idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
16,891 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Project_x( EXEC_OP_ FT_Pos dx,
FT_Pos dy )
{
FT_UNUSED_EXEC;
FT_UNUSED( dy );
return dx;
}
| 213,835,301,885,390,540,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,892 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Project_y( EXEC_OP_ FT_Pos dx,
FT_Pos dy )
{
FT_UNUSED_EXEC;
FT_UNUSED( dx );
return dy;
}
| 296,945,211,476,109,760,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,893 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Read_CVT( EXEC_OP_ FT_ULong idx )
{
return CUR.cvt[idx];
}
| 153,201,692,917,964,100,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,894 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Round_Down_To_Grid( EXEC_OP_ FT_F26Dot6 distance,
FT_F26Dot6 compensation )
{
FT_F26Dot6 val;
FT_UNUSED_EXEC;
if ( distance >= 0 )
{
val = distance + compensation;
if ( distance && val > 0 )
val &= ~63;
else
val = 0;
}
el... | 317,514,450,859,642,040,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,895 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Round_None( EXEC_OP_ FT_F26Dot6 distance,
FT_F26Dot6 compensation )
{
FT_F26Dot6 val;
FT_UNUSED_EXEC;
if ( distance >= 0 )
{
val = distance + compensation;
if ( distance && val < 0 )
val = 0;
}
else
{
val = distance - compensation;
... | 263,325,449,160,110,680,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,896 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Round_Super( EXEC_OP_ FT_F26Dot6 distance,
FT_F26Dot6 compensation )
{
FT_F26Dot6 val;
if ( distance >= 0 )
{
val = ( distance - CUR.phase + CUR.threshold + compensation ) &
-CUR.period;
if ( distance && val < 0 )
val = 0;
val += CUR.p... | 133,977,830,194,023,030,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,897 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Round_Super_45( EXEC_OP_ FT_F26Dot6 distance,
FT_F26Dot6 compensation )
{
FT_F26Dot6 val;
if ( distance >= 0 )
{
val = ( ( distance - CUR.phase + CUR.threshold + compensation ) /
CUR.period ) * CUR.period;
if ( distance && val < 0 )
val... | 262,592,671,888,900,440,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,898 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Round_To_Double_Grid( EXEC_OP_ FT_F26Dot6 distance,
FT_F26Dot6 compensation )
{
FT_F26Dot6 val;
FT_UNUSED_EXEC;
if ( distance >= 0 )
{
val = distance + compensation + 16;
if ( distance && val > 0 )
val &= ~31;
else
val = 0;
... | 29,365,462,623,545,175,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,899 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Round_To_Grid( EXEC_OP_ FT_F26Dot6 distance,
FT_F26Dot6 compensation )
{
FT_F26Dot6 val;
FT_UNUSED_EXEC;
if ( distance >= 0 )
{
val = distance + compensation + 32;
if ( distance && val > 0 )
val &= ~63;
else
val = 0;
}
else
... | 136,532,477,047,349,310,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,900 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Round_Up_To_Grid( EXEC_OP_ FT_F26Dot6 distance,
FT_F26Dot6 compensation )
{
FT_F26Dot6 val;
FT_UNUSED_EXEC;
if ( distance >= 0 )
{
val = distance + compensation + 63;
if ( distance && val > 0 )
val &= ~63;
else
val = 0;
}
e... | 135,487,851,543,326,800,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,901 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | SkipCode( EXEC_OP )
{
CUR.IP += CUR.length;
if ( CUR.IP < CUR.codeSize )
{
CUR.opcode = CUR.code[CUR.IP];
CUR.length = opcode_length[CUR.opcode];
if ( CUR.length < 0 )
{
if ( CUR.IP + 1 > CUR.codeSize )
goto Fail_Overflow;
CUR.length = 2 - CUR.length *... | 329,587,569,732,227,200,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,902 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Write_CVT( EXEC_OP_ FT_ULong idx,
FT_F26Dot6 value )
{
CUR.cvt[idx] = value;
}
| 236,769,228,252,578,900,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,903 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | _iup_worker_interpolate( IUP_Worker worker,
FT_UInt p1,
FT_UInt p2,
FT_UInt ref1,
FT_UInt ref2 )
{
FT_UInt i;
FT_F26Dot6 orus1, orus2, org1, org2, delta1, delta2;
if ( p1 >... | 120,041,791,086,882,580,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,904 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | _iup_worker_shift( IUP_Worker worker,
FT_UInt p1,
FT_UInt p2,
FT_UInt p )
{
FT_UInt i;
FT_F26Dot6 dx;
dx = worker->curs[p].x - worker->orgs[p].x;
if ( dx != 0 )
{
for ( i = p1; i < p; i++ )
worker->c... | 42,197,491,649,662,803,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,908 | savannah | b2ea64bcc6c385a8e8318f9c759450a07df58b6d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d | None | 0 | Destroy_Module( FT_Module module )
{
FT_Memory memory = module->memory;
FT_Module_Class* clazz = module->clazz;
FT_Library library = module->library;
/* finalize client-data - before anything else */
if ( module->generic.finalizer )
module->generic.finalizer( module )... | 267,685,272,087,748,900,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2519 | Heap-based buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted length value in a POST fragment header in a font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2519 |
16,909 | savannah | b2ea64bcc6c385a8e8318f9c759450a07df58b6d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d | None | 0 | FT_Activate_Size( FT_Size size )
{
FT_Face face;
if ( size == NULL )
return FT_Err_Invalid_Argument;
face = size->face;
if ( face == NULL || face->driver == NULL )
return FT_Err_Invalid_Argument;
/* we don't need anything more complex than that; all size objects */
/* are a... | 111,857,523,646,822,960,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2519 | Heap-based buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted length value in a POST fragment header in a font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2519 |
16,910 | savannah | b2ea64bcc6c385a8e8318f9c759450a07df58b6d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d | None | 0 | FT_Add_Module( FT_Library library,
const FT_Module_Class* clazz )
{
FT_Error error;
FT_Memory memory;
FT_Module module;
FT_UInt nn;
#define FREETYPE_VER_FIXED ( ( (FT_Long)FREETYPE_MAJOR << 16 ) | \
FREETYPE_MINOR ... | 51,153,112,392,561,580,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2519 | Heap-based buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted length value in a POST fragment header in a font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2519 |
16,911 | savannah | b2ea64bcc6c385a8e8318f9c759450a07df58b6d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d | None | 0 | FT_Attach_File( FT_Face face,
const char* filepathname )
{
FT_Open_Args open;
/* test for valid `face' delayed to FT_Attach_Stream() */
if ( !filepathname )
return FT_Err_Invalid_Argument;
open.stream = NULL;
open.flags = FT_OPEN_PATHNAME;
open.pathnam... | 75,966,508,346,506,820,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2519 | Heap-based buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted length value in a POST fragment header in a font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2519 |
16,912 | savannah | b2ea64bcc6c385a8e8318f9c759450a07df58b6d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d | None | 0 | FT_Attach_Stream( FT_Face face,
FT_Open_Args* parameters )
{
FT_Stream stream;
FT_Error error;
FT_Driver driver;
FT_Driver_Class clazz;
/* test for valid `parameters' delayed to FT_Stream_New() */
if ( !face )
return FT_Err_Invalid_Face_Handle;
... | 183,581,392,006,509,000,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2519 | Heap-based buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted length value in a POST fragment header in a font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2519 |
16,913 | savannah | b2ea64bcc6c385a8e8318f9c759450a07df58b6d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d | None | 0 | FT_CMap_Done( FT_CMap cmap )
{
if ( cmap )
{
FT_Face face = cmap->charmap.face;
FT_Memory memory = FT_FACE_MEMORY( face );
FT_Error error;
FT_Int i, j;
for ( i = 0; i < face->num_charmaps; i++ )
{
if ( (FT_CMap)face->charmaps[i] == cmap )
{
... | 50,836,940,226,643,470,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2519 | Heap-based buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted length value in a POST fragment header in a font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2519 |
16,914 | savannah | b2ea64bcc6c385a8e8318f9c759450a07df58b6d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d | None | 0 | FT_CMap_New( FT_CMap_Class clazz,
FT_Pointer init_data,
FT_CharMap charmap,
FT_CMap *acmap )
{
FT_Error error = FT_Err_Ok;
FT_Face face;
FT_Memory memory;
FT_CMap cmap;
if ( clazz == NULL || charmap == NULL || charmap->face =... | 295,120,020,779,088,550,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2519 | Heap-based buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted length value in a POST fragment header in a font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2519 |
16,915 | savannah | b2ea64bcc6c385a8e8318f9c759450a07df58b6d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d | None | 0 | FT_Done_Face( FT_Face face )
{
FT_Error error;
FT_Driver driver;
FT_Memory memory;
FT_ListNode node;
error = FT_Err_Invalid_Face_Handle;
if ( face && face->driver )
{
driver = face->driver;
memory = driver->root.memory;
/* find face in driver's list */
... | 83,343,645,119,735,730,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2519 | Heap-based buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted length value in a POST fragment header in a font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2519 |
16,916 | savannah | b2ea64bcc6c385a8e8318f9c759450a07df58b6d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d | None | 0 | FT_Done_Library( FT_Library library )
{
FT_Memory memory;
if ( !library )
return FT_Err_Invalid_Library_Handle;
memory = library->memory;
/* Discard client-data */
if ( library->generic.finalizer )
library->generic.finalizer( library );
/* Close all faces in the library. ... | 111,931,851,942,677,130,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2519 | Heap-based buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted length value in a POST fragment header in a font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2519 |
16,917 | savannah | b2ea64bcc6c385a8e8318f9c759450a07df58b6d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d | None | 0 | FT_Face_GetCharVariantIndex( FT_Face face,
FT_ULong charcode,
FT_ULong variantSelector )
{
FT_UInt result = 0;
if ( face && face->charmap &&
face->charmap->encoding == FT_ENCODING_UNICODE )
{
FT_CharMap charmap = find_va... | 64,404,405,854,836,180,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2519 | Heap-based buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted length value in a POST fragment header in a font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2519 |
16,918 | savannah | b2ea64bcc6c385a8e8318f9c759450a07df58b6d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d | None | 0 | FT_Face_GetCharVariantIsDefault( FT_Face face,
FT_ULong charcode,
FT_ULong variantSelector )
{
FT_Int result = -1;
if ( face )
{
FT_CharMap charmap = find_variant_selector_charmap( face );
if ( charmap != NULL )
... | 275,588,250,150,287,000,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2519 | Heap-based buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted length value in a POST fragment header in a font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2519 |
16,919 | savannah | b2ea64bcc6c385a8e8318f9c759450a07df58b6d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d | None | 0 | FT_Face_GetCharsOfVariant( FT_Face face,
FT_ULong variantSelector )
{
FT_UInt32 *result = NULL;
if ( face )
{
FT_CharMap charmap = find_variant_selector_charmap( face );
if ( charmap != NULL )
{
FT_CMap vcmap = FT_CMAP( charmap );
... | 117,344,924,290,139,900,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2519 | Heap-based buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted length value in a POST fragment header in a font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2519 |
16,920 | savannah | b2ea64bcc6c385a8e8318f9c759450a07df58b6d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d | None | 0 | FT_Face_GetVariantSelectors( FT_Face face )
{
FT_UInt32 *result = NULL;
if ( face )
{
FT_CharMap charmap = find_variant_selector_charmap( face );
if ( charmap != NULL )
{
FT_CMap vcmap = FT_CMAP( charmap );
FT_Memory memory = FT_FACE_MEMORY( face );
... | 150,586,754,018,346,500,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2519 | Heap-based buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted length value in a POST fragment header in a font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2519 |
16,921 | savannah | b2ea64bcc6c385a8e8318f9c759450a07df58b6d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d | None | 0 | FT_Get_CMap_Language_ID( FT_CharMap charmap )
{
FT_Service_TTCMaps service;
FT_Face face;
TT_CMapInfo cmap_info;
if ( !charmap || !charmap->face )
return 0;
face = charmap->face;
FT_FACE_FIND_SERVICE( face, service, TT_CMAP );
if ( service == NULL )
r... | 37,200,294,448,175,620,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2519 | Heap-based buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted length value in a POST fragment header in a font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2519 |
16,922 | savannah | b2ea64bcc6c385a8e8318f9c759450a07df58b6d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d | None | 0 | FT_Get_Char_Index( FT_Face face,
FT_ULong charcode )
{
FT_UInt result = 0;
if ( face && face->charmap )
{
FT_CMap cmap = FT_CMAP( face->charmap );
if ( charcode > 0xFFFFFFFFUL )
{
FT_TRACE1(( "FT_Get_Char_Index: too large charcode" ));
FT_T... | 250,852,244,457,090,130,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2519 | Heap-based buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted length value in a POST fragment header in a font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2519 |
16,923 | savannah | b2ea64bcc6c385a8e8318f9c759450a07df58b6d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d | None | 0 | FT_Get_Charmap_Index( FT_CharMap charmap )
{
FT_Int i;
if ( !charmap || !charmap->face )
return -1;
for ( i = 0; i < charmap->face->num_charmaps; i++ )
if ( charmap->face->charmaps[i] == charmap )
break;
FT_ASSERT( i < charmap->face->num_charmaps );
return i;
}
| 135,556,997,230,097,390,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2519 | Heap-based buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted length value in a POST fragment header in a font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2519 |
16,924 | savannah | b2ea64bcc6c385a8e8318f9c759450a07df58b6d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d | None | 0 | FT_Get_First_Char( FT_Face face,
FT_UInt *agindex )
{
FT_ULong result = 0;
FT_UInt gindex = 0;
if ( face && face->charmap && face->num_glyphs )
{
gindex = FT_Get_Char_Index( face, 0 );
if ( gindex == 0 || gindex >= (FT_UInt)face->num_glyphs )
result =... | 94,860,495,684,710,120,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2519 | Heap-based buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted length value in a POST fragment header in a font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2519 |
16,925 | savannah | b2ea64bcc6c385a8e8318f9c759450a07df58b6d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d | None | 0 | FT_Get_Kerning( FT_Face face,
FT_UInt left_glyph,
FT_UInt right_glyph,
FT_UInt kern_mode,
FT_Vector *akerning )
{
FT_Error error = FT_Err_Ok;
FT_Driver driver;
if ( !face )
return FT_Err_Invalid_Face_Hand... | 90,877,790,786,642,960,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2519 | Heap-based buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted length value in a POST fragment header in a font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2519 |
16,926 | savannah | b2ea64bcc6c385a8e8318f9c759450a07df58b6d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d | None | 0 | FT_Get_Module( FT_Library library,
const char* module_name )
{
FT_Module result = 0;
FT_Module* cur;
FT_Module* limit;
if ( !library || !module_name )
return result;
cur = library->modules;
limit = cur + library->num_modules;
for ( ; cur < limit; cur++... | 189,831,338,823,309,600,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2519 | Heap-based buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted length value in a POST fragment header in a font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2519 |
16,927 | savannah | b2ea64bcc6c385a8e8318f9c759450a07df58b6d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d | None | 0 | FT_Get_Module_Interface( FT_Library library,
const char* mod_name )
{
FT_Module module;
/* test for valid `library' delayed to FT_Get_Module() */
module = FT_Get_Module( library, mod_name );
return module ? module->clazz->module_interface : 0;
}
| 154,247,570,582,429,580,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2519 | Heap-based buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted length value in a POST fragment header in a font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2519 |
16,928 | savannah | b2ea64bcc6c385a8e8318f9c759450a07df58b6d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d | None | 0 | FT_Get_Name_Index( FT_Face face,
FT_String* glyph_name )
{
FT_UInt result = 0;
if ( face && FT_HAS_GLYPH_NAMES( face ) )
{
FT_Service_GlyphDict service;
FT_FACE_LOOKUP_SERVICE( face,
service,
GLYPH_DI... | 247,840,993,301,607,850,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2519 | Heap-based buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted length value in a POST fragment header in a font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2519 |
16,929 | savannah | b2ea64bcc6c385a8e8318f9c759450a07df58b6d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d | None | 0 | FT_Get_Postscript_Name( FT_Face face )
{
const char* result = NULL;
if ( !face )
goto Exit;
if ( !result )
{
FT_Service_PsFontName service;
FT_FACE_LOOKUP_SERVICE( face,
service,
POSTSCRIPT_FONT_NAME );
if (... | 175,425,568,108,816,440,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2519 | Heap-based buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted length value in a POST fragment header in a font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2519 |
16,930 | savannah | b2ea64bcc6c385a8e8318f9c759450a07df58b6d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d | None | 0 | FT_Get_Renderer( FT_Library library,
FT_Glyph_Format format )
{
/* test for valid `library' delayed to FT_Lookup_Renderer() */
return FT_Lookup_Renderer( library, format, 0 );
}
| 154,327,940,569,130,500,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2519 | Heap-based buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted length value in a POST fragment header in a font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2519 |
16,931 | savannah | b2ea64bcc6c385a8e8318f9c759450a07df58b6d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d | None | 0 | FT_Get_Sfnt_Table( FT_Face face,
FT_Sfnt_Tag tag )
{
void* table = 0;
FT_Service_SFNT_Table service;
if ( face && FT_IS_SFNT( face ) )
{
FT_FACE_FIND_SERVICE( face, service, SFNT_TABLE );
if ( service != NULL )
table = service->get_t... | 24,475,752,390,687,698,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2519 | Heap-based buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted length value in a POST fragment header in a font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2519 |
16,932 | savannah | b2ea64bcc6c385a8e8318f9c759450a07df58b6d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d | None | 0 | FT_Get_SubGlyph_Info( FT_GlyphSlot glyph,
FT_UInt sub_index,
FT_Int *p_index,
FT_UInt *p_flags,
FT_Int *p_arg1,
FT_Int *p_arg2,
FT_Matrix *p_... | 338,973,108,884,348,800,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2519 | Heap-based buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted length value in a POST fragment header in a font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2519 |
16,933 | savannah | b2ea64bcc6c385a8e8318f9c759450a07df58b6d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d | None | 0 | FT_Get_Track_Kerning( FT_Face face,
FT_Fixed point_size,
FT_Int degree,
FT_Fixed* akerning )
{
FT_Service_Kerning service;
FT_Error error = FT_Err_Ok;
if ( !face )
return FT_Err_Invalid_Face_Handle;
... | 307,095,497,844,328,330,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2519 | Heap-based buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted length value in a POST fragment header in a font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2519 |
16,934 | savannah | b2ea64bcc6c385a8e8318f9c759450a07df58b6d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d | None | 0 | FT_Library_Version( FT_Library library,
FT_Int *amajor,
FT_Int *aminor,
FT_Int *apatch )
{
FT_Int major = 0;
FT_Int minor = 0;
FT_Int patch = 0;
if ( library )
{
major = library->version_major;
mi... | 277,827,923,999,515,500,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2519 | Heap-based buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted length value in a POST fragment header in a font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2519 |
16,935 | savannah | b2ea64bcc6c385a8e8318f9c759450a07df58b6d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d | None | 0 | FT_Load_Sfnt_Table( FT_Face face,
FT_ULong tag,
FT_Long offset,
FT_Byte* buffer,
FT_ULong* length )
{
FT_Service_SFNT_Table service;
if ( !face || !FT_IS_SFNT( face ) )
return FT_Err_Invalid_Face_Hand... | 165,686,658,451,248,670,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2519 | Heap-based buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted length value in a POST fragment header in a font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2519 |
16,936 | savannah | b2ea64bcc6c385a8e8318f9c759450a07df58b6d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d | None | 0 | FT_Lookup_Renderer( FT_Library library,
FT_Glyph_Format format,
FT_ListNode* node )
{
FT_ListNode cur;
FT_Renderer result = 0;
if ( !library )
goto Exit;
cur = library->renderers.head;
if ( node )
{
if ( *node )
... | 303,652,953,797,404,100,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2519 | Heap-based buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted length value in a POST fragment header in a font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2519 |
16,937 | savannah | b2ea64bcc6c385a8e8318f9c759450a07df58b6d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d | None | 0 | FT_Match_Size( FT_Face face,
FT_Size_Request req,
FT_Bool ignore_width,
FT_ULong* size_index )
{
FT_Int i;
FT_Long w, h;
if ( !FT_HAS_FIXED_SIZES( face ) )
return FT_Err_Invalid_Face_Handle;
/* FT_Bitmap_Size do... | 257,171,194,998,408,820,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2519 | Heap-based buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted length value in a POST fragment header in a font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2519 |
16,938 | savannah | b2ea64bcc6c385a8e8318f9c759450a07df58b6d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d | None | 0 | FT_New_Library( FT_Memory memory,
FT_Library *alibrary )
{
FT_Library library = 0;
FT_Error error;
if ( !memory )
return FT_Err_Invalid_Argument;
#ifdef FT_DEBUG_LEVEL_ERROR
/* init debugging support */
ft_debug_init();
#endif
/* first of all, allocate the... | 257,639,077,604,464,980,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2519 | Heap-based buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted length value in a POST fragment header in a font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2519 |
16,939 | savannah | b2ea64bcc6c385a8e8318f9c759450a07df58b6d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d | None | 0 | FT_New_Memory_Face( FT_Library library,
const FT_Byte* file_base,
FT_Long file_size,
FT_Long face_index,
FT_Face *aface )
{
FT_Open_Args args;
/* test for valid `library' and `face' delaye... | 262,132,965,597,654,440,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2519 | Heap-based buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted length value in a POST fragment header in a font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2519 |
16,940 | savannah | b2ea64bcc6c385a8e8318f9c759450a07df58b6d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d | None | 0 | FT_New_Size( FT_Face face,
FT_Size *asize )
{
FT_Error error;
FT_Memory memory;
FT_Driver driver;
FT_Driver_Class clazz;
FT_Size size = 0;
FT_ListNode node = 0;
if ( !face )
return FT_Err_Invalid_Face_Handle;
if ( !asiz... | 176,075,560,283,927,700,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2519 | Heap-based buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted length value in a POST fragment header in a font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2519 |
16,941 | savannah | b2ea64bcc6c385a8e8318f9c759450a07df58b6d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d | None | 0 | FT_Open_Face( FT_Library library,
const FT_Open_Args* args,
FT_Long face_index,
FT_Face *aface )
{
FT_Error error;
FT_Driver driver;
FT_Memory memory;
FT_Stream stream = 0;
FT_Face face = 0;
... | 273,245,254,141,554,240,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2519 | Heap-based buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted length value in a POST fragment header in a font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2519 |
16,942 | savannah | b2ea64bcc6c385a8e8318f9c759450a07df58b6d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d | None | 0 | FT_Remove_Module( FT_Library library,
FT_Module module )
{
/* try to find the module from the table, then remove it from there */
if ( !library )
return FT_Err_Invalid_Library_Handle;
if ( module )
{
FT_Module* cur = library->modules;
FT_Module* limit =... | 308,979,820,183,446,500,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2519 | Heap-based buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted length value in a POST fragment header in a font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2519 |
16,943 | savannah | b2ea64bcc6c385a8e8318f9c759450a07df58b6d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d | None | 0 | FT_Render_Glyph( FT_GlyphSlot slot,
FT_Render_Mode render_mode )
{
FT_Library library;
if ( !slot || !slot->face )
return FT_Err_Invalid_Argument;
library = FT_FACE_LIBRARY( slot->face );
return FT_Render_Glyph_Internal( library, slot, render_mode );
}
| 296,668,467,811,529,250,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2519 | Heap-based buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted length value in a POST fragment header in a font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2519 |
16,944 | savannah | b2ea64bcc6c385a8e8318f9c759450a07df58b6d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d | None | 0 | FT_Render_Glyph_Internal( FT_Library library,
FT_GlyphSlot slot,
FT_Render_Mode render_mode )
{
FT_Error error = FT_Err_Ok;
FT_Renderer renderer;
/* if it is already a bitmap, no need to do anything */
switch ( slot->format )
... | 306,978,565,671,891,300,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2519 | Heap-based buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted length value in a POST fragment header in a font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2519 |
16,945 | savannah | b2ea64bcc6c385a8e8318f9c759450a07df58b6d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d | None | 0 | FT_Request_Size( FT_Face face,
FT_Size_Request req )
{
FT_Driver_Class clazz;
FT_ULong strike_index;
if ( !face )
return FT_Err_Invalid_Face_Handle;
if ( !req || req->width < 0 || req->height < 0 ||
req->type >= FT_SIZE_REQUEST_TYPE_MAX )
... | 337,161,367,517,149,700,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2519 | Heap-based buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted length value in a POST fragment header in a font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2519 |
16,946 | savannah | b2ea64bcc6c385a8e8318f9c759450a07df58b6d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d | None | 0 | FT_Select_Charmap( FT_Face face,
FT_Encoding encoding )
{
FT_CharMap* cur;
FT_CharMap* limit;
if ( !face )
return FT_Err_Invalid_Face_Handle;
if ( encoding == FT_ENCODING_NONE )
return FT_Err_Invalid_Argument;
/* FT_ENCODING_UNICODE is special. We tr... | 302,596,655,134,398,670,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2519 | Heap-based buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted length value in a POST fragment header in a font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2519 |
16,947 | savannah | b2ea64bcc6c385a8e8318f9c759450a07df58b6d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d | None | 0 | FT_Select_Metrics( FT_Face face,
FT_ULong strike_index )
{
FT_Size_Metrics* metrics;
FT_Bitmap_Size* bsize;
metrics = &face->size->metrics;
bsize = face->available_sizes + strike_index;
metrics->x_ppem = (FT_UShort)( ( bsize->x_ppem + 32 ) >> 6 );
metrics->y_p... | 240,738,904,139,523,300,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2519 | Heap-based buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted length value in a POST fragment header in a font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2519 |
16,948 | savannah | b2ea64bcc6c385a8e8318f9c759450a07df58b6d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d | None | 0 | FT_Select_Size( FT_Face face,
FT_Int strike_index )
{
FT_Driver_Class clazz;
if ( !face || !FT_HAS_FIXED_SIZES( face ) )
return FT_Err_Invalid_Face_Handle;
if ( strike_index < 0 || strike_index >= face->num_fixed_sizes )
return FT_Err_Invalid_Argument;
clazz = f... | 336,910,071,881,906,160,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2519 | Heap-based buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted length value in a POST fragment header in a font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2519 |
16,949 | savannah | b2ea64bcc6c385a8e8318f9c759450a07df58b6d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d | None | 0 | FT_Set_Char_Size( FT_Face face,
FT_F26Dot6 char_width,
FT_F26Dot6 char_height,
FT_UInt horz_resolution,
FT_UInt vert_resolution )
{
FT_Size_RequestRec req;
if ( !char_width )
char_width = char_height;
... | 67,807,585,680,395,440,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2519 | Heap-based buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted length value in a POST fragment header in a font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2519 |
16,950 | savannah | b2ea64bcc6c385a8e8318f9c759450a07df58b6d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d | None | 0 | FT_Set_Charmap( FT_Face face,
FT_CharMap charmap )
{
FT_CharMap* cur;
FT_CharMap* limit;
if ( !face )
return FT_Err_Invalid_Face_Handle;
cur = face->charmaps;
if ( !cur )
return FT_Err_Invalid_CharMap_Handle;
if ( FT_Get_CMap_Format( charmap ) == 14 )
... | 28,811,251,026,148,090,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2519 | Heap-based buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted length value in a POST fragment header in a font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2519 |
16,951 | savannah | b2ea64bcc6c385a8e8318f9c759450a07df58b6d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d | None | 0 | FT_Set_Debug_Hook( FT_Library library,
FT_UInt hook_index,
FT_DebugHook_Func debug_hook )
{
if ( library && debug_hook &&
hook_index <
( sizeof ( library->debug_hooks ) / sizeof ( void* ) ) )
library->debug_hooks[hook_index]... | 139,163,630,972,631,190,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2519 | Heap-based buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted length value in a POST fragment header in a font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2519 |
16,952 | savannah | b2ea64bcc6c385a8e8318f9c759450a07df58b6d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d | None | 0 | FT_Set_Pixel_Sizes( FT_Face face,
FT_UInt pixel_width,
FT_UInt pixel_height )
{
FT_Size_RequestRec req;
if ( pixel_width == 0 )
pixel_width = pixel_height;
else if ( pixel_height == 0 )
pixel_height = pixel_width;
if ( pixel_width < 1 )... | 60,649,479,645,925,520,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2519 | Heap-based buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted length value in a POST fragment header in a font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2519 |
16,953 | savannah | b2ea64bcc6c385a8e8318f9c759450a07df58b6d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d | None | 0 | FT_Set_Renderer( FT_Library library,
FT_Renderer renderer,
FT_UInt num_params,
FT_Parameter* parameters )
{
FT_ListNode node;
FT_Error error = FT_Err_Ok;
if ( !library )
return FT_Err_Invalid_Library_Handle;
if ( !... | 215,589,387,701,807,700,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2519 | Heap-based buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted length value in a POST fragment header in a font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2519 |
16,954 | savannah | b2ea64bcc6c385a8e8318f9c759450a07df58b6d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d | None | 0 | FT_Sfnt_Table_Info( FT_Face face,
FT_UInt table_index,
FT_ULong *tag,
FT_ULong *length )
{
FT_Service_SFNT_Table service;
FT_ULong offset;
if ( !face || !FT_IS_SFNT( face ) )
return FT_Err_Invalid_Face_Handl... | 168,390,477,476,319,340,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2519 | Heap-based buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted length value in a POST fragment header in a font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2519 |
16,955 | savannah | b2ea64bcc6c385a8e8318f9c759450a07df58b6d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d | None | 0 | IsMacBinary( FT_Library library,
FT_Stream stream,
FT_Long face_index,
FT_Face *aface )
{
unsigned char header[128];
FT_Error error;
FT_Long dlen, offset;
if ( NULL == stream )
return FT_Err_Invalid_Stream_Operation;
e... | 23,977,310,350,916,870,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2519 | Heap-based buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted length value in a POST fragment header in a font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2519 |
16,956 | savannah | b2ea64bcc6c385a8e8318f9c759450a07df58b6d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d | None | 0 | IsMacResource( FT_Library library,
FT_Stream stream,
FT_Long resource_offset,
FT_Long face_index,
FT_Face *aface )
{
FT_Memory memory = library->memory;
FT_Error error;
FT_Long map_offset, rdara_pos;
FT_Long *... | 38,049,621,751,917,040,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2519 | Heap-based buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted length value in a POST fragment header in a font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2519 |
16,957 | savannah | b2ea64bcc6c385a8e8318f9c759450a07df58b6d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d | None | 0 | Mac_Read_sfnt_Resource( FT_Library library,
FT_Stream stream,
FT_Long *offsets,
FT_Long resource_cnt,
FT_Long face_index,
FT_Face *aface )
{
FT_Memory memory = libr... | 274,812,937,675,230,280,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2519 | Heap-based buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted length value in a POST fragment header in a font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2519 |
16,958 | savannah | b2ea64bcc6c385a8e8318f9c759450a07df58b6d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d | None | 0 | ft_add_renderer( FT_Module module )
{
FT_Library library = module->library;
FT_Memory memory = library->memory;
FT_Error error;
FT_ListNode node;
if ( FT_NEW( node ) )
goto Exit;
{
FT_Renderer render = FT_RENDERER( module );
FT_Renderer_Class* clazz ... | 314,490,712,491,282,100,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2519 | Heap-based buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted length value in a POST fragment header in a font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2519 |
16,959 | savannah | b2ea64bcc6c385a8e8318f9c759450a07df58b6d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d | None | 0 | ft_cmap_done_internal( FT_CMap cmap )
{
FT_CMap_Class clazz = cmap->clazz;
FT_Face face = cmap->charmap.face;
FT_Memory memory = FT_FACE_MEMORY(face);
if ( clazz->done )
clazz->done( cmap );
FT_FREE( cmap );
}
| 131,752,195,973,374,070,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2519 | Heap-based buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted length value in a POST fragment header in a font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2519 |
16,960 | savannah | b2ea64bcc6c385a8e8318f9c759450a07df58b6d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d | None | 0 | ft_lookup_PS_in_sfnt_stream( FT_Stream stream,
FT_Long face_index,
FT_ULong* offset,
FT_ULong* length,
FT_Bool* is_sfnt_cid )
{
FT_Error error;
FT_UShort numTables;
FT_L... | 150,548,737,700,322,560,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2519 | Heap-based buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted length value in a POST fragment header in a font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2519 |
16,961 | savannah | b2ea64bcc6c385a8e8318f9c759450a07df58b6d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d | None | 0 | ft_lookup_glyph_renderer( FT_GlyphSlot slot )
{
FT_Face face = slot->face;
FT_Library library = FT_FACE_LIBRARY( face );
FT_Renderer result = library->cur_renderer;
if ( !result || result->glyph_format != slot->format )
result = FT_Lookup_Renderer( library, slot->format, 0 );
... | 163,074,725,000,500,000,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2519 | Heap-based buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted length value in a POST fragment header in a font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2519 |
16,962 | savannah | b2ea64bcc6c385a8e8318f9c759450a07df58b6d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d | None | 0 | ft_module_get_service( FT_Module module,
const char* service_id )
{
FT_Pointer result = NULL;
if ( module )
{
FT_ASSERT( module->clazz && module->clazz->get_interface );
/* first, look for the service in the module
*/
if ( module->clazz->get_interfa... | 20,359,845,309,225,506,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2519 | Heap-based buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted length value in a POST fragment header in a font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2519 |
16,963 | savannah | b2ea64bcc6c385a8e8318f9c759450a07df58b6d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d | None | 0 | ft_recompute_scaled_metrics( FT_Face face,
FT_Size_Metrics* metrics )
{
/* Compute root ascender, descender, test height, and max_advance */
#ifdef GRID_FIT_METRICS
metrics->ascender = FT_PIX_CEIL( FT_MulFix( face->ascender,
... | 82,241,043,344,103,990,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2519 | Heap-based buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted length value in a POST fragment header in a font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2519 |
16,964 | savannah | b2ea64bcc6c385a8e8318f9c759450a07df58b6d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d | None | 0 | ft_remove_renderer( FT_Module module )
{
FT_Library library = module->library;
FT_Memory memory = library->memory;
FT_ListNode node;
node = FT_List_Find( &library->renderers, module );
if ( node )
{
FT_Renderer render = FT_RENDERER( module );
/* release raster object... | 108,355,168,919,050,020,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2519 | Heap-based buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted length value in a POST fragment header in a font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2519 |
16,965 | savannah | b2ea64bcc6c385a8e8318f9c759450a07df58b6d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d | None | 0 | ft_set_current_renderer( FT_Library library )
{
FT_Renderer renderer;
renderer = FT_Lookup_Renderer( library, FT_GLYPH_FORMAT_OUTLINE, 0 );
library->cur_renderer = renderer;
}
| 311,101,043,352,516,060,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2519 | Heap-based buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted length value in a POST fragment header in a font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2519 |
16,966 | savannah | b2ea64bcc6c385a8e8318f9c759450a07df58b6d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d | None | 0 | ft_stub_set_char_sizes( FT_Size size,
FT_F26Dot6 width,
FT_F26Dot6 height,
FT_UInt horz_res,
FT_UInt vert_res )
{
FT_Size_RequestRec req;
FT_Driver driver = size->face->driver;
... | 13,343,587,357,202,226,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2519 | Heap-based buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted length value in a POST fragment header in a font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2519 |
16,967 | savannah | b2ea64bcc6c385a8e8318f9c759450a07df58b6d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d | None | 0 | ft_synthesize_vertical_metrics( FT_Glyph_Metrics* metrics,
FT_Pos advance )
{
FT_Pos height = metrics->height;
/* compensate for glyph with bbox above/below the baseline */
if ( metrics->horiBearingY < 0 )
{
if ( height < metrics->horiBearingY ... | 332,374,179,903,688,500,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2519 | Heap-based buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted length value in a POST fragment header in a font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2519 |
16,968 | savannah | b2ea64bcc6c385a8e8318f9c759450a07df58b6d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d | None | 0 | load_mac_face( FT_Library library,
FT_Stream stream,
FT_Long face_index,
FT_Face *aface,
const FT_Open_Args *args )
{
FT_Error error;
FT_UNUSED( args );
error = IsMacBinary( library, stre... | 28,478,640,478,053,720,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2519 | Heap-based buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted length value in a POST fragment header in a font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2519 |
16,969 | savannah | b2ea64bcc6c385a8e8318f9c759450a07df58b6d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d | None | 0 | memory_stream_close( FT_Stream stream )
{
FT_Memory memory = stream->memory;
FT_FREE( stream->base );
stream->size = 0;
stream->base = 0;
stream->close = 0;
}
| 142,470,101,635,125,700,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2519 | Heap-based buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted length value in a POST fragment header in a font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2519 |
16,970 | savannah | b2ea64bcc6c385a8e8318f9c759450a07df58b6d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d | None | 0 | open_face_PS_from_sfnt_stream( FT_Library library,
FT_Stream stream,
FT_Long face_index,
FT_Int num_params,
FT_Parameter *params,
... | 109,456,001,245,190,480,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2519 | Heap-based buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted length value in a POST fragment header in a font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2519 |
16,971 | savannah | 6305b869d86ff415a33576df6d43729673c66eee | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=6305b869d86ff415a33576df6d43729673c66eee | None | 0 | FT_Message( const char* fmt,
... )
{
va_list ap;
va_start( ap, fmt );
vfprintf( stderr, fmt, ap );
va_end( ap );
}
| 49,785,951,218,404,600,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2010-2500 | Integer overflow in the gray_render_span function in smooth/ftgrays.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2500 |
16,972 | savannah | 6305b869d86ff415a33576df6d43729673c66eee | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=6305b869d86ff415a33576df6d43729673c66eee | None | 0 | FT_Outline_Decompose( const FT_Outline* outline,
const FT_Outline_Funcs* func_interface,
void* user )
{
#undef SCALED
#define SCALED( x ) ( ( (x) << shift ) - delta )
FT_Vector v_last;
FT_Vector v_control;
FT_Vector v_sta... | 102,633,661,073,278,130,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2010-2500 | Integer overflow in the gray_render_span function in smooth/ftgrays.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2500 |
16,973 | savannah | 6305b869d86ff415a33576df6d43729673c66eee | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=6305b869d86ff415a33576df6d43729673c66eee | None | 0 | gray_conic_to( const FT_Vector* control,
const FT_Vector* to,
PWorker worker )
{
gray_render_conic( RAS_VAR_ control, to );
return 0;
}
| 75,287,315,014,081,750,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2010-2500 | Integer overflow in the gray_render_span function in smooth/ftgrays.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2500 |
16,974 | savannah | 6305b869d86ff415a33576df6d43729673c66eee | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=6305b869d86ff415a33576df6d43729673c66eee | None | 0 | gray_convert_glyph( RAS_ARG )
{
TBand bands[40];
TBand* volatile band;
int volatile n, num_bands;
TPos volatile min, max, max_y;
FT_BBox* clip;
/* Set up state in the raster object */
gray_compute_cbox( RAS_VAR );
/* clip to target bitmap, exit if nothin... | 41,753,048,001,871,193,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2010-2500 | Integer overflow in the gray_render_span function in smooth/ftgrays.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2500 |
16,975 | savannah | 6305b869d86ff415a33576df6d43729673c66eee | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=6305b869d86ff415a33576df6d43729673c66eee | None | 0 | gray_convert_glyph_inner( RAS_ARG )
{
volatile int error = 0;
#ifdef FT_CONFIG_OPTION_PIC
FT_Outline_Funcs func_interface;
Init_Class_func_interface(&func_interface);
#endif
if ( ft_setjmp( ras.jump_buffer ) == 0 )
{
error = FT_Outline_Decompose( &ras.outline, &func_interface, &ras... | 122,862,298,085,667,000,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2010-2500 | Integer overflow in the gray_render_span function in smooth/ftgrays.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2500 |
16,976 | savannah | 6305b869d86ff415a33576df6d43729673c66eee | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=6305b869d86ff415a33576df6d43729673c66eee | None | 0 | gray_cubic_to( const FT_Vector* control1,
const FT_Vector* control2,
const FT_Vector* to,
PWorker worker )
{
gray_render_cubic( RAS_VAR_ control1, control2, to );
return 0;
}
| 94,289,859,453,881,550,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2010-2500 | Integer overflow in the gray_render_span function in smooth/ftgrays.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2500 |
16,977 | savannah | 6305b869d86ff415a33576df6d43729673c66eee | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=6305b869d86ff415a33576df6d43729673c66eee | None | 0 | gray_dump_cells( RAS_ARG )
{
int yindex;
for ( yindex = 0; yindex < ras.ycount; yindex++ )
{
PCell cell;
printf( "%3d:", yindex );
for ( cell = ras.ycells[yindex]; cell != NULL; cell = cell->next )
printf( " (%3ld, c:%4ld, a:%6d)", cell->x, cell->cover, cell->area );
... | 2,871,164,861,872,854,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2010-2500 | Integer overflow in the gray_render_span function in smooth/ftgrays.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2500 |
16,978 | savannah | 6305b869d86ff415a33576df6d43729673c66eee | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=6305b869d86ff415a33576df6d43729673c66eee | None | 0 | gray_find_cell( RAS_ARG )
{
PCell *pcell, cell;
TPos x = ras.ex;
if ( x > ras.count_ex )
x = ras.count_ex;
pcell = &ras.ycells[ras.ey];
for (;;)
{
cell = *pcell;
if ( cell == NULL || cell->x > x )
break;
if ( cell->x == x )
goto Exit;
pc... | 145,420,740,608,905,000,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2010-2500 | Integer overflow in the gray_render_span function in smooth/ftgrays.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2500 |
16,979 | savannah | 6305b869d86ff415a33576df6d43729673c66eee | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=6305b869d86ff415a33576df6d43729673c66eee | None | 0 | gray_hline( RAS_ARG_ TCoord x,
TCoord y,
TPos area,
TCoord acount )
{
FT_Span* span;
int count;
int coverage;
/* compute the coverage line's coverage, depending on the */
/* outline fill rule ... | 35,563,689,171,399,360,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2010-2500 | Integer overflow in the gray_render_span function in smooth/ftgrays.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2500 |
16,980 | savannah | 6305b869d86ff415a33576df6d43729673c66eee | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=6305b869d86ff415a33576df6d43729673c66eee | None | 0 | gray_init_cells( RAS_ARG_ void* buffer,
long byte_size )
{
ras.buffer = buffer;
ras.buffer_size = byte_size;
ras.ycells = (PCell*) buffer;
ras.cells = NULL;
ras.max_cells = 0;
ras.num_cells = 0;
ras.area = 0;
ras.cover ... | 239,273,514,965,116,300,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2010-2500 | Integer overflow in the gray_render_span function in smooth/ftgrays.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2500 |
16,981 | savannah | 6305b869d86ff415a33576df6d43729673c66eee | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=6305b869d86ff415a33576df6d43729673c66eee | None | 0 | gray_line_to( const FT_Vector* to,
PWorker worker )
{
gray_render_line( RAS_VAR_ UPSCALE( to->x ), UPSCALE( to->y ) );
return 0;
}
| 119,623,350,900,108,200,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2010-2500 | Integer overflow in the gray_render_span function in smooth/ftgrays.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2500 |
16,982 | savannah | 6305b869d86ff415a33576df6d43729673c66eee | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=6305b869d86ff415a33576df6d43729673c66eee | None | 0 | gray_move_to( const FT_Vector* to,
PWorker worker )
{
TPos x, y;
/* record current cell, if any */
gray_record_cell( RAS_VAR );
/* start to a new position */
x = UPSCALE( to->x );
y = UPSCALE( to->y );
gray_start_cell( RAS_VAR_ TRUNC( x ), TRUNC( y ) );
... | 173,947,327,146,547,540,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2010-2500 | Integer overflow in the gray_render_span function in smooth/ftgrays.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2500 |
16,983 | savannah | 6305b869d86ff415a33576df6d43729673c66eee | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=6305b869d86ff415a33576df6d43729673c66eee | None | 0 | gray_raster_new( void* memory,
FT_Raster* araster )
{
static TRaster the_raster;
FT_UNUSED( memory );
*araster = (FT_Raster)&the_raster;
FT_MEM_ZERO( &the_raster, sizeof ( the_raster ) );
return 0;
}
| 297,645,738,127,884,600,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2010-2500 | Integer overflow in the gray_render_span function in smooth/ftgrays.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2500 |
16,984 | savannah | 6305b869d86ff415a33576df6d43729673c66eee | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=6305b869d86ff415a33576df6d43729673c66eee | None | 0 | gray_raster_new( FT_Memory memory,
FT_Raster* araster )
{
FT_Error error;
PRaster raster;
*araster = 0;
if ( !FT_ALLOC( raster, sizeof ( TRaster ) ) )
{
raster->memory = memory;
*araster = (FT_Raster)raster;
}
return error;
}
| 299,800,754,575,837,100,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2010-2500 | Integer overflow in the gray_render_span function in smooth/ftgrays.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2500 |
16,985 | savannah | 6305b869d86ff415a33576df6d43729673c66eee | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=6305b869d86ff415a33576df6d43729673c66eee | None | 0 | gray_raster_render( PRaster raster,
const FT_Raster_Params* params )
{
const FT_Outline* outline = (const FT_Outline*)params->source;
const FT_Bitmap* target_map = params->target;
PWorker worker;
if ( !raster || !raster->buffer || !raster->b... | 118,829,098,009,149,330,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2010-2500 | Integer overflow in the gray_render_span function in smooth/ftgrays.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2500 |
16,986 | savannah | 6305b869d86ff415a33576df6d43729673c66eee | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=6305b869d86ff415a33576df6d43729673c66eee | None | 0 | gray_raster_reset( FT_Raster raster,
char* pool_base,
long pool_size )
{
PRaster rast = (PRaster)raster;
if ( raster )
{
if ( pool_base && pool_size >= (long)sizeof ( TWorker ) + 2048 )
{
PWorker worker = (PWorker)pool_base;
... | 166,677,168,093,679,870,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2010-2500 | Integer overflow in the gray_render_span function in smooth/ftgrays.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2500 |
16,987 | savannah | 6305b869d86ff415a33576df6d43729673c66eee | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=6305b869d86ff415a33576df6d43729673c66eee | None | 0 | gray_record_cell( RAS_ARG )
{
if ( !ras.invalid && ( ras.area | ras.cover ) )
{
PCell cell = gray_find_cell( RAS_VAR );
cell->area += ras.area;
cell->cover += ras.cover;
}
}
| 20,576,697,853,990,023,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2010-2500 | Integer overflow in the gray_render_span function in smooth/ftgrays.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2500 |
16,988 | savannah | 6305b869d86ff415a33576df6d43729673c66eee | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=6305b869d86ff415a33576df6d43729673c66eee | None | 0 | gray_render_conic( RAS_ARG_ const FT_Vector* control,
const FT_Vector* to )
{
TPos dx, dy;
int top, level;
int* levels;
FT_Vector* arc;
dx = DOWNSCALE( ras.x ) + to->x - ( control->x << 1 );
if ( dx < 0 )
dx = -dx;
dy = DOWNS... | 83,266,872,402,215,820,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2010-2500 | Integer overflow in the gray_render_span function in smooth/ftgrays.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2500 |
16,989 | savannah | 6305b869d86ff415a33576df6d43729673c66eee | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=6305b869d86ff415a33576df6d43729673c66eee | None | 0 | gray_render_cubic( RAS_ARG_ const FT_Vector* control1,
const FT_Vector* control2,
const FT_Vector* to )
{
int top, level;
int* levels;
FT_Vector* arc;
int mid_x = ( DOWNSCALE( ras.x ) + to->x +
... | 66,123,956,180,331,090,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2010-2500 | Integer overflow in the gray_render_span function in smooth/ftgrays.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2500 |
16,990 | savannah | 6305b869d86ff415a33576df6d43729673c66eee | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=6305b869d86ff415a33576df6d43729673c66eee | None | 0 | gray_render_line( RAS_ARG_ TPos to_x,
TPos to_y )
{
TCoord ey1, ey2, fy1, fy2, mod;
TPos dx, dy, x, x2;
long p, first;
int delta, rem, lift, incr;
ey1 = TRUNC( ras.last_ey );
ey2 = TRUNC( to_y ); /* if (ey2 >= ras.max_ey) ey2 = ras.max_ey-1; */... | 184,348,291,460,218,300,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2010-2500 | Integer overflow in the gray_render_span function in smooth/ftgrays.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2500 |
16,991 | savannah | 6305b869d86ff415a33576df6d43729673c66eee | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=6305b869d86ff415a33576df6d43729673c66eee | None | 0 | gray_render_scanline( RAS_ARG_ TCoord ey,
TPos x1,
TCoord y1,
TPos x2,
TCoord y2 )
{
TCoord ex1, ex2, fx1, fx2, delta, mod, lift, rem;
long p, first, dx;
int ... | 172,658,267,333,934,760,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2010-2500 | Integer overflow in the gray_render_span function in smooth/ftgrays.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2500 |
16,992 | savannah | 6305b869d86ff415a33576df6d43729673c66eee | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=6305b869d86ff415a33576df6d43729673c66eee | None | 0 | gray_set_cell( RAS_ARG_ TCoord ex,
TCoord ey )
{
/* Move the cell pointer to a new position. We set the `invalid' */
/* flag to indicate that the cell isn't part of those we're interested */
/* in during the render phase. This means that: */
/... | 104,821,551,084,954,590,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2010-2500 | Integer overflow in the gray_render_span function in smooth/ftgrays.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2500 |
16,993 | savannah | 6305b869d86ff415a33576df6d43729673c66eee | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=6305b869d86ff415a33576df6d43729673c66eee | None | 0 | gray_start_cell( RAS_ARG_ TCoord ex,
TCoord ey )
{
if ( ex > ras.max_ex )
ex = (TCoord)( ras.max_ex );
if ( ex < ras.min_ex )
ex = (TCoord)( ras.min_ex - 1 );
ras.area = 0;
ras.cover = 0;
ras.ex = ex - ras.min_ex;
ras.ey = ey - ras.m... | 327,038,470,218,758,000,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2010-2500 | Integer overflow in the gray_render_span function in smooth/ftgrays.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2500 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.