree (voidpf opaque, voidpf address)
{
(void) opaque;
xfree (address);
}
| 4,528,613,452,142,047,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2017-13090 | The retr.c:fd_read_body() function is called when processing OK responses. When the response is sent chunked in wget before 1.19.2, the chunk parser uses strtol() to read each chunk's length, but doesn't check that the chunk length is a non-negative number. The code then tries to read the chunk in pieces of 8192 bytes ... | https://nvd.nist.gov/vuln/detail/CVE-2017-13090 |
13,370 | ghostscript | 0d3901189f245232f0161addf215d7268c4d05a3 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=0d3901189f245232f0161addf215d7268c4d05a3 | None | 0 | check_file_permissions(i_ctx_t *i_ctx_p, const char *fname, int len,
gx_io_device *iodev, const char *permitgroup)
{
char fname_reduced[gp_file_name_sizeof];
uint rlen = sizeof(fname_reduced);
if (gp_file_name_reduce(fname, len, fname_reduced, &rlen) != gp_combine_success)
r... | 64,640,629,699,522,050,000,000,000,000,000,000,000 | None | null | [] | CVE-2018-15908 | In Artifex Ghostscript 9.23 before 2018-08-23, attackers are able to supply malicious PostScript files to bypass .tempfile restrictions and write files. | https://nvd.nist.gov/vuln/detail/CVE-2018-15908 |
13,371 | ghostscript | 0d3901189f245232f0161addf215d7268c4d05a3 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=0d3901189f245232f0161addf215d7268c4d05a3 | None | 0 | execfile_cleanup(i_ctx_t *i_ctx_p)
{
check_ostack(1);
*++osp = esp[2];
return zclosefile(i_ctx_p);
}
| 32,290,595,450,673,673,000,000,000,000,000,000,000 | None | null | [] | CVE-2018-15908 | In Artifex Ghostscript 9.23 before 2018-08-23, attackers are able to supply malicious PostScript files to bypass .tempfile restrictions and write files. | https://nvd.nist.gov/vuln/detail/CVE-2018-15908 |
13,372 | ghostscript | 0d3901189f245232f0161addf215d7268c4d05a3 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=0d3901189f245232f0161addf215d7268c4d05a3 | None | 0 | execfile_finish(i_ctx_t *i_ctx_p)
{
check_ostack(1);
esp -= 2;
execfile_cleanup(i_ctx_p);
return o_pop_estack;
}
| 53,055,284,484,100,290,000,000,000,000,000,000,000 | None | null | [] | CVE-2018-15908 | In Artifex Ghostscript 9.23 before 2018-08-23, attackers are able to supply malicious PostScript files to bypass .tempfile restrictions and write files. | https://nvd.nist.gov/vuln/detail/CVE-2018-15908 |
13,373 | ghostscript | 0d3901189f245232f0161addf215d7268c4d05a3 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=0d3901189f245232f0161addf215d7268c4d05a3 | None | 0 | file_cleanup(i_ctx_t *i_ctx_p)
{
gx_io_device *iodev = r_ptr(esp + 2, gx_io_device);
iodev->procs.enumerate_close(r_ptr(esp + 5, file_enum));
return 0;
}
| 60,715,895,058,148,940,000,000,000,000,000,000,000 | None | null | [] | CVE-2018-15908 | In Artifex Ghostscript 9.23 before 2018-08-23, attackers are able to supply malicious PostScript files to bypass .tempfile restrictions and write files. | https://nvd.nist.gov/vuln/detail/CVE-2018-15908 |
13,374 | ghostscript | 0d3901189f245232f0161addf215d7268c4d05a3 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=0d3901189f245232f0161addf215d7268c4d05a3 | None | 0 | file_continue(i_ctx_t *i_ctx_p)
{
os_ptr op = osp;
es_ptr pscratch = esp - 2;
file_enum *pfen = r_ptr(esp - 1, file_enum);
int devlen = esp[-3].value.intval;
gx_io_device *iodev = r_ptr(esp - 4, gx_io_device);
uint len = r_size(pscratch);
uint code;
if (len < devlen)
return_erro... | 333,724,299,582,216,170,000,000,000,000,000,000,000 | None | null | [] | CVE-2018-15908 | In Artifex Ghostscript 9.23 before 2018-08-23, attackers are able to supply malicious PostScript files to bypass .tempfile restrictions and write files. | https://nvd.nist.gov/vuln/detail/CVE-2018-15908 |
13,375 | ghostscript | 0d3901189f245232f0161addf215d7268c4d05a3 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=0d3901189f245232f0161addf215d7268c4d05a3 | None | 0 | file_is_tempfile(i_ctx_t *i_ctx_p, const uchar *fname, int len)
{
ref *SAFETY;
ref *tempfiles;
ref kname;
if (dict_find_string(systemdict, "SAFETY", &SAFETY) <= 0 ||
dict_find_string(SAFETY, "tempfiles", &tempfiles) <= 0)
return false;
if (name_ref(imemory, fname, len, &kname, -... | 271,616,700,076,594,160,000,000,000,000,000,000,000 | None | null | [] | CVE-2018-15908 | In Artifex Ghostscript 9.23 before 2018-08-23, attackers are able to supply malicious PostScript files to bypass .tempfile restrictions and write files. | https://nvd.nist.gov/vuln/detail/CVE-2018-15908 |
13,376 | ghostscript | 0d3901189f245232f0161addf215d7268c4d05a3 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=0d3901189f245232f0161addf215d7268c4d05a3 | None | 0 | make_invalid_file(i_ctx_t *i_ctx_p, ref * fp)
{
make_file(fp, avm_invalid_file_entry, ~0, i_ctx_p->invalid_file_stream);
}
| 285,969,683,974,576,400,000,000,000,000,000,000,000 | None | null | [] | CVE-2018-15908 | In Artifex Ghostscript 9.23 before 2018-08-23, attackers are able to supply malicious PostScript files to bypass .tempfile restrictions and write files. | https://nvd.nist.gov/vuln/detail/CVE-2018-15908 |
13,377 | ghostscript | 0d3901189f245232f0161addf215d7268c4d05a3 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=0d3901189f245232f0161addf215d7268c4d05a3 | None | 0 | prefix_is_simple(const char *pstr)
{
int i;
char c;
for (i = 0; (c = pstr[i]) != 0; i++) {
if (!(c == '-' || c == '_' || (c >= '0' && c <= '9') ||
(c >= 'A' && c <= 'Z') || (c >= 'a' && c <= 'z')))
return false;
}
return true;
}
| 73,473,627,103,539,540,000,000,000,000,000,000,000 | None | null | [] | CVE-2018-15908 | In Artifex Ghostscript 9.23 before 2018-08-23, attackers are able to supply malicious PostScript files to bypass .tempfile restrictions and write files. | https://nvd.nist.gov/vuln/detail/CVE-2018-15908 |
13,378 | ghostscript | 0d3901189f245232f0161addf215d7268c4d05a3 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=0d3901189f245232f0161addf215d7268c4d05a3 | None | 0 | zdeletefile(i_ctx_t *i_ctx_p)
{
os_ptr op = osp;
gs_parsed_file_name_t pname;
int code = parse_real_file_name(op, &pname, imemory, "deletefile");
if (code < 0)
return code;
if (pname.iodev == iodev_default(imemory)) {
if ((code = check_file_permissions(i_ctx_p, pname.fname, pname.le... | 22,559,057,806,888,133,000,000,000,000,000,000,000 | None | null | [] | CVE-2018-15908 | In Artifex Ghostscript 9.23 before 2018-08-23, attackers are able to supply malicious PostScript files to bypass .tempfile restrictions and write files. | https://nvd.nist.gov/vuln/detail/CVE-2018-15908 |
13,379 | ghostscript | 0d3901189f245232f0161addf215d7268c4d05a3 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=0d3901189f245232f0161addf215d7268c4d05a3 | None | 0 | zexecfile(i_ctx_t *i_ctx_p)
{
os_ptr op = osp;
check_type_access(*op, t_file, a_executable | a_read | a_execute);
check_estack(4); /* cleanup, file, finish, file */
push_mark_estack(es_other, execfile_cleanup);
*++esp = *op;
push_op_estack(execfile_finish);
return zexec(i_ctx_p);... | 270,955,082,830,400,950,000,000,000,000,000,000,000 | None | null | [] | CVE-2018-15908 | In Artifex Ghostscript 9.23 before 2018-08-23, attackers are able to supply malicious PostScript files to bypass .tempfile restrictions and write files. | https://nvd.nist.gov/vuln/detail/CVE-2018-15908 |
13,380 | ghostscript | 0d3901189f245232f0161addf215d7268c4d05a3 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=0d3901189f245232f0161addf215d7268c4d05a3 | None | 0 | zfile(i_ctx_t *i_ctx_p)
{
os_ptr op = osp;
char file_access[4];
gs_parsed_file_name_t pname;
int code = parse_file_access_string(op, file_access);
stream *s;
if (code < 0)
return code;
code = parse_file_name(op-1, &pname, i_ctx_p->LockFilePermissions, imemory);
if (code < 0)
... | 257,929,439,913,272,650,000,000,000,000,000,000,000 | None | null | [] | CVE-2018-15908 | In Artifex Ghostscript 9.23 before 2018-08-23, attackers are able to supply malicious PostScript files to bypass .tempfile restrictions and write files. | https://nvd.nist.gov/vuln/detail/CVE-2018-15908 |
13,381 | ghostscript | 0d3901189f245232f0161addf215d7268c4d05a3 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=0d3901189f245232f0161addf215d7268c4d05a3 | None | 0 | zfilenameforall(i_ctx_t *i_ctx_p)
{
os_ptr op = osp;
file_enum *pfen;
gx_io_device *iodev = NULL;
gs_parsed_file_name_t pname;
int code = 0;
check_write_type(*op, t_string);
check_proc(op[-1]);
check_read_type(op[-2], t_string);
/* Push a mark, the iodev, devicenamelen, the scratch ... | 172,501,702,646,678,640,000,000,000,000,000,000,000 | None | null | [] | CVE-2018-15908 | In Artifex Ghostscript 9.23 before 2018-08-23, attackers are able to supply malicious PostScript files to bypass .tempfile restrictions and write files. | https://nvd.nist.gov/vuln/detail/CVE-2018-15908 |
13,382 | ghostscript | 0d3901189f245232f0161addf215d7268c4d05a3 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=0d3901189f245232f0161addf215d7268c4d05a3 | None | 0 | zfilenamelistseparator(i_ctx_t *i_ctx_p)
{
os_ptr op = osp;
push(1);
make_const_string(op, avm_foreign | a_readonly, 1,
(const byte *)&gp_file_name_list_separator);
return 0;
}
| 72,363,697,945,693,160,000,000,000,000,000,000,000 | None | null | [] | CVE-2018-15908 | In Artifex Ghostscript 9.23 before 2018-08-23, attackers are able to supply malicious PostScript files to bypass .tempfile restrictions and write files. | https://nvd.nist.gov/vuln/detail/CVE-2018-15908 |
13,383 | ghostscript | 0d3901189f245232f0161addf215d7268c4d05a3 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=0d3901189f245232f0161addf215d7268c4d05a3 | None | 0 | zfilenamesplit(i_ctx_t *i_ctx_p)
{
os_ptr op = osp;
check_read_type(*op, t_string);
/****** NOT IMPLEMENTED YET ******/
return_error(gs_error_undefined);
}
| 308,168,029,720,086,570,000,000,000,000,000,000,000 | None | null | [] | CVE-2018-15908 | In Artifex Ghostscript 9.23 before 2018-08-23, attackers are able to supply malicious PostScript files to bypass .tempfile restrictions and write files. | https://nvd.nist.gov/vuln/detail/CVE-2018-15908 |
13,384 | ghostscript | 0d3901189f245232f0161addf215d7268c4d05a3 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=0d3901189f245232f0161addf215d7268c4d05a3 | None | 0 | zlibfile(i_ctx_t *i_ctx_p)
{
os_ptr op = osp;
int code;
byte cname[DEFAULT_BUFFER_SIZE];
uint clen;
gs_parsed_file_name_t pname;
stream *s;
gx_io_device *iodev_dflt;
check_ostack(2);
code = parse_file_name(op, &pname, i_ctx_p->LockFilePermissions, imemory);
if (code < 0)
... | 198,223,944,056,374,150,000,000,000,000,000,000,000 | None | null | [] | CVE-2018-15908 | In Artifex Ghostscript 9.23 before 2018-08-23, attackers are able to supply malicious PostScript files to bypass .tempfile restrictions and write files. | https://nvd.nist.gov/vuln/detail/CVE-2018-15908 |
13,385 | ghostscript | 0d3901189f245232f0161addf215d7268c4d05a3 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=0d3901189f245232f0161addf215d7268c4d05a3 | None | 0 | zrenamefile(i_ctx_t *i_ctx_p)
{
int code;
os_ptr op = osp;
gs_parsed_file_name_t pname1, pname2;
code = parse_real_file_name(op, &pname2, imemory, "renamefile(to)");
if (code < 0)
return code;
pname1.fname = 0;
code = parse_real_file_name(op - 1, &pname1, imemory, "renamefile(from)... | 311,604,776,856,509,460,000,000,000,000,000,000,000 | None | null | [] | CVE-2018-15908 | In Artifex Ghostscript 9.23 before 2018-08-23, attackers are able to supply malicious PostScript files to bypass .tempfile restrictions and write files. | https://nvd.nist.gov/vuln/detail/CVE-2018-15908 |
13,386 | ghostscript | 0d3901189f245232f0161addf215d7268c4d05a3 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=0d3901189f245232f0161addf215d7268c4d05a3 | None | 0 | zstatus(i_ctx_t *i_ctx_p)
{
os_ptr op = osp;
switch (r_type(op)) {
case t_file:
{
stream *s;
make_bool(op, (file_is_valid(s, op) ? 1 : 0));
}
return 0;
case t_string:
{
gs_parsed_file_name_t pname;
... | 249,372,932,293,879,600,000,000,000,000,000,000,000 | None | null | [] | CVE-2018-15908 | In Artifex Ghostscript 9.23 before 2018-08-23, attackers are able to supply malicious PostScript files to bypass .tempfile restrictions and write files. | https://nvd.nist.gov/vuln/detail/CVE-2018-15908 |
13,387 | drm | 9f1f1a2dab38d4ce87a13565cf4dc1b73bef3a5f | https://cgit.freedesktop.org/drm/drm-misc/commit/?id=9f1f1a2dab38d4ce87a13565cf4dc1b73bef3a5f | https://cgit.freedesktop.org/drm/drm-misc/commit/?id=9f1f1a2dab38d4ce87a13565cf4dc1b73bef3a5f | None | 0 | int __drm_get_edid_firmware_path(char *buf, size_t bufsize)
{
return scnprintf(buf, bufsize, "%s", edid_firmware);
}
| 167,247,304,375,795,270,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2019-12382 | An issue was discovered in drm_load_edid_firmware in drivers/gpu/drm/drm_edid_load.c in the Linux kernel through 5.1.5. There is an unchecked kstrdup of fwstr, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash). NOTE: The vendor disputes this issues as not being a vul... | https://nvd.nist.gov/vuln/detail/CVE-2019-12382 |
13,388 | drm | 9f1f1a2dab38d4ce87a13565cf4dc1b73bef3a5f | https://cgit.freedesktop.org/drm/drm-misc/commit/?id=9f1f1a2dab38d4ce87a13565cf4dc1b73bef3a5f | https://cgit.freedesktop.org/drm/drm-misc/commit/?id=9f1f1a2dab38d4ce87a13565cf4dc1b73bef3a5f | None | 0 | int __drm_set_edid_firmware_path(const char *path)
{
scnprintf(edid_firmware, sizeof(edid_firmware), "%s", path);
return 0;
}
| 2,596,171,284,463,626,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2019-12382 | An issue was discovered in drm_load_edid_firmware in drivers/gpu/drm/drm_edid_load.c in the Linux kernel through 5.1.5. There is an unchecked kstrdup of fwstr, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash). NOTE: The vendor disputes this issues as not being a vul... | https://nvd.nist.gov/vuln/detail/CVE-2019-12382 |
13,389 | drm | 9f1f1a2dab38d4ce87a13565cf4dc1b73bef3a5f | https://cgit.freedesktop.org/drm/drm-misc/commit/?id=9f1f1a2dab38d4ce87a13565cf4dc1b73bef3a5f | https://cgit.freedesktop.org/drm/drm-misc/commit/?id=9f1f1a2dab38d4ce87a13565cf4dc1b73bef3a5f | None | 0 | static void *edid_load(struct drm_connector *connector, const char *name,
const char *connector_name)
{
const struct firmware *fw = NULL;
const u8 *fwdata;
u8 *edid;
int fwsize, builtin;
int i, valid_extensions = 0;
bool print_bad_edid = !connector->bad_edid_counter || (drm_debug & DRM_UT_KMS);
builtin = mat... | 69,145,133,261,595,560,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2019-12382 | An issue was discovered in drm_load_edid_firmware in drivers/gpu/drm/drm_edid_load.c in the Linux kernel through 5.1.5. There is an unchecked kstrdup of fwstr, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash). NOTE: The vendor disputes this issues as not being a vul... | https://nvd.nist.gov/vuln/detail/CVE-2019-12382 |
13,390 | drm | 9f1f1a2dab38d4ce87a13565cf4dc1b73bef3a5f | https://cgit.freedesktop.org/drm/drm-misc/commit/?id=9f1f1a2dab38d4ce87a13565cf4dc1b73bef3a5f | https://cgit.freedesktop.org/drm/drm-misc/commit/?id=9f1f1a2dab38d4ce87a13565cf4dc1b73bef3a5f | None | 0 | static int edid_size(const u8 *edid, int data_size)
{
if (data_size < EDID_LENGTH)
return 0;
return (edid[0x7e] + 1) * EDID_LENGTH;
}
| 336,785,181,459,859,870,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2019-12382 | An issue was discovered in drm_load_edid_firmware in drivers/gpu/drm/drm_edid_load.c in the Linux kernel through 5.1.5. There is an unchecked kstrdup of fwstr, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash). NOTE: The vendor disputes this issues as not being a vul... | https://nvd.nist.gov/vuln/detail/CVE-2019-12382 |
13,508 | savannah | c265cad1c95b84abfd4e8d861f25926ef13b5d91 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=weechat.git;a=commit;h=c265cad1c95b84abfd4e8d861f25926ef13b5d91 | None | 0 | irc_server_set_prefix_modes_chars (struct t_irc_server *server,
const char *prefix)
{
char *pos;
int i, length_modes, length_chars;
if (!server || !prefix)
return;
/* free previous values */
if (server->prefix_modes)
{
free (server->pr... | 139,147,605,210,658,700,000,000,000,000,000,000,000 | irc-server.c | 148,871,913,653,776,940,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-1428 | Wee Enhanced Environment for Chat (aka WeeChat) 0.3.4 and earlier does not properly verify that the server hostname matches the domain name of the subject of an X.509 certificate, which allows man-in-the-middle attackers to spoof an SSL chat server via an arbitrary certificate, related to incorrect use of the GnuTLS AP... | https://nvd.nist.gov/vuln/detail/CVE-2011-1428 |
13,514 | haproxy | 7ec765568883b2d4e5a2796adbeb492a22ec9bd4 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.5.git;a=commit;h=7ec765568883b2d4e5a2796adbeb492a22ec9bd4 | None | 0 | void buffer_dump(FILE *o, struct buffer *b, int from, int to)
{
fprintf(o, "Dumping buffer %p\n", b);
fprintf(o, " data=%p o=%d i=%d p=%p\n"
" relative: p=0x%04x\n",
b->data, b->o, b->i, b->p, (unsigned int)(b->p - b->data));
fprintf(o, "Dumping contents from byte %d to ... | 226,756,074,562,389,140,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2015-3281 | The buffer_slow_realign function in HAProxy 1.5.x before 1.5.14 and 1.6-dev does not properly realign a buffer that is used for pending outgoing data, which allows remote attackers to obtain sensitive information (uninitialized memory contents of previous requests) via a crafted request. | https://nvd.nist.gov/vuln/detail/CVE-2015-3281 |
13,515 | haproxy | 7ec765568883b2d4e5a2796adbeb492a22ec9bd4 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.5.git;a=commit;h=7ec765568883b2d4e5a2796adbeb492a22ec9bd4 | None | 0 | int buffer_insert_line2(struct buffer *b, char *pos, const char *str, int len)
{
int delta;
delta = len + 2;
if (bi_end(b) + delta >= b->data + b->size)
return 0; /* no space left */
if (buffer_not_empty(b) &&
bi_end(b) + delta > bo_ptr(b) &&
bo_ptr(b) >= bi_end(b))
return 0; /* no space left bef... | 213,590,683,596,263,270,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2015-3281 | The buffer_slow_realign function in HAProxy 1.5.x before 1.5.14 and 1.6-dev does not properly realign a buffer that is used for pending outgoing data, which allows remote attackers to obtain sensitive information (uninitialized memory contents of previous requests) via a crafted request. | https://nvd.nist.gov/vuln/detail/CVE-2015-3281 |
13,516 | haproxy | 7ec765568883b2d4e5a2796adbeb492a22ec9bd4 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.5.git;a=commit;h=7ec765568883b2d4e5a2796adbeb492a22ec9bd4 | None | 0 | int buffer_replace2(struct buffer *b, char *pos, char *end, const char *str, int len)
{
int delta;
delta = len - (end - pos);
if (bi_end(b) + delta > b->data + b->size)
return 0; /* no space left */
if (buffer_not_empty(b) &&
bi_end(b) + delta > bo_ptr(b) &&
bo_ptr(b) >= bi_end(b))
return 0; /* n... | 334,969,875,149,820,230,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2015-3281 | The buffer_slow_realign function in HAProxy 1.5.x before 1.5.14 and 1.6-dev does not properly realign a buffer that is used for pending outgoing data, which allows remote attackers to obtain sensitive information (uninitialized memory contents of previous requests) via a crafted request. | https://nvd.nist.gov/vuln/detail/CVE-2015-3281 |
13,517 | haproxy | 7ec765568883b2d4e5a2796adbeb492a22ec9bd4 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.5.git;a=commit;h=7ec765568883b2d4e5a2796adbeb492a22ec9bd4 | None | 0 | int init_buffer()
{
pool2_buffer = create_pool("buffer", sizeof (struct buffer) + global.tune.bufsize, MEM_F_SHARED);
return pool2_buffer != NULL;
}
| 63,967,265,063,489,700,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2015-3281 | The buffer_slow_realign function in HAProxy 1.5.x before 1.5.14 and 1.6-dev does not properly realign a buffer that is used for pending outgoing data, which allows remote attackers to obtain sensitive information (uninitialized memory contents of previous requests) via a crafted request. | https://nvd.nist.gov/vuln/detail/CVE-2015-3281 |
13,543 | savannah | 3f872fe60463a931c5c766dbf8c36870c0023e88 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=quagga.git;a=commitdiff;h=3f872fe60463a931c5c766dbf8c36870c0023e88 | None | 0 | api_opaque_lsa_print (struct lsa_header *data)
{
struct opaque_lsa
{
struct lsa_header header;
u_char mydata[];
};
struct opaque_lsa *olsa;
int opaquelen;
int i;
ospf_lsa_header_dump (data);
olsa = (struct opaque_lsa *) data;
opaquelen = ntohs (data->length) - OSPF_LSA_HEADER_SIZE;
zlog_... | 130,434,259,034,030,000,000,000,000,000,000,000,000 | ospf_api.c | 14,936,573,712,231,030,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-2236 | Stack-based buffer overflow in the new_msg_lsa_change_notify function in the OSPFD API (ospf_api.c) in Quagga before 0.99.22.2, when --enable-opaque-lsa and the -a command line option are used, allows remote attackers to cause a denial of service (crash) via a large LSA. | https://nvd.nist.gov/vuln/detail/CVE-2013-2236 |
13,544 | savannah | 3f872fe60463a931c5c766dbf8c36870c0023e88 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=quagga.git;a=commitdiff;h=3f872fe60463a931c5c766dbf8c36870c0023e88 | None | 0 | msg_dup (struct msg *msg)
{
struct msg *new;
assert (msg);
new = msg_new (msg->hdr.msgtype, STREAM_DATA (msg->s),
ntohl (msg->hdr.msgseq), ntohs (msg->hdr.msglen));
return new;
}
| 254,899,380,917,647,600,000,000,000,000,000,000,000 | ospf_api.c | 14,936,573,712,231,030,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-2236 | Stack-based buffer overflow in the new_msg_lsa_change_notify function in the OSPFD API (ospf_api.c) in Quagga before 0.99.22.2, when --enable-opaque-lsa and the -a command line option are used, allows remote attackers to cause a denial of service (crash) via a large LSA. | https://nvd.nist.gov/vuln/detail/CVE-2013-2236 |
13,545 | savannah | 3f872fe60463a931c5c766dbf8c36870c0023e88 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=quagga.git;a=commitdiff;h=3f872fe60463a931c5c766dbf8c36870c0023e88 | None | 0 | msg_fifo_flush (struct msg_fifo *fifo)
{
struct msg *op;
struct msg *next;
for (op = fifo->head; op; op = next)
{
next = op->next;
msg_free (op);
}
fifo->head = fifo->tail = NULL;
fifo->count = 0;
}
| 287,099,124,128,760,400,000,000,000,000,000,000,000 | ospf_api.c | 14,936,573,712,231,030,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-2236 | Stack-based buffer overflow in the new_msg_lsa_change_notify function in the OSPFD API (ospf_api.c) in Quagga before 0.99.22.2, when --enable-opaque-lsa and the -a command line option are used, allows remote attackers to cause a denial of service (crash) via a large LSA. | https://nvd.nist.gov/vuln/detail/CVE-2013-2236 |
13,546 | savannah | 3f872fe60463a931c5c766dbf8c36870c0023e88 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=quagga.git;a=commitdiff;h=3f872fe60463a931c5c766dbf8c36870c0023e88 | None | 0 | msg_fifo_free (struct msg_fifo *fifo)
{
msg_fifo_flush (fifo);
XFREE (MTYPE_OSPF_API_FIFO, fifo);
}
| 55,246,014,808,040,430,000,000,000,000,000,000,000 | ospf_api.c | 14,936,573,712,231,030,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-2236 | Stack-based buffer overflow in the new_msg_lsa_change_notify function in the OSPFD API (ospf_api.c) in Quagga before 0.99.22.2, when --enable-opaque-lsa and the -a command line option are used, allows remote attackers to cause a denial of service (crash) via a large LSA. | https://nvd.nist.gov/vuln/detail/CVE-2013-2236 |
13,547 | savannah | 3f872fe60463a931c5c766dbf8c36870c0023e88 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=quagga.git;a=commitdiff;h=3f872fe60463a931c5c766dbf8c36870c0023e88 | None | 0 | msg_fifo_head (struct msg_fifo *fifo)
{
return fifo->head;
}
| 64,612,968,300,241,450,000,000,000,000,000,000,000 | ospf_api.c | 14,936,573,712,231,030,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-2236 | Stack-based buffer overflow in the new_msg_lsa_change_notify function in the OSPFD API (ospf_api.c) in Quagga before 0.99.22.2, when --enable-opaque-lsa and the -a command line option are used, allows remote attackers to cause a denial of service (crash) via a large LSA. | https://nvd.nist.gov/vuln/detail/CVE-2013-2236 |
13,548 | savannah | 3f872fe60463a931c5c766dbf8c36870c0023e88 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=quagga.git;a=commitdiff;h=3f872fe60463a931c5c766dbf8c36870c0023e88 | None | 0 | msg_fifo_new ()
{
return XCALLOC (MTYPE_OSPF_API_FIFO, sizeof (struct msg_fifo));
}
| 182,082,531,806,792,200,000,000,000,000,000,000,000 | ospf_api.c | 14,936,573,712,231,030,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-2236 | Stack-based buffer overflow in the new_msg_lsa_change_notify function in the OSPFD API (ospf_api.c) in Quagga before 0.99.22.2, when --enable-opaque-lsa and the -a command line option are used, allows remote attackers to cause a denial of service (crash) via a large LSA. | https://nvd.nist.gov/vuln/detail/CVE-2013-2236 |
13,549 | savannah | 3f872fe60463a931c5c766dbf8c36870c0023e88 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=quagga.git;a=commitdiff;h=3f872fe60463a931c5c766dbf8c36870c0023e88 | None | 0 | msg_fifo_pop (struct msg_fifo *fifo)
{
struct msg *msg;
msg = fifo->head;
if (msg)
{
fifo->head = msg->next;
if (fifo->head == NULL)
fifo->tail = NULL;
fifo->count--;
}
return msg;
}
| 62,212,069,805,203,740,000,000,000,000,000,000,000 | ospf_api.c | 14,936,573,712,231,030,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-2236 | Stack-based buffer overflow in the new_msg_lsa_change_notify function in the OSPFD API (ospf_api.c) in Quagga before 0.99.22.2, when --enable-opaque-lsa and the -a command line option are used, allows remote attackers to cause a denial of service (crash) via a large LSA. | https://nvd.nist.gov/vuln/detail/CVE-2013-2236 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.