idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
16,791 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_CLEAR( INS_ARG )
{
DO_CLEAR
}
| 213,117,548,065,931,830,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,792 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_DEBUG( INS_ARG )
{
DO_DEBUG
}
| 196,150,324,400,191,400,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,793 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_DELTAC( INS_ARG )
{
FT_ULong nump, k;
FT_ULong A, C;
FT_Long B;
#ifdef TT_CONFIG_OPTION_UNPATENTED_HINTING
/* Delta hinting is covered by US Patent 5159668. */
if ( CUR.face->unpatented_hinting )
{
FT_Long n = args[0] * 2;
if ( CUR.args < n )
{
CUR.erro... | 31,870,655,262,835,916,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,794 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_DELTAP( INS_ARG )
{
FT_ULong k, nump;
FT_UShort A;
FT_ULong C;
FT_Long B;
#ifdef TT_CONFIG_OPTION_UNPATENTED_HINTING
/* Delta hinting is covered by US Patent 5159668. */
if ( CUR.face->unpatented_hinting )
{
FT_Long n = args[0] * 2;
if ( CUR.args < n )
... | 22,186,881,185,493,680,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,795 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_DEPTH( INS_ARG )
{
DO_DEPTH
}
| 286,136,067,489,831,900,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,796 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_DIV( INS_ARG )
{
DO_DIV
}
| 295,457,019,904,008,240,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,797 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_EIF( INS_ARG )
{
/* nothing to do */
}
| 75,558,262,218,112,040,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,798 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_ELSE( INS_ARG )
{
FT_Int nIfs;
FT_UNUSED_ARG;
nIfs = 1;
do
{
if ( SKIP_Code() == FAILURE )
return;
switch ( CUR.opcode )
{
case 0x58: /* IF */
nIfs++;
break;
case 0x59: /* EIF */
nIfs--;
break;
}
} w... | 129,730,768,623,938,990,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,799 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_ENDF( INS_ARG )
{
TT_CallRec* pRec;
FT_UNUSED_ARG;
if ( CUR.callTop <= 0 ) /* We encountered an ENDF without a call */
{
CUR.error = TT_Err_ENDF_In_Exec_Stream;
return;
}
CUR.callTop--;
pRec = &CUR.callStack[CUR.callTop];
pRec->Cur_Count--;
CUR.step_in... | 209,506,411,270,458,130,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,800 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_EVEN( INS_ARG )
{
DO_EVEN
}
| 33,924,159,045,430,980,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,801 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_FLIPPT( INS_ARG )
{
FT_UShort point;
FT_UNUSED_ARG;
if ( CUR.top < CUR.GS.loop )
{
CUR.error = TT_Err_Too_Few_Arguments;
return;
}
while ( CUR.GS.loop > 0 )
{
CUR.args--;
point = (FT_UShort)CUR.stack[CUR.args];
if ( BOUNDS( point, CUR.pts.n_points... | 303,825,062,692,596,700,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,802 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_FLIPRGOFF( INS_ARG )
{
FT_UShort I, K, L;
K = (FT_UShort)args[1];
L = (FT_UShort)args[0];
if ( BOUNDS( K, CUR.pts.n_points ) ||
BOUNDS( L, CUR.pts.n_points ) )
{
if ( CUR.pedantic_hinting )
CUR.error = TT_Err_Invalid_Reference;
return;
}
for ( I = L;... | 45,609,317,444,776,150,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,803 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_FLIPRGON( INS_ARG )
{
FT_UShort I, K, L;
K = (FT_UShort)args[1];
L = (FT_UShort)args[0];
if ( BOUNDS( K, CUR.pts.n_points ) ||
BOUNDS( L, CUR.pts.n_points ) )
{
if ( CUR.pedantic_hinting )
CUR.error = TT_Err_Invalid_Reference;
return;
}
for ( I = L; ... | 166,884,910,499,290,180,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,804 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_FLOOR( INS_ARG )
{
DO_FLOOR
}
| 116,645,092,990,469,700,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,805 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_GC( INS_ARG )
{
FT_ULong L;
FT_F26Dot6 R;
L = (FT_ULong)args[0];
if ( BOUNDS( L, CUR.zp2.n_points ) )
{
if ( CUR.pedantic_hinting )
{
CUR.error = TT_Err_Invalid_Reference;
return;
}
else
R = 0;
}
else
{
if ( CUR.opcode ... | 199,820,978,719,086,900,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,806 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_GETINFO( INS_ARG )
{
FT_Long K;
K = 0;
/* We return MS rasterizer version 1.7 for the font scaler. */
if ( ( args[0] & 1 ) != 0 )
K = 35;
/* Has the glyph been rotated? */
if ( ( args[0] & 2 ) != 0 && CUR.tt_metrics.rotated )
K |= 0x80;
/* Has the glyph been stretch... | 173,313,469,355,069,730,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,807 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_GFV( INS_ARG )
{
DO_GFV
}
| 50,929,673,282,198,280,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,808 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_GPV( INS_ARG )
{
DO_GPV
}
| 79,438,857,749,860,030,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,809 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_GT( INS_ARG )
{
DO_GT
}
| 156,513,543,108,954,180,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,810 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_GTEQ( INS_ARG )
{
DO_GTEQ
}
| 206,230,547,623,941,960,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,811 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_Goto_CodeRange( EXEC_OP_ FT_Int aRange,
FT_ULong aIP )
{
TT_CodeRange* range;
if ( aRange < 1 || aRange > 3 )
{
CUR.error = TT_Err_Bad_Argument;
return FAILURE;
}
range = &CUR.codeRangeTable[aRange - 1];
if ( range->base == NULL ) /... | 70,389,250,801,497,830,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,812 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_IDEF( INS_ARG )
{
TT_DefRecord* def;
TT_DefRecord* limit;
/* First of all, look for the same function in our table */
def = CUR.IDefs;
limit = def + CUR.numIDefs;
for ( ; def < limit; def++ )
if ( def->opc == (FT_ULong)args[0] )
break;
if ( def == limit )
... | 134,526,390,500,600,730,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,813 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_IF( INS_ARG )
{
FT_Int nIfs;
FT_Bool Out;
if ( args[0] != 0 )
return;
nIfs = 1;
Out = 0;
do
{
if ( SKIP_Code() == FAILURE )
return;
switch ( CUR.opcode )
{
case 0x58: /* IF */
nIfs++;
break;
case 0x1B: /* ... | 227,881,500,878,405,100,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,814 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_INSTCTRL( INS_ARG )
{
FT_Long K, L;
K = args[1];
L = args[0];
if ( K < 1 || K > 2 )
{
if ( CUR.pedantic_hinting )
CUR.error = TT_Err_Invalid_Reference;
return;
}
if ( L != 0 )
L = K;
CUR.GS.instruct_control = FT_BOOL(
( (FT_Byte)CUR.GS.inst... | 144,023,311,421,558,870,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,815 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_IP( INS_ARG )
{
FT_F26Dot6 old_range, cur_range;
FT_Vector* orus_base;
FT_Vector* cur_base;
FT_Int twilight;
FT_UNUSED_ARG;
if ( CUR.top < CUR.GS.loop )
{
CUR.error = TT_Err_Invalid_Reference;
return;
}
/*
* We need to deal in a special way with t... | 176,209,819,364,097,700,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,816 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_JROF( INS_ARG )
{
DO_JROF
}
| 16,944,994,757,024,045,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,817 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_JROT( INS_ARG )
{
DO_JROT
}
| 107,125,910,552,299,480,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,818 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_LOOPCALL( INS_ARG )
{
FT_ULong F;
TT_CallRec* pCrec;
TT_DefRecord* def;
/* first of all, check the index */
F = args[1];
if ( BOUNDS( F, CUR.maxFunc + 1 ) )
goto Fail;
/* Except for some old Apple fonts, all functions in a TrueType */
/* font are defined in inc... | 182,997,569,380,997,640,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,819 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_LT( INS_ARG )
{
DO_LT
}
| 70,738,472,074,028,340,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,820 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_LTEQ( INS_ARG )
{
DO_LTEQ
}
| 158,088,921,406,259,490,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,821 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_MAX( INS_ARG )
{
DO_MAX
}
| 311,399,752,700,514,500,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,822 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_MD( INS_ARG )
{
FT_UShort K, L;
FT_F26Dot6 D;
K = (FT_UShort)args[1];
L = (FT_UShort)args[0];
if( BOUNDS( L, CUR.zp0.n_points ) ||
BOUNDS( K, CUR.zp1.n_points ) )
{
if ( CUR.pedantic_hinting )
{
CUR.error = TT_Err_Invalid_Reference;
return;
... | 14,949,519,983,092,762,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,823 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_MDAP( INS_ARG )
{
FT_UShort point;
FT_F26Dot6 cur_dist,
distance;
point = (FT_UShort)args[0];
if ( BOUNDS( point, CUR.zp0.n_points ) )
{
if ( CUR.pedantic_hinting )
CUR.error = TT_Err_Invalid_Reference;
return;
}
/* XXX: Is there some undocu... | 12,996,789,146,667,722,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,824 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_MDRP( INS_ARG )
{
FT_UShort point;
FT_F26Dot6 org_dist, distance;
point = (FT_UShort)args[0];
if ( BOUNDS( point, CUR.zp1.n_points ) ||
BOUNDS( CUR.GS.rp0, CUR.zp0.n_points ) )
{
if ( CUR.pedantic_hinting )
CUR.error = TT_Err_Invalid_Reference;
return;... | 121,242,938,556,081,630,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,825 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_MIAP( INS_ARG )
{
FT_ULong cvtEntry;
FT_UShort point;
FT_F26Dot6 distance,
org_dist;
cvtEntry = (FT_ULong)args[1];
point = (FT_UShort)args[0];
if ( BOUNDS( point, CUR.zp0.n_points ) ||
BOUNDS( cvtEntry, CUR.cvtSize ) )
{
if ( CUR.ped... | 9,804,813,342,341,426,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,826 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_MIN( INS_ARG )
{
DO_MIN
}
| 81,899,634,977,204,540,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,827 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_MINDEX( INS_ARG )
{
FT_Long L, K;
L = args[0];
if ( L <= 0 || L > CUR.args )
{
CUR.error = TT_Err_Invalid_Reference;
return;
}
K = CUR.stack[CUR.args - L];
FT_ARRAY_MOVE( &CUR.stack[CUR.args - L ],
&CUR.stack[CUR.args - L + 1],
... | 251,914,001,164,934,900,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,828 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_MIRP( INS_ARG )
{
FT_UShort point;
FT_ULong cvtEntry;
FT_F26Dot6 cvt_dist,
distance,
cur_dist,
org_dist;
point = (FT_UShort)args[0];
cvtEntry = (FT_ULong)( args[1] + 1 );
/* XXX: UNDOCUMENTED! cvt[-1] = 0 always */
if ( BO... | 11,750,091,700,902,326,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,829 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_MPPEM( INS_ARG )
{
DO_MPPEM
}
| 112,602,354,652,737,240,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,830 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_MPS( INS_ARG )
{
DO_MPS
}
| 150,533,244,520,503,270,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,831 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_MSIRP( INS_ARG )
{
FT_UShort point;
FT_F26Dot6 distance;
point = (FT_UShort)args[0];
if ( BOUNDS( point, CUR.zp1.n_points ) ||
BOUNDS( CUR.GS.rp0, CUR.zp0.n_points ) )
{
if ( CUR.pedantic_hinting )
CUR.error = TT_Err_Invalid_Reference;
return;
}
... | 94,984,742,930,296,320,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,832 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_MUL( INS_ARG )
{
DO_MUL
}
| 317,999,838,810,273,200,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,833 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_NEG( INS_ARG )
{
DO_NEG
}
| 257,082,344,052,655,870,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,834 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_NEQ( INS_ARG )
{
DO_NEQ
}
| 302,767,854,131,804,900,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,835 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_NOT( INS_ARG )
{
DO_NOT
}
| 224,691,101,134,123,270,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,836 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_NPUSHB( INS_ARG )
{
FT_UShort L, K;
L = (FT_UShort)CUR.code[CUR.IP + 1];
if ( BOUNDS( L, CUR.stackSize + 1 - CUR.top ) )
{
CUR.error = TT_Err_Stack_Overflow;
return;
}
for ( K = 1; K <= L; K++ )
args[K - 1] = CUR.code[CUR.IP + K + 1];
CUR.new_top += L;
}
| 101,359,665,041,566,450,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,837 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_NPUSHW( INS_ARG )
{
FT_UShort L, K;
L = (FT_UShort)CUR.code[CUR.IP + 1];
if ( BOUNDS( L, CUR.stackSize + 1 - CUR.top ) )
{
CUR.error = TT_Err_Stack_Overflow;
return;
}
CUR.IP += 2;
for ( K = 0; K < L; K++ )
args[K] = GET_ShortIns();
CUR.step_ins = FALSE;
... | 77,490,342,275,807,880,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,838 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_NROUND( INS_ARG )
{
DO_NROUND
}
| 54,555,573,702,800,460,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,839 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_ODD( INS_ARG )
{
DO_ODD
}
| 59,870,391,402,858,630,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,840 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_OR( INS_ARG )
{
DO_OR
}
| 75,504,767,769,483,610,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,841 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_POP( INS_ARG )
{
/* nothing to do */
}
| 287,529,026,161,251,300,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,842 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_PUSHB( INS_ARG )
{
FT_UShort L, K;
L = (FT_UShort)( CUR.opcode - 0xB0 + 1 );
if ( BOUNDS( L, CUR.stackSize + 1 - CUR.top ) )
{
CUR.error = TT_Err_Stack_Overflow;
return;
}
for ( K = 1; K <= L; K++ )
args[K - 1] = CUR.code[CUR.IP + K];
}
| 31,611,843,560,869,773,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,843 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_PUSHW( INS_ARG )
{
FT_UShort L, K;
L = (FT_UShort)( CUR.opcode - 0xB8 + 1 );
if ( BOUNDS( L, CUR.stackSize + 1 - CUR.top ) )
{
CUR.error = TT_Err_Stack_Overflow;
return;
}
CUR.IP++;
for ( K = 0; K < L; K++ )
args[K] = GET_ShortIns();
CUR.step_ins = FALSE;... | 21,132,624,512,539,098,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,844 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_RCVT( INS_ARG )
{
DO_RCVT
}
| 69,068,469,143,835,940,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,845 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_RDTG( INS_ARG )
{
DO_RDTG
}
| 210,116,485,631,655,030,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,846 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_ROLL( INS_ARG )
{
FT_Long A, B, C;
FT_UNUSED_EXEC;
A = args[2];
B = args[1];
C = args[0];
args[2] = C;
args[1] = A;
args[0] = B;
}
| 290,423,908,261,946,720,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,847 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_ROUND( INS_ARG )
{
DO_ROUND
}
| 57,956,892,022,336,590,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,848 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_RS( INS_ARG )
{
DO_RS
}
| 274,361,835,170,641,800,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,849 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_RTG( INS_ARG )
{
DO_RTG
}
| 316,720,371,587,138,250,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,850 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_RTHG( INS_ARG )
{
DO_RTHG
}
| 285,747,044,010,347,700,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,851 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_S45ROUND( INS_ARG )
{
DO_S45ROUND
}
| 253,794,651,319,700,800,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,852 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_SANGW( INS_ARG )
{
/* instruction not supported anymore */
}
| 88,192,916,164,987,500,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,853 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_SCANCTRL( INS_ARG )
{
FT_Int A;
/* Get Threshold */
A = (FT_Int)( args[0] & 0xFF );
if ( A == 0xFF )
{
CUR.GS.scan_control = TRUE;
return;
}
else if ( A == 0 )
{
CUR.GS.scan_control = FALSE;
return;
}
if ( ( args[0] & 0x100 ) != 0 && CUR.tt_me... | 102,669,182,896,890,180,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,854 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_SCANTYPE( INS_ARG )
{
if ( args[0] >= 0 )
CUR.GS.scan_type = (FT_Int)args[0];
}
| 114,471,030,848,096,360,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,855 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_SCFS( INS_ARG )
{
FT_Long K;
FT_UShort L;
L = (FT_UShort)args[0];
if ( BOUNDS( L, CUR.zp2.n_points ) )
{
if ( CUR.pedantic_hinting )
CUR.error = TT_Err_Invalid_Reference;
return;
}
K = CUR_fast_project( &CUR.zp2.cur[L] );
CUR_Func_move( &CUR.zp2, L, a... | 179,895,480,448,047,670,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,856 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_SDB( INS_ARG )
{
DO_SDB
}
| 92,943,029,747,059,140,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,857 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_SDPVTL( INS_ARG )
{
FT_Long A, B, C;
FT_UShort p1, p2; /* was FT_Int in pas type ERROR */
p1 = (FT_UShort)args[1];
p2 = (FT_UShort)args[0];
if ( BOUNDS( p2, CUR.zp1.n_points ) ||
BOUNDS( p1, CUR.zp2.n_points ) )
{
if ( CUR.pedantic_hinting )
CUR.error = TT... | 323,938,940,011,266,040,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,858 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_SDS( INS_ARG )
{
DO_SDS
}
| 335,852,864,253,304,930,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,859 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_SFVFS( INS_ARG )
{
DO_SFVFS
}
| 46,125,505,462,032,900,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,860 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_SFVTCA( INS_ARG )
{
DO_SFVTCA
}
| 206,218,933,973,266,560,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,861 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_SFVTPV( INS_ARG )
{
DO_SFVTPV
}
| 165,887,956,898,237,660,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,862 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_SHP( INS_ARG )
{
TT_GlyphZoneRec zp;
FT_UShort refp;
FT_F26Dot6 dx,
dy;
FT_UShort point;
FT_UNUSED_ARG;
if ( CUR.top < CUR.GS.loop )
{
CUR.error = TT_Err_Invalid_Reference;
return;
}
if ( COMPUTE_Point_Displacement( &... | 109,229,273,499,678,300,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,863 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_SHPIX( INS_ARG )
{
FT_F26Dot6 dx, dy;
FT_UShort point;
if ( CUR.top < CUR.GS.loop + 1 )
{
CUR.error = TT_Err_Invalid_Reference;
return;
}
#ifdef TT_CONFIG_OPTION_UNPATENTED_HINTING
if ( CUR.face->unpatented_hinting )
{
if ( CUR.GS.both_x_axis )
{
... | 83,403,231,167,763,110,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,864 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_SHZ( INS_ARG )
{
TT_GlyphZoneRec zp;
FT_UShort refp;
FT_F26Dot6 dx,
dy;
FT_UShort last_point, i;
if ( BOUNDS( args[0], 2 ) )
{
if ( CUR.pedantic_hinting )
CUR.error = TT_Err_Invalid_Reference;
return;
}
if ( COMPUTE_Poi... | 306,536,047,395,712,100,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,865 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_SLOOP( INS_ARG )
{
DO_SLOOP
}
| 48,017,933,434,198,400,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,866 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_SMD( INS_ARG )
{
DO_SMD
}
| 149,337,730,212,650,220,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,867 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_SPVFS( INS_ARG )
{
DO_SPVFS
}
| 119,656,509,223,095,500,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,868 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_SPVTCA( INS_ARG )
{
DO_SPVTCA
}
| 322,054,237,693,701,700,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,869 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_SPVTL( INS_ARG )
{
DO_SPVTL
}
| 243,274,749,251,919,750,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,870 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_SROUND( INS_ARG )
{
DO_SROUND
}
| 204,627,160,475,243,970,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,871 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_SRP0( INS_ARG )
{
DO_SRP0
}
| 275,828,859,487,455,400,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,872 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_SRP2( INS_ARG )
{
DO_SRP2
}
| 3,768,469,023,505,917,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,873 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_SSW( INS_ARG )
{
DO_SSW
}
| 182,773,830,935,200,450,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,874 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_SSWCI( INS_ARG )
{
DO_SSWCI
}
| 126,438,064,406,640,530,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,875 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_SVTCA( INS_ARG )
{
DO_SVTCA
}
| 132,599,951,225,547,400,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,876 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_SWAP( INS_ARG )
{
DO_SWAP
}
| 338,884,849,900,597,670,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,877 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_SZP0( INS_ARG )
{
switch ( (FT_Int)args[0] )
{
case 0:
CUR.zp0 = CUR.twilight;
break;
case 1:
CUR.zp0 = CUR.pts;
break;
default:
if ( CUR.pedantic_hinting )
CUR.error = TT_Err_Invalid_Reference;
return;
}
CUR.GS.gep0 = (FT_UShort)args[0]... | 68,930,230,467,585,310,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,878 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_SZP1( INS_ARG )
{
switch ( (FT_Int)args[0] )
{
case 0:
CUR.zp1 = CUR.twilight;
break;
case 1:
CUR.zp1 = CUR.pts;
break;
default:
if ( CUR.pedantic_hinting )
CUR.error = TT_Err_Invalid_Reference;
return;
}
CUR.GS.gep1 = (FT_UShort)args[0]... | 283,699,797,118,889,000,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,879 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_SZP2( INS_ARG )
{
switch ( (FT_Int)args[0] )
{
case 0:
CUR.zp2 = CUR.twilight;
break;
case 1:
CUR.zp2 = CUR.pts;
break;
default:
if ( CUR.pedantic_hinting )
CUR.error = TT_Err_Invalid_Reference;
return;
}
CUR.GS.gep2 = (FT_UShort)args[0]... | 300,145,820,635,567,660,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,880 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_SZPS( INS_ARG )
{
switch ( (FT_Int)args[0] )
{
case 0:
CUR.zp0 = CUR.twilight;
break;
case 1:
CUR.zp0 = CUR.pts;
break;
default:
if ( CUR.pedantic_hinting )
CUR.error = TT_Err_Invalid_Reference;
return;
}
CUR.zp1 = CUR.zp0;
CUR.zp2 =... | 146,421,719,793,044,300,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,881 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_SxVTL( EXEC_OP_ FT_UShort aIdx1,
FT_UShort aIdx2,
FT_Int aOpc,
FT_UnitVector* Vec )
{
FT_Long A, B, C;
FT_Vector* p1;
FT_Vector* p2;
if ( BOUNDS( aIdx1, CUR.zp2.n_points ) ||
BOUNDS( aIdx2, C... | 267,818,274,509,216,660,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,882 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_UNKNOWN( INS_ARG )
{
TT_DefRecord* def = CUR.IDefs;
TT_DefRecord* limit = def + CUR.numIDefs;
FT_UNUSED_ARG;
for ( ; def < limit; def++ )
{
if ( (FT_Byte)def->opc == CUR.opcode && def->active )
{
TT_CallRec* call;
if ( CUR.callTop >= CUR.callSize )
... | 64,163,918,176,171,000,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,883 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_UTP( INS_ARG )
{
FT_UShort point;
FT_Byte mask;
point = (FT_UShort)args[0];
if ( BOUNDS( point, CUR.zp0.n_points ) )
{
if ( CUR.pedantic_hinting )
CUR.error = TT_Err_Invalid_Reference;
return;
}
mask = 0xFF;
if ( CUR.GS.freeVector.x != 0 )
mask ... | 311,669,429,900,569,200,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,884 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_WCVTF( INS_ARG )
{
DO_WCVTF
}
| 175,953,897,902,092,180,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,885 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_WCVTP( INS_ARG )
{
DO_WCVTP
}
| 14,619,162,327,872,026,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,886 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_WS( INS_ARG )
{
DO_WS
}
| 47,022,742,795,427,030,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,887 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Move_CVT( EXEC_OP_ FT_ULong idx,
FT_F26Dot6 value )
{
CUR.cvt[idx] += value;
}
| 93,507,782,884,113,980,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,888 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Move_CVT_Stretched( EXEC_OP_ FT_ULong idx,
FT_F26Dot6 value )
{
CUR.cvt[idx] += FT_DivFix( value, CURRENT_Ratio() );
}
| 108,442,308,389,218,000,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,889 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Move_Zp2_Point( EXEC_OP_ FT_UShort point,
FT_F26Dot6 dx,
FT_F26Dot6 dy,
FT_Bool touch )
{
#ifdef TT_CONFIG_OPTION_UNPATENTED_HINTING
if ( CUR.face->unpatented_hinting )
{
if ( CUR.GS.both_x_axis )
{
... | 320,070,724,783,192,900,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,890 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Normalize( EXEC_OP_ FT_F26Dot6 Vx,
FT_F26Dot6 Vy,
FT_UnitVector* R )
{
FT_F26Dot6 W;
FT_Bool S1, S2;
FT_UNUSED_EXEC;
if ( FT_ABS( Vx ) < 0x10000L && FT_ABS( Vy ) < 0x10000L )
{
Vx *= 0x100;
Vy *= 0x100;
W = TT_VecL... | 200,301,852,365,810,850,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.