idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
18,505
gnupg
da780c8183cccc8f533c8ace8211ac2cb2bdee7b
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=da780c8183cccc8f533c8ace8211ac2cb2bdee7b
None
0
point_resize (mpi_point_t p, mpi_ec_t ctx) { /* * For now, we allocate enough limbs for our EC computation of ec_*. * Once we will improve ec_* to be constant size (and constant * time), NLIMBS can be ctx->p->nlimbs. */ size_t nlimbs = 2*ctx->p->nlimbs+1; mpi_resize (p->x, nlimbs); if (ctx->model !...
255,723,976,883,487,530,000,000,000,000,000,000,000
ec.c
274,122,731,010,458,620,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2017-0379
Libgcrypt before 1.8.1 does not properly consider Curve25519 side-channel attacks, which makes it easier for attackers to discover a secret key, related to cipher/ecc.c and mpi/ec.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-0379
18,506
gnupg
da780c8183cccc8f533c8ace8211ac2cb2bdee7b
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=da780c8183cccc8f533c8ace8211ac2cb2bdee7b
None
0
point_set (mpi_point_t d, mpi_point_t s) { mpi_set (d->x, s->x); mpi_set (d->y, s->y); mpi_set (d->z, s->z); }
125,042,948,640,285,920,000,000,000,000,000,000,000
ec.c
274,122,731,010,458,620,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2017-0379
Libgcrypt before 1.8.1 does not properly consider Curve25519 side-channel attacks, which makes it easier for attackers to discover a secret key, related to cipher/ecc.c and mpi/ec.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-0379
18,507
gnupg
da780c8183cccc8f533c8ace8211ac2cb2bdee7b
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=da780c8183cccc8f533c8ace8211ac2cb2bdee7b
None
0
point_swap_cond (mpi_point_t d, mpi_point_t s, unsigned long swap, mpi_ec_t ctx) { mpi_swap_cond (d->x, s->x, swap); if (ctx->model != MPI_EC_MONTGOMERY) mpi_swap_cond (d->y, s->y, swap); mpi_swap_cond (d->z, s->z, swap); }
99,071,370,757,478,080,000,000,000,000,000,000,000
ec.c
274,122,731,010,458,620,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2017-0379
Libgcrypt before 1.8.1 does not properly consider Curve25519 side-channel attacks, which makes it easier for attackers to discover a secret key, related to cipher/ecc.c and mpi/ec.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-0379
18,508
savannah
135c3faebb96f8f550bd4f318716f2e1e095a969
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=135c3faebb96f8f550bd4f318716f2e1e095a969
None
0
cf2_builder_cubeTo( CF2_OutlineCallbacks callbacks, const CF2_CallbackParams params ) { /* downcast the object pointer */ CF2_Outline outline = (CF2_Outline)callbacks; CFF_Builder* builder; FT_ASSERT( outline && outline->decoder ); FT_ASSERT( params->op == CF2_Pa...
170,594,496,400,059,130,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2014-2241
The (1) cf2_initLocalRegionBuffer and (2) cf2_initGlobalRegionBuffer functions in cff/cf2ft.c in FreeType before 2.5.3 do not properly check if a subroutine exists, which allows remote attackers to cause a denial of service (assertion failure), as demonstrated by a crafted ttf file.
https://nvd.nist.gov/vuln/detail/CVE-2014-2241
18,509
savannah
135c3faebb96f8f550bd4f318716f2e1e095a969
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=135c3faebb96f8f550bd4f318716f2e1e095a969
None
0
cf2_builder_lineTo( CF2_OutlineCallbacks callbacks, const CF2_CallbackParams params ) { /* downcast the object pointer */ CF2_Outline outline = (CF2_Outline)callbacks; CFF_Builder* builder; FT_ASSERT( outline && outline->decoder ); FT_ASSERT( params->op == CF2_Pa...
327,058,808,216,153,440,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2014-2241
The (1) cf2_initLocalRegionBuffer and (2) cf2_initGlobalRegionBuffer functions in cff/cf2ft.c in FreeType before 2.5.3 do not properly check if a subroutine exists, which allows remote attackers to cause a denial of service (assertion failure), as demonstrated by a crafted ttf file.
https://nvd.nist.gov/vuln/detail/CVE-2014-2241
18,510
savannah
135c3faebb96f8f550bd4f318716f2e1e095a969
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=135c3faebb96f8f550bd4f318716f2e1e095a969
None
0
cf2_builder_moveTo( CF2_OutlineCallbacks callbacks, const CF2_CallbackParams params ) { /* downcast the object pointer */ CF2_Outline outline = (CF2_Outline)callbacks; CFF_Builder* builder; (void)params; /* only used in debug mode */ FT_ASSERT( outline &&...
259,298,068,547,917,260,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2014-2241
The (1) cf2_initLocalRegionBuffer and (2) cf2_initGlobalRegionBuffer functions in cff/cf2ft.c in FreeType before 2.5.3 do not properly check if a subroutine exists, which allows remote attackers to cause a denial of service (assertion failure), as demonstrated by a crafted ttf file.
https://nvd.nist.gov/vuln/detail/CVE-2014-2241
18,511
savannah
135c3faebb96f8f550bd4f318716f2e1e095a969
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=135c3faebb96f8f550bd4f318716f2e1e095a969
None
0
cf2_decoder_parse_charstrings( CFF_Decoder* decoder, FT_Byte* charstring_base, FT_ULong charstring_len ) { FT_Memory memory; FT_Error error = FT_Err_Ok; CF2_Font font; FT_ASSERT( decoder && decoder->cff ); memor...
50,150,606,441,736,590,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2014-2241
The (1) cf2_initLocalRegionBuffer and (2) cf2_initGlobalRegionBuffer functions in cff/cf2ft.c in FreeType before 2.5.3 do not properly check if a subroutine exists, which allows remote attackers to cause a denial of service (assertion failure), as demonstrated by a crafted ttf file.
https://nvd.nist.gov/vuln/detail/CVE-2014-2241
18,512
savannah
135c3faebb96f8f550bd4f318716f2e1e095a969
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=135c3faebb96f8f550bd4f318716f2e1e095a969
None
0
cf2_freeSeacComponent( CFF_Decoder* decoder, CF2_Buffer buf ) { FT_ASSERT( decoder ); cff_free_glyph_data( decoder->builder.face, (FT_Byte**)&buf->start, (FT_ULong)( buf->end - buf->start ) ); }
336,235,373,603,351,300,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2014-2241
The (1) cf2_initLocalRegionBuffer and (2) cf2_initGlobalRegionBuffer functions in cff/cf2ft.c in FreeType before 2.5.3 do not properly check if a subroutine exists, which allows remote attackers to cause a denial of service (assertion failure), as demonstrated by a crafted ttf file.
https://nvd.nist.gov/vuln/detail/CVE-2014-2241
18,513
savannah
135c3faebb96f8f550bd4f318716f2e1e095a969
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=135c3faebb96f8f550bd4f318716f2e1e095a969
None
0
cf2_free_instance( void* ptr ) { CF2_Font font = (CF2_Font)ptr; if ( font ) { FT_Memory memory = font->memory; (void)memory; } }
101,875,742,468,422,230,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2014-2241
The (1) cf2_initLocalRegionBuffer and (2) cf2_initGlobalRegionBuffer functions in cff/cf2ft.c in FreeType before 2.5.3 do not properly check if a subroutine exists, which allows remote attackers to cause a denial of service (assertion failure), as demonstrated by a crafted ttf file.
https://nvd.nist.gov/vuln/detail/CVE-2014-2241
18,514
savannah
135c3faebb96f8f550bd4f318716f2e1e095a969
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=135c3faebb96f8f550bd4f318716f2e1e095a969
None
0
cf2_getBlueValues( CFF_Decoder* decoder, size_t* count, FT_Pos* *data ) { FT_ASSERT( decoder && decoder->current_subfont ); *count = decoder->current_subfont->private_dict.num_blue_values; *data = (FT_Pos*) &decoder->current_subfont-...
316,504,280,093,502,840,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2014-2241
The (1) cf2_initLocalRegionBuffer and (2) cf2_initGlobalRegionBuffer functions in cff/cf2ft.c in FreeType before 2.5.3 do not properly check if a subroutine exists, which allows remote attackers to cause a denial of service (assertion failure), as demonstrated by a crafted ttf file.
https://nvd.nist.gov/vuln/detail/CVE-2014-2241
18,515
savannah
135c3faebb96f8f550bd4f318716f2e1e095a969
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=135c3faebb96f8f550bd4f318716f2e1e095a969
None
0
cf2_getFamilyOtherBlues( CFF_Decoder* decoder, size_t* count, FT_Pos* *data ) { FT_ASSERT( decoder && decoder->current_subfont ); *count = decoder->current_subfont->private_dict.num_family_other_blues; *data = (FT_Pos*) &...
268,177,008,778,945,760,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2014-2241
The (1) cf2_initLocalRegionBuffer and (2) cf2_initGlobalRegionBuffer functions in cff/cf2ft.c in FreeType before 2.5.3 do not properly check if a subroutine exists, which allows remote attackers to cause a denial of service (assertion failure), as demonstrated by a crafted ttf file.
https://nvd.nist.gov/vuln/detail/CVE-2014-2241
18,516
savannah
135c3faebb96f8f550bd4f318716f2e1e095a969
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=135c3faebb96f8f550bd4f318716f2e1e095a969
None
0
cf2_getLanguageGroup( CFF_Decoder* decoder ) { FT_ASSERT( decoder && decoder->current_subfont ); return decoder->current_subfont->private_dict.language_group; }
153,489,604,829,395,700,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2014-2241
The (1) cf2_initLocalRegionBuffer and (2) cf2_initGlobalRegionBuffer functions in cff/cf2ft.c in FreeType before 2.5.3 do not properly check if a subroutine exists, which allows remote attackers to cause a denial of service (assertion failure), as demonstrated by a crafted ttf file.
https://nvd.nist.gov/vuln/detail/CVE-2014-2241
18,517
savannah
135c3faebb96f8f550bd4f318716f2e1e095a969
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=135c3faebb96f8f550bd4f318716f2e1e095a969
None
0
cf2_getOtherBlues( CFF_Decoder* decoder, size_t* count, FT_Pos* *data ) { FT_ASSERT( decoder && decoder->current_subfont ); *count = decoder->current_subfont->private_dict.num_other_blues; *data = (FT_Pos*) &decoder->current_subfont-...
64,191,922,766,115,410,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2014-2241
The (1) cf2_initLocalRegionBuffer and (2) cf2_initGlobalRegionBuffer functions in cff/cf2ft.c in FreeType before 2.5.3 do not properly check if a subroutine exists, which allows remote attackers to cause a denial of service (assertion failure), as demonstrated by a crafted ttf file.
https://nvd.nist.gov/vuln/detail/CVE-2014-2241
18,518
savannah
135c3faebb96f8f550bd4f318716f2e1e095a969
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=135c3faebb96f8f550bd4f318716f2e1e095a969
None
0
cf2_getPpemY( CFF_Decoder* decoder ) { FT_ASSERT( decoder && decoder->builder.face && decoder->builder.face->root.size ); /* * Note that `y_ppem' can be zero if there wasn't a call to * `FT_Set_Char_Size' or something similar. Ho...
71,364,301,184,790,620,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2014-2241
The (1) cf2_initLocalRegionBuffer and (2) cf2_initGlobalRegionBuffer functions in cff/cf2ft.c in FreeType before 2.5.3 do not properly check if a subroutine exists, which allows remote attackers to cause a denial of service (assertion failure), as demonstrated by a crafted ttf file.
https://nvd.nist.gov/vuln/detail/CVE-2014-2241
18,519
savannah
135c3faebb96f8f550bd4f318716f2e1e095a969
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=135c3faebb96f8f550bd4f318716f2e1e095a969
None
0
cf2_getScaleAndHintFlag( CFF_Decoder* decoder, CF2_Fixed* x_scale, CF2_Fixed* y_scale, FT_Bool* hinted, FT_Bool* scaled ) { FT_ASSERT( decoder && decoder->builder.glyph ); /* note: F...
321,245,757,606,713,200,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2014-2241
The (1) cf2_initLocalRegionBuffer and (2) cf2_initGlobalRegionBuffer functions in cff/cf2ft.c in FreeType before 2.5.3 do not properly check if a subroutine exists, which allows remote attackers to cause a denial of service (assertion failure), as demonstrated by a crafted ttf file.
https://nvd.nist.gov/vuln/detail/CVE-2014-2241
18,520
savannah
135c3faebb96f8f550bd4f318716f2e1e095a969
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=135c3faebb96f8f550bd4f318716f2e1e095a969
None
0
cf2_getStdHW( CFF_Decoder* decoder ) { FT_ASSERT( decoder && decoder->current_subfont ); return cf2_intToFixed( decoder->current_subfont->private_dict.standard_width ); }
77,432,167,680,879,560,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2014-2241
The (1) cf2_initLocalRegionBuffer and (2) cf2_initGlobalRegionBuffer functions in cff/cf2ft.c in FreeType before 2.5.3 do not properly check if a subroutine exists, which allows remote attackers to cause a denial of service (assertion failure), as demonstrated by a crafted ttf file.
https://nvd.nist.gov/vuln/detail/CVE-2014-2241
18,521
savannah
135c3faebb96f8f550bd4f318716f2e1e095a969
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=135c3faebb96f8f550bd4f318716f2e1e095a969
None
0
cf2_getStdVW( CFF_Decoder* decoder ) { FT_ASSERT( decoder && decoder->current_subfont ); return cf2_intToFixed( decoder->current_subfont->private_dict.standard_height ); }
16,416,796,569,751,260,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2014-2241
The (1) cf2_initLocalRegionBuffer and (2) cf2_initGlobalRegionBuffer functions in cff/cf2ft.c in FreeType before 2.5.3 do not properly check if a subroutine exists, which allows remote attackers to cause a denial of service (assertion failure), as demonstrated by a crafted ttf file.
https://nvd.nist.gov/vuln/detail/CVE-2014-2241
18,522
savannah
135c3faebb96f8f550bd4f318716f2e1e095a969
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=135c3faebb96f8f550bd4f318716f2e1e095a969
None
0
cf2_getSubfont( CFF_Decoder* decoder ) { FT_ASSERT( decoder && decoder->current_subfont ); return decoder->current_subfont; }
80,525,625,082,750,080,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2014-2241
The (1) cf2_initLocalRegionBuffer and (2) cf2_initGlobalRegionBuffer functions in cff/cf2ft.c in FreeType before 2.5.3 do not properly check if a subroutine exists, which allows remote attackers to cause a denial of service (assertion failure), as demonstrated by a crafted ttf file.
https://nvd.nist.gov/vuln/detail/CVE-2014-2241
18,523
savannah
135c3faebb96f8f550bd4f318716f2e1e095a969
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=135c3faebb96f8f550bd4f318716f2e1e095a969
None
0
cf2_getUnitsPerEm( CFF_Decoder* decoder ) { FT_ASSERT( decoder && decoder->builder.face ); FT_ASSERT( decoder->builder.face->root.units_per_EM ); return decoder->builder.face->root.units_per_EM; }
247,851,427,529,743,980,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2014-2241
The (1) cf2_initLocalRegionBuffer and (2) cf2_initGlobalRegionBuffer functions in cff/cf2ft.c in FreeType before 2.5.3 do not properly check if a subroutine exists, which allows remote attackers to cause a denial of service (assertion failure), as demonstrated by a crafted ttf file.
https://nvd.nist.gov/vuln/detail/CVE-2014-2241
18,524
savannah
135c3faebb96f8f550bd4f318716f2e1e095a969
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=135c3faebb96f8f550bd4f318716f2e1e095a969
None
0
cf2_outline_init( CF2_Outline outline, FT_Memory memory, FT_Error* error ) { FT_MEM_ZERO( outline, sizeof ( CF2_OutlineRec ) ); outline->root.memory = memory; outline->root.error = error; outline->root.moveTo = cf2_builder_moveTo; outline->root.l...
54,419,828,785,090,030,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2014-2241
The (1) cf2_initLocalRegionBuffer and (2) cf2_initGlobalRegionBuffer functions in cff/cf2ft.c in FreeType before 2.5.3 do not properly check if a subroutine exists, which allows remote attackers to cause a denial of service (assertion failure), as demonstrated by a crafted ttf file.
https://nvd.nist.gov/vuln/detail/CVE-2014-2241
18,525
savannah
135c3faebb96f8f550bd4f318716f2e1e095a969
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=135c3faebb96f8f550bd4f318716f2e1e095a969
None
0
cf2_setGlyphWidth( CF2_Outline outline, CF2_Fixed width ) { CFF_Decoder* decoder = outline->decoder; FT_ASSERT( decoder ); decoder->glyph_width = cf2_fixedToInt( width ); }
89,696,163,652,982,660,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2014-2241
The (1) cf2_initLocalRegionBuffer and (2) cf2_initGlobalRegionBuffer functions in cff/cf2ft.c in FreeType before 2.5.3 do not properly check if a subroutine exists, which allows remote attackers to cause a denial of service (assertion failure), as demonstrated by a crafted ttf file.
https://nvd.nist.gov/vuln/detail/CVE-2014-2241
18,548
ghostscript
60dabde18d7fe12b19da8b509bdfee9cc886aafc
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc
None
0
static int count_commas(char *s) { int n = 0; while (*s) { if (*s == ',') n ++; s ++; } return n; }
280,517,366,720,366,300,000,000,000,000,000,000,000
xps-common.c
165,036,389,961,832,330,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2014-2013
Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element.
https://nvd.nist.gov/vuln/detail/CVE-2014-2013
18,549
ghostscript
60dabde18d7fe12b19da8b509bdfee9cc886aafc
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc
None
0
static inline int unhex(int a) { if (a >= 'A' && a <= 'F') return a - 'A' + 0xA; if (a >= 'a' && a <= 'f') return a - 'a' + 0xA; if (a >= '0' && a <= '9') return a - '0'; return 0; }
277,827,583,708,907,400,000,000,000,000,000,000,000
xps-common.c
165,036,389,961,832,330,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2014-2013
Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element.
https://nvd.nist.gov/vuln/detail/CVE-2014-2013
18,550
ghostscript
60dabde18d7fe12b19da8b509bdfee9cc886aafc
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc
None
0
xps_end_opacity(xps_document *doc, char *base_uri, xps_resource *dict, char *opacity_att, fz_xml *opacity_mask_tag) { if (!opacity_att && !opacity_mask_tag) return; if (doc->opacity_top > 0) doc->opacity_top--; if (opacity_mask_tag) { if (strcmp(fz_xml_tag(opacity_mask_tag), "SolidColorBrush")) fz_pop_c...
217,608,070,287,607,460,000,000,000,000,000,000,000
xps-common.c
165,036,389,961,832,330,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2014-2013
Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element.
https://nvd.nist.gov/vuln/detail/CVE-2014-2013
18,551
ghostscript
60dabde18d7fe12b19da8b509bdfee9cc886aafc
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc
None
0
xps_lookup_alternate_content(fz_xml *node) { for (node = fz_xml_down(node); node; node = fz_xml_next(node)) { if (!strcmp(fz_xml_tag(node), "mc:Choice") && fz_xml_att(node, "Requires")) { char list[64]; char *next = list, *item; fz_strlcpy(list, fz_xml_att(node, "Requires"), sizeof(list)); while ((ite...
315,109,031,334,668,300,000,000,000,000,000,000,000
xps-common.c
165,036,389,961,832,330,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2014-2013
Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element.
https://nvd.nist.gov/vuln/detail/CVE-2014-2013
18,552
ghostscript
60dabde18d7fe12b19da8b509bdfee9cc886aafc
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc
None
0
xps_parse_element(xps_document *doc, const fz_matrix *ctm, const fz_rect *area, char *base_uri, xps_resource *dict, fz_xml *node) { if (doc->cookie && doc->cookie->abort) return; if (!strcmp(fz_xml_tag(node), "Path")) xps_parse_path(doc, ctm, base_uri, dict, node); if (!strcmp(fz_xml_tag(node), "Glyphs")) xps_...
317,311,068,043,768,540,000,000,000,000,000,000,000
xps-common.c
165,036,389,961,832,330,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2014-2013
Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element.
https://nvd.nist.gov/vuln/detail/CVE-2014-2013
18,553
ghostscript
60dabde18d7fe12b19da8b509bdfee9cc886aafc
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc
None
0
xps_parse_rectangle(xps_document *doc, char *text, fz_rect *rect) { float args[4]; char *s = text; int i; args[0] = 0; args[1] = 0; args[2] = 1; args[3] = 1; for (i = 0; i < 4 && *s; i++) { args[i] = fz_atof(s); while (*s && *s != ',') s++; if (*s == ',') s++; } rect->x0 = args[0]; rect->y0 = a...
141,577,369,087,591,170,000,000,000,000,000,000,000
xps-common.c
165,036,389,961,832,330,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2014-2013
Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element.
https://nvd.nist.gov/vuln/detail/CVE-2014-2013
18,554
ghostscript
60dabde18d7fe12b19da8b509bdfee9cc886aafc
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc
None
0
static inline int is_real_num_char(int c) { return (c >= '0' && c <= '9') || c == 'e' || c == 'E' || c == '+' || c == '-' || c == '.'; }
168,254,286,943,574,790,000,000,000,000,000,000,000
xps-glyphs.c
328,500,031,164,501,400,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2014-2013
Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element.
https://nvd.nist.gov/vuln/detail/CVE-2014-2013
18,555
ghostscript
60dabde18d7fe12b19da8b509bdfee9cc886aafc
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc
None
0
xps_count_font_encodings(fz_font *font) { FT_Face face = font->ft_face; return face->num_charmaps; }
106,287,244,624,409,250,000,000,000,000,000,000,000
xps-glyphs.c
328,500,031,164,501,400,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2014-2013
Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element.
https://nvd.nist.gov/vuln/detail/CVE-2014-2013
18,556
ghostscript
60dabde18d7fe12b19da8b509bdfee9cc886aafc
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc
None
0
xps_deobfuscate_font_resource(xps_document *doc, xps_part *part) { unsigned char buf[33]; unsigned char key[16]; char *p; int i; p = strrchr(part->name, '/'); if (!p) p = part->name; for (i = 0; i < 32 && *p; p++) { if (ishex(*p)) buf[i++] = *p; } buf[i] = 0; if (i != 32) { fz_warn(doc->ctx, "ca...
91,682,742,567,849,120,000,000,000,000,000,000,000
xps-glyphs.c
328,500,031,164,501,400,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2014-2013
Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element.
https://nvd.nist.gov/vuln/detail/CVE-2014-2013
18,557
ghostscript
60dabde18d7fe12b19da8b509bdfee9cc886aafc
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc
None
0
xps_encode_font_char(fz_font *font, int code) { FT_Face face = font->ft_face; int gid = FT_Get_Char_Index(face, code); if (gid == 0 && face->charmap && face->charmap->platform_id == 3 && face->charmap->encoding_id == 0) gid = FT_Get_Char_Index(face, 0xF000 | code); return gid; }
337,717,917,581,417,960,000,000,000,000,000,000,000
xps-glyphs.c
328,500,031,164,501,400,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2014-2013
Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element.
https://nvd.nist.gov/vuln/detail/CVE-2014-2013
18,558
ghostscript
60dabde18d7fe12b19da8b509bdfee9cc886aafc
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc
None
0
xps_identify_font_encoding(fz_font *font, int idx, int *pid, int *eid) { FT_Face face = font->ft_face; *pid = face->charmaps[idx]->platform_id; *eid = face->charmaps[idx]->encoding_id; }
161,823,016,779,816,340,000,000,000,000,000,000,000
xps-glyphs.c
328,500,031,164,501,400,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2014-2013
Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element.
https://nvd.nist.gov/vuln/detail/CVE-2014-2013
18,559
ghostscript
60dabde18d7fe12b19da8b509bdfee9cc886aafc
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc
None
0
xps_lookup_font(xps_document *doc, char *name) { xps_font_cache *cache; for (cache = doc->font_table; cache; cache = cache->next) if (!xps_strcasecmp(cache->name, name)) return fz_keep_font(doc->ctx, cache->font); return NULL; }
270,358,357,774,228,870,000,000,000,000,000,000,000
xps-glyphs.c
328,500,031,164,501,400,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2014-2013
Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element.
https://nvd.nist.gov/vuln/detail/CVE-2014-2013
18,560
ghostscript
60dabde18d7fe12b19da8b509bdfee9cc886aafc
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc
None
0
xps_measure_font_glyph(xps_document *doc, fz_font *font, int gid, xps_glyph_metrics *mtx) { int mask = FT_LOAD_NO_SCALE | FT_LOAD_IGNORE_TRANSFORM; FT_Face face = font->ft_face; FT_Fixed hadv, vadv; fz_context *ctx = doc->ctx; fz_lock(ctx, FZ_LOCK_FREETYPE); FT_Get_Advance(face, gid, mask, &hadv); FT_Get_Advanc...
184,665,142,084,455,750,000,000,000,000,000,000,000
xps-glyphs.c
328,500,031,164,501,400,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2014-2013
Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element.
https://nvd.nist.gov/vuln/detail/CVE-2014-2013
18,561
ghostscript
60dabde18d7fe12b19da8b509bdfee9cc886aafc
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc
None
0
xps_parse_cluster_mapping(char *s, int *code_count, int *glyph_count) { if (*s == '(') s = xps_parse_digits(s + 1, code_count); if (*s == ':') s = xps_parse_digits(s + 1, glyph_count); if (*s == ')') s ++; return s; }
251,723,560,347,249,620,000,000,000,000,000,000,000
xps-glyphs.c
328,500,031,164,501,400,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2014-2013
Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element.
https://nvd.nist.gov/vuln/detail/CVE-2014-2013
18,562
ghostscript
60dabde18d7fe12b19da8b509bdfee9cc886aafc
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc
None
0
xps_parse_glyph_index(char *s, int *glyph_index) { if (*s >= '0' && *s <= '9') s = xps_parse_digits(s, glyph_index); return s; }
156,486,371,588,479,870,000,000,000,000,000,000,000
xps-glyphs.c
328,500,031,164,501,400,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2014-2013
Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element.
https://nvd.nist.gov/vuln/detail/CVE-2014-2013
18,563
ghostscript
60dabde18d7fe12b19da8b509bdfee9cc886aafc
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc
None
0
xps_parse_glyph_metrics(char *s, float *advance, float *uofs, float *vofs) { if (*s == ',') s = xps_parse_real_num(s + 1, advance); if (*s == ',') s = xps_parse_real_num(s + 1, uofs); if (*s == ',') s = xps_parse_real_num(s + 1, vofs); return s; }
310,673,138,375,177,700,000,000,000,000,000,000,000
xps-glyphs.c
328,500,031,164,501,400,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2014-2013
Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element.
https://nvd.nist.gov/vuln/detail/CVE-2014-2013
18,564
ghostscript
60dabde18d7fe12b19da8b509bdfee9cc886aafc
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc
None
0
xps_parse_glyphs_imp(xps_document *doc, const fz_matrix *ctm, fz_font *font, float size, float originx, float originy, int is_sideways, int bidi_level, char *indices, char *unicode) { xps_glyph_metrics mtx; fz_text *text; fz_matrix tm; float e, f; float x = originx; float y = originy; char *us = unicode; cha...
51,418,238,765,375,130,000,000,000,000,000,000,000
xps-glyphs.c
328,500,031,164,501,400,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2014-2013
Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element.
https://nvd.nist.gov/vuln/detail/CVE-2014-2013
18,565
ghostscript
60dabde18d7fe12b19da8b509bdfee9cc886aafc
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc
None
0
xps_parse_real_num(char *s, float *number) { char buf[64]; char *p = buf; while (is_real_num_char(*s)) *p++ = *s++; *p = 0; if (buf[0]) *number = fz_atof(buf); return s; }
106,303,086,848,030,680,000,000,000,000,000,000,000
xps-glyphs.c
328,500,031,164,501,400,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2014-2013
Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element.
https://nvd.nist.gov/vuln/detail/CVE-2014-2013
18,566
ghostscript
60dabde18d7fe12b19da8b509bdfee9cc886aafc
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc
None
0
xps_select_best_font_encoding(xps_document *doc, fz_font *font) { static struct { int pid, eid; } xps_cmap_list[] = { { 3, 10 }, /* Unicode with surrogates */ { 3, 1 }, /* Unicode without surrogates */ { 3, 5 }, /* Wansung */ { 3, 4 }, /* Big5 */ { 3, 3 }, /* Prc */ { 3, 2 }, /* ShiftJis */ { 3, 0...
108,451,170,086,821,700,000,000,000,000,000,000,000
xps-glyphs.c
328,500,031,164,501,400,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2014-2013
Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element.
https://nvd.nist.gov/vuln/detail/CVE-2014-2013
18,567
ghostscript
60dabde18d7fe12b19da8b509bdfee9cc886aafc
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc
None
0
xps_select_font_encoding(fz_font *font, int idx) { FT_Face face = font->ft_face; FT_Set_Charmap(face, face->charmaps[idx]); }
290,511,010,068,679,530,000,000,000,000,000,000,000
xps-glyphs.c
328,500,031,164,501,400,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2014-2013
Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element.
https://nvd.nist.gov/vuln/detail/CVE-2014-2013
18,568
ghostscript
60dabde18d7fe12b19da8b509bdfee9cc886aafc
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc
None
0
static int cmp_stop(const void *a, const void *b) { const struct stop *astop = a; const struct stop *bstop = b; float diff = astop->offset - bstop->offset; if (diff < 0) return -1; if (diff > 0) return 1; return astop->index - bstop->index; }
206,718,902,025,750,670,000,000,000,000,000,000,000
xps-gradient.c
34,862,251,547,178,460,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2014-2013
Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element.
https://nvd.nist.gov/vuln/detail/CVE-2014-2013
18,569
ghostscript
60dabde18d7fe12b19da8b509bdfee9cc886aafc
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc
None
0
static inline float lerp(float a, float b, float x) { return a + (b - a) * x; }
204,955,890,985,139,830,000,000,000,000,000,000,000
xps-gradient.c
34,862,251,547,178,460,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2014-2013
Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element.
https://nvd.nist.gov/vuln/detail/CVE-2014-2013
18,570
ghostscript
60dabde18d7fe12b19da8b509bdfee9cc886aafc
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc
None
0
static inline float point_inside_circle(float px, float py, float x, float y, float r) { float dx = px - x; float dy = py - y; return dx * dx + dy * dy <= r * r; }
161,850,213,541,515,520,000,000,000,000,000,000,000
xps-gradient.c
34,862,251,547,178,460,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2014-2013
Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element.
https://nvd.nist.gov/vuln/detail/CVE-2014-2013
18,571
ghostscript
60dabde18d7fe12b19da8b509bdfee9cc886aafc
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc
None
0
xps_draw_linear_gradient(xps_document *doc, const fz_matrix *ctm, const fz_rect *area, struct stop *stops, int count, fz_xml *root, int spread) { float x0, y0, x1, y1; int i, mi, ma; float dx, dy, x, y, k; fz_point p1, p2; fz_matrix inv; fz_rect local_area = *area; char *start_point_att = fz_xml_att(root, "St...
63,987,928,841,885,760,000,000,000,000,000,000,000
xps-gradient.c
34,862,251,547,178,460,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2014-2013
Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element.
https://nvd.nist.gov/vuln/detail/CVE-2014-2013
18,572
ghostscript
60dabde18d7fe12b19da8b509bdfee9cc886aafc
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc
None
0
xps_draw_one_linear_gradient(xps_document *doc, const fz_matrix *ctm, struct stop *stops, int count, int extend, float x0, float y0, float x1, float y1) { fz_shade *shade; /* TODO: this (and the stuff in pdf_shade) should move to res_shade.c */ shade = fz_malloc_struct(doc->ctx, fz_shade); FZ_INIT_STORABLE(shad...
322,666,159,842,862,930,000,000,000,000,000,000,000
xps-gradient.c
34,862,251,547,178,460,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2014-2013
Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element.
https://nvd.nist.gov/vuln/detail/CVE-2014-2013
18,573
ghostscript
60dabde18d7fe12b19da8b509bdfee9cc886aafc
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc
None
0
xps_draw_radial_gradient(xps_document *doc, const fz_matrix *ctm, const fz_rect *area, struct stop *stops, int count, fz_xml *root, int spread) { float x0, y0, r0; float x1, y1, r1; float xrad = 1; float yrad = 1; float invscale; int i, ma = 1; fz_matrix local_ctm = *ctm; fz_matrix inv; fz_rect local_area = ...
199,082,708,069,447,750,000,000,000,000,000,000,000
xps-gradient.c
34,862,251,547,178,460,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2014-2013
Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element.
https://nvd.nist.gov/vuln/detail/CVE-2014-2013
18,574
ghostscript
60dabde18d7fe12b19da8b509bdfee9cc886aafc
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc
None
0
xps_parse_gradient_brush(xps_document *doc, const fz_matrix *ctm, const fz_rect *area, char *base_uri, xps_resource *dict, fz_xml *root, void (*draw)(xps_document *, const fz_matrix*, const fz_rect *, struct stop *, int, fz_xml *, int)) { fz_xml *node; char *opacity_att; char *spread_att; char *transform_att; ...
68,728,437,367,345,630,000,000,000,000,000,000,000
xps-gradient.c
34,862,251,547,178,460,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2014-2013
Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element.
https://nvd.nist.gov/vuln/detail/CVE-2014-2013
18,575
ghostscript
60dabde18d7fe12b19da8b509bdfee9cc886aafc
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc
None
0
xps_parse_linear_gradient_brush(xps_document *doc, const fz_matrix *ctm, const fz_rect *area, char *base_uri, xps_resource *dict, fz_xml *root) { xps_parse_gradient_brush(doc, ctm, area, base_uri, dict, root, xps_draw_linear_gradient); }
241,645,555,057,040,070,000,000,000,000,000,000,000
xps-gradient.c
34,862,251,547,178,460,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2014-2013
Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element.
https://nvd.nist.gov/vuln/detail/CVE-2014-2013
18,576
ghostscript
60dabde18d7fe12b19da8b509bdfee9cc886aafc
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc
None
0
xps_sample_gradient_stops(fz_shade *shade, struct stop *stops, int count) { float offset, d; int i, k; k = 0; for (i = 0; i < 256; i++) { offset = i / 255.0f; while (k + 1 < count && offset > stops[k+1].offset) k++; d = (offset - stops[k].offset) / (stops[k+1].offset - stops[k].offset); shade->functi...
234,229,669,747,807,840,000,000,000,000,000,000,000
xps-gradient.c
34,862,251,547,178,460,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2014-2013
Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element.
https://nvd.nist.gov/vuln/detail/CVE-2014-2013
18,577
ghostscript
60dabde18d7fe12b19da8b509bdfee9cc886aafc
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc
None
0
angle_between(const fz_point u, const fz_point v) { float det = u.x * v.y - u.y * v.x; float sign = (det < 0 ? -1 : 1); float magu = u.x * u.x + u.y * u.y; float magv = v.x * v.x + v.y * v.y; float udotv = u.x * v.x + u.y * v.y; float t = udotv / (magu * magv); /* guard against rounding errors when near |1| (whe...
25,318,481,172,155,780,000,000,000,000,000,000,000
xps-path.c
233,204,495,568,169,470,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2014-2013
Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element.
https://nvd.nist.gov/vuln/detail/CVE-2014-2013
18,578
ghostscript
60dabde18d7fe12b19da8b509bdfee9cc886aafc
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc
None
0
xps_draw_arc_segment(fz_context *doc, fz_path *path, const fz_matrix *mtx, float th0, float th1, int iscw) { float t, d; fz_point p; while (th1 < th0) th1 += (float)M_PI * 2; d = (float)M_PI / 180; /* 1-degree precision */ if (iscw) { for (t = th0 + d; t < th1 - d/2; t += d) { p.x = cosf(t); p.y = ...
151,403,701,732,359,010,000,000,000,000,000,000,000
xps-path.c
233,204,495,568,169,470,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2014-2013
Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element.
https://nvd.nist.gov/vuln/detail/CVE-2014-2013
18,579
ghostscript
60dabde18d7fe12b19da8b509bdfee9cc886aafc
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc
None
0
xps_parse_abbreviated_geometry(xps_document *doc, char *geom, int *fill_rule) { fz_path *path; char **args; char **pargs; char *s = geom; fz_point pt; int i, n; int cmd, old; float x1, y1, x2, y2, x3, y3; float smooth_x, smooth_y; /* saved cubic bezier control point for smooth curves */ int reset_smooth; pa...
249,664,541,270,401,280,000,000,000,000,000,000,000
xps-path.c
233,204,495,568,169,470,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2014-2013
Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element.
https://nvd.nist.gov/vuln/detail/CVE-2014-2013
18,580
ghostscript
60dabde18d7fe12b19da8b509bdfee9cc886aafc
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc
None
0
xps_parse_arc_segment(fz_context *doc, fz_path *path, fz_xml *root, int stroking, int *skipped_stroke) { /* ArcSegment pretty much follows the SVG algorithm for converting an * arc in endpoint representation to an arc in centerpoint * representation. Once in centerpoint it can be given to the * graphics library ...
13,218,552,231,944,604,000,000,000,000,000,000,000
xps-path.c
233,204,495,568,169,470,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2014-2013
Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element.
https://nvd.nist.gov/vuln/detail/CVE-2014-2013
18,581
ghostscript
60dabde18d7fe12b19da8b509bdfee9cc886aafc
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc
None
0
xps_parse_float_array(char *s, int num, float *x) { int k = 0; if (s == NULL || *s == 0) return NULL; while (*s) { while (*s == 0x0d || *s == '\t' || *s == ' ' || *s == 0x0a) s++; x[k] = (float)strtod(s, &s); while (*s == 0x0d || *s == '\t' || *s == ' ' || *s == 0x0a) s++; if (*s == ',') s++; ...
40,600,864,067,068,080,000,000,000,000,000,000,000
xps-path.c
233,204,495,568,169,470,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2014-2013
Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element.
https://nvd.nist.gov/vuln/detail/CVE-2014-2013
18,582
ghostscript
60dabde18d7fe12b19da8b509bdfee9cc886aafc
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc
None
0
xps_parse_path_figure(fz_context *doc, fz_path *path, fz_xml *root, int stroking) { fz_xml *node; char *is_closed_att; char *start_point_att; char *is_filled_att; int is_closed = 0; int is_filled = 1; float start_x = 0; float start_y = 0; int skipped_stroke = 0; is_closed_att = fz_xml_att(root, "IsClosed"...
269,184,794,589,625,680,000,000,000,000,000,000,000
xps-path.c
233,204,495,568,169,470,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2014-2013
Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element.
https://nvd.nist.gov/vuln/detail/CVE-2014-2013
18,583
ghostscript
60dabde18d7fe12b19da8b509bdfee9cc886aafc
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc
None
0
xps_parse_path_geometry(xps_document *doc, xps_resource *dict, fz_xml *root, int stroking, int *fill_rule) { fz_xml *node; char *figures_att; char *fill_rule_att; char *transform_att; fz_xml *transform_tag = NULL; fz_xml *figures_tag = NULL; /* only used by resource */ fz_matrix transform; fz_path *path; f...
252,336,628,301,409,040,000,000,000,000,000,000,000
xps-path.c
233,204,495,568,169,470,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2014-2013
Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element.
https://nvd.nist.gov/vuln/detail/CVE-2014-2013
18,584
ghostscript
60dabde18d7fe12b19da8b509bdfee9cc886aafc
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc
None
0
xps_parse_point(char *s_in, float *x, float *y) { char *s_out = s_in; float xy[2]; s_out = xps_parse_float_array(s_out, 2, &xy[0]); *x = xy[0]; *y = xy[1]; return s_out; }
267,376,209,587,018,500,000,000,000,000,000,000,000
xps-path.c
233,204,495,568,169,470,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2014-2013
Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element.
https://nvd.nist.gov/vuln/detail/CVE-2014-2013
18,585
ghostscript
60dabde18d7fe12b19da8b509bdfee9cc886aafc
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc
None
0
xps_parse_poly_bezier_segment(fz_context *doc, fz_path *path, fz_xml *root, int stroking, int *skipped_stroke) { char *points_att = fz_xml_att(root, "Points"); char *is_stroked_att = fz_xml_att(root, "IsStroked"); float x[3], y[3]; int is_stroked; char *s; int n; if (!points_att) { fz_warn(doc, "PolyBezierSe...
97,810,264,793,624,600,000,000,000,000,000,000,000
xps-path.c
233,204,495,568,169,470,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2014-2013
Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element.
https://nvd.nist.gov/vuln/detail/CVE-2014-2013
18,586
ghostscript
60dabde18d7fe12b19da8b509bdfee9cc886aafc
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc
None
0
xps_parse_poly_line_segment(fz_context *doc, fz_path *path, fz_xml *root, int stroking, int *skipped_stroke) { char *points_att = fz_xml_att(root, "Points"); char *is_stroked_att = fz_xml_att(root, "IsStroked"); int is_stroked; float x, y; char *s; if (!points_att) { fz_warn(doc, "PolyLineSegment element has ...
38,105,694,775,042,493,000,000,000,000,000,000,000
xps-path.c
233,204,495,568,169,470,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2014-2013
Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element.
https://nvd.nist.gov/vuln/detail/CVE-2014-2013
18,587
ghostscript
60dabde18d7fe12b19da8b509bdfee9cc886aafc
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc
None
0
xps_parse_poly_quadratic_bezier_segment(fz_context *doc, fz_path *path, fz_xml *root, int stroking, int *skipped_stroke) { char *points_att = fz_xml_att(root, "Points"); char *is_stroked_att = fz_xml_att(root, "IsStroked"); float x[2], y[2]; int is_stroked; fz_point pt; char *s; int n; if (!points_att) { fz...
48,908,487,420,187,370,000,000,000,000,000,000,000
xps-path.c
233,204,495,568,169,470,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2014-2013
Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element.
https://nvd.nist.gov/vuln/detail/CVE-2014-2013
18,588
lxde
f99163c6ff8b2f57c5f37b1ce5d62cf7450d4648
https://git.lxde.org/gitweb/?p=lxde/pcmanfm
https://git.lxde.org/gitweb/?p=lxde/lxterminal.git;a=commit;h=f99163c6ff8b2f57c5f37b1ce5d62cf7450d4648
None
0
static gboolean lxterminal_socket_accept_client(GIOChannel * source, GIOCondition condition, LXTermWindow * lxtermwin) { if (condition & G_IO_IN) { /* Accept the new connection. */ int fd = accept(g_io_channel_unix_get_fd(source), NULL, NULL); if (fd < 0) g_warning("Accept fa...
131,257,008,401,233,960,000,000,000,000,000,000,000
None
null
[ "CWE-284" ]
CVE-2016-10369
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).
https://nvd.nist.gov/vuln/detail/CVE-2016-10369
18,589
lxde
f99163c6ff8b2f57c5f37b1ce5d62cf7450d4648
https://git.lxde.org/gitweb/?p=lxde/pcmanfm
https://git.lxde.org/gitweb/?p=lxde/lxterminal.git;a=commit;h=f99163c6ff8b2f57c5f37b1ce5d62cf7450d4648
None
0
static gboolean lxterminal_socket_read_channel(GIOChannel * gio, GIOCondition condition, LXTermWindow * lxtermwin) { /* Read message. */ gchar * msg = NULL; gsize len = 0; GError * err = NULL; GIOStatus ret = g_io_channel_read_to_end(gio, &msg, &len, &err); if (ret == G_IO_STATUS_ERROR) { ...
39,623,340,063,477,823,000,000,000,000,000,000,000
None
null
[ "CWE-284" ]
CVE-2016-10369
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).
https://nvd.nist.gov/vuln/detail/CVE-2016-10369
18,590
savannah
fa481c116e65ccf9137c7ddc8abc3cf05dc12f55
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=gnash.git;a=commitdiff;h=fa481c116e65ccf9137c7ddc8abc3cf05dc12f55
None
0
nsPluginInstance::DestroyStream(NPStream* /*stream*/, NPError /*reason*/) { if (_streamfd != -1) { if (close(_streamfd) == -1) { perror("closing _streamfd"); } else { _streamfd = -1; } } return NPERR_NO_ERROR; }
92,849,475,068,879,910,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2011-4328
plugin/npapi/plugin.cpp in Gnash before 0.8.10 uses weak permissions (world readable) for cookie files with predictable names in /tmp, which allows local users to obtain sensitive information.
https://nvd.nist.gov/vuln/detail/CVE-2011-4328
18,591
savannah
fa481c116e65ccf9137c7ddc8abc3cf05dc12f55
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=gnash.git;a=commitdiff;h=fa481c116e65ccf9137c7ddc8abc3cf05dc12f55
None
0
nsPluginInstance::GetValue(NPPVariable aVariable, void *aValue) { if (aVariable == NPPVpluginScriptableNPObject) { if (_scriptObject) { void **v = (void **)aValue; NPN_RetainObject(_scriptObject); *v = _scriptObject; } else { gnash::log_debug("_script...
6,557,299,281,548,204,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2011-4328
plugin/npapi/plugin.cpp in Gnash before 0.8.10 uses weak permissions (world readable) for cookie files with predictable names in /tmp, which allows local users to obtain sensitive information.
https://nvd.nist.gov/vuln/detail/CVE-2011-4328
18,592
savannah
fa481c116e65ccf9137c7ddc8abc3cf05dc12f55
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=gnash.git;a=commitdiff;h=fa481c116e65ccf9137c7ddc8abc3cf05dc12f55
None
0
inline bool HasScripting() { return (NPNFuncs.version >= NPVERS_HAS_NPRUNTIME_SCRIPTING); }
315,848,700,126,459,230,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2011-4328
plugin/npapi/plugin.cpp in Gnash before 0.8.10 uses weak permissions (world readable) for cookie files with predictable names in /tmp, which allows local users to obtain sensitive information.
https://nvd.nist.gov/vuln/detail/CVE-2011-4328
18,593
savannah
fa481c116e65ccf9137c7ddc8abc3cf05dc12f55
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=gnash.git;a=commitdiff;h=fa481c116e65ccf9137c7ddc8abc3cf05dc12f55
None
0
NS_DestroyPluginInstance(nsPluginInstanceBase* aPlugin) { delete static_cast<gnash::nsPluginInstance *> (aPlugin); }
76,232,823,247,091,435,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2011-4328
plugin/npapi/plugin.cpp in Gnash before 0.8.10 uses weak permissions (world readable) for cookie files with predictable names in /tmp, which allows local users to obtain sensitive information.
https://nvd.nist.gov/vuln/detail/CVE-2011-4328
18,594
savannah
fa481c116e65ccf9137c7ddc8abc3cf05dc12f55
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=gnash.git;a=commitdiff;h=fa481c116e65ccf9137c7ddc8abc3cf05dc12f55
None
0
NS_NewPluginInstance(nsPluginCreateData * aCreateDataStruct) { if(!aCreateDataStruct) { return NULL; } return new gnash::nsPluginInstance(aCreateDataStruct); }
67,902,204,840,371,210,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2011-4328
plugin/npapi/plugin.cpp in Gnash before 0.8.10 uses weak permissions (world readable) for cookie files with predictable names in /tmp, which allows local users to obtain sensitive information.
https://nvd.nist.gov/vuln/detail/CVE-2011-4328
18,595
savannah
fa481c116e65ccf9137c7ddc8abc3cf05dc12f55
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=gnash.git;a=commitdiff;h=fa481c116e65ccf9137c7ddc8abc3cf05dc12f55
None
0
NS_PluginGetValue(NPPVariable aVariable, void *aValue) { NPError err = NPERR_NO_ERROR; switch (aVariable) { case NPPVpluginNameString: *static_cast<const char **> (aValue) = PLUGIN_NAME; break; case NPPVpluginDescriptionString: *static_cast<const char **>(aV...
141,971,228,174,723,470,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2011-4328
plugin/npapi/plugin.cpp in Gnash before 0.8.10 uses weak permissions (world readable) for cookie files with predictable names in /tmp, which allows local users to obtain sensitive information.
https://nvd.nist.gov/vuln/detail/CVE-2011-4328
18,596
savannah
fa481c116e65ccf9137c7ddc8abc3cf05dc12f55
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=gnash.git;a=commitdiff;h=fa481c116e65ccf9137c7ddc8abc3cf05dc12f55
None
0
NS_PluginInitialize() { if ( gnash::plugInitialized ) { gnash::log_debug("NS_PluginInitialize called, but ignored (we already initialized)"); return NPERR_NO_ERROR; } gnash::log_debug("NS_PluginInitialize call ---------------------------"); NPError err = NPERR_NO_ERROR; NPBool su...
229,330,017,577,009,220,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2011-4328
plugin/npapi/plugin.cpp in Gnash before 0.8.10 uses weak permissions (world readable) for cookie files with predictable names in /tmp, which allows local users to obtain sensitive information.
https://nvd.nist.gov/vuln/detail/CVE-2011-4328
18,597
savannah
fa481c116e65ccf9137c7ddc8abc3cf05dc12f55
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=gnash.git;a=commitdiff;h=fa481c116e65ccf9137c7ddc8abc3cf05dc12f55
None
0
nsPluginInstance::NewStream(NPMIMEType /*type*/, NPStream* stream, NPBool /*seekable*/, uint16_t* /*stype*/) { if (_childpid) { return NPERR_GENERIC_ERROR; } _swf_url = stream->url; if (!_swf_url.empty() && _window) { return startProc(); } return NP...
24,123,827,653,019,720,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2011-4328
plugin/npapi/plugin.cpp in Gnash before 0.8.10 uses weak permissions (world readable) for cookie files with predictable names in /tmp, which allows local users to obtain sensitive information.
https://nvd.nist.gov/vuln/detail/CVE-2011-4328
18,598
savannah
fa481c116e65ccf9137c7ddc8abc3cf05dc12f55
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=gnash.git;a=commitdiff;h=fa481c116e65ccf9137c7ddc8abc3cf05dc12f55
None
0
nsPluginInstance::SetWindow(NPWindow* aWindow) { if(!aWindow) { gnash::log_error(std::string(__FUNCTION__) + ": ERROR: Window handle was bogus!"); return NPERR_INVALID_PARAM; #if 0 } else { gnash::log_debug("%s: X origin = %d, Y Origin = %d, Width = %d," " Height = %d, Window...
337,718,432,672,893,150,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2011-4328
plugin/npapi/plugin.cpp in Gnash before 0.8.10 uses weak permissions (world readable) for cookie files with predictable names in /tmp, which allows local users to obtain sensitive information.
https://nvd.nist.gov/vuln/detail/CVE-2011-4328
18,599
savannah
fa481c116e65ccf9137c7ddc8abc3cf05dc12f55
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=gnash.git;a=commitdiff;h=fa481c116e65ccf9137c7ddc8abc3cf05dc12f55
None
0
nsPluginInstance::WriteReady(NPStream* /* stream */ ) { if ( _streamfd != -1 ) { return 1024; } else { return 0; } }
211,353,661,739,556,600,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2011-4328
plugin/npapi/plugin.cpp in Gnash before 0.8.10 uses weak permissions (world readable) for cookie files with predictable names in /tmp, which allows local users to obtain sensitive information.
https://nvd.nist.gov/vuln/detail/CVE-2011-4328
18,600
savannah
fa481c116e65ccf9137c7ddc8abc3cf05dc12f55
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=gnash.git;a=commitdiff;h=fa481c116e65ccf9137c7ddc8abc3cf05dc12f55
None
0
cleanup_childpid(gpointer data) { int* pid = static_cast<int*>(data); int status; int rv = waitpid(*pid, &status, WNOHANG); if (rv <= 0) { kill(*pid, SIGKILL); waitpid(*pid, &status, 0); } gnash::log_debug("Child process exited with status %s", status); delete pid; ...
313,807,431,192,363,860,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2011-4328
plugin/npapi/plugin.cpp in Gnash before 0.8.10 uses weak permissions (world readable) for cookie files with predictable names in /tmp, which allows local users to obtain sensitive information.
https://nvd.nist.gov/vuln/detail/CVE-2011-4328
18,601
savannah
fa481c116e65ccf9137c7ddc8abc3cf05dc12f55
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=gnash.git;a=commitdiff;h=fa481c116e65ccf9137c7ddc8abc3cf05dc12f55
None
0
close_fds(const int (& except)[N]) { int numfailed = 0, closed = 0; for (int anfd = fileno(stderr)+1; numfailed < 10; anfd++) { if (std::find(except, except+N, anfd) != except+N) { continue; } if (close(anfd) < 0) { numfailed++; } else { numfai...
2,355,630,909,746,146,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2011-4328
plugin/npapi/plugin.cpp in Gnash before 0.8.10 uses weak permissions (world readable) for cookie files with predictable names in /tmp, which allows local users to obtain sensitive information.
https://nvd.nist.gov/vuln/detail/CVE-2011-4328
18,602
savannah
fa481c116e65ccf9137c7ddc8abc3cf05dc12f55
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=gnash.git;a=commitdiff;h=fa481c116e65ccf9137c7ddc8abc3cf05dc12f55
None
0
create_standalone_launcher(const std::string& page_url, const std::string& swf_url, const std::map<std::string, std::string>& params) { #ifdef CREATE_STANDALONE_GNASH_LAUNCHER if (!createSaLauncher) { return; } std::ofstream saLauncher; std::stringstream ss; stat...
304,084,950,863,602,570,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2011-4328
plugin/npapi/plugin.cpp in Gnash before 0.8.10 uses weak permissions (world readable) for cookie files with predictable names in /tmp, which allows local users to obtain sensitive information.
https://nvd.nist.gov/vuln/detail/CVE-2011-4328
18,603
savannah
fa481c116e65ccf9137c7ddc8abc3cf05dc12f55
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=gnash.git;a=commitdiff;h=fa481c116e65ccf9137c7ddc8abc3cf05dc12f55
None
0
nsPluginInstance::getCurrentPageURL() const { return getDocumentProp("baseURI"); }
176,700,604,445,558,200,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2011-4328
plugin/npapi/plugin.cpp in Gnash before 0.8.10 uses weak permissions (world readable) for cookie files with predictable names in /tmp, which allows local users to obtain sensitive information.
https://nvd.nist.gov/vuln/detail/CVE-2011-4328
18,604
savannah
fa481c116e65ccf9137c7ddc8abc3cf05dc12f55
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=gnash.git;a=commitdiff;h=fa481c116e65ccf9137c7ddc8abc3cf05dc12f55
None
0
nsPluginInstance::getDocumentProp(const std::string& propname) const { std::string rv; if (!HasScripting()) { LOG_ONCE( gnash::log_debug("Browser doesn't support scripting") ); return rv; } NPObject* windowobj; NPError err = NPN_GetValue(_instance, NPNVWindowNPObject, &windowobj); ...
249,316,006,894,377,170,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2011-4328
plugin/npapi/plugin.cpp in Gnash before 0.8.10 uses weak permissions (world readable) for cookie files with predictable names in /tmp, which allows local users to obtain sensitive information.
https://nvd.nist.gov/vuln/detail/CVE-2011-4328
18,605
savannah
fa481c116e65ccf9137c7ddc8abc3cf05dc12f55
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=gnash.git;a=commitdiff;h=fa481c116e65ccf9137c7ddc8abc3cf05dc12f55
None
0
getGnashExecutable() { std::string procname; bool process_found = false; struct stat procstats; char *gnash_env = std::getenv("GNASH_PLAYER"); if (gnash_env) { procname = gnash_env; process_found = (0 == stat(procname.c_str(), &procstats)); if (!process_found) { ...
80,564,543,084,413,630,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2011-4328
plugin/npapi/plugin.cpp in Gnash before 0.8.10 uses weak permissions (world readable) for cookie files with predictable names in /tmp, which allows local users to obtain sensitive information.
https://nvd.nist.gov/vuln/detail/CVE-2011-4328
18,606
savannah
fa481c116e65ccf9137c7ddc8abc3cf05dc12f55
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=gnash.git;a=commitdiff;h=fa481c116e65ccf9137c7ddc8abc3cf05dc12f55
None
0
getPluginDescription() { static const char* desc = NULL; if (!desc) { desc = std::getenv("GNASH_PLUGIN_DESCRIPTION"); if (desc == NULL) desc = PLUGIN_DESCRIPTION; } return desc; }
107,115,944,123,771,940,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2011-4328
plugin/npapi/plugin.cpp in Gnash before 0.8.10 uses weak permissions (world readable) for cookie files with predictable names in /tmp, which allows local users to obtain sensitive information.
https://nvd.nist.gov/vuln/detail/CVE-2011-4328
18,607
savannah
fa481c116e65ccf9137c7ddc8abc3cf05dc12f55
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=gnash.git;a=commitdiff;h=fa481c116e65ccf9137c7ddc8abc3cf05dc12f55
None
0
nsPluginInstance::handlePlayerRequests(GIOChannel* iochan, GIOCondition cond) { if ( cond & G_IO_HUP ) { gnash::log_debug("Player control socket hang up"); return false; } assert(cond & G_IO_IN); gnash::log_debug("Checking player requests on FD #%d", g_io_channel_unix_ge...
203,983,781,877,856,900,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2011-4328
plugin/npapi/plugin.cpp in Gnash before 0.8.10 uses weak permissions (world readable) for cookie files with predictable names in /tmp, which allows local users to obtain sensitive information.
https://nvd.nist.gov/vuln/detail/CVE-2011-4328
18,608
savannah
fa481c116e65ccf9137c7ddc8abc3cf05dc12f55
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=gnash.git;a=commitdiff;h=fa481c116e65ccf9137c7ddc8abc3cf05dc12f55
None
0
nsPluginInstance::nsPluginInstance(nsPluginCreateData* data) : nsPluginInstanceBase(), _instance(data->instance), _window(0), _width(0), _height(0), _streamfd(-1), _childpid(0), _filefd(-1), _name(), _scriptObject(0) { for (size_t i=0, n=data->argc; i<n; ++i) { s...
286,144,777,054,444,760,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2011-4328
plugin/npapi/plugin.cpp in Gnash before 0.8.10 uses weak permissions (world readable) for cookie files with predictable names in /tmp, which allows local users to obtain sensitive information.
https://nvd.nist.gov/vuln/detail/CVE-2011-4328
18,609
savannah
fa481c116e65ccf9137c7ddc8abc3cf05dc12f55
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=gnash.git;a=commitdiff;h=fa481c116e65ccf9137c7ddc8abc3cf05dc12f55
None
0
processLog_debug(const boost::format& fmt) { std::cout << "DEBUG: " << fmt.str() << std::endl; }
280,666,310,693,079,600,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2011-4328
plugin/npapi/plugin.cpp in Gnash before 0.8.10 uses weak permissions (world readable) for cookie files with predictable names in /tmp, which allows local users to obtain sensitive information.
https://nvd.nist.gov/vuln/detail/CVE-2011-4328
18,610
savannah
fa481c116e65ccf9137c7ddc8abc3cf05dc12f55
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=gnash.git;a=commitdiff;h=fa481c116e65ccf9137c7ddc8abc3cf05dc12f55
None
0
processLog_debug(const boost::format& /* fmt */) { /* do nothing */ }
248,861,854,973,777,800,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2011-4328
plugin/npapi/plugin.cpp in Gnash before 0.8.10 uses weak permissions (world readable) for cookie files with predictable names in /tmp, which allows local users to obtain sensitive information.
https://nvd.nist.gov/vuln/detail/CVE-2011-4328
18,611
savannah
fa481c116e65ccf9137c7ddc8abc3cf05dc12f55
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=gnash.git;a=commitdiff;h=fa481c116e65ccf9137c7ddc8abc3cf05dc12f55
None
0
processLog_error(const boost::format& fmt) { std::cerr << "ERROR: " << fmt.str() << std::endl; }
163,293,484,009,745,920,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2011-4328
plugin/npapi/plugin.cpp in Gnash before 0.8.10 uses weak permissions (world readable) for cookie files with predictable names in /tmp, which allows local users to obtain sensitive information.
https://nvd.nist.gov/vuln/detail/CVE-2011-4328
18,612
savannah
fa481c116e65ccf9137c7ddc8abc3cf05dc12f55
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=gnash.git;a=commitdiff;h=fa481c116e65ccf9137c7ddc8abc3cf05dc12f55
None
0
processLog_trace(const boost::format& fmt) { std::cout << "TRACE: " << fmt.str() << std::endl; }
234,711,093,427,517,250,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2011-4328
plugin/npapi/plugin.cpp in Gnash before 0.8.10 uses weak permissions (world readable) for cookie files with predictable names in /tmp, which allows local users to obtain sensitive information.
https://nvd.nist.gov/vuln/detail/CVE-2011-4328
18,613
savannah
fa481c116e65ccf9137c7ddc8abc3cf05dc12f55
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=gnash.git;a=commitdiff;h=fa481c116e65ccf9137c7ddc8abc3cf05dc12f55
None
0
processLog_trace(const boost::format& /* fmt */) { /* do nothing */ }
165,507,783,055,111,540,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2011-4328
plugin/npapi/plugin.cpp in Gnash before 0.8.10 uses weak permissions (world readable) for cookie files with predictable names in /tmp, which allows local users to obtain sensitive information.
https://nvd.nist.gov/vuln/detail/CVE-2011-4328
18,614
savannah
fa481c116e65ccf9137c7ddc8abc3cf05dc12f55
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=gnash.git;a=commitdiff;h=fa481c116e65ccf9137c7ddc8abc3cf05dc12f55
None
0
remove_handler(GIOChannel*, GIOCondition, gpointer) { return FALSE; }
253,628,384,771,233,740,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2011-4328
plugin/npapi/plugin.cpp in Gnash before 0.8.10 uses weak permissions (world readable) for cookie files with predictable names in /tmp, which allows local users to obtain sensitive information.
https://nvd.nist.gov/vuln/detail/CVE-2011-4328
18,615
savannah
fa481c116e65ccf9137c7ddc8abc3cf05dc12f55
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=gnash.git;a=commitdiff;h=fa481c116e65ccf9137c7ddc8abc3cf05dc12f55
None
0
nsPluginInstance::setupIOChannel(int fd, GIOFunc handler, GIOCondition signals) const { GIOChannel* ichan = g_io_channel_unix_new(fd); g_io_channel_set_close_on_unref(ichan, true); gnash::log_debug("New IO Channel for fd #%d", g_io_channel_unix_get_fd(ichan)); g_io_add_watch(ichan,...
148,081,202,236,810,700,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2011-4328
plugin/npapi/plugin.cpp in Gnash before 0.8.10 uses weak permissions (world readable) for cookie files with predictable names in /tmp, which allows local users to obtain sensitive information.
https://nvd.nist.gov/vuln/detail/CVE-2011-4328
18,616
savannah
fa481c116e65ccf9137c7ddc8abc3cf05dc12f55
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=gnash.git;a=commitdiff;h=fa481c116e65ccf9137c7ddc8abc3cf05dc12f55
None
0
nsPluginInstance::setupProxy(const std::string& url) { #if NPAPI_VERSION != 190 if (!NPNFuncs.getvalueforurl) return; #endif char *proxy = 0; uint32_t length = 0; #if NPAPI_VERSION != 190 NPN_GetValueForURL(_instance, NPNURLVProxy, url.c_str(), &proxy, &length); #endif if (!p...
278,867,867,547,960,250,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2011-4328
plugin/npapi/plugin.cpp in Gnash before 0.8.10 uses weak permissions (world readable) for cookie files with predictable names in /tmp, which allows local users to obtain sensitive information.
https://nvd.nist.gov/vuln/detail/CVE-2011-4328
18,617
savannah
fa481c116e65ccf9137c7ddc8abc3cf05dc12f55
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=gnash.git;a=commitdiff;h=fa481c116e65ccf9137c7ddc8abc3cf05dc12f55
None
0
nsPluginInstance::shut() { gnash::log_debug("Gnash plugin shutting down"); if (_streamfd != -1) { if (close(_streamfd) == -1) { perror("closing _streamfd"); } else { _streamfd = -1; } } }
92,021,381,884,049,620,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2011-4328
plugin/npapi/plugin.cpp in Gnash before 0.8.10 uses weak permissions (world readable) for cookie files with predictable names in /tmp, which allows local users to obtain sensitive information.
https://nvd.nist.gov/vuln/detail/CVE-2011-4328
18,618
savannah
fa481c116e65ccf9137c7ddc8abc3cf05dc12f55
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=gnash.git;a=commitdiff;h=fa481c116e65ccf9137c7ddc8abc3cf05dc12f55
None
0
nsPluginInstance::startProc() { int p2c_pipe[2]; int c2p_pipe[2]; int p2c_controlpipe[2]; int ret = socketpair(AF_UNIX, SOCK_STREAM, 0, p2c_pipe); if (ret == -1) { gnash::log_error("socketpair(p2c) failed: %s", strerror(errno)); return NPERR_GENERIC_ERROR; } _streamfd = p2c...
192,729,681,263,991,140,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2011-4328
plugin/npapi/plugin.cpp in Gnash before 0.8.10 uses weak permissions (world readable) for cookie files with predictable names in /tmp, which allows local users to obtain sensitive information.
https://nvd.nist.gov/vuln/detail/CVE-2011-4328
18,619
savannah
fa481c116e65ccf9137c7ddc8abc3cf05dc12f55
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=gnash.git;a=commitdiff;h=fa481c116e65ccf9137c7ddc8abc3cf05dc12f55
None
0
wait_for_gdb() { if (!waitforgdb) { return; } std::cout << std::endl << " Attach GDB to PID " << getpid() << " to debug!" << std::endl << " This thread will block until then!" << std::endl << " Once blocked here, you can set other breakpoints." ...
135,691,997,723,419,080,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2011-4328
plugin/npapi/plugin.cpp in Gnash before 0.8.10 uses weak permissions (world readable) for cookie files with predictable names in /tmp, which allows local users to obtain sensitive information.
https://nvd.nist.gov/vuln/detail/CVE-2011-4328
18,620
savannah
fa481c116e65ccf9137c7ddc8abc3cf05dc12f55
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/gitweb/?p=gnash.git;a=commitdiff;h=fa481c116e65ccf9137c7ddc8abc3cf05dc12f55
None
0
nsPluginInstance::~nsPluginInstance() { if (_scriptObject) { NPN_ReleaseObject(_scriptObject); } do { } while (g_source_remove_by_user_data(this)); if (_childpid > 0) { int status; int rv = waitpid(_childpid, &status, WNOHANG); if (rv <= 0) { ...
135,765,244,797,463,500,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2011-4328
plugin/npapi/plugin.cpp in Gnash before 0.8.10 uses weak permissions (world readable) for cookie files with predictable names in /tmp, which allows local users to obtain sensitive information.
https://nvd.nist.gov/vuln/detail/CVE-2011-4328
18,621
savannah
beecf80a6deecbaf5d264d4f864451bde4fe98b8
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=beecf80a6deecbaf5d264d4f864451bde4fe98b8
None
0
FT_Create_Class_cff_field_handlers( FT_Library library, CFF_Field_Handler** output_class ) { CFF_Field_Handler* clazz = NULL; FT_Error error; FT_Memory memory = library->memory; int i = 0; #undef CFF_FIELD #define CFF_FIELD(...
148,329,434,917,598,610,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2016-10328
FreeType 2 before 2016-12-16 has an out-of-bounds write caused by a heap-based buffer overflow related to the cff_parser_run function in cff/cffparse.c.
https://nvd.nist.gov/vuln/detail/CVE-2016-10328
18,622
savannah
beecf80a6deecbaf5d264d4f864451bde4fe98b8
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=beecf80a6deecbaf5d264d4f864451bde4fe98b8
None
0
FT_Destroy_Class_cff_field_handlers( FT_Library library, CFF_Field_Handler* clazz ) { FT_Memory memory = library->memory; if ( clazz ) FT_FREE( clazz ); }
71,948,812,765,816,650,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2016-10328
FreeType 2 before 2016-12-16 has an out-of-bounds write caused by a heap-based buffer overflow related to the cff_parser_run function in cff/cffparse.c.
https://nvd.nist.gov/vuln/detail/CVE-2016-10328
18,623
savannah
beecf80a6deecbaf5d264d4f864451bde4fe98b8
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=beecf80a6deecbaf5d264d4f864451bde4fe98b8
None
0
cff_parse_blend( CFF_Parser parser ) { /* blend operator can only be used in a Private DICT */ CFF_Private priv = (CFF_Private)parser->object; CFF_SubFont subFont; CFF_Blend blend; FT_UInt numBlends; FT_Error error; error = FT_ERR( Stack_Underflow ); if ( !priv || !...
220,256,932,045,994,220,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2016-10328
FreeType 2 before 2016-12-16 has an out-of-bounds write caused by a heap-based buffer overflow related to the cff_parser_run function in cff/cffparse.c.
https://nvd.nist.gov/vuln/detail/CVE-2016-10328
18,624
savannah
beecf80a6deecbaf5d264d4f864451bde4fe98b8
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=beecf80a6deecbaf5d264d4f864451bde4fe98b8
None
0
cff_parse_cid_ros( CFF_Parser parser ) { CFF_FontRecDict dict = (CFF_FontRecDict)parser->object; FT_Byte** data = parser->stack; FT_Error error; error = FT_ERR( Stack_Underflow ); if ( parser->top >= parser->stack + 3 ) { dict->cid_registry = (FT_UInt)cff_parse_num(...
37,189,254,301,317,760,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2016-10328
FreeType 2 before 2016-12-16 has an out-of-bounds write caused by a heap-based buffer overflow related to the cff_parser_run function in cff/cffparse.c.
https://nvd.nist.gov/vuln/detail/CVE-2016-10328
18,625
savannah
beecf80a6deecbaf5d264d4f864451bde4fe98b8
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=beecf80a6deecbaf5d264d4f864451bde4fe98b8
None
0
cff_parse_fixed_dynamic( CFF_Parser parser, FT_Byte** d, FT_Long* scaling ) { FT_ASSERT( scaling ); if ( **d == 30 ) return cff_parse_real( *d, parser->limit, 0, scaling ); else { FT_Long number; FT_Int integer_length;...
195,427,724,744,936,470,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2016-10328
FreeType 2 before 2016-12-16 has an out-of-bounds write caused by a heap-based buffer overflow related to the cff_parser_run function in cff/cffparse.c.
https://nvd.nist.gov/vuln/detail/CVE-2016-10328
18,626
savannah
beecf80a6deecbaf5d264d4f864451bde4fe98b8
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=beecf80a6deecbaf5d264d4f864451bde4fe98b8
None
0
cff_parse_fixed_scaled( CFF_Parser parser, FT_Byte** d, FT_Long scaling ) { return do_fixed( parser, d, scaling ); }
200,976,438,281,493,550,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2016-10328
FreeType 2 before 2016-12-16 has an out-of-bounds write caused by a heap-based buffer overflow related to the cff_parser_run function in cff/cffparse.c.
https://nvd.nist.gov/vuln/detail/CVE-2016-10328