idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
18,505 | gnupg | da780c8183cccc8f533c8ace8211ac2cb2bdee7b | http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg | https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=da780c8183cccc8f533c8ace8211ac2cb2bdee7b | None | 0 | point_resize (mpi_point_t p, mpi_ec_t ctx)
{
/*
* For now, we allocate enough limbs for our EC computation of ec_*.
* Once we will improve ec_* to be constant size (and constant
* time), NLIMBS can be ctx->p->nlimbs.
*/
size_t nlimbs = 2*ctx->p->nlimbs+1;
mpi_resize (p->x, nlimbs);
if (ctx->model !... | 255,723,976,883,487,530,000,000,000,000,000,000,000 | ec.c | 274,122,731,010,458,620,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2017-0379 | Libgcrypt before 1.8.1 does not properly consider Curve25519 side-channel attacks, which makes it easier for attackers to discover a secret key, related to cipher/ecc.c and mpi/ec.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-0379 |
18,506 | gnupg | da780c8183cccc8f533c8ace8211ac2cb2bdee7b | http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg | https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=da780c8183cccc8f533c8ace8211ac2cb2bdee7b | None | 0 | point_set (mpi_point_t d, mpi_point_t s)
{
mpi_set (d->x, s->x);
mpi_set (d->y, s->y);
mpi_set (d->z, s->z);
}
| 125,042,948,640,285,920,000,000,000,000,000,000,000 | ec.c | 274,122,731,010,458,620,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2017-0379 | Libgcrypt before 1.8.1 does not properly consider Curve25519 side-channel attacks, which makes it easier for attackers to discover a secret key, related to cipher/ecc.c and mpi/ec.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-0379 |
18,507 | gnupg | da780c8183cccc8f533c8ace8211ac2cb2bdee7b | http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg | https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=da780c8183cccc8f533c8ace8211ac2cb2bdee7b | None | 0 | point_swap_cond (mpi_point_t d, mpi_point_t s, unsigned long swap,
mpi_ec_t ctx)
{
mpi_swap_cond (d->x, s->x, swap);
if (ctx->model != MPI_EC_MONTGOMERY)
mpi_swap_cond (d->y, s->y, swap);
mpi_swap_cond (d->z, s->z, swap);
}
| 99,071,370,757,478,080,000,000,000,000,000,000,000 | ec.c | 274,122,731,010,458,620,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2017-0379 | Libgcrypt before 1.8.1 does not properly consider Curve25519 side-channel attacks, which makes it easier for attackers to discover a secret key, related to cipher/ecc.c and mpi/ec.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-0379 |
18,508 | savannah | 135c3faebb96f8f550bd4f318716f2e1e095a969 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=135c3faebb96f8f550bd4f318716f2e1e095a969 | None | 0 | cf2_builder_cubeTo( CF2_OutlineCallbacks callbacks,
const CF2_CallbackParams params )
{
/* downcast the object pointer */
CF2_Outline outline = (CF2_Outline)callbacks;
CFF_Builder* builder;
FT_ASSERT( outline && outline->decoder );
FT_ASSERT( params->op == CF2_Pa... | 170,594,496,400,059,130,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2014-2241 | The (1) cf2_initLocalRegionBuffer and (2) cf2_initGlobalRegionBuffer functions in cff/cf2ft.c in FreeType before 2.5.3 do not properly check if a subroutine exists, which allows remote attackers to cause a denial of service (assertion failure), as demonstrated by a crafted ttf file. | https://nvd.nist.gov/vuln/detail/CVE-2014-2241 |
18,509 | savannah | 135c3faebb96f8f550bd4f318716f2e1e095a969 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=135c3faebb96f8f550bd4f318716f2e1e095a969 | None | 0 | cf2_builder_lineTo( CF2_OutlineCallbacks callbacks,
const CF2_CallbackParams params )
{
/* downcast the object pointer */
CF2_Outline outline = (CF2_Outline)callbacks;
CFF_Builder* builder;
FT_ASSERT( outline && outline->decoder );
FT_ASSERT( params->op == CF2_Pa... | 327,058,808,216,153,440,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2014-2241 | The (1) cf2_initLocalRegionBuffer and (2) cf2_initGlobalRegionBuffer functions in cff/cf2ft.c in FreeType before 2.5.3 do not properly check if a subroutine exists, which allows remote attackers to cause a denial of service (assertion failure), as demonstrated by a crafted ttf file. | https://nvd.nist.gov/vuln/detail/CVE-2014-2241 |
18,510 | savannah | 135c3faebb96f8f550bd4f318716f2e1e095a969 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=135c3faebb96f8f550bd4f318716f2e1e095a969 | None | 0 | cf2_builder_moveTo( CF2_OutlineCallbacks callbacks,
const CF2_CallbackParams params )
{
/* downcast the object pointer */
CF2_Outline outline = (CF2_Outline)callbacks;
CFF_Builder* builder;
(void)params; /* only used in debug mode */
FT_ASSERT( outline &&... | 259,298,068,547,917,260,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2014-2241 | The (1) cf2_initLocalRegionBuffer and (2) cf2_initGlobalRegionBuffer functions in cff/cf2ft.c in FreeType before 2.5.3 do not properly check if a subroutine exists, which allows remote attackers to cause a denial of service (assertion failure), as demonstrated by a crafted ttf file. | https://nvd.nist.gov/vuln/detail/CVE-2014-2241 |
18,511 | savannah | 135c3faebb96f8f550bd4f318716f2e1e095a969 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=135c3faebb96f8f550bd4f318716f2e1e095a969 | None | 0 | cf2_decoder_parse_charstrings( CFF_Decoder* decoder,
FT_Byte* charstring_base,
FT_ULong charstring_len )
{
FT_Memory memory;
FT_Error error = FT_Err_Ok;
CF2_Font font;
FT_ASSERT( decoder && decoder->cff );
memor... | 50,150,606,441,736,590,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2014-2241 | The (1) cf2_initLocalRegionBuffer and (2) cf2_initGlobalRegionBuffer functions in cff/cf2ft.c in FreeType before 2.5.3 do not properly check if a subroutine exists, which allows remote attackers to cause a denial of service (assertion failure), as demonstrated by a crafted ttf file. | https://nvd.nist.gov/vuln/detail/CVE-2014-2241 |
18,512 | savannah | 135c3faebb96f8f550bd4f318716f2e1e095a969 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=135c3faebb96f8f550bd4f318716f2e1e095a969 | None | 0 | cf2_freeSeacComponent( CFF_Decoder* decoder,
CF2_Buffer buf )
{
FT_ASSERT( decoder );
cff_free_glyph_data( decoder->builder.face,
(FT_Byte**)&buf->start,
(FT_ULong)( buf->end - buf->start ) );
}
| 336,235,373,603,351,300,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2014-2241 | The (1) cf2_initLocalRegionBuffer and (2) cf2_initGlobalRegionBuffer functions in cff/cf2ft.c in FreeType before 2.5.3 do not properly check if a subroutine exists, which allows remote attackers to cause a denial of service (assertion failure), as demonstrated by a crafted ttf file. | https://nvd.nist.gov/vuln/detail/CVE-2014-2241 |
18,513 | savannah | 135c3faebb96f8f550bd4f318716f2e1e095a969 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=135c3faebb96f8f550bd4f318716f2e1e095a969 | None | 0 | cf2_free_instance( void* ptr )
{
CF2_Font font = (CF2_Font)ptr;
if ( font )
{
FT_Memory memory = font->memory;
(void)memory;
}
}
| 101,875,742,468,422,230,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2014-2241 | The (1) cf2_initLocalRegionBuffer and (2) cf2_initGlobalRegionBuffer functions in cff/cf2ft.c in FreeType before 2.5.3 do not properly check if a subroutine exists, which allows remote attackers to cause a denial of service (assertion failure), as demonstrated by a crafted ttf file. | https://nvd.nist.gov/vuln/detail/CVE-2014-2241 |
18,514 | savannah | 135c3faebb96f8f550bd4f318716f2e1e095a969 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=135c3faebb96f8f550bd4f318716f2e1e095a969 | None | 0 | cf2_getBlueValues( CFF_Decoder* decoder,
size_t* count,
FT_Pos* *data )
{
FT_ASSERT( decoder && decoder->current_subfont );
*count = decoder->current_subfont->private_dict.num_blue_values;
*data = (FT_Pos*)
&decoder->current_subfont-... | 316,504,280,093,502,840,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2014-2241 | The (1) cf2_initLocalRegionBuffer and (2) cf2_initGlobalRegionBuffer functions in cff/cf2ft.c in FreeType before 2.5.3 do not properly check if a subroutine exists, which allows remote attackers to cause a denial of service (assertion failure), as demonstrated by a crafted ttf file. | https://nvd.nist.gov/vuln/detail/CVE-2014-2241 |
18,515 | savannah | 135c3faebb96f8f550bd4f318716f2e1e095a969 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=135c3faebb96f8f550bd4f318716f2e1e095a969 | None | 0 | cf2_getFamilyOtherBlues( CFF_Decoder* decoder,
size_t* count,
FT_Pos* *data )
{
FT_ASSERT( decoder && decoder->current_subfont );
*count = decoder->current_subfont->private_dict.num_family_other_blues;
*data = (FT_Pos*)
&... | 268,177,008,778,945,760,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2014-2241 | The (1) cf2_initLocalRegionBuffer and (2) cf2_initGlobalRegionBuffer functions in cff/cf2ft.c in FreeType before 2.5.3 do not properly check if a subroutine exists, which allows remote attackers to cause a denial of service (assertion failure), as demonstrated by a crafted ttf file. | https://nvd.nist.gov/vuln/detail/CVE-2014-2241 |
18,516 | savannah | 135c3faebb96f8f550bd4f318716f2e1e095a969 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=135c3faebb96f8f550bd4f318716f2e1e095a969 | None | 0 | cf2_getLanguageGroup( CFF_Decoder* decoder )
{
FT_ASSERT( decoder && decoder->current_subfont );
return decoder->current_subfont->private_dict.language_group;
}
| 153,489,604,829,395,700,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2014-2241 | The (1) cf2_initLocalRegionBuffer and (2) cf2_initGlobalRegionBuffer functions in cff/cf2ft.c in FreeType before 2.5.3 do not properly check if a subroutine exists, which allows remote attackers to cause a denial of service (assertion failure), as demonstrated by a crafted ttf file. | https://nvd.nist.gov/vuln/detail/CVE-2014-2241 |
18,517 | savannah | 135c3faebb96f8f550bd4f318716f2e1e095a969 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=135c3faebb96f8f550bd4f318716f2e1e095a969 | None | 0 | cf2_getOtherBlues( CFF_Decoder* decoder,
size_t* count,
FT_Pos* *data )
{
FT_ASSERT( decoder && decoder->current_subfont );
*count = decoder->current_subfont->private_dict.num_other_blues;
*data = (FT_Pos*)
&decoder->current_subfont-... | 64,191,922,766,115,410,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2014-2241 | The (1) cf2_initLocalRegionBuffer and (2) cf2_initGlobalRegionBuffer functions in cff/cf2ft.c in FreeType before 2.5.3 do not properly check if a subroutine exists, which allows remote attackers to cause a denial of service (assertion failure), as demonstrated by a crafted ttf file. | https://nvd.nist.gov/vuln/detail/CVE-2014-2241 |
18,518 | savannah | 135c3faebb96f8f550bd4f318716f2e1e095a969 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=135c3faebb96f8f550bd4f318716f2e1e095a969 | None | 0 | cf2_getPpemY( CFF_Decoder* decoder )
{
FT_ASSERT( decoder &&
decoder->builder.face &&
decoder->builder.face->root.size );
/*
* Note that `y_ppem' can be zero if there wasn't a call to
* `FT_Set_Char_Size' or something similar. Ho... | 71,364,301,184,790,620,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2014-2241 | The (1) cf2_initLocalRegionBuffer and (2) cf2_initGlobalRegionBuffer functions in cff/cf2ft.c in FreeType before 2.5.3 do not properly check if a subroutine exists, which allows remote attackers to cause a denial of service (assertion failure), as demonstrated by a crafted ttf file. | https://nvd.nist.gov/vuln/detail/CVE-2014-2241 |
18,519 | savannah | 135c3faebb96f8f550bd4f318716f2e1e095a969 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=135c3faebb96f8f550bd4f318716f2e1e095a969 | None | 0 | cf2_getScaleAndHintFlag( CFF_Decoder* decoder,
CF2_Fixed* x_scale,
CF2_Fixed* y_scale,
FT_Bool* hinted,
FT_Bool* scaled )
{
FT_ASSERT( decoder && decoder->builder.glyph );
/* note: F... | 321,245,757,606,713,200,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2014-2241 | The (1) cf2_initLocalRegionBuffer and (2) cf2_initGlobalRegionBuffer functions in cff/cf2ft.c in FreeType before 2.5.3 do not properly check if a subroutine exists, which allows remote attackers to cause a denial of service (assertion failure), as demonstrated by a crafted ttf file. | https://nvd.nist.gov/vuln/detail/CVE-2014-2241 |
18,520 | savannah | 135c3faebb96f8f550bd4f318716f2e1e095a969 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=135c3faebb96f8f550bd4f318716f2e1e095a969 | None | 0 | cf2_getStdHW( CFF_Decoder* decoder )
{
FT_ASSERT( decoder && decoder->current_subfont );
return cf2_intToFixed(
decoder->current_subfont->private_dict.standard_width );
}
| 77,432,167,680,879,560,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2014-2241 | The (1) cf2_initLocalRegionBuffer and (2) cf2_initGlobalRegionBuffer functions in cff/cf2ft.c in FreeType before 2.5.3 do not properly check if a subroutine exists, which allows remote attackers to cause a denial of service (assertion failure), as demonstrated by a crafted ttf file. | https://nvd.nist.gov/vuln/detail/CVE-2014-2241 |
18,521 | savannah | 135c3faebb96f8f550bd4f318716f2e1e095a969 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=135c3faebb96f8f550bd4f318716f2e1e095a969 | None | 0 | cf2_getStdVW( CFF_Decoder* decoder )
{
FT_ASSERT( decoder && decoder->current_subfont );
return cf2_intToFixed(
decoder->current_subfont->private_dict.standard_height );
}
| 16,416,796,569,751,260,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2014-2241 | The (1) cf2_initLocalRegionBuffer and (2) cf2_initGlobalRegionBuffer functions in cff/cf2ft.c in FreeType before 2.5.3 do not properly check if a subroutine exists, which allows remote attackers to cause a denial of service (assertion failure), as demonstrated by a crafted ttf file. | https://nvd.nist.gov/vuln/detail/CVE-2014-2241 |
18,522 | savannah | 135c3faebb96f8f550bd4f318716f2e1e095a969 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=135c3faebb96f8f550bd4f318716f2e1e095a969 | None | 0 | cf2_getSubfont( CFF_Decoder* decoder )
{
FT_ASSERT( decoder && decoder->current_subfont );
return decoder->current_subfont;
}
| 80,525,625,082,750,080,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2014-2241 | The (1) cf2_initLocalRegionBuffer and (2) cf2_initGlobalRegionBuffer functions in cff/cf2ft.c in FreeType before 2.5.3 do not properly check if a subroutine exists, which allows remote attackers to cause a denial of service (assertion failure), as demonstrated by a crafted ttf file. | https://nvd.nist.gov/vuln/detail/CVE-2014-2241 |
18,523 | savannah | 135c3faebb96f8f550bd4f318716f2e1e095a969 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=135c3faebb96f8f550bd4f318716f2e1e095a969 | None | 0 | cf2_getUnitsPerEm( CFF_Decoder* decoder )
{
FT_ASSERT( decoder && decoder->builder.face );
FT_ASSERT( decoder->builder.face->root.units_per_EM );
return decoder->builder.face->root.units_per_EM;
}
| 247,851,427,529,743,980,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2014-2241 | The (1) cf2_initLocalRegionBuffer and (2) cf2_initGlobalRegionBuffer functions in cff/cf2ft.c in FreeType before 2.5.3 do not properly check if a subroutine exists, which allows remote attackers to cause a denial of service (assertion failure), as demonstrated by a crafted ttf file. | https://nvd.nist.gov/vuln/detail/CVE-2014-2241 |
18,524 | savannah | 135c3faebb96f8f550bd4f318716f2e1e095a969 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=135c3faebb96f8f550bd4f318716f2e1e095a969 | None | 0 | cf2_outline_init( CF2_Outline outline,
FT_Memory memory,
FT_Error* error )
{
FT_MEM_ZERO( outline, sizeof ( CF2_OutlineRec ) );
outline->root.memory = memory;
outline->root.error = error;
outline->root.moveTo = cf2_builder_moveTo;
outline->root.l... | 54,419,828,785,090,030,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2014-2241 | The (1) cf2_initLocalRegionBuffer and (2) cf2_initGlobalRegionBuffer functions in cff/cf2ft.c in FreeType before 2.5.3 do not properly check if a subroutine exists, which allows remote attackers to cause a denial of service (assertion failure), as demonstrated by a crafted ttf file. | https://nvd.nist.gov/vuln/detail/CVE-2014-2241 |
18,525 | savannah | 135c3faebb96f8f550bd4f318716f2e1e095a969 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=135c3faebb96f8f550bd4f318716f2e1e095a969 | None | 0 | cf2_setGlyphWidth( CF2_Outline outline,
CF2_Fixed width )
{
CFF_Decoder* decoder = outline->decoder;
FT_ASSERT( decoder );
decoder->glyph_width = cf2_fixedToInt( width );
}
| 89,696,163,652,982,660,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2014-2241 | The (1) cf2_initLocalRegionBuffer and (2) cf2_initGlobalRegionBuffer functions in cff/cf2ft.c in FreeType before 2.5.3 do not properly check if a subroutine exists, which allows remote attackers to cause a denial of service (assertion failure), as demonstrated by a crafted ttf file. | https://nvd.nist.gov/vuln/detail/CVE-2014-2241 |
18,548 | ghostscript | 60dabde18d7fe12b19da8b509bdfee9cc886aafc | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc | None | 0 | static int count_commas(char *s)
{
int n = 0;
while (*s)
{
if (*s == ',')
n ++;
s ++;
}
return n;
}
| 280,517,366,720,366,300,000,000,000,000,000,000,000 | xps-common.c | 165,036,389,961,832,330,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2014-2013 | Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element. | https://nvd.nist.gov/vuln/detail/CVE-2014-2013 |
18,549 | ghostscript | 60dabde18d7fe12b19da8b509bdfee9cc886aafc | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc | None | 0 | static inline int unhex(int a)
{
if (a >= 'A' && a <= 'F') return a - 'A' + 0xA;
if (a >= 'a' && a <= 'f') return a - 'a' + 0xA;
if (a >= '0' && a <= '9') return a - '0';
return 0;
}
| 277,827,583,708,907,400,000,000,000,000,000,000,000 | xps-common.c | 165,036,389,961,832,330,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2014-2013 | Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element. | https://nvd.nist.gov/vuln/detail/CVE-2014-2013 |
18,550 | ghostscript | 60dabde18d7fe12b19da8b509bdfee9cc886aafc | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc | None | 0 | xps_end_opacity(xps_document *doc, char *base_uri, xps_resource *dict,
char *opacity_att, fz_xml *opacity_mask_tag)
{
if (!opacity_att && !opacity_mask_tag)
return;
if (doc->opacity_top > 0)
doc->opacity_top--;
if (opacity_mask_tag)
{
if (strcmp(fz_xml_tag(opacity_mask_tag), "SolidColorBrush"))
fz_pop_c... | 217,608,070,287,607,460,000,000,000,000,000,000,000 | xps-common.c | 165,036,389,961,832,330,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2014-2013 | Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element. | https://nvd.nist.gov/vuln/detail/CVE-2014-2013 |
18,551 | ghostscript | 60dabde18d7fe12b19da8b509bdfee9cc886aafc | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc | None | 0 | xps_lookup_alternate_content(fz_xml *node)
{
for (node = fz_xml_down(node); node; node = fz_xml_next(node))
{
if (!strcmp(fz_xml_tag(node), "mc:Choice") && fz_xml_att(node, "Requires"))
{
char list[64];
char *next = list, *item;
fz_strlcpy(list, fz_xml_att(node, "Requires"), sizeof(list));
while ((ite... | 315,109,031,334,668,300,000,000,000,000,000,000,000 | xps-common.c | 165,036,389,961,832,330,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2014-2013 | Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element. | https://nvd.nist.gov/vuln/detail/CVE-2014-2013 |
18,552 | ghostscript | 60dabde18d7fe12b19da8b509bdfee9cc886aafc | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc | None | 0 | xps_parse_element(xps_document *doc, const fz_matrix *ctm, const fz_rect *area, char *base_uri, xps_resource *dict, fz_xml *node)
{
if (doc->cookie && doc->cookie->abort)
return;
if (!strcmp(fz_xml_tag(node), "Path"))
xps_parse_path(doc, ctm, base_uri, dict, node);
if (!strcmp(fz_xml_tag(node), "Glyphs"))
xps_... | 317,311,068,043,768,540,000,000,000,000,000,000,000 | xps-common.c | 165,036,389,961,832,330,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2014-2013 | Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element. | https://nvd.nist.gov/vuln/detail/CVE-2014-2013 |
18,553 | ghostscript | 60dabde18d7fe12b19da8b509bdfee9cc886aafc | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc | None | 0 | xps_parse_rectangle(xps_document *doc, char *text, fz_rect *rect)
{
float args[4];
char *s = text;
int i;
args[0] = 0; args[1] = 0;
args[2] = 1; args[3] = 1;
for (i = 0; i < 4 && *s; i++)
{
args[i] = fz_atof(s);
while (*s && *s != ',')
s++;
if (*s == ',')
s++;
}
rect->x0 = args[0];
rect->y0 = a... | 141,577,369,087,591,170,000,000,000,000,000,000,000 | xps-common.c | 165,036,389,961,832,330,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2014-2013 | Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element. | https://nvd.nist.gov/vuln/detail/CVE-2014-2013 |
18,554 | ghostscript | 60dabde18d7fe12b19da8b509bdfee9cc886aafc | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc | None | 0 | static inline int is_real_num_char(int c)
{
return (c >= '0' && c <= '9') ||
c == 'e' || c == 'E' || c == '+' || c == '-' || c == '.';
}
| 168,254,286,943,574,790,000,000,000,000,000,000,000 | xps-glyphs.c | 328,500,031,164,501,400,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2014-2013 | Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element. | https://nvd.nist.gov/vuln/detail/CVE-2014-2013 |
18,555 | ghostscript | 60dabde18d7fe12b19da8b509bdfee9cc886aafc | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc | None | 0 | xps_count_font_encodings(fz_font *font)
{
FT_Face face = font->ft_face;
return face->num_charmaps;
}
| 106,287,244,624,409,250,000,000,000,000,000,000,000 | xps-glyphs.c | 328,500,031,164,501,400,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2014-2013 | Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element. | https://nvd.nist.gov/vuln/detail/CVE-2014-2013 |
18,556 | ghostscript | 60dabde18d7fe12b19da8b509bdfee9cc886aafc | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc | None | 0 | xps_deobfuscate_font_resource(xps_document *doc, xps_part *part)
{
unsigned char buf[33];
unsigned char key[16];
char *p;
int i;
p = strrchr(part->name, '/');
if (!p)
p = part->name;
for (i = 0; i < 32 && *p; p++)
{
if (ishex(*p))
buf[i++] = *p;
}
buf[i] = 0;
if (i != 32)
{
fz_warn(doc->ctx, "ca... | 91,682,742,567,849,120,000,000,000,000,000,000,000 | xps-glyphs.c | 328,500,031,164,501,400,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2014-2013 | Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element. | https://nvd.nist.gov/vuln/detail/CVE-2014-2013 |
18,557 | ghostscript | 60dabde18d7fe12b19da8b509bdfee9cc886aafc | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc | None | 0 | xps_encode_font_char(fz_font *font, int code)
{
FT_Face face = font->ft_face;
int gid = FT_Get_Char_Index(face, code);
if (gid == 0 && face->charmap && face->charmap->platform_id == 3 && face->charmap->encoding_id == 0)
gid = FT_Get_Char_Index(face, 0xF000 | code);
return gid;
}
| 337,717,917,581,417,960,000,000,000,000,000,000,000 | xps-glyphs.c | 328,500,031,164,501,400,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2014-2013 | Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element. | https://nvd.nist.gov/vuln/detail/CVE-2014-2013 |
18,558 | ghostscript | 60dabde18d7fe12b19da8b509bdfee9cc886aafc | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc | None | 0 | xps_identify_font_encoding(fz_font *font, int idx, int *pid, int *eid)
{
FT_Face face = font->ft_face;
*pid = face->charmaps[idx]->platform_id;
*eid = face->charmaps[idx]->encoding_id;
}
| 161,823,016,779,816,340,000,000,000,000,000,000,000 | xps-glyphs.c | 328,500,031,164,501,400,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2014-2013 | Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element. | https://nvd.nist.gov/vuln/detail/CVE-2014-2013 |
18,559 | ghostscript | 60dabde18d7fe12b19da8b509bdfee9cc886aafc | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc | None | 0 | xps_lookup_font(xps_document *doc, char *name)
{
xps_font_cache *cache;
for (cache = doc->font_table; cache; cache = cache->next)
if (!xps_strcasecmp(cache->name, name))
return fz_keep_font(doc->ctx, cache->font);
return NULL;
}
| 270,358,357,774,228,870,000,000,000,000,000,000,000 | xps-glyphs.c | 328,500,031,164,501,400,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2014-2013 | Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element. | https://nvd.nist.gov/vuln/detail/CVE-2014-2013 |
18,560 | ghostscript | 60dabde18d7fe12b19da8b509bdfee9cc886aafc | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc | None | 0 | xps_measure_font_glyph(xps_document *doc, fz_font *font, int gid, xps_glyph_metrics *mtx)
{
int mask = FT_LOAD_NO_SCALE | FT_LOAD_IGNORE_TRANSFORM;
FT_Face face = font->ft_face;
FT_Fixed hadv, vadv;
fz_context *ctx = doc->ctx;
fz_lock(ctx, FZ_LOCK_FREETYPE);
FT_Get_Advance(face, gid, mask, &hadv);
FT_Get_Advanc... | 184,665,142,084,455,750,000,000,000,000,000,000,000 | xps-glyphs.c | 328,500,031,164,501,400,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2014-2013 | Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element. | https://nvd.nist.gov/vuln/detail/CVE-2014-2013 |
18,561 | ghostscript | 60dabde18d7fe12b19da8b509bdfee9cc886aafc | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc | None | 0 | xps_parse_cluster_mapping(char *s, int *code_count, int *glyph_count)
{
if (*s == '(')
s = xps_parse_digits(s + 1, code_count);
if (*s == ':')
s = xps_parse_digits(s + 1, glyph_count);
if (*s == ')')
s ++;
return s;
}
| 251,723,560,347,249,620,000,000,000,000,000,000,000 | xps-glyphs.c | 328,500,031,164,501,400,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2014-2013 | Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element. | https://nvd.nist.gov/vuln/detail/CVE-2014-2013 |
18,562 | ghostscript | 60dabde18d7fe12b19da8b509bdfee9cc886aafc | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc | None | 0 | xps_parse_glyph_index(char *s, int *glyph_index)
{
if (*s >= '0' && *s <= '9')
s = xps_parse_digits(s, glyph_index);
return s;
}
| 156,486,371,588,479,870,000,000,000,000,000,000,000 | xps-glyphs.c | 328,500,031,164,501,400,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2014-2013 | Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element. | https://nvd.nist.gov/vuln/detail/CVE-2014-2013 |
18,563 | ghostscript | 60dabde18d7fe12b19da8b509bdfee9cc886aafc | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc | None | 0 | xps_parse_glyph_metrics(char *s, float *advance, float *uofs, float *vofs)
{
if (*s == ',')
s = xps_parse_real_num(s + 1, advance);
if (*s == ',')
s = xps_parse_real_num(s + 1, uofs);
if (*s == ',')
s = xps_parse_real_num(s + 1, vofs);
return s;
}
| 310,673,138,375,177,700,000,000,000,000,000,000,000 | xps-glyphs.c | 328,500,031,164,501,400,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2014-2013 | Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element. | https://nvd.nist.gov/vuln/detail/CVE-2014-2013 |
18,564 | ghostscript | 60dabde18d7fe12b19da8b509bdfee9cc886aafc | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc | None | 0 | xps_parse_glyphs_imp(xps_document *doc, const fz_matrix *ctm,
fz_font *font, float size, float originx, float originy,
int is_sideways, int bidi_level,
char *indices, char *unicode)
{
xps_glyph_metrics mtx;
fz_text *text;
fz_matrix tm;
float e, f;
float x = originx;
float y = originy;
char *us = unicode;
cha... | 51,418,238,765,375,130,000,000,000,000,000,000,000 | xps-glyphs.c | 328,500,031,164,501,400,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2014-2013 | Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element. | https://nvd.nist.gov/vuln/detail/CVE-2014-2013 |
18,565 | ghostscript | 60dabde18d7fe12b19da8b509bdfee9cc886aafc | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc | None | 0 | xps_parse_real_num(char *s, float *number)
{
char buf[64];
char *p = buf;
while (is_real_num_char(*s))
*p++ = *s++;
*p = 0;
if (buf[0])
*number = fz_atof(buf);
return s;
}
| 106,303,086,848,030,680,000,000,000,000,000,000,000 | xps-glyphs.c | 328,500,031,164,501,400,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2014-2013 | Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element. | https://nvd.nist.gov/vuln/detail/CVE-2014-2013 |
18,566 | ghostscript | 60dabde18d7fe12b19da8b509bdfee9cc886aafc | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc | None | 0 | xps_select_best_font_encoding(xps_document *doc, fz_font *font)
{
static struct { int pid, eid; } xps_cmap_list[] =
{
{ 3, 10 }, /* Unicode with surrogates */
{ 3, 1 }, /* Unicode without surrogates */
{ 3, 5 }, /* Wansung */
{ 3, 4 }, /* Big5 */
{ 3, 3 }, /* Prc */
{ 3, 2 }, /* ShiftJis */
{ 3, 0... | 108,451,170,086,821,700,000,000,000,000,000,000,000 | xps-glyphs.c | 328,500,031,164,501,400,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2014-2013 | Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element. | https://nvd.nist.gov/vuln/detail/CVE-2014-2013 |
18,567 | ghostscript | 60dabde18d7fe12b19da8b509bdfee9cc886aafc | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc | None | 0 | xps_select_font_encoding(fz_font *font, int idx)
{
FT_Face face = font->ft_face;
FT_Set_Charmap(face, face->charmaps[idx]);
}
| 290,511,010,068,679,530,000,000,000,000,000,000,000 | xps-glyphs.c | 328,500,031,164,501,400,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2014-2013 | Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element. | https://nvd.nist.gov/vuln/detail/CVE-2014-2013 |
18,568 | ghostscript | 60dabde18d7fe12b19da8b509bdfee9cc886aafc | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc | None | 0 | static int cmp_stop(const void *a, const void *b)
{
const struct stop *astop = a;
const struct stop *bstop = b;
float diff = astop->offset - bstop->offset;
if (diff < 0)
return -1;
if (diff > 0)
return 1;
return astop->index - bstop->index;
}
| 206,718,902,025,750,670,000,000,000,000,000,000,000 | xps-gradient.c | 34,862,251,547,178,460,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2014-2013 | Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element. | https://nvd.nist.gov/vuln/detail/CVE-2014-2013 |
18,569 | ghostscript | 60dabde18d7fe12b19da8b509bdfee9cc886aafc | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc | None | 0 | static inline float lerp(float a, float b, float x)
{
return a + (b - a) * x;
}
| 204,955,890,985,139,830,000,000,000,000,000,000,000 | xps-gradient.c | 34,862,251,547,178,460,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2014-2013 | Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element. | https://nvd.nist.gov/vuln/detail/CVE-2014-2013 |
18,570 | ghostscript | 60dabde18d7fe12b19da8b509bdfee9cc886aafc | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc | None | 0 | static inline float point_inside_circle(float px, float py, float x, float y, float r)
{
float dx = px - x;
float dy = py - y;
return dx * dx + dy * dy <= r * r;
}
| 161,850,213,541,515,520,000,000,000,000,000,000,000 | xps-gradient.c | 34,862,251,547,178,460,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2014-2013 | Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element. | https://nvd.nist.gov/vuln/detail/CVE-2014-2013 |
18,571 | ghostscript | 60dabde18d7fe12b19da8b509bdfee9cc886aafc | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc | None | 0 | xps_draw_linear_gradient(xps_document *doc, const fz_matrix *ctm, const fz_rect *area,
struct stop *stops, int count,
fz_xml *root, int spread)
{
float x0, y0, x1, y1;
int i, mi, ma;
float dx, dy, x, y, k;
fz_point p1, p2;
fz_matrix inv;
fz_rect local_area = *area;
char *start_point_att = fz_xml_att(root, "St... | 63,987,928,841,885,760,000,000,000,000,000,000,000 | xps-gradient.c | 34,862,251,547,178,460,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2014-2013 | Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element. | https://nvd.nist.gov/vuln/detail/CVE-2014-2013 |
18,572 | ghostscript | 60dabde18d7fe12b19da8b509bdfee9cc886aafc | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc | None | 0 | xps_draw_one_linear_gradient(xps_document *doc, const fz_matrix *ctm,
struct stop *stops, int count,
int extend,
float x0, float y0, float x1, float y1)
{
fz_shade *shade;
/* TODO: this (and the stuff in pdf_shade) should move to res_shade.c */
shade = fz_malloc_struct(doc->ctx, fz_shade);
FZ_INIT_STORABLE(shad... | 322,666,159,842,862,930,000,000,000,000,000,000,000 | xps-gradient.c | 34,862,251,547,178,460,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2014-2013 | Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element. | https://nvd.nist.gov/vuln/detail/CVE-2014-2013 |
18,573 | ghostscript | 60dabde18d7fe12b19da8b509bdfee9cc886aafc | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc | None | 0 | xps_draw_radial_gradient(xps_document *doc, const fz_matrix *ctm, const fz_rect *area,
struct stop *stops, int count,
fz_xml *root, int spread)
{
float x0, y0, r0;
float x1, y1, r1;
float xrad = 1;
float yrad = 1;
float invscale;
int i, ma = 1;
fz_matrix local_ctm = *ctm;
fz_matrix inv;
fz_rect local_area = ... | 199,082,708,069,447,750,000,000,000,000,000,000,000 | xps-gradient.c | 34,862,251,547,178,460,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2014-2013 | Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element. | https://nvd.nist.gov/vuln/detail/CVE-2014-2013 |
18,574 | ghostscript | 60dabde18d7fe12b19da8b509bdfee9cc886aafc | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc | None | 0 | xps_parse_gradient_brush(xps_document *doc, const fz_matrix *ctm, const fz_rect *area,
char *base_uri, xps_resource *dict, fz_xml *root,
void (*draw)(xps_document *, const fz_matrix*, const fz_rect *, struct stop *, int, fz_xml *, int))
{
fz_xml *node;
char *opacity_att;
char *spread_att;
char *transform_att;
... | 68,728,437,367,345,630,000,000,000,000,000,000,000 | xps-gradient.c | 34,862,251,547,178,460,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2014-2013 | Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element. | https://nvd.nist.gov/vuln/detail/CVE-2014-2013 |
18,575 | ghostscript | 60dabde18d7fe12b19da8b509bdfee9cc886aafc | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc | None | 0 | xps_parse_linear_gradient_brush(xps_document *doc, const fz_matrix *ctm, const fz_rect *area,
char *base_uri, xps_resource *dict, fz_xml *root)
{
xps_parse_gradient_brush(doc, ctm, area, base_uri, dict, root, xps_draw_linear_gradient);
}
| 241,645,555,057,040,070,000,000,000,000,000,000,000 | xps-gradient.c | 34,862,251,547,178,460,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2014-2013 | Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element. | https://nvd.nist.gov/vuln/detail/CVE-2014-2013 |
18,576 | ghostscript | 60dabde18d7fe12b19da8b509bdfee9cc886aafc | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc | None | 0 | xps_sample_gradient_stops(fz_shade *shade, struct stop *stops, int count)
{
float offset, d;
int i, k;
k = 0;
for (i = 0; i < 256; i++)
{
offset = i / 255.0f;
while (k + 1 < count && offset > stops[k+1].offset)
k++;
d = (offset - stops[k].offset) / (stops[k+1].offset - stops[k].offset);
shade->functi... | 234,229,669,747,807,840,000,000,000,000,000,000,000 | xps-gradient.c | 34,862,251,547,178,460,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2014-2013 | Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element. | https://nvd.nist.gov/vuln/detail/CVE-2014-2013 |
18,577 | ghostscript | 60dabde18d7fe12b19da8b509bdfee9cc886aafc | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc | None | 0 | angle_between(const fz_point u, const fz_point v)
{
float det = u.x * v.y - u.y * v.x;
float sign = (det < 0 ? -1 : 1);
float magu = u.x * u.x + u.y * u.y;
float magv = v.x * v.x + v.y * v.y;
float udotv = u.x * v.x + u.y * v.y;
float t = udotv / (magu * magv);
/* guard against rounding errors when near |1| (whe... | 25,318,481,172,155,780,000,000,000,000,000,000,000 | xps-path.c | 233,204,495,568,169,470,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2014-2013 | Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element. | https://nvd.nist.gov/vuln/detail/CVE-2014-2013 |
18,578 | ghostscript | 60dabde18d7fe12b19da8b509bdfee9cc886aafc | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc | None | 0 | xps_draw_arc_segment(fz_context *doc, fz_path *path, const fz_matrix *mtx, float th0, float th1, int iscw)
{
float t, d;
fz_point p;
while (th1 < th0)
th1 += (float)M_PI * 2;
d = (float)M_PI / 180; /* 1-degree precision */
if (iscw)
{
for (t = th0 + d; t < th1 - d/2; t += d)
{
p.x = cosf(t);
p.y = ... | 151,403,701,732,359,010,000,000,000,000,000,000,000 | xps-path.c | 233,204,495,568,169,470,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2014-2013 | Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element. | https://nvd.nist.gov/vuln/detail/CVE-2014-2013 |
18,579 | ghostscript | 60dabde18d7fe12b19da8b509bdfee9cc886aafc | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc | None | 0 | xps_parse_abbreviated_geometry(xps_document *doc, char *geom, int *fill_rule)
{
fz_path *path;
char **args;
char **pargs;
char *s = geom;
fz_point pt;
int i, n;
int cmd, old;
float x1, y1, x2, y2, x3, y3;
float smooth_x, smooth_y; /* saved cubic bezier control point for smooth curves */
int reset_smooth;
pa... | 249,664,541,270,401,280,000,000,000,000,000,000,000 | xps-path.c | 233,204,495,568,169,470,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2014-2013 | Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element. | https://nvd.nist.gov/vuln/detail/CVE-2014-2013 |
18,580 | ghostscript | 60dabde18d7fe12b19da8b509bdfee9cc886aafc | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc | None | 0 | xps_parse_arc_segment(fz_context *doc, fz_path *path, fz_xml *root, int stroking, int *skipped_stroke)
{
/* ArcSegment pretty much follows the SVG algorithm for converting an
* arc in endpoint representation to an arc in centerpoint
* representation. Once in centerpoint it can be given to the
* graphics library ... | 13,218,552,231,944,604,000,000,000,000,000,000,000 | xps-path.c | 233,204,495,568,169,470,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2014-2013 | Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element. | https://nvd.nist.gov/vuln/detail/CVE-2014-2013 |
18,581 | ghostscript | 60dabde18d7fe12b19da8b509bdfee9cc886aafc | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc | None | 0 | xps_parse_float_array(char *s, int num, float *x)
{
int k = 0;
if (s == NULL || *s == 0)
return NULL;
while (*s)
{
while (*s == 0x0d || *s == '\t' || *s == ' ' || *s == 0x0a)
s++;
x[k] = (float)strtod(s, &s);
while (*s == 0x0d || *s == '\t' || *s == ' ' || *s == 0x0a)
s++;
if (*s == ',')
s++;
... | 40,600,864,067,068,080,000,000,000,000,000,000,000 | xps-path.c | 233,204,495,568,169,470,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2014-2013 | Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element. | https://nvd.nist.gov/vuln/detail/CVE-2014-2013 |
18,582 | ghostscript | 60dabde18d7fe12b19da8b509bdfee9cc886aafc | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc | None | 0 | xps_parse_path_figure(fz_context *doc, fz_path *path, fz_xml *root, int stroking)
{
fz_xml *node;
char *is_closed_att;
char *start_point_att;
char *is_filled_att;
int is_closed = 0;
int is_filled = 1;
float start_x = 0;
float start_y = 0;
int skipped_stroke = 0;
is_closed_att = fz_xml_att(root, "IsClosed"... | 269,184,794,589,625,680,000,000,000,000,000,000,000 | xps-path.c | 233,204,495,568,169,470,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2014-2013 | Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element. | https://nvd.nist.gov/vuln/detail/CVE-2014-2013 |
18,583 | ghostscript | 60dabde18d7fe12b19da8b509bdfee9cc886aafc | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc | None | 0 | xps_parse_path_geometry(xps_document *doc, xps_resource *dict, fz_xml *root, int stroking, int *fill_rule)
{
fz_xml *node;
char *figures_att;
char *fill_rule_att;
char *transform_att;
fz_xml *transform_tag = NULL;
fz_xml *figures_tag = NULL; /* only used by resource */
fz_matrix transform;
fz_path *path;
f... | 252,336,628,301,409,040,000,000,000,000,000,000,000 | xps-path.c | 233,204,495,568,169,470,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2014-2013 | Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element. | https://nvd.nist.gov/vuln/detail/CVE-2014-2013 |
18,584 | ghostscript | 60dabde18d7fe12b19da8b509bdfee9cc886aafc | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc | None | 0 | xps_parse_point(char *s_in, float *x, float *y)
{
char *s_out = s_in;
float xy[2];
s_out = xps_parse_float_array(s_out, 2, &xy[0]);
*x = xy[0];
*y = xy[1];
return s_out;
}
| 267,376,209,587,018,500,000,000,000,000,000,000,000 | xps-path.c | 233,204,495,568,169,470,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2014-2013 | Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element. | https://nvd.nist.gov/vuln/detail/CVE-2014-2013 |
18,585 | ghostscript | 60dabde18d7fe12b19da8b509bdfee9cc886aafc | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc | None | 0 | xps_parse_poly_bezier_segment(fz_context *doc, fz_path *path, fz_xml *root, int stroking, int *skipped_stroke)
{
char *points_att = fz_xml_att(root, "Points");
char *is_stroked_att = fz_xml_att(root, "IsStroked");
float x[3], y[3];
int is_stroked;
char *s;
int n;
if (!points_att)
{
fz_warn(doc, "PolyBezierSe... | 97,810,264,793,624,600,000,000,000,000,000,000,000 | xps-path.c | 233,204,495,568,169,470,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2014-2013 | Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element. | https://nvd.nist.gov/vuln/detail/CVE-2014-2013 |
18,586 | ghostscript | 60dabde18d7fe12b19da8b509bdfee9cc886aafc | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc | None | 0 | xps_parse_poly_line_segment(fz_context *doc, fz_path *path, fz_xml *root, int stroking, int *skipped_stroke)
{
char *points_att = fz_xml_att(root, "Points");
char *is_stroked_att = fz_xml_att(root, "IsStroked");
int is_stroked;
float x, y;
char *s;
if (!points_att)
{
fz_warn(doc, "PolyLineSegment element has ... | 38,105,694,775,042,493,000,000,000,000,000,000,000 | xps-path.c | 233,204,495,568,169,470,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2014-2013 | Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element. | https://nvd.nist.gov/vuln/detail/CVE-2014-2013 |
18,587 | ghostscript | 60dabde18d7fe12b19da8b509bdfee9cc886aafc | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=mupdf.git;a=commitdiff;h=60dabde18d7fe12b19da8b509bdfee9cc886aafc | None | 0 | xps_parse_poly_quadratic_bezier_segment(fz_context *doc, fz_path *path, fz_xml *root, int stroking, int *skipped_stroke)
{
char *points_att = fz_xml_att(root, "Points");
char *is_stroked_att = fz_xml_att(root, "IsStroked");
float x[2], y[2];
int is_stroked;
fz_point pt;
char *s;
int n;
if (!points_att)
{
fz... | 48,908,487,420,187,370,000,000,000,000,000,000,000 | xps-path.c | 233,204,495,568,169,470,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2014-2013 | Stack-based buffer overflow in the xps_parse_color function in xps/xps-common.c in MuPDF 1.3 and earlier allows remote attackers to execute arbitrary code via a large number of entries in the ContextColor value of the Fill attribute in a Path element. | https://nvd.nist.gov/vuln/detail/CVE-2014-2013 |
18,588 | lxde | f99163c6ff8b2f57c5f37b1ce5d62cf7450d4648 | https://git.lxde.org/gitweb/?p=lxde/pcmanfm | https://git.lxde.org/gitweb/?p=lxde/lxterminal.git;a=commit;h=f99163c6ff8b2f57c5f37b1ce5d62cf7450d4648 | None | 0 | static gboolean lxterminal_socket_accept_client(GIOChannel * source, GIOCondition condition, LXTermWindow * lxtermwin)
{
if (condition & G_IO_IN)
{
/* Accept the new connection. */
int fd = accept(g_io_channel_unix_get_fd(source), NULL, NULL);
if (fd < 0)
g_warning("Accept fa... | 131,257,008,401,233,960,000,000,000,000,000,000,000 | None | null | [
"CWE-284"
] | CVE-2016-10369 | unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control). | https://nvd.nist.gov/vuln/detail/CVE-2016-10369 |
18,589 | lxde | f99163c6ff8b2f57c5f37b1ce5d62cf7450d4648 | https://git.lxde.org/gitweb/?p=lxde/pcmanfm | https://git.lxde.org/gitweb/?p=lxde/lxterminal.git;a=commit;h=f99163c6ff8b2f57c5f37b1ce5d62cf7450d4648 | None | 0 | static gboolean lxterminal_socket_read_channel(GIOChannel * gio, GIOCondition condition, LXTermWindow * lxtermwin)
{
/* Read message. */
gchar * msg = NULL;
gsize len = 0;
GError * err = NULL;
GIOStatus ret = g_io_channel_read_to_end(gio, &msg, &len, &err);
if (ret == G_IO_STATUS_ERROR)
{
... | 39,623,340,063,477,823,000,000,000,000,000,000,000 | None | null | [
"CWE-284"
] | CVE-2016-10369 | unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control). | https://nvd.nist.gov/vuln/detail/CVE-2016-10369 |
18,590 | savannah | fa481c116e65ccf9137c7ddc8abc3cf05dc12f55 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=gnash.git;a=commitdiff;h=fa481c116e65ccf9137c7ddc8abc3cf05dc12f55 | None | 0 | nsPluginInstance::DestroyStream(NPStream* /*stream*/, NPError /*reason*/)
{
if (_streamfd != -1) {
if (close(_streamfd) == -1) {
perror("closing _streamfd");
} else {
_streamfd = -1;
}
}
return NPERR_NO_ERROR;
}
| 92,849,475,068,879,910,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2011-4328 | plugin/npapi/plugin.cpp in Gnash before 0.8.10 uses weak permissions (world readable) for cookie files with predictable names in /tmp, which allows local users to obtain sensitive information. | https://nvd.nist.gov/vuln/detail/CVE-2011-4328 |
18,591 | savannah | fa481c116e65ccf9137c7ddc8abc3cf05dc12f55 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=gnash.git;a=commitdiff;h=fa481c116e65ccf9137c7ddc8abc3cf05dc12f55 | None | 0 | nsPluginInstance::GetValue(NPPVariable aVariable, void *aValue)
{
if (aVariable == NPPVpluginScriptableNPObject) {
if (_scriptObject) {
void **v = (void **)aValue;
NPN_RetainObject(_scriptObject);
*v = _scriptObject;
} else {
gnash::log_debug("_script... | 6,557,299,281,548,204,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2011-4328 | plugin/npapi/plugin.cpp in Gnash before 0.8.10 uses weak permissions (world readable) for cookie files with predictable names in /tmp, which allows local users to obtain sensitive information. | https://nvd.nist.gov/vuln/detail/CVE-2011-4328 |
18,592 | savannah | fa481c116e65ccf9137c7ddc8abc3cf05dc12f55 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=gnash.git;a=commitdiff;h=fa481c116e65ccf9137c7ddc8abc3cf05dc12f55 | None | 0 | inline bool HasScripting()
{
return (NPNFuncs.version >= NPVERS_HAS_NPRUNTIME_SCRIPTING);
}
| 315,848,700,126,459,230,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2011-4328 | plugin/npapi/plugin.cpp in Gnash before 0.8.10 uses weak permissions (world readable) for cookie files with predictable names in /tmp, which allows local users to obtain sensitive information. | https://nvd.nist.gov/vuln/detail/CVE-2011-4328 |
18,593 | savannah | fa481c116e65ccf9137c7ddc8abc3cf05dc12f55 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=gnash.git;a=commitdiff;h=fa481c116e65ccf9137c7ddc8abc3cf05dc12f55 | None | 0 | NS_DestroyPluginInstance(nsPluginInstanceBase* aPlugin)
{
delete static_cast<gnash::nsPluginInstance *> (aPlugin);
}
| 76,232,823,247,091,435,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2011-4328 | plugin/npapi/plugin.cpp in Gnash before 0.8.10 uses weak permissions (world readable) for cookie files with predictable names in /tmp, which allows local users to obtain sensitive information. | https://nvd.nist.gov/vuln/detail/CVE-2011-4328 |
18,594 | savannah | fa481c116e65ccf9137c7ddc8abc3cf05dc12f55 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=gnash.git;a=commitdiff;h=fa481c116e65ccf9137c7ddc8abc3cf05dc12f55 | None | 0 | NS_NewPluginInstance(nsPluginCreateData * aCreateDataStruct)
{
if(!aCreateDataStruct) {
return NULL;
}
return new gnash::nsPluginInstance(aCreateDataStruct);
}
| 67,902,204,840,371,210,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2011-4328 | plugin/npapi/plugin.cpp in Gnash before 0.8.10 uses weak permissions (world readable) for cookie files with predictable names in /tmp, which allows local users to obtain sensitive information. | https://nvd.nist.gov/vuln/detail/CVE-2011-4328 |
18,595 | savannah | fa481c116e65ccf9137c7ddc8abc3cf05dc12f55 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=gnash.git;a=commitdiff;h=fa481c116e65ccf9137c7ddc8abc3cf05dc12f55 | None | 0 | NS_PluginGetValue(NPPVariable aVariable, void *aValue)
{
NPError err = NPERR_NO_ERROR;
switch (aVariable) {
case NPPVpluginNameString:
*static_cast<const char **> (aValue) = PLUGIN_NAME;
break;
case NPPVpluginDescriptionString:
*static_cast<const char **>(aV... | 141,971,228,174,723,470,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2011-4328 | plugin/npapi/plugin.cpp in Gnash before 0.8.10 uses weak permissions (world readable) for cookie files with predictable names in /tmp, which allows local users to obtain sensitive information. | https://nvd.nist.gov/vuln/detail/CVE-2011-4328 |
18,596 | savannah | fa481c116e65ccf9137c7ddc8abc3cf05dc12f55 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=gnash.git;a=commitdiff;h=fa481c116e65ccf9137c7ddc8abc3cf05dc12f55 | None | 0 | NS_PluginInitialize()
{
if ( gnash::plugInitialized ) {
gnash::log_debug("NS_PluginInitialize called, but ignored (we already initialized)");
return NPERR_NO_ERROR;
}
gnash::log_debug("NS_PluginInitialize call ---------------------------");
NPError err = NPERR_NO_ERROR;
NPBool su... | 229,330,017,577,009,220,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2011-4328 | plugin/npapi/plugin.cpp in Gnash before 0.8.10 uses weak permissions (world readable) for cookie files with predictable names in /tmp, which allows local users to obtain sensitive information. | https://nvd.nist.gov/vuln/detail/CVE-2011-4328 |
18,597 | savannah | fa481c116e65ccf9137c7ddc8abc3cf05dc12f55 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=gnash.git;a=commitdiff;h=fa481c116e65ccf9137c7ddc8abc3cf05dc12f55 | None | 0 | nsPluginInstance::NewStream(NPMIMEType /*type*/, NPStream* stream,
NPBool /*seekable*/, uint16_t* /*stype*/)
{
if (_childpid) {
return NPERR_GENERIC_ERROR;
}
_swf_url = stream->url;
if (!_swf_url.empty() && _window) {
return startProc();
}
return NP... | 24,123,827,653,019,720,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2011-4328 | plugin/npapi/plugin.cpp in Gnash before 0.8.10 uses weak permissions (world readable) for cookie files with predictable names in /tmp, which allows local users to obtain sensitive information. | https://nvd.nist.gov/vuln/detail/CVE-2011-4328 |
18,598 | savannah | fa481c116e65ccf9137c7ddc8abc3cf05dc12f55 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=gnash.git;a=commitdiff;h=fa481c116e65ccf9137c7ddc8abc3cf05dc12f55 | None | 0 | nsPluginInstance::SetWindow(NPWindow* aWindow)
{
if(!aWindow) {
gnash::log_error(std::string(__FUNCTION__) + ": ERROR: Window handle was bogus!");
return NPERR_INVALID_PARAM;
#if 0
} else {
gnash::log_debug("%s: X origin = %d, Y Origin = %d, Width = %d,"
" Height = %d, Window... | 337,718,432,672,893,150,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2011-4328 | plugin/npapi/plugin.cpp in Gnash before 0.8.10 uses weak permissions (world readable) for cookie files with predictable names in /tmp, which allows local users to obtain sensitive information. | https://nvd.nist.gov/vuln/detail/CVE-2011-4328 |
18,599 | savannah | fa481c116e65ccf9137c7ddc8abc3cf05dc12f55 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=gnash.git;a=commitdiff;h=fa481c116e65ccf9137c7ddc8abc3cf05dc12f55 | None | 0 | nsPluginInstance::WriteReady(NPStream* /* stream */ )
{
if ( _streamfd != -1 ) {
return 1024;
} else {
return 0;
}
}
| 211,353,661,739,556,600,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2011-4328 | plugin/npapi/plugin.cpp in Gnash before 0.8.10 uses weak permissions (world readable) for cookie files with predictable names in /tmp, which allows local users to obtain sensitive information. | https://nvd.nist.gov/vuln/detail/CVE-2011-4328 |
18,600 | savannah | fa481c116e65ccf9137c7ddc8abc3cf05dc12f55 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=gnash.git;a=commitdiff;h=fa481c116e65ccf9137c7ddc8abc3cf05dc12f55 | None | 0 | cleanup_childpid(gpointer data)
{
int* pid = static_cast<int*>(data);
int status;
int rv = waitpid(*pid, &status, WNOHANG);
if (rv <= 0) {
kill(*pid, SIGKILL);
waitpid(*pid, &status, 0);
}
gnash::log_debug("Child process exited with status %s", status);
delete pid;
... | 313,807,431,192,363,860,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2011-4328 | plugin/npapi/plugin.cpp in Gnash before 0.8.10 uses weak permissions (world readable) for cookie files with predictable names in /tmp, which allows local users to obtain sensitive information. | https://nvd.nist.gov/vuln/detail/CVE-2011-4328 |
18,601 | savannah | fa481c116e65ccf9137c7ddc8abc3cf05dc12f55 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=gnash.git;a=commitdiff;h=fa481c116e65ccf9137c7ddc8abc3cf05dc12f55 | None | 0 | close_fds(const int (& except)[N])
{
int numfailed = 0, closed = 0;
for (int anfd = fileno(stderr)+1; numfailed < 10; anfd++) {
if (std::find(except, except+N, anfd) != except+N) {
continue;
}
if (close(anfd) < 0) {
numfailed++;
} else {
numfai... | 2,355,630,909,746,146,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2011-4328 | plugin/npapi/plugin.cpp in Gnash before 0.8.10 uses weak permissions (world readable) for cookie files with predictable names in /tmp, which allows local users to obtain sensitive information. | https://nvd.nist.gov/vuln/detail/CVE-2011-4328 |
18,602 | savannah | fa481c116e65ccf9137c7ddc8abc3cf05dc12f55 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=gnash.git;a=commitdiff;h=fa481c116e65ccf9137c7ddc8abc3cf05dc12f55 | None | 0 | create_standalone_launcher(const std::string& page_url, const std::string& swf_url,
const std::map<std::string, std::string>& params)
{
#ifdef CREATE_STANDALONE_GNASH_LAUNCHER
if (!createSaLauncher) {
return;
}
std::ofstream saLauncher;
std::stringstream ss;
stat... | 304,084,950,863,602,570,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2011-4328 | plugin/npapi/plugin.cpp in Gnash before 0.8.10 uses weak permissions (world readable) for cookie files with predictable names in /tmp, which allows local users to obtain sensitive information. | https://nvd.nist.gov/vuln/detail/CVE-2011-4328 |
18,603 | savannah | fa481c116e65ccf9137c7ddc8abc3cf05dc12f55 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=gnash.git;a=commitdiff;h=fa481c116e65ccf9137c7ddc8abc3cf05dc12f55 | None | 0 | nsPluginInstance::getCurrentPageURL() const
{
return getDocumentProp("baseURI");
}
| 176,700,604,445,558,200,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2011-4328 | plugin/npapi/plugin.cpp in Gnash before 0.8.10 uses weak permissions (world readable) for cookie files with predictable names in /tmp, which allows local users to obtain sensitive information. | https://nvd.nist.gov/vuln/detail/CVE-2011-4328 |
18,604 | savannah | fa481c116e65ccf9137c7ddc8abc3cf05dc12f55 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=gnash.git;a=commitdiff;h=fa481c116e65ccf9137c7ddc8abc3cf05dc12f55 | None | 0 | nsPluginInstance::getDocumentProp(const std::string& propname) const
{
std::string rv;
if (!HasScripting()) {
LOG_ONCE( gnash::log_debug("Browser doesn't support scripting") );
return rv;
}
NPObject* windowobj;
NPError err = NPN_GetValue(_instance, NPNVWindowNPObject, &windowobj);
... | 249,316,006,894,377,170,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2011-4328 | plugin/npapi/plugin.cpp in Gnash before 0.8.10 uses weak permissions (world readable) for cookie files with predictable names in /tmp, which allows local users to obtain sensitive information. | https://nvd.nist.gov/vuln/detail/CVE-2011-4328 |
18,605 | savannah | fa481c116e65ccf9137c7ddc8abc3cf05dc12f55 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=gnash.git;a=commitdiff;h=fa481c116e65ccf9137c7ddc8abc3cf05dc12f55 | None | 0 | getGnashExecutable()
{
std::string procname;
bool process_found = false;
struct stat procstats;
char *gnash_env = std::getenv("GNASH_PLAYER");
if (gnash_env) {
procname = gnash_env;
process_found = (0 == stat(procname.c_str(), &procstats));
if (!process_found) {
... | 80,564,543,084,413,630,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2011-4328 | plugin/npapi/plugin.cpp in Gnash before 0.8.10 uses weak permissions (world readable) for cookie files with predictable names in /tmp, which allows local users to obtain sensitive information. | https://nvd.nist.gov/vuln/detail/CVE-2011-4328 |
18,606 | savannah | fa481c116e65ccf9137c7ddc8abc3cf05dc12f55 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=gnash.git;a=commitdiff;h=fa481c116e65ccf9137c7ddc8abc3cf05dc12f55 | None | 0 | getPluginDescription()
{
static const char* desc = NULL;
if (!desc) {
desc = std::getenv("GNASH_PLUGIN_DESCRIPTION");
if (desc == NULL) desc = PLUGIN_DESCRIPTION;
}
return desc;
}
| 107,115,944,123,771,940,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2011-4328 | plugin/npapi/plugin.cpp in Gnash before 0.8.10 uses weak permissions (world readable) for cookie files with predictable names in /tmp, which allows local users to obtain sensitive information. | https://nvd.nist.gov/vuln/detail/CVE-2011-4328 |
18,607 | savannah | fa481c116e65ccf9137c7ddc8abc3cf05dc12f55 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=gnash.git;a=commitdiff;h=fa481c116e65ccf9137c7ddc8abc3cf05dc12f55 | None | 0 | nsPluginInstance::handlePlayerRequests(GIOChannel* iochan, GIOCondition cond)
{
if ( cond & G_IO_HUP ) {
gnash::log_debug("Player control socket hang up");
return false;
}
assert(cond & G_IO_IN);
gnash::log_debug("Checking player requests on FD #%d",
g_io_channel_unix_ge... | 203,983,781,877,856,900,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2011-4328 | plugin/npapi/plugin.cpp in Gnash before 0.8.10 uses weak permissions (world readable) for cookie files with predictable names in /tmp, which allows local users to obtain sensitive information. | https://nvd.nist.gov/vuln/detail/CVE-2011-4328 |
18,608 | savannah | fa481c116e65ccf9137c7ddc8abc3cf05dc12f55 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=gnash.git;a=commitdiff;h=fa481c116e65ccf9137c7ddc8abc3cf05dc12f55 | None | 0 | nsPluginInstance::nsPluginInstance(nsPluginCreateData* data)
:
nsPluginInstanceBase(),
_instance(data->instance),
_window(0),
_width(0),
_height(0),
_streamfd(-1),
_childpid(0),
_filefd(-1),
_name(),
_scriptObject(0)
{
for (size_t i=0, n=data->argc; i<n; ++i) {
s... | 286,144,777,054,444,760,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2011-4328 | plugin/npapi/plugin.cpp in Gnash before 0.8.10 uses weak permissions (world readable) for cookie files with predictable names in /tmp, which allows local users to obtain sensitive information. | https://nvd.nist.gov/vuln/detail/CVE-2011-4328 |
18,609 | savannah | fa481c116e65ccf9137c7ddc8abc3cf05dc12f55 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=gnash.git;a=commitdiff;h=fa481c116e65ccf9137c7ddc8abc3cf05dc12f55 | None | 0 | processLog_debug(const boost::format& fmt)
{
std::cout << "DEBUG: " << fmt.str() << std::endl;
}
| 280,666,310,693,079,600,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2011-4328 | plugin/npapi/plugin.cpp in Gnash before 0.8.10 uses weak permissions (world readable) for cookie files with predictable names in /tmp, which allows local users to obtain sensitive information. | https://nvd.nist.gov/vuln/detail/CVE-2011-4328 |
18,610 | savannah | fa481c116e65ccf9137c7ddc8abc3cf05dc12f55 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=gnash.git;a=commitdiff;h=fa481c116e65ccf9137c7ddc8abc3cf05dc12f55 | None | 0 | processLog_debug(const boost::format& /* fmt */)
{ /* do nothing */ }
| 248,861,854,973,777,800,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2011-4328 | plugin/npapi/plugin.cpp in Gnash before 0.8.10 uses weak permissions (world readable) for cookie files with predictable names in /tmp, which allows local users to obtain sensitive information. | https://nvd.nist.gov/vuln/detail/CVE-2011-4328 |
18,611 | savannah | fa481c116e65ccf9137c7ddc8abc3cf05dc12f55 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=gnash.git;a=commitdiff;h=fa481c116e65ccf9137c7ddc8abc3cf05dc12f55 | None | 0 | processLog_error(const boost::format& fmt)
{
std::cerr << "ERROR: " << fmt.str() << std::endl;
}
| 163,293,484,009,745,920,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2011-4328 | plugin/npapi/plugin.cpp in Gnash before 0.8.10 uses weak permissions (world readable) for cookie files with predictable names in /tmp, which allows local users to obtain sensitive information. | https://nvd.nist.gov/vuln/detail/CVE-2011-4328 |
18,612 | savannah | fa481c116e65ccf9137c7ddc8abc3cf05dc12f55 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=gnash.git;a=commitdiff;h=fa481c116e65ccf9137c7ddc8abc3cf05dc12f55 | None | 0 | processLog_trace(const boost::format& fmt)
{
std::cout << "TRACE: " << fmt.str() << std::endl;
}
| 234,711,093,427,517,250,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2011-4328 | plugin/npapi/plugin.cpp in Gnash before 0.8.10 uses weak permissions (world readable) for cookie files with predictable names in /tmp, which allows local users to obtain sensitive information. | https://nvd.nist.gov/vuln/detail/CVE-2011-4328 |
18,613 | savannah | fa481c116e65ccf9137c7ddc8abc3cf05dc12f55 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=gnash.git;a=commitdiff;h=fa481c116e65ccf9137c7ddc8abc3cf05dc12f55 | None | 0 | processLog_trace(const boost::format& /* fmt */)
{ /* do nothing */ }
| 165,507,783,055,111,540,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2011-4328 | plugin/npapi/plugin.cpp in Gnash before 0.8.10 uses weak permissions (world readable) for cookie files with predictable names in /tmp, which allows local users to obtain sensitive information. | https://nvd.nist.gov/vuln/detail/CVE-2011-4328 |
18,614 | savannah | fa481c116e65ccf9137c7ddc8abc3cf05dc12f55 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=gnash.git;a=commitdiff;h=fa481c116e65ccf9137c7ddc8abc3cf05dc12f55 | None | 0 | remove_handler(GIOChannel*, GIOCondition, gpointer)
{
return FALSE;
}
| 253,628,384,771,233,740,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2011-4328 | plugin/npapi/plugin.cpp in Gnash before 0.8.10 uses weak permissions (world readable) for cookie files with predictable names in /tmp, which allows local users to obtain sensitive information. | https://nvd.nist.gov/vuln/detail/CVE-2011-4328 |
18,615 | savannah | fa481c116e65ccf9137c7ddc8abc3cf05dc12f55 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=gnash.git;a=commitdiff;h=fa481c116e65ccf9137c7ddc8abc3cf05dc12f55 | None | 0 | nsPluginInstance::setupIOChannel(int fd, GIOFunc handler, GIOCondition signals) const
{
GIOChannel* ichan = g_io_channel_unix_new(fd);
g_io_channel_set_close_on_unref(ichan, true);
gnash::log_debug("New IO Channel for fd #%d",
g_io_channel_unix_get_fd(ichan));
g_io_add_watch(ichan,... | 148,081,202,236,810,700,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2011-4328 | plugin/npapi/plugin.cpp in Gnash before 0.8.10 uses weak permissions (world readable) for cookie files with predictable names in /tmp, which allows local users to obtain sensitive information. | https://nvd.nist.gov/vuln/detail/CVE-2011-4328 |
18,616 | savannah | fa481c116e65ccf9137c7ddc8abc3cf05dc12f55 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=gnash.git;a=commitdiff;h=fa481c116e65ccf9137c7ddc8abc3cf05dc12f55 | None | 0 | nsPluginInstance::setupProxy(const std::string& url)
{
#if NPAPI_VERSION != 190
if (!NPNFuncs.getvalueforurl) return;
#endif
char *proxy = 0;
uint32_t length = 0;
#if NPAPI_VERSION != 190
NPN_GetValueForURL(_instance, NPNURLVProxy, url.c_str(),
&proxy, &length);
#endif
if (!p... | 278,867,867,547,960,250,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2011-4328 | plugin/npapi/plugin.cpp in Gnash before 0.8.10 uses weak permissions (world readable) for cookie files with predictable names in /tmp, which allows local users to obtain sensitive information. | https://nvd.nist.gov/vuln/detail/CVE-2011-4328 |
18,617 | savannah | fa481c116e65ccf9137c7ddc8abc3cf05dc12f55 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=gnash.git;a=commitdiff;h=fa481c116e65ccf9137c7ddc8abc3cf05dc12f55 | None | 0 | nsPluginInstance::shut()
{
gnash::log_debug("Gnash plugin shutting down");
if (_streamfd != -1) {
if (close(_streamfd) == -1) {
perror("closing _streamfd");
} else {
_streamfd = -1;
}
}
}
| 92,021,381,884,049,620,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2011-4328 | plugin/npapi/plugin.cpp in Gnash before 0.8.10 uses weak permissions (world readable) for cookie files with predictable names in /tmp, which allows local users to obtain sensitive information. | https://nvd.nist.gov/vuln/detail/CVE-2011-4328 |
18,618 | savannah | fa481c116e65ccf9137c7ddc8abc3cf05dc12f55 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=gnash.git;a=commitdiff;h=fa481c116e65ccf9137c7ddc8abc3cf05dc12f55 | None | 0 | nsPluginInstance::startProc()
{
int p2c_pipe[2];
int c2p_pipe[2];
int p2c_controlpipe[2];
int ret = socketpair(AF_UNIX, SOCK_STREAM, 0, p2c_pipe);
if (ret == -1) {
gnash::log_error("socketpair(p2c) failed: %s", strerror(errno));
return NPERR_GENERIC_ERROR;
}
_streamfd = p2c... | 192,729,681,263,991,140,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2011-4328 | plugin/npapi/plugin.cpp in Gnash before 0.8.10 uses weak permissions (world readable) for cookie files with predictable names in /tmp, which allows local users to obtain sensitive information. | https://nvd.nist.gov/vuln/detail/CVE-2011-4328 |
18,619 | savannah | fa481c116e65ccf9137c7ddc8abc3cf05dc12f55 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=gnash.git;a=commitdiff;h=fa481c116e65ccf9137c7ddc8abc3cf05dc12f55 | None | 0 | wait_for_gdb()
{
if (!waitforgdb) {
return;
}
std::cout << std::endl << " Attach GDB to PID " << getpid()
<< " to debug!" << std::endl
<< " This thread will block until then!" << std::endl
<< " Once blocked here, you can set other breakpoints."
... | 135,691,997,723,419,080,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2011-4328 | plugin/npapi/plugin.cpp in Gnash before 0.8.10 uses weak permissions (world readable) for cookie files with predictable names in /tmp, which allows local users to obtain sensitive information. | https://nvd.nist.gov/vuln/detail/CVE-2011-4328 |
18,620 | savannah | fa481c116e65ccf9137c7ddc8abc3cf05dc12f55 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/gitweb/?p=gnash.git;a=commitdiff;h=fa481c116e65ccf9137c7ddc8abc3cf05dc12f55 | None | 0 | nsPluginInstance::~nsPluginInstance()
{
if (_scriptObject) {
NPN_ReleaseObject(_scriptObject);
}
do { } while (g_source_remove_by_user_data(this));
if (_childpid > 0) {
int status;
int rv = waitpid(_childpid, &status, WNOHANG);
if (rv <= 0) {
... | 135,765,244,797,463,500,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2011-4328 | plugin/npapi/plugin.cpp in Gnash before 0.8.10 uses weak permissions (world readable) for cookie files with predictable names in /tmp, which allows local users to obtain sensitive information. | https://nvd.nist.gov/vuln/detail/CVE-2011-4328 |
18,621 | savannah | beecf80a6deecbaf5d264d4f864451bde4fe98b8 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=beecf80a6deecbaf5d264d4f864451bde4fe98b8 | None | 0 | FT_Create_Class_cff_field_handlers( FT_Library library,
CFF_Field_Handler** output_class )
{
CFF_Field_Handler* clazz = NULL;
FT_Error error;
FT_Memory memory = library->memory;
int i = 0;
#undef CFF_FIELD
#define CFF_FIELD(... | 148,329,434,917,598,610,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2016-10328 | FreeType 2 before 2016-12-16 has an out-of-bounds write caused by a heap-based buffer overflow related to the cff_parser_run function in cff/cffparse.c. | https://nvd.nist.gov/vuln/detail/CVE-2016-10328 |
18,622 | savannah | beecf80a6deecbaf5d264d4f864451bde4fe98b8 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=beecf80a6deecbaf5d264d4f864451bde4fe98b8 | None | 0 | FT_Destroy_Class_cff_field_handlers( FT_Library library,
CFF_Field_Handler* clazz )
{
FT_Memory memory = library->memory;
if ( clazz )
FT_FREE( clazz );
}
| 71,948,812,765,816,650,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2016-10328 | FreeType 2 before 2016-12-16 has an out-of-bounds write caused by a heap-based buffer overflow related to the cff_parser_run function in cff/cffparse.c. | https://nvd.nist.gov/vuln/detail/CVE-2016-10328 |
18,623 | savannah | beecf80a6deecbaf5d264d4f864451bde4fe98b8 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=beecf80a6deecbaf5d264d4f864451bde4fe98b8 | None | 0 | cff_parse_blend( CFF_Parser parser )
{
/* blend operator can only be used in a Private DICT */
CFF_Private priv = (CFF_Private)parser->object;
CFF_SubFont subFont;
CFF_Blend blend;
FT_UInt numBlends;
FT_Error error;
error = FT_ERR( Stack_Underflow );
if ( !priv || !... | 220,256,932,045,994,220,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2016-10328 | FreeType 2 before 2016-12-16 has an out-of-bounds write caused by a heap-based buffer overflow related to the cff_parser_run function in cff/cffparse.c. | https://nvd.nist.gov/vuln/detail/CVE-2016-10328 |
18,624 | savannah | beecf80a6deecbaf5d264d4f864451bde4fe98b8 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=beecf80a6deecbaf5d264d4f864451bde4fe98b8 | None | 0 | cff_parse_cid_ros( CFF_Parser parser )
{
CFF_FontRecDict dict = (CFF_FontRecDict)parser->object;
FT_Byte** data = parser->stack;
FT_Error error;
error = FT_ERR( Stack_Underflow );
if ( parser->top >= parser->stack + 3 )
{
dict->cid_registry = (FT_UInt)cff_parse_num(... | 37,189,254,301,317,760,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2016-10328 | FreeType 2 before 2016-12-16 has an out-of-bounds write caused by a heap-based buffer overflow related to the cff_parser_run function in cff/cffparse.c. | https://nvd.nist.gov/vuln/detail/CVE-2016-10328 |
18,625 | savannah | beecf80a6deecbaf5d264d4f864451bde4fe98b8 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=beecf80a6deecbaf5d264d4f864451bde4fe98b8 | None | 0 | cff_parse_fixed_dynamic( CFF_Parser parser,
FT_Byte** d,
FT_Long* scaling )
{
FT_ASSERT( scaling );
if ( **d == 30 )
return cff_parse_real( *d, parser->limit, 0, scaling );
else
{
FT_Long number;
FT_Int integer_length;... | 195,427,724,744,936,470,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2016-10328 | FreeType 2 before 2016-12-16 has an out-of-bounds write caused by a heap-based buffer overflow related to the cff_parser_run function in cff/cffparse.c. | https://nvd.nist.gov/vuln/detail/CVE-2016-10328 |
18,626 | savannah | beecf80a6deecbaf5d264d4f864451bde4fe98b8 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=beecf80a6deecbaf5d264d4f864451bde4fe98b8 | None | 0 | cff_parse_fixed_scaled( CFF_Parser parser,
FT_Byte** d,
FT_Long scaling )
{
return do_fixed( parser, d, scaling );
}
| 200,976,438,281,493,550,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2016-10328 | FreeType 2 before 2016-12-16 has an out-of-bounds write caused by a heap-based buffer overflow related to the cff_parser_run function in cff/cffparse.c. | https://nvd.nist.gov/vuln/detail/CVE-2016-10328 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.