is_vulnerable bool 2
classes | func stringlengths 28 484k | cwe listlengths 1 2 | project stringclasses 592
values | commit_id stringlengths 7 44 | hash stringlengths 34 39 | big_vul_idx int64 4.09k 189k ⌀ | idx int64 0 522k | cwe_description stringclasses 81
values |
|---|---|---|---|---|---|---|---|---|
false | t1_decoder_parse_charstrings( T1_Decoder decoder,
FT_Byte* charstring_base,
FT_UInt charstring_len )
{
FT_Error error;
T1_Decoder_Zone zone;
FT_Byte* ip;
FT_Byte* limit;
T1_Builder builder = &d... | [
"CWE-787"
] | savannah | f958c48ee431bef8d4d466b40c9cb2d4dbcb7791 | 173319081189597155474138387684978602892 | 178,056 | 211 | The product writes data past the end, or before the beginning, of the intended buffer. |
true | t1_decoder_parse_charstrings( T1_Decoder decoder,
FT_Byte* charstring_base,
FT_UInt charstring_len )
{
FT_Error error;
T1_Decoder_Zone zone;
FT_Byte* ip;
FT_Byte* limit;
T1_Builder builder = &d... | [
"CWE-787"
] | savannah | f958c48ee431bef8d4d466b40c9cb2d4dbcb7791 | 131877843141694356133309697518467244252 | 178,056 | 158,071 | The product writes data past the end, or before the beginning, of the intended buffer. |
false | validate_body_helper (DBusTypeReader *reader,
int byte_order,
dbus_bool_t walk_reader_to_end,
const unsigned char *p,
const unsigned char *end,
const unsigned char **ne... | [
"CWE-399"
] | dbus | 7d65a3a6ed8815e34a99c680ac3869fde49dbbd4 | 293803507783746447357509233379751643676 | 178,058 | 212 | This vulnerability category highlights issues in resource management where failures to properly release memory, file handles, or other resources can degrade system performance or enable denial-of-service conditions. |
true | validate_body_helper (DBusTypeReader *reader,
int byte_order,
dbus_bool_t walk_reader_to_end,
int total_depth,
const unsigned char *p,
const unsigned ch... | [
"CWE-399"
] | dbus | 7d65a3a6ed8815e34a99c680ac3869fde49dbbd4 | 176712459114438620245064919145260257013 | 178,058 | 158,072 | This vulnerability category highlights issues in resource management where failures to properly release memory, file handles, or other resources can degrade system performance or enable denial-of-service conditions. |
false | tt_size_reset( TT_Size size,
FT_Bool only_height )
{
TT_Face face;
FT_Size_Metrics* metrics;
size->ttmetrics.valid = FALSE;
face = (TT_Face)size->root.face;
metrics = &size->metrics;
/* copy the result from base layer */
/* This bit flag, if set... | [
"CWE-787"
] | savannah | e6699596af5c5d6f0ae0ea06e19df87dce088df8 | 328349556850502930530519513006179954778 | 178,059 | 213 | The product writes data past the end, or before the beginning, of the intended buffer. |
true | tt_size_reset( TT_Size size,
FT_Bool only_height )
{
TT_Face face;
FT_Size_Metrics* metrics;
face = (TT_Face)size->root.face;
/* nothing to do for CFF2 */
if ( face->isCFF2 )
return FT_Err_Ok;
size->ttmetrics.valid = FALSE;
metrics = &size->... | [
"CWE-787"
] | savannah | e6699596af5c5d6f0ae0ea06e19df87dce088df8 | 242836455535349747653527932796504023034 | 178,059 | 158,073 | The product writes data past the end, or before the beginning, of the intended buffer. |
false | sfnt_init_face( FT_Stream stream,
TT_Face face,
FT_Int face_instance_index,
FT_Int num_params,
FT_Parameter* params )
{
FT_Error error;
FT_Memory memory = face->root.memory;
FT_Library librar... | [
"CWE-787"
] | savannah | 7bbb91fbf47fc0775cc9705673caf0c47a81f94b | 119798325318146814691558712066205414712 | 178,060 | 214 | The product writes data past the end, or before the beginning, of the intended buffer. |
true | sfnt_init_face( FT_Stream stream,
TT_Face face,
FT_Int face_instance_index,
FT_Int num_params,
FT_Parameter* params )
{
FT_Error error;
FT_Memory memory = face->root.memory;
FT_Library librar... | [
"CWE-787"
] | savannah | 7bbb91fbf47fc0775cc9705673caf0c47a81f94b | 226909658136416070549978617553739875522 | 178,060 | 158,074 | The product writes data past the end, or before the beginning, of the intended buffer. |
false | int main (int argc, char *argv[])
{
int objectsCount = 0;
Guint numOffset = 0;
std::vector<Object> pages;
std::vector<Guint> offsets;
XRef *yRef, *countRef;
FILE *f;
OutStream *outStr;
int i;
int j, rootNum;
std::vector<PDFDoc *>docs;
int majorVersion = 0;
int minorVersion = 0;
char *fileName ... | [
"CWE-476"
] | poppler | 5c9b08a875b07853be6c44e43ff5f7f059df666a | 180050936886598415271458736244884709418 | 178,062 | 215 | The product dereferences a pointer that it expects to be valid but is NULL. |
true | int main (int argc, char *argv[])
{
int objectsCount = 0;
Guint numOffset = 0;
std::vector<Object> pages;
std::vector<Guint> offsets;
XRef *yRef, *countRef;
FILE *f;
OutStream *outStr;
int i;
int j, rootNum;
std::vector<PDFDoc *>docs;
int majorVersion = 0;
int minorVersion = 0;
char *fileName ... | [
"CWE-476"
] | poppler | 5c9b08a875b07853be6c44e43ff5f7f059df666a | 4674050423349651754578522671885372804 | 178,062 | 158,075 | The product dereferences a pointer that it expects to be valid but is NULL. |
false | main (int argc _GL_UNUSED, char **argv)
{
struct timespec result;
struct timespec result2;
struct timespec expected;
struct timespec now;
const char *p;
int i;
long gmtoff;
time_t ref_time = 1304250918;
/* Set the time zone to US Eastern time with the 2012 rules. This
should disable any leap se... | [
"CWE-119"
] | savannah | 94e01571507835ff59dd8ce2a0b56a4b566965a4 | 85463602567582995767126053202641542542 | 178,063 | 216 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
true | main (int argc _GL_UNUSED, char **argv)
{
struct timespec result;
struct timespec result2;
struct timespec expected;
struct timespec now;
const char *p;
int i;
long gmtoff;
time_t ref_time = 1304250918;
/* Set the time zone to US Eastern time with the 2012 rules. This
should disable any leap se... | [
"CWE-119"
] | savannah | 94e01571507835ff59dd8ce2a0b56a4b566965a4 | 254772284669524418106772745534242359013 | 178,063 | 158,076 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
false | ft_var_readpackedpoints( FT_Stream stream,
FT_UInt *point_cnt )
{
FT_UShort *points;
FT_Int n;
FT_Int runcnt;
FT_Int i;
FT_Int j;
FT_Int first;
FT_Memory memory = stream->memory;
FT_Error error = TT_Err_Ok;
FT_UNUSED( err... | [
"CWE-119"
] | savannah | 59eb9f8cfe7d1df379a2318316d1f04f80fba54a | 176444419672545527315649492039587951909 | 178,069 | 217 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
true | ft_var_readpackedpoints( FT_Stream stream,
FT_UInt *point_cnt )
{
FT_UShort *points;
FT_Int n;
FT_Int runcnt;
FT_Int i;
FT_Int j;
FT_Int first;
FT_Memory memory = stream->memory;
FT_Error error = TT_Err_Ok;
FT_UNUSED( er... | [
"CWE-119"
] | savannah | 59eb9f8cfe7d1df379a2318316d1f04f80fba54a | 179208058990458728256307235003655306316 | 178,069 | 158,077 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
false | set_text_distance(gs_point *pdist, double dx, double dy, const gs_matrix *pmat)
{
int code = gs_distance_transform_inverse(dx, dy, pmat, pdist);
double rounded;
if (code == gs_error_undefinedresult) {
/* The CTM is degenerate.
Can't know the distance in user space.
} else if (... | [
"CWE-119"
] | ghostscript | 39b1e54b2968620723bf32e96764c88797714879 | 334604983653907615489271299004330168271 | 178,070 | 218 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
true | set_text_distance(gs_point *pdist, double dx, double dy, const gs_matrix *pmat)
{
int code;
double rounded;
if (dx > 1e38 || dy > 1e38)
code = gs_error_undefinedresult;
else
code = gs_distance_transform_inverse(dx, dy, pmat, pdist);
if (code == gs_error_undefinedresult) {
... | [
"CWE-119"
] | ghostscript | 39b1e54b2968620723bf32e96764c88797714879 | 59940488774012010522720030779464241139 | 178,070 | 158,078 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
false | static void h2_process_demux(struct h2c *h2c)
{
struct h2s *h2s;
if (h2c->st0 >= H2_CS_ERROR)
return;
if (unlikely(h2c->st0 < H2_CS_FRAME_H)) {
if (h2c->st0 == H2_CS_PREFACE) {
if (unlikely(h2c_frt_recv_preface(h2c) <= 0)) {
/* RFC7540#3.5: a GOAWAY frame MAY be omitted */
if (h2c->st0 == H2_CS_ERRO... | [
"CWE-119"
] | haproxy | 3f0e1ec70173593f4c2b3681b26c04a4ed5fc588 | 197791135802871490452896068201538076195 | 178,071 | 219 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
true | static void h2_process_demux(struct h2c *h2c)
{
struct h2s *h2s;
if (h2c->st0 >= H2_CS_ERROR)
return;
if (unlikely(h2c->st0 < H2_CS_FRAME_H)) {
if (h2c->st0 == H2_CS_PREFACE) {
if (unlikely(h2c_frt_recv_preface(h2c) <= 0)) {
/* RFC7540#3.5: a GOAWAY frame MAY be omitted */
if (h2c->st0 == H2_CS_ERRO... | [
"CWE-119"
] | haproxy | 3f0e1ec70173593f4c2b3681b26c04a4ed5fc588 | 78211051505197321979153553871570809611 | 178,071 | 158,079 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
false | Status XvMCGetDRInfo(Display *dpy, XvPortID port,
char **name, char **busID,
int *major, int *minor,
int *patchLevel,
int *isLocal)
{
XExtDisplayInfo *info = xvmc_find_display(dpy);
xvmcGetDRInfoReply rep;
xvmcGetDRInfoReq *req;
CARD32 magic;
#ifdef HAVE_SHMAT
volatile ... | [
"CWE-119"
] | libXvMC | 2cd95e7da8367cccdcdd5c9b160012d1dec5cbdb | 225773238597816987128397211875317401076 | 178,085 | 223 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
true | Status XvMCGetDRInfo(Display *dpy, XvPortID port,
char **name, char **busID,
int *major, int *minor,
int *patchLevel,
int *isLocal)
{
XExtDisplayInfo *info = xvmc_find_display(dpy);
xvmcGetDRInfoReply rep;
xvmcGetDRInfoReq *req;
CARD32 magic;
#ifdef HAVE_SHMAT
volatile ... | [
"CWE-119"
] | libXvMC | 2cd95e7da8367cccdcdd5c9b160012d1dec5cbdb | 134961230573839871155626004817245283432 | 178,085 | 158,083 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
false | XFixesFetchRegionAndBounds (Display *dpy,
XserverRegion region,
int *nrectanglesRet,
XRectangle *bounds)
{
XFixesExtDisplayInfo *info = XFixesFindDisplay (dpy);
xXFixesFetchRegionReq *req;
xXFixesFetchRegionReply rep;
XRectangle *rects;
int nrects;
lon... | [
"CWE-190"
] | libXfixes | 61c1039ee23a2d1de712843bed3480654d7ef42e | 306933036253550523681529656378317307640 | 178,094 | 231 | The product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value that is too large to store in the associated representation. When this occurs, ... |
true | XFixesFetchRegionAndBounds (Display *dpy,
XserverRegion region,
int *nrectanglesRet,
XRectangle *bounds)
{
XFixesExtDisplayInfo *info = XFixesFindDisplay (dpy);
xXFixesFetchRegionReq *req;
xXFixesFetchRegionReply rep;
XRectangle *rects;
int nrects;
lon... | [
"CWE-190"
] | libXfixes | 61c1039ee23a2d1de712843bed3480654d7ef42e | 304152935311185577079726690952840617920 | 178,094 | 158,091 | The product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value that is too large to store in the associated representation. When this occurs, ... |
false | static inline int hpel_motion(MpegEncContext *s,
uint8_t *dest, uint8_t *src,
int src_x, int src_y,
op_pixels_func *pix_op,
int motion_x, int motion_y)
{
int dxy = 0;
int emu = 0;
src_x +... | [
"CWE-476"
] | libav | 136f55207521f0b03194ef5b55ba70f1635d6aee | 111292629842222758487961407224615725800 | 178,099 | 232 | The product dereferences a pointer that it expects to be valid but is NULL. |
true | static inline int hpel_motion(MpegEncContext *s,
uint8_t *dest, uint8_t *src,
int src_x, int src_y,
op_pixels_func *pix_op,
int motion_x, int motion_y)
{
int dxy = 0;
int emu = 0;
src_x +... | [
"CWE-476"
] | libav | 136f55207521f0b03194ef5b55ba70f1635d6aee | 104050017138290810308559131153118862587 | 178,099 | 158,092 | The product dereferences a pointer that it expects to be valid but is NULL. |
false | static void ssh_throttle_all(Ssh ssh, int enable, int bufsize)
{
int i;
struct ssh_channel *c;
if (enable == ssh->throttled_all)
return;
ssh->throttled_all = enable;
ssh->overall_bufsize = bufsize;
if (!ssh->channels)
return;
for (i = 0; NULL != (c = index234(ssh->channels, i)); i++) {
s... | [
"CWE-119"
] | tartarus | 4ff22863d895cb7ebfced4cf923a012a614adaa8 | 325909590182680995779527787302149618683 | 178,103 | 233 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
true | static void ssh_throttle_all(Ssh ssh, int enable, int bufsize)
{
int i;
struct ssh_channel *c;
if (enable == ssh->throttled_all)
return;
ssh->throttled_all = enable;
ssh->overall_bufsize = bufsize;
if (!ssh->channels)
return;
for (i = 0; NULL != (c = index234(ssh->channels, i)); i++) {
s... | [
"CWE-119"
] | tartarus | 4ff22863d895cb7ebfced4cf923a012a614adaa8 | 245301482448712873104203214442039471825 | 178,103 | 158,093 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
false | static int get_crl_sk(X509_STORE_CTX *ctx, X509_CRL **pcrl, X509_CRL **pdcrl,
X509 **pissuer, int *pscore, unsigned int *preasons,
STACK_OF(X509_CRL) *crls)
{
int i, crl_score, best_score = *pscore;
unsigned int reasons, best_reasons = 0;
X509 *x = ctx->current_ce... | [
"CWE-476"
] | openssl | 6e629b5be45face20b4ca71c4fcbfed78b864a2e | 135793188300012979952739633768625629213 | 178,112 | 234 | The product dereferences a pointer that it expects to be valid but is NULL. |
true | static int get_crl_sk(X509_STORE_CTX *ctx, X509_CRL **pcrl, X509_CRL **pdcrl,
X509 **pissuer, int *pscore, unsigned int *preasons,
STACK_OF(X509_CRL) *crls)
{
int i, crl_score, best_score = *pscore;
unsigned int reasons, best_reasons = 0;
X509 *x = ctx->current_ce... | [
"CWE-476"
] | openssl | 6e629b5be45face20b4ca71c4fcbfed78b864a2e | 282685569527671381524876751964696218430 | 178,112 | 158,094 | The product dereferences a pointer that it expects to be valid but is NULL. |
false | vcard_apdu_new(unsigned char *raw_apdu, int len, vcard_7816_status_t *status)
{
VCardAPDU *new_apdu;
*status = VCARD7816_STATUS_EXC_ERROR_MEMORY_FAILURE;
if (len < 4) {
*status = VCARD7816_STATUS_ERROR_WRONG_LENGTH;
return NULL;
}
new_apdu = g_new(VCardAPDU, 1);
new_apdu->a_dat... | [
"CWE-772"
] | spice | 9113dc6a303604a2d9812ac70c17d076ef11886c | 336092549544277958136877844795822151529 | 178,113 | 235 | The product does not release a resource after its effective lifetime has ended, i.e., after the resource is no longer needed. |
true | vcard_apdu_new(unsigned char *raw_apdu, int len, vcard_7816_status_t *status)
{
VCardAPDU *new_apdu;
*status = VCARD7816_STATUS_EXC_ERROR_MEMORY_FAILURE;
if (len < 4) {
*status = VCARD7816_STATUS_ERROR_WRONG_LENGTH;
return NULL;
}
new_apdu = g_new(VCardAPDU, 1);
new_apdu->a_dat... | [
"CWE-772"
] | spice | 9113dc6a303604a2d9812ac70c17d076ef11886c | 81348847311456679355137118764174459124 | 178,113 | 158,095 | The product does not release a resource after its effective lifetime has ended, i.e., after the resource is no longer needed. |
false | int vrend_create_shader(struct vrend_context *ctx,
uint32_t handle,
const struct pipe_stream_output_info *so_info,
const char *shd_text, uint32_t offlen, uint32_t num_tokens,
uint32_t type, uint32_t pkt_length)
{
struct v... | [
"CWE-190"
] | virglrenderer | 93761787b29f37fa627dea9082cdfc1a1ec608d6 | 277560631509583395850123120925257608076 | 178,117 | 238 | The product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value that is too large to store in the associated representation. When this occurs, ... |
true | int vrend_create_shader(struct vrend_context *ctx,
uint32_t handle,
const struct pipe_stream_output_info *so_info,
const char *shd_text, uint32_t offlen, uint32_t num_tokens,
uint32_t type, uint32_t pkt_length)
{
struct v... | [
"CWE-190"
] | virglrenderer | 93761787b29f37fa627dea9082cdfc1a1ec608d6 | 24883819423866269393027879732805252268 | 178,117 | 158,098 | The product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value that is too large to store in the associated representation. When this occurs, ... |
false | static struct vrend_linked_shader_program *add_shader_program(struct vrend_context *ctx,
struct vrend_shader *vs,
struct vrend_shader *fs,
... | [
"CWE-772"
] | virglrenderer | a2f12a1b0f95b13b6f8dc3d05d7b74b4386394e4 | 323217311057867578248239667496178090457 | 178,118 | 239 | The product does not release a resource after its effective lifetime has ended, i.e., after the resource is no longer needed. |
true | static struct vrend_linked_shader_program *add_shader_program(struct vrend_context *ctx,
struct vrend_shader *vs,
struct vrend_shader *fs,
... | [
"CWE-772"
] | virglrenderer | a2f12a1b0f95b13b6f8dc3d05d7b74b4386394e4 | 68470240422616925679336488813198975337 | 178,118 | 158,099 | The product does not release a resource after its effective lifetime has ended, i.e., after the resource is no longer needed. |
false | void vrend_renderer_context_destroy(uint32_t handle)
{
struct vrend_decode_ctx *ctx;
bool ret;
if (handle >= VREND_MAX_CTX)
return;
ctx = dec_ctx[handle];
if (!ctx)
return;
vrend_hw_switch_context(dec_ctx[0]->grctx, true);
}
| [
"CWE-476"
] | virglrenderer | 0a5dff15912207b83018485f83e067474e818bab | 248536757234533019908341843286492380403 | 178,121 | 240 | The product dereferences a pointer that it expects to be valid but is NULL. |
true | void vrend_renderer_context_destroy(uint32_t handle)
{
struct vrend_decode_ctx *ctx;
bool ret;
if (handle >= VREND_MAX_CTX)
return;
/* never destroy context 0 here, it will be destroyed in vrend_decode_reset()*/
if (handle == 0) {
return;
}
ctx = dec_ctx[handle];
if (!ctx)
... | [
"CWE-476"
] | virglrenderer | 0a5dff15912207b83018485f83e067474e818bab | 154473925672822272321889471335487355877 | 178,121 | 158,100 | The product dereferences a pointer that it expects to be valid but is NULL. |
false | static boolean parse_identifier( const char **pcur, char *ret )
{
const char *cur = *pcur;
int i = 0;
if (is_alpha_underscore( cur )) {
ret[i++] = *cur++;
while (is_alpha_underscore( cur ) || is_digit( cur ))
ret[i++] = *cur++;
ret[i++] = '\0';
*pcur = cur;
retur... | [
"CWE-119"
] | virglrenderer | e534b51ca3c3cd25f3990589932a9ed711c59b27 | 142817990104108566810102542927701673732 | 178,123 | 241 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
true | static boolean parse_identifier( const char **pcur, char *ret )
static boolean parse_identifier( const char **pcur, char *ret, size_t len )
{
const char *cur = *pcur;
int i = 0;
if (is_alpha_underscore( cur )) {
ret[i++] = *cur++;
while (is_alpha_underscore( cur ) || is_digit( cur )) {
... | [
"CWE-119"
] | virglrenderer | e534b51ca3c3cd25f3990589932a9ed711c59b27 | 72378232091169844659239787043415407980 | 178,123 | 158,101 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
false | int vrend_create_vertex_elements_state(struct vrend_context *ctx,
uint32_t handle,
unsigned num_elements,
const struct pipe_vertex_element *elements)
{
struct vrend_vertex_element_array *v = CALLOC_ST... | [
"CWE-119"
] | virglrenderer | 114688c526fe45f341d75ccd1d85473c3b08f7a7 | 127813115019639337707795536823961346235 | 178,126 | 242 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
true | int vrend_create_vertex_elements_state(struct vrend_context *ctx,
uint32_t handle,
unsigned num_elements,
const struct pipe_vertex_element *elements)
{
struct vrend_vertex_element_array *v = CALLOC_ST... | [
"CWE-119"
] | virglrenderer | 114688c526fe45f341d75ccd1d85473c3b08f7a7 | 226301324475184087438442572611658189614 | 178,126 | 158,102 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
false | static int vrend_decode_create_ve(struct vrend_decode_ctx *ctx, uint32_t handle, uint16_t length)
{
struct pipe_vertex_element *ve = NULL;
int num_elements;
int i;
int ret;
if (length < 1)
return EINVAL;
if ((length - 1) % 4)
return EINVAL;
num_elements = (length - 1) / 4;
if (nu... | [
"CWE-125"
] | virglrenderer | a5ac49940c40ae415eac0cf912eac7070b4ba95d | 279616717599430675241465878003165352261 | 178,129 | 243 | The product reads data past the end, or before the beginning, of the intended buffer. |
true | static int vrend_decode_create_ve(struct vrend_decode_ctx *ctx, uint32_t handle, uint16_t length)
{
struct pipe_vertex_element *ve = NULL;
int num_elements;
int i;
int ret;
if (length < 1)
return EINVAL;
if ((length - 1) % 4)
return EINVAL;
num_elements = (length - 1) / 4;
if (nu... | [
"CWE-125"
] | virglrenderer | a5ac49940c40ae415eac0cf912eac7070b4ba95d | 129688850372043760228352545289414617217 | 178,129 | 158,104 | The product reads data past the end, or before the beginning, of the intended buffer. |
false | static void set_banner(struct openconnect_info *vpninfo)
{
char *banner, *q;
const char *p;
if (!vpninfo->banner || !(banner = malloc(strlen(vpninfo->banner)))) {
unsetenv("CISCO_BANNER");
return;
}
p = vpninfo->banner;
q = banner;
while (*p) {
if ... | [
"CWE-119"
] | infradead | 14cae65318d3ef1f7d449e463b72b6934e82f1c2 | 174272131383202600271920404270020112167 | 178,132 | 246 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
true | static void set_banner(struct openconnect_info *vpninfo)
{
char *banner, *q;
const char *p;
if (!vpninfo->banner || !(banner = malloc(strlen(vpninfo->banner)+1))) {
unsetenv("CISCO_BANNER");
return;
}
p = vpninfo->banner;
q = banner;
while (*p) {
i... | [
"CWE-119"
] | infradead | 14cae65318d3ef1f7d449e463b72b6934e82f1c2 | 279834395077552091770358368547534380658 | 178,132 | 158,105 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
false | int ssl_parse_clienthello_tlsext(SSL *s, unsigned char **p,
unsigned char *limit, int *al)
{
unsigned short type;
unsigned short size;
unsigned short len;
unsigned char *data = *p;
int renegotiate_seen = 0;
int sigalg_seen = 0;
s->servername_done = 0;
s-... | [
"CWE-399"
] | openssl | 2c0d295e26306e15a92eb23a84a1802005c1c137 | 29224115480775327782453555135433777408 | 178,136 | 249 | This vulnerability category highlights issues in resource management where failures to properly release memory, file handles, or other resources can degrade system performance or enable denial-of-service conditions. |
true | int ssl_parse_clienthello_tlsext(SSL *s, unsigned char **p,
unsigned char *limit, int *al)
{
unsigned short type;
unsigned short size;
unsigned short len;
unsigned char *data = *p;
int renegotiate_seen = 0;
int sigalg_seen = 0;
s->servername_done = 0;
s-... | [
"CWE-399"
] | openssl | 2c0d295e26306e15a92eb23a84a1802005c1c137 | 50008233472111594579570026097454618108 | 178,136 | 158,108 | This vulnerability category highlights issues in resource management where failures to properly release memory, file handles, or other resources can degrade system performance or enable denial-of-service conditions. |
false | static int tls_decrypt_ticket(SSL *s, const unsigned char *etick,
int eticklen, const unsigned char *sess_id,
int sesslen, SSL_SESSION **psess)
{
SSL_SESSION *sess;
unsigned char *sdec;
const unsigned char *p;
int slen, mlen, renew_ticket = 0, ... | [
"CWE-20"
] | openssl | e97763c92c655dcf4af2860b3abd2bc4c8a267f9 | 2230119928438274047665345409737174926 | 178,138 | 250 | The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly. |
true | static int tls_decrypt_ticket(SSL *s, const unsigned char *etick,
int eticklen, const unsigned char *sess_id,
int sesslen, SSL_SESSION **psess)
{
SSL_SESSION *sess;
unsigned char *sdec;
const unsigned char *p;
int slen, mlen, renew_ticket = 0, ... | [
"CWE-20"
] | openssl | e97763c92c655dcf4af2860b3abd2bc4c8a267f9 | 221161159369771407245687985156292409299 | 178,138 | 158,109 | The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly. |
false | recv_and_process_client_pkt(void /*int fd*/)
{
ssize_t size;
len_and_sockaddr *to;
struct sockaddr *from;
msg_t msg;
uint8_t query_status;
l_fixedpt_t query_xmttime;
to = get_sock_lsa(G_listen_fd);
from = xzalloc(to->len);
size = recv_from_to(G_listen_fd, &msg, sizeof(msg),... | [
"CWE-399"
] | busybox | 150dc7a2b483b8338a3e185c478b4b23ee884e71 | 156100728183473686227543895216612348906 | 178,139 | 251 | This vulnerability category highlights issues in resource management where failures to properly release memory, file handles, or other resources can degrade system performance or enable denial-of-service conditions. |
true | recv_and_process_client_pkt(void /*int fd*/)
{
ssize_t size;
len_and_sockaddr *to;
struct sockaddr *from;
msg_t msg;
uint8_t query_status;
l_fixedpt_t query_xmttime;
to = get_sock_lsa(G_listen_fd);
from = xzalloc(to->len);
size = recv_from_to(G_listen_fd, &msg, sizeof(msg),... | [
"CWE-399"
] | busybox | 150dc7a2b483b8338a3e185c478b4b23ee884e71 | 21371049218394401264776342910550411194 | 178,139 | 158,110 | This vulnerability category highlights issues in resource management where failures to properly release memory, file handles, or other resources can degrade system performance or enable denial-of-service conditions. |
false | main (int argc, char *argv[])
{
struct gengetopt_args_info args_info;
char *line = NULL;
size_t linelen = 0;
char *p, *r;
uint32_t *q;
unsigned cmdn = 0;
int rc;
setlocale (LC_ALL, "");
set_program_name (argv[0]);
bindtextdomain (PACKAGE, LOCALEDIR);
textdomain (PACKAGE);
if (cmdline_parser (a... | [
"CWE-125"
] | savannah | 5e3cb9c7b5bf0ce665b9d68f5ddf095af5c9ba60 | 336554870084234386632359019600938342414 | 178,157 | 252 | The product reads data past the end, or before the beginning, of the intended buffer. |
true | main (int argc, char *argv[])
{
struct gengetopt_args_info args_info;
char *line = NULL;
size_t linelen = 0;
char *p, *r;
uint32_t *q;
unsigned cmdn = 0;
int rc;
setlocale (LC_ALL, "");
set_program_name (argv[0]);
bindtextdomain (PACKAGE, LOCALEDIR);
textdomain (PACKAGE);
if (cmdline_parser (a... | [
"CWE-125"
] | savannah | 5e3cb9c7b5bf0ce665b9d68f5ddf095af5c9ba60 | 47000565902019325067062732144193781212 | 178,157 | 158,111 | The product reads data past the end, or before the beginning, of the intended buffer. |
false | FT_Stream_EnterFrame( FT_Stream stream,
FT_ULong count )
{
FT_Error error = FT_Err_Ok;
FT_ULong read_bytes;
/* check for nested frame access */
FT_ASSERT( stream && stream->cursor == 0 );
if ( stream->read )
{
/* allocate the frame in memory */
FT_... | [
"CWE-20"
] | savannah | 45a3c76b547511fa9d97aca34b150a0663257375 | 171308526437072917405338067244329397761 | 178,158 | 253 | The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly. |
true | FT_Stream_EnterFrame( FT_Stream stream,
FT_ULong count )
{
FT_Error error = FT_Err_Ok;
FT_ULong read_bytes;
/* check for nested frame access */
FT_ASSERT( stream && stream->cursor == 0 );
if ( stream->read )
{
/* allocate the frame in memory */
FT_... | [
"CWE-20"
] | savannah | 45a3c76b547511fa9d97aca34b150a0663257375 | 15593559594427562342568939375098455612 | 178,158 | 158,112 | The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly. |
false | parse_instruction(
struct translate_ctx *ctx,
boolean has_label )
{
uint i;
uint saturate = 0;
const struct tgsi_opcode_info *info;
struct tgsi_full_instruction inst;
const char *cur;
uint advance;
inst = tgsi_default_full_instruction();
/* Parse predicate.
*/
eat_opt_white( &ctx-... | [
"CWE-119"
] | virglrenderer | 28894a30a17a84529be102b21118e55d6c9f23fa | 207706300612945852467345419819110560855 | 178,159 | 254 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
true | parse_instruction(
struct translate_ctx *ctx,
boolean has_label )
{
uint i;
uint saturate = 0;
const struct tgsi_opcode_info *info;
struct tgsi_full_instruction inst;
const char *cur;
uint advance;
inst = tgsi_default_full_instruction();
/* Parse predicate.
*/
eat_opt_white( &ctx-... | [
"CWE-119"
] | virglrenderer | 28894a30a17a84529be102b21118e55d6c9f23fa | 321254582650752893308442793791247099756 | 178,159 | 158,113 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
false | int http_request_forward_body(struct session *s, struct channel *req, int an_bit)
{
struct http_txn *txn = &s->txn;
struct http_msg *msg = &s->txn.req;
if (unlikely(msg->msg_state < HTTP_MSG_BODY))
return 0;
if ((req->flags & (CF_READ_ERROR|CF_READ_TIMEOUT|CF_WRITE_ERROR|CF_WRITE_TIMEOUT)) ||
((req->flags ... | [
"CWE-189"
] | haproxy | b4d05093bc89f71377230228007e69a1434c1a0c | 74231898713312769363715897872246138359 | 178,162 | 256 | This weakness involves numeric computation errors, such as integer overflows, underflows, or precision losses, which can lead to miscalculations and exploitable behaviors in software. |
true | int http_request_forward_body(struct session *s, struct channel *req, int an_bit)
{
struct http_txn *txn = &s->txn;
struct http_msg *msg = &s->txn.req;
if (unlikely(msg->msg_state < HTTP_MSG_BODY))
return 0;
if ((req->flags & (CF_READ_ERROR|CF_READ_TIMEOUT|CF_WRITE_ERROR|CF_WRITE_TIMEOUT)) ||
((req->flags ... | [
"CWE-189"
] | haproxy | b4d05093bc89f71377230228007e69a1434c1a0c | 232911459327632823261392605236293767883 | 178,162 | 158,115 | This weakness involves numeric computation errors, such as integer overflows, underflows, or precision losses, which can lead to miscalculations and exploitable behaviors in software. |
false | void Part::slotOpenExtractedEntry(KJob *job)
{
if (!job->error()) {
OpenJob *openJob = qobject_cast<OpenJob*>(job);
Q_ASSERT(openJob);
m_tmpExtractDirList << openJob->tempDir();
const QString fullName = openJob->validatedFilePath();
bool isWritable = m_model->archive() &&... | [
"CWE-78"
] | kde | 82fdfd24d46966a117fa625b68784735a40f9065 | 127189817454680839187942616776907215530 | 178,164 | 257 | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. |
true | void Part::slotOpenExtractedEntry(KJob *job)
{
if (!job->error()) {
OpenJob *openJob = qobject_cast<OpenJob*>(job);
Q_ASSERT(openJob);
m_tmpExtractDirList << openJob->tempDir();
const QString fullName = openJob->validatedFilePath();
bool isWritable = m_model->archive() &&... | [
"CWE-78"
] | kde | 82fdfd24d46966a117fa625b68784735a40f9065 | 254744186026668512929911458145895625788 | 178,164 | 158,116 | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. |
false | Ins_IUP( INS_ARG )
{
IUP_WorkerRec V;
FT_Byte mask;
FT_UInt first_point; /* first point of contour */
FT_UInt end_point; /* end point (last+1) of contour */
FT_UInt first_touched; /* first touched point in contour */
FT_UInt cur_touched; /* current touched ... | [
"CWE-119"
] | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | 271982803099189327229111379866845675067 | 178,174 | 263 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
true | Ins_IUP( INS_ARG )
{
IUP_WorkerRec V;
FT_Byte mask;
FT_UInt first_point; /* first point of contour */
FT_UInt end_point; /* end point (last+1) of contour */
FT_UInt first_touched; /* first touched point in contour */
FT_UInt cur_touched; /* current touched ... | [
"CWE-119"
] | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | 12490107828131494076459414255246754337 | 178,174 | 158,122 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
false | Mac_Read_POST_Resource( FT_Library library,
FT_Stream stream,
FT_Long *offsets,
FT_Long resource_cnt,
FT_Long face_index,
FT_Face *aface )
{
FT_Error error = FT_E... | [
"CWE-119"
] | savannah | b2ea64bcc6c385a8e8318f9c759450a07df58b6d | 239474837185248719277265167606864341043 | 178,175 | 264 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
true | Mac_Read_POST_Resource( FT_Library library,
FT_Stream stream,
FT_Long *offsets,
FT_Long resource_cnt,
FT_Long face_index,
FT_Face *aface )
{
FT_Error error = FT_E... | [
"CWE-119"
] | savannah | b2ea64bcc6c385a8e8318f9c759450a07df58b6d | 138045724524241880239158930414068620502 | 178,175 | 158,123 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
false | gray_render_span( int y,
int count,
const FT_Span* spans,
PWorker worker )
{
unsigned char* p;
FT_Bitmap* map = &worker->target;
/* first of all, compute the scanline offset */
p = (unsigned char*)... | [
"CWE-189"
] | savannah | 6305b869d86ff415a33576df6d43729673c66eee | 233903124056505689403424392136593938770 | 178,176 | 265 | This weakness involves numeric computation errors, such as integer overflows, underflows, or precision losses, which can lead to miscalculations and exploitable behaviors in software. |
true | gray_render_span( int y,
int count,
const FT_Span* spans,
PWorker worker )
{
unsigned char* p;
FT_Bitmap* map = &worker->target;
/* first of all, compute the scanline offset */
p = (unsigned char*)... | [
"CWE-189"
] | savannah | 6305b869d86ff415a33576df6d43729673c66eee | 34358703453298665322690073547254403786 | 178,176 | 158,124 | This weakness involves numeric computation errors, such as integer overflows, underflows, or precision losses, which can lead to miscalculations and exploitable behaviors in software. |
false | Mac_Read_POST_Resource( FT_Library library,
FT_Stream stream,
FT_Long *offsets,
FT_Long resource_cnt,
FT_Long face_index,
FT_Face *aface )
{
FT_Error error = FT_E... | [
"CWE-119"
] | savannah | c69891a1345640096fbf396e8dd567fe879ce233 | 66761366277063878236162927407801840545 | 178,178 | 267 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
true | Mac_Read_POST_Resource( FT_Library library,
FT_Stream stream,
FT_Long *offsets,
FT_Long resource_cnt,
FT_Long face_index,
FT_Face *aface )
{
FT_Error error = FT_E... | [
"CWE-119"
] | savannah | c69891a1345640096fbf396e8dd567fe879ce233 | 104194448279931618216830643509594183948 | 178,178 | 158,126 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
false | psh_glyph_find_strong_points( PSH_Glyph glyph,
FT_Int dimension )
{
/* a point is `strong' if it is located on a stem edge and */
/* has an `in' or `out' tangent parallel to the hint's direction */
PSH_Hint_Table table = &glyph->hint_tables[dimension];
... | [
"CWE-399"
] | savannah | 8d22746c9e5af80ff4304aef440986403a5072e2 | 238917502809110546701210284595052003786 | 178,179 | 268 | This vulnerability category highlights issues in resource management where failures to properly release memory, file handles, or other resources can degrade system performance or enable denial-of-service conditions. |
true | psh_glyph_find_strong_points( PSH_Glyph glyph,
FT_Int dimension )
{
/* a point is `strong' if it is located on a stem edge and */
/* has an `in' or `out' tangent parallel to the hint's direction */
PSH_Hint_Table table = &glyph->hint_tables[dimension];
... | [
"CWE-399"
] | savannah | 8d22746c9e5af80ff4304aef440986403a5072e2 | 125782867654545345190551371896398338847 | 178,179 | 158,127 | This vulnerability category highlights issues in resource management where failures to properly release memory, file handles, or other resources can degrade system performance or enable denial-of-service conditions. |
false | cff_decoder_parse_charstrings( CFF_Decoder* decoder,
FT_Byte* charstring_base,
FT_ULong charstring_len )
{
FT_Error error;
CFF_Decoder_Zone* zone;
FT_Byte* ip;
FT_Byte* limit;
CFF_Builder*... | [
"CWE-189"
] | savannah | 7d3d2cc4fef72c6be9c454b3809c387e12b44cfc | 78533740565488192289380822412773176149 | 178,180 | 269 | This weakness involves numeric computation errors, such as integer overflows, underflows, or precision losses, which can lead to miscalculations and exploitable behaviors in software. |
true | cff_decoder_parse_charstrings( CFF_Decoder* decoder,
FT_Byte* charstring_base,
FT_ULong charstring_len )
{
FT_Error error;
CFF_Decoder_Zone* zone;
FT_Byte* ip;
FT_Byte* limit;
CFF_Builder*... | [
"CWE-189"
] | savannah | 7d3d2cc4fef72c6be9c454b3809c387e12b44cfc | 338965105723107567424020450442881213658 | 178,180 | 158,128 | This weakness involves numeric computation errors, such as integer overflows, underflows, or precision losses, which can lead to miscalculations and exploitable behaviors in software. |
false | XvQueryAdaptors(
Display *dpy,
Window window,
unsigned int *p_nAdaptors,
XvAdaptorInfo **p_pAdaptors)
{
XExtDisplayInfo *info = xv_find_display(dpy);
xvQueryAdaptorsReq *req;
xvQueryAdaptorsReply rep;
size_t size;
unsigned int ii, jj;
char *name;
XvAdaptorInfo *pas = NULL... | [
"CWE-125"
] | libXv | d9da580b46a28ab497de2e94fdc7b9ff953dab17 | 25138831966304988672154482243921916552 | 178,181 | 270 | The product reads data past the end, or before the beginning, of the intended buffer. |
true | XvQueryAdaptors(
Display *dpy,
Window window,
unsigned int *p_nAdaptors,
XvAdaptorInfo **p_pAdaptors)
{
XExtDisplayInfo *info = xv_find_display(dpy);
xvQueryAdaptorsReq *req;
xvQueryAdaptorsReply rep;
size_t size;
unsigned int ii, jj;
char *name;
char *end;
XvAdaptorI... | [
"CWE-125"
] | libXv | d9da580b46a28ab497de2e94fdc7b9ff953dab17 | 13775494404515584781393413951208073381 | 178,181 | 158,129 | The product reads data past the end, or before the beginning, of the intended buffer. |
false | intuit_diff_type (bool need_header, mode_t *p_file_type)
{
file_offset this_line = 0;
file_offset first_command_line = -1;
char first_ed_command_letter = 0;
lin fcl_line = 0; /* Pacify 'gcc -W'. */
bool this_is_a_command = false;
bool stars_this_line = false;
bool extended_headers = false;
... | [
"CWE-476"
] | savannah | f290f48a621867084884bfff87f8093c15195e6a | 119977677141531301071259218660699705481 | 178,192 | 274 | The product dereferences a pointer that it expects to be valid but is NULL. |
true | intuit_diff_type (bool need_header, mode_t *p_file_type)
{
file_offset this_line = 0;
file_offset first_command_line = -1;
char first_ed_command_letter = 0;
lin fcl_line = 0; /* Pacify 'gcc -W'. */
bool this_is_a_command = false;
bool stars_this_line = false;
bool extended_headers = false;
... | [
"CWE-476"
] | savannah | f290f48a621867084884bfff87f8093c15195e6a | 146473763077753726031355449366744801662 | 178,192 | 158,133 | The product dereferences a pointer that it expects to be valid but is NULL. |
false | Ins_GETVARIATION( TT_ExecContext exc,
FT_Long* args )
{
FT_UInt num_axes = exc->face->blend->num_axis;
FT_Fixed* coords = exc->face->blend->normalizedcoords;
FT_UInt i;
if ( BOUNDS( num_axes, exc->stackSize + 1 - exc->top ) )
{
exc->error = FT_THROW( S... | [
"CWE-476"
] | savannah | 29c759284e305ec428703c9a5831d0b1fc3497ef | 139567459660525946313428439964298096333 | 178,193 | 275 | The product dereferences a pointer that it expects to be valid but is NULL. |
true | Ins_GETVARIATION( TT_ExecContext exc,
FT_Long* args )
{
FT_UInt num_axes = exc->face->blend->num_axis;
FT_Fixed* coords = exc->face->blend->normalizedcoords;
FT_UInt i;
if ( BOUNDS( num_axes, exc->stackSize + 1 - exc->top ) )
{
exc->error = FT_THROW( S... | [
"CWE-476"
] | savannah | 29c759284e305ec428703c9a5831d0b1fc3497ef | 159806780920376373711216124732552440560 | 178,193 | 158,134 | The product dereferences a pointer that it expects to be valid but is NULL. |
false | int ssl3_get_server_hello(SSL *s)
{
STACK_OF(SSL_CIPHER) *sk;
const SSL_CIPHER *c;
unsigned char *p,*d;
int i,al,ok;
unsigned int j;
long n;
#ifndef OPENSSL_NO_COMP
SSL_COMP *comp;
#endif
n=s->method->ssl_get_message(s,
SSL3_ST_CR_SRVR_HELLO_A,
SSL3_ST_CR_SRVR_HELLO_B,
-1,
20000, /* ?? */
&ok);
if... | [
"Other"
] | openssl | 83764a989dcc87fbea337da5f8f86806fe767b7e | 277497504299456757679652544715041856567 | 178,194 | 276 | Unknown |
true | int ssl3_get_server_hello(SSL *s)
{
STACK_OF(SSL_CIPHER) *sk;
const SSL_CIPHER *c;
unsigned char *p,*d;
int i,al,ok;
unsigned int j;
long n;
#ifndef OPENSSL_NO_COMP
SSL_COMP *comp;
#endif
n=s->method->ssl_get_message(s,
SSL3_ST_CR_SRVR_HELLO_A,
SSL3_ST_CR_SRVR_HELLO_B,
-1,
20000, /* ?? */
&ok);
if... | [
"Other"
] | openssl | 83764a989dcc87fbea337da5f8f86806fe767b7e | 213542089899120777699331744298021444999 | 178,194 | 158,135 | Unknown |
false | void ssl_set_client_disabled(SSL *s)
{
CERT *c = s->cert;
c->mask_a = 0;
c->mask_k = 0;
/* Don't allow TLS 1.2 only ciphers if we don't suppport them */
if (!SSL_CLIENT_USE_TLS1_2_CIPHERS(s))
c->mask_ssl = SSL_TLSV1_2;
else
c->mask_ssl = 0;
ssl_set_sig_mask(&c->mask_a, s, SSL_SECOP_SIGALG_MASK);
/* Disable... | [
"Other"
] | openssl | 80bd7b41b30af6ee96f519e629463583318de3b0 | 145190138964748869120683088287665695350 | 178,195 | 277 | Unknown |
true | void ssl_set_client_disabled(SSL *s)
{
CERT *c = s->cert;
c->mask_a = 0;
c->mask_k = 0;
/* Don't allow TLS 1.2 only ciphers if we don't suppport them */
if (!SSL_CLIENT_USE_TLS1_2_CIPHERS(s))
c->mask_ssl = SSL_TLSV1_2;
else
c->mask_ssl = 0;
ssl_set_sig_mask(&c->mask_a, s, SSL_SECOP_SIGALG_MASK);
/* Disable... | [
"Other"
] | openssl | 80bd7b41b30af6ee96f519e629463583318de3b0 | 282690502176957429077395181909592930453 | 178,195 | 158,136 | Unknown |
false | void DelayedExecutor::delayedExecute(const QString &udi)
{
Solid::Device device(udi);
QString exec = m_service.exec();
MacroExpander mx(device);
mx.expandMacros(exec);
KRun::runCommand(exec, QString(), m_service.icon(), 0);
deleteLater();
}
| [
"CWE-78"
] | kde | 9db872df82c258315c6ebad800af59e81ffb9212 | 185460399545264476872601191691271963408 | 178,196 | 278 | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. |
true | void DelayedExecutor::delayedExecute(const QString &udi)
{
Solid::Device device(udi);
QString exec = m_service.exec();
MacroExpander mx(device);
mx.expandMacrosShellQuote(exec);
KRun::runCommand(exec, QString(), m_service.icon(), 0);
deleteLater();
}
| [
"CWE-78"
] | kde | 9db872df82c258315c6ebad800af59e81ffb9212 | 323699902109915935156580630724126463315 | 178,196 | 158,137 | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. |
false | uint NotificationsEngine::Notify(const QString &app_name, uint replaces_id,
const QString &app_icon, const QString &summary, const QString &body,
const QStringList &actions, const QVariantMap &hints, int timeout)
{
uint partOf = 0;
const QString ... | [
"CWE-200"
] | kde | 8164beac15ea34ec0d1564f0557fe3e742bdd938 | 66626965994794909671436631171592255350 | 178,197 | 279 | The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. |
true | uint NotificationsEngine::Notify(const QString &app_name, uint replaces_id,
const QString &app_icon, const QString &summary, const QString &body,
const QStringList &actions, const QVariantMap &hints, int timeout)
{
uint partOf = 0;
const QString ... | [
"CWE-200"
] | kde | 8164beac15ea34ec0d1564f0557fe3e742bdd938 | 307726928526403562600043842982225149020 | 178,197 | 158,138 | The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. |
false | uint NotificationsEngine::Notify(const QString &app_name, uint replaces_id,
const QString &app_icon, const QString &summary, const QString &body,
const QStringList &actions, const QVariantMap &hints, int timeout)
{
uint partOf = 0;
const QString ... | [
"CWE-200"
] | kde | 5bc696b5abcdb460c1017592e80b2d7f6ed3107c | 49080920792690681565819742613436372042 | 178,198 | 280 | The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. |
true | uint NotificationsEngine::Notify(const QString &app_name, uint replaces_id,
const QString &app_icon, const QString &summary, const QString &body,
const QStringList &actions, const QVariantMap &hints, int timeout)
{
uint partOf = 0;
const QString ... | [
"CWE-200"
] | kde | 5bc696b5abcdb460c1017592e80b2d7f6ed3107c | 114483981526891060266771495911529009869 | 178,198 | 158,139 | The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. |
false | dns_stricmp(const char* str1, const char* str2)
{
char c1, c2;
*----------------------------------------------------------------------------*/
/* DNS variables */
static struct udp_pcb *dns_pcb;
static u8_t dns_seqno;
static struct dns_table_entry dns_table[DNS_TABLE_SIZE];
static str... | [
"CWE-345"
] | savannah | 9fb46e120655ac481b2af8f865d5ae56c39b831a | 181259810056970673184917548254526485235 | 178,220 | 283 | The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data. |
true | dns_stricmp(const char* str1, const char* str2)
{
char c1, c2;
*----------------------------------------------------------------------------*/
/* DNS variables */
static struct udp_pcb *dns_pcbs[DNS_MAX_SOURCE_PORTS];
#if ((LWIP_DNS_SECURE & LWIP_DNS_SECURE_RAND_SRC_PORT) != 0)
static u8_t ... | [
"CWE-345"
] | savannah | 9fb46e120655ac481b2af8f865d5ae56c39b831a | 167319277236782062603877419055130451552 | 178,220 | 158,142 | The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data. |
false | static void reply_sesssetup_and_X_spnego(struct smb_request *req)
{
const uint8 *p;
DATA_BLOB blob1;
size_t bufrem;
char *tmp;
const char *native_os;
const char *native_lanman;
const char *primary_domain;
const char *p2;
uint16 data_blob_len = SVAL(req->vwv+7, 0);
enum remote_arch_types ra_type = get_remote_a... | [
"CWE-119"
] | samba | 9280051bfba337458722fb157f3082f93cbd9f2b | 252100526266913255109910552885875245221 | 178,226 | 287 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
true | static void reply_sesssetup_and_X_spnego(struct smb_request *req)
{
const uint8 *p;
DATA_BLOB blob1;
size_t bufrem;
char *tmp;
const char *native_os;
const char *native_lanman;
const char *primary_domain;
const char *p2;
uint16 data_blob_len = SVAL(req->vwv+7, 0);
enum remote_arch_types ra_type = get_remote_a... | [
"CWE-119"
] | samba | 9280051bfba337458722fb157f3082f93cbd9f2b | 264029160300950657613398871836569816502 | 178,226 | 158,146 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
false | _asn1_extract_der_octet (asn1_node node, const unsigned char *der,
int der_len, unsigned flags)
{
int len2, len3;
int counter, counter_end;
int result;
len2 = asn1_get_length_der (der, der_len, &len3);
if (len2 < -1)
return ASN1_DER_ERROR;
counter = len3 + 1;
DECR_LEN(der_len, len3);
if (l... | [
"CWE-399"
] | savannah | f435825c0f527a8e52e6ffbc3ad0bc60531d537e | 199202175349742229581148475563569699182 | 178,249 | 288 | This vulnerability category highlights issues in resource management where failures to properly release memory, file handles, or other resources can degrade system performance or enable denial-of-service conditions. |
true | _asn1_extract_der_octet (asn1_node node, const unsigned char *der,
int der_len, unsigned flags)
{
int len2, len3;
int counter, counter_end;
int result;
len2 = asn1_get_length_der (der, der_len, &len3);
if (len2 < -1)
return ASN1_DER_ERROR;
counter = len3 + 1;
DECR_LEN(der_len, len3);
if (l... | [
"CWE-399"
] | savannah | f435825c0f527a8e52e6ffbc3ad0bc60531d537e | 67295952125339630714795122517192783264 | 178,249 | 158,148 | This vulnerability category highlights issues in resource management where failures to properly release memory, file handles, or other resources can degrade system performance or enable denial-of-service conditions. |
false | load(ImlibImage * im, ImlibProgressFunction progress, char progress_granularity,
char immediate_load)
{
static const int intoffset[] = { 0, 4, 2, 1 };
static const int intjump[] = { 8, 8, 4, 2 };
int rc;
DATA32 *ptr;
GifFileType *gif;
GifRowType *r... | [
"CWE-119"
] | enlightment | 37a96801663b7b4cd3fbe56cc0eb8b6a17e766a8 | 29413401693515776488286177132255863480 | 178,251 | 289 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
true | load(ImlibImage * im, ImlibProgressFunction progress, char progress_granularity,
char immediate_load)
{
static const int intoffset[] = { 0, 4, 2, 1 };
static const int intjump[] = { 8, 8, 4, 2 };
int rc;
DATA32 *ptr;
GifFileType *gif;
GifRowType *r... | [
"CWE-119"
] | enlightment | 37a96801663b7b4cd3fbe56cc0eb8b6a17e766a8 | 327794120807518814236575440422420435138 | 178,251 | 158,149 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
false | __imlib_MergeUpdate(ImlibUpdate * u, int w, int h, int hgapmax)
{
ImlibUpdate *nu = NULL, *uu;
struct _tile *t;
int tw, th, x, y, i;
int *gaps = NULL;
/* if theres no rects to process.. return NULL */
if (!u)
return NULL;
tw = w >> TB;
if (w & T... | [
"CWE-119"
] | enlightment | ce94edca1ccfbe314cb7cd9453433fad404ec7ef | 36599931638812584056030971307038057704 | 178,252 | 290 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
true | __imlib_MergeUpdate(ImlibUpdate * u, int w, int h, int hgapmax)
{
ImlibUpdate *nu = NULL, *uu;
struct _tile *t;
int tw, th, x, y, i;
int *gaps = NULL;
/* if theres no rects to process.. return NULL */
if (!u)
return NULL;
tw = w >> TB;
if (w & T... | [
"CWE-119"
] | enlightment | ce94edca1ccfbe314cb7cd9453433fad404ec7ef | 35689730528572601890660899349736969741 | 178,252 | 158,150 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
false | _gnutls_ciphertext2compressed (gnutls_session_t session,
opaque * compress_data,
int compress_size,
gnutls_datum_t ciphertext, uint8_t type,
record_parameters_st * params)
{
uint8_t MAC[MAX_HASH... | [
"CWE-310"
] | savannah | 422214868061370aeeb0ac9cd0f021a5c350a57d | 124737111803029213599184263327276296012 | 178,253 | 291 | This weakness pertains to the use of cryptographic functions that are weak, misconfigured, or outdated, which undermines the intended protection of encrypted data and communications. |
true | _gnutls_ciphertext2compressed (gnutls_session_t session,
opaque * compress_data,
int compress_size,
gnutls_datum_t ciphertext, uint8_t type,
record_parameters_st * params)
{
uint8_t MAC[MAX_HASH... | [
"CWE-310"
] | savannah | 422214868061370aeeb0ac9cd0f021a5c350a57d | 86024422305750338389798766305319221010 | 178,253 | 158,151 | This weakness pertains to the use of cryptographic functions that are weak, misconfigured, or outdated, which undermines the intended protection of encrypted data and communications. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.