Datasets:

is_vulnerable
bool
2 classes
func
stringlengths
28
484k
cwe
listlengths
1
2
project
stringclasses
592 values
commit_id
stringlengths
7
44
hash
stringlengths
34
39
big_vul_idx
int64
4.09k
189k
idx
int64
0
522k
cwe_description
stringclasses
81 values
false
t1_decoder_parse_charstrings( T1_Decoder decoder, FT_Byte* charstring_base, FT_UInt charstring_len ) { FT_Error error; T1_Decoder_Zone zone; FT_Byte* ip; FT_Byte* limit; T1_Builder builder = &d...
[ "CWE-787" ]
savannah
f958c48ee431bef8d4d466b40c9cb2d4dbcb7791
173319081189597155474138387684978602892
178,056
211
The product writes data past the end, or before the beginning, of the intended buffer.
true
t1_decoder_parse_charstrings( T1_Decoder decoder, FT_Byte* charstring_base, FT_UInt charstring_len ) { FT_Error error; T1_Decoder_Zone zone; FT_Byte* ip; FT_Byte* limit; T1_Builder builder = &d...
[ "CWE-787" ]
savannah
f958c48ee431bef8d4d466b40c9cb2d4dbcb7791
131877843141694356133309697518467244252
178,056
158,071
The product writes data past the end, or before the beginning, of the intended buffer.
false
validate_body_helper (DBusTypeReader *reader, int byte_order, dbus_bool_t walk_reader_to_end, const unsigned char *p, const unsigned char *end, const unsigned char **ne...
[ "CWE-399" ]
dbus
7d65a3a6ed8815e34a99c680ac3869fde49dbbd4
293803507783746447357509233379751643676
178,058
212
This vulnerability category highlights issues in resource management where failures to properly release memory, file handles, or other resources can degrade system performance or enable denial-of-service conditions.
true
validate_body_helper (DBusTypeReader *reader, int byte_order, dbus_bool_t walk_reader_to_end, int total_depth, const unsigned char *p, const unsigned ch...
[ "CWE-399" ]
dbus
7d65a3a6ed8815e34a99c680ac3869fde49dbbd4
176712459114438620245064919145260257013
178,058
158,072
This vulnerability category highlights issues in resource management where failures to properly release memory, file handles, or other resources can degrade system performance or enable denial-of-service conditions.
false
tt_size_reset( TT_Size size, FT_Bool only_height ) { TT_Face face; FT_Size_Metrics* metrics; size->ttmetrics.valid = FALSE; face = (TT_Face)size->root.face; metrics = &size->metrics; /* copy the result from base layer */ /* This bit flag, if set...
[ "CWE-787" ]
savannah
e6699596af5c5d6f0ae0ea06e19df87dce088df8
328349556850502930530519513006179954778
178,059
213
The product writes data past the end, or before the beginning, of the intended buffer.
true
tt_size_reset( TT_Size size, FT_Bool only_height ) { TT_Face face; FT_Size_Metrics* metrics; face = (TT_Face)size->root.face; /* nothing to do for CFF2 */ if ( face->isCFF2 ) return FT_Err_Ok; size->ttmetrics.valid = FALSE; metrics = &size->...
[ "CWE-787" ]
savannah
e6699596af5c5d6f0ae0ea06e19df87dce088df8
242836455535349747653527932796504023034
178,059
158,073
The product writes data past the end, or before the beginning, of the intended buffer.
false
sfnt_init_face( FT_Stream stream, TT_Face face, FT_Int face_instance_index, FT_Int num_params, FT_Parameter* params ) { FT_Error error; FT_Memory memory = face->root.memory; FT_Library librar...
[ "CWE-787" ]
savannah
7bbb91fbf47fc0775cc9705673caf0c47a81f94b
119798325318146814691558712066205414712
178,060
214
The product writes data past the end, or before the beginning, of the intended buffer.
true
sfnt_init_face( FT_Stream stream, TT_Face face, FT_Int face_instance_index, FT_Int num_params, FT_Parameter* params ) { FT_Error error; FT_Memory memory = face->root.memory; FT_Library librar...
[ "CWE-787" ]
savannah
7bbb91fbf47fc0775cc9705673caf0c47a81f94b
226909658136416070549978617553739875522
178,060
158,074
The product writes data past the end, or before the beginning, of the intended buffer.
false
int main (int argc, char *argv[]) { int objectsCount = 0; Guint numOffset = 0; std::vector<Object> pages; std::vector<Guint> offsets; XRef *yRef, *countRef; FILE *f; OutStream *outStr; int i; int j, rootNum; std::vector<PDFDoc *>docs; int majorVersion = 0; int minorVersion = 0; char *fileName ...
[ "CWE-476" ]
poppler
5c9b08a875b07853be6c44e43ff5f7f059df666a
180050936886598415271458736244884709418
178,062
215
The product dereferences a pointer that it expects to be valid but is NULL.
true
int main (int argc, char *argv[]) { int objectsCount = 0; Guint numOffset = 0; std::vector<Object> pages; std::vector<Guint> offsets; XRef *yRef, *countRef; FILE *f; OutStream *outStr; int i; int j, rootNum; std::vector<PDFDoc *>docs; int majorVersion = 0; int minorVersion = 0; char *fileName ...
[ "CWE-476" ]
poppler
5c9b08a875b07853be6c44e43ff5f7f059df666a
4674050423349651754578522671885372804
178,062
158,075
The product dereferences a pointer that it expects to be valid but is NULL.
false
main (int argc _GL_UNUSED, char **argv) { struct timespec result; struct timespec result2; struct timespec expected; struct timespec now; const char *p; int i; long gmtoff; time_t ref_time = 1304250918; /* Set the time zone to US Eastern time with the 2012 rules. This should disable any leap se...
[ "CWE-119" ]
savannah
94e01571507835ff59dd8ce2a0b56a4b566965a4
85463602567582995767126053202641542542
178,063
216
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
true
main (int argc _GL_UNUSED, char **argv) { struct timespec result; struct timespec result2; struct timespec expected; struct timespec now; const char *p; int i; long gmtoff; time_t ref_time = 1304250918; /* Set the time zone to US Eastern time with the 2012 rules. This should disable any leap se...
[ "CWE-119" ]
savannah
94e01571507835ff59dd8ce2a0b56a4b566965a4
254772284669524418106772745534242359013
178,063
158,076
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
false
ft_var_readpackedpoints( FT_Stream stream, FT_UInt *point_cnt ) { FT_UShort *points; FT_Int n; FT_Int runcnt; FT_Int i; FT_Int j; FT_Int first; FT_Memory memory = stream->memory; FT_Error error = TT_Err_Ok; FT_UNUSED( err...
[ "CWE-119" ]
savannah
59eb9f8cfe7d1df379a2318316d1f04f80fba54a
176444419672545527315649492039587951909
178,069
217
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
true
ft_var_readpackedpoints( FT_Stream stream, FT_UInt *point_cnt ) { FT_UShort *points; FT_Int n; FT_Int runcnt; FT_Int i; FT_Int j; FT_Int first; FT_Memory memory = stream->memory; FT_Error error = TT_Err_Ok; FT_UNUSED( er...
[ "CWE-119" ]
savannah
59eb9f8cfe7d1df379a2318316d1f04f80fba54a
179208058990458728256307235003655306316
178,069
158,077
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
false
set_text_distance(gs_point *pdist, double dx, double dy, const gs_matrix *pmat) { int code = gs_distance_transform_inverse(dx, dy, pmat, pdist); double rounded; if (code == gs_error_undefinedresult) { /* The CTM is degenerate. Can't know the distance in user space. } else if (...
[ "CWE-119" ]
ghostscript
39b1e54b2968620723bf32e96764c88797714879
334604983653907615489271299004330168271
178,070
218
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
true
set_text_distance(gs_point *pdist, double dx, double dy, const gs_matrix *pmat) { int code; double rounded; if (dx > 1e38 || dy > 1e38) code = gs_error_undefinedresult; else code = gs_distance_transform_inverse(dx, dy, pmat, pdist); if (code == gs_error_undefinedresult) { ...
[ "CWE-119" ]
ghostscript
39b1e54b2968620723bf32e96764c88797714879
59940488774012010522720030779464241139
178,070
158,078
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
false
static void h2_process_demux(struct h2c *h2c) { struct h2s *h2s; if (h2c->st0 >= H2_CS_ERROR) return; if (unlikely(h2c->st0 < H2_CS_FRAME_H)) { if (h2c->st0 == H2_CS_PREFACE) { if (unlikely(h2c_frt_recv_preface(h2c) <= 0)) { /* RFC7540#3.5: a GOAWAY frame MAY be omitted */ if (h2c->st0 == H2_CS_ERRO...
[ "CWE-119" ]
haproxy
3f0e1ec70173593f4c2b3681b26c04a4ed5fc588
197791135802871490452896068201538076195
178,071
219
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
true
static void h2_process_demux(struct h2c *h2c) { struct h2s *h2s; if (h2c->st0 >= H2_CS_ERROR) return; if (unlikely(h2c->st0 < H2_CS_FRAME_H)) { if (h2c->st0 == H2_CS_PREFACE) { if (unlikely(h2c_frt_recv_preface(h2c) <= 0)) { /* RFC7540#3.5: a GOAWAY frame MAY be omitted */ if (h2c->st0 == H2_CS_ERRO...
[ "CWE-119" ]
haproxy
3f0e1ec70173593f4c2b3681b26c04a4ed5fc588
78211051505197321979153553871570809611
178,071
158,079
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
false
Status XvMCGetDRInfo(Display *dpy, XvPortID port, char **name, char **busID, int *major, int *minor, int *patchLevel, int *isLocal) { XExtDisplayInfo *info = xvmc_find_display(dpy); xvmcGetDRInfoReply rep; xvmcGetDRInfoReq *req; CARD32 magic; #ifdef HAVE_SHMAT volatile ...
[ "CWE-119" ]
libXvMC
2cd95e7da8367cccdcdd5c9b160012d1dec5cbdb
225773238597816987128397211875317401076
178,085
223
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
true
Status XvMCGetDRInfo(Display *dpy, XvPortID port, char **name, char **busID, int *major, int *minor, int *patchLevel, int *isLocal) { XExtDisplayInfo *info = xvmc_find_display(dpy); xvmcGetDRInfoReply rep; xvmcGetDRInfoReq *req; CARD32 magic; #ifdef HAVE_SHMAT volatile ...
[ "CWE-119" ]
libXvMC
2cd95e7da8367cccdcdd5c9b160012d1dec5cbdb
134961230573839871155626004817245283432
178,085
158,083
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
false
XFixesFetchRegionAndBounds (Display *dpy, XserverRegion region, int *nrectanglesRet, XRectangle *bounds) { XFixesExtDisplayInfo *info = XFixesFindDisplay (dpy); xXFixesFetchRegionReq *req; xXFixesFetchRegionReply rep; XRectangle *rects; int nrects; lon...
[ "CWE-190" ]
libXfixes
61c1039ee23a2d1de712843bed3480654d7ef42e
306933036253550523681529656378317307640
178,094
231
The product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value that is too large to store in the associated representation. When this occurs, ...
true
XFixesFetchRegionAndBounds (Display *dpy, XserverRegion region, int *nrectanglesRet, XRectangle *bounds) { XFixesExtDisplayInfo *info = XFixesFindDisplay (dpy); xXFixesFetchRegionReq *req; xXFixesFetchRegionReply rep; XRectangle *rects; int nrects; lon...
[ "CWE-190" ]
libXfixes
61c1039ee23a2d1de712843bed3480654d7ef42e
304152935311185577079726690952840617920
178,094
158,091
The product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value that is too large to store in the associated representation. When this occurs, ...
false
static inline int hpel_motion(MpegEncContext *s, uint8_t *dest, uint8_t *src, int src_x, int src_y, op_pixels_func *pix_op, int motion_x, int motion_y) { int dxy = 0; int emu = 0; src_x +...
[ "CWE-476" ]
libav
136f55207521f0b03194ef5b55ba70f1635d6aee
111292629842222758487961407224615725800
178,099
232
The product dereferences a pointer that it expects to be valid but is NULL.
true
static inline int hpel_motion(MpegEncContext *s, uint8_t *dest, uint8_t *src, int src_x, int src_y, op_pixels_func *pix_op, int motion_x, int motion_y) { int dxy = 0; int emu = 0; src_x +...
[ "CWE-476" ]
libav
136f55207521f0b03194ef5b55ba70f1635d6aee
104050017138290810308559131153118862587
178,099
158,092
The product dereferences a pointer that it expects to be valid but is NULL.
false
static void ssh_throttle_all(Ssh ssh, int enable, int bufsize) { int i; struct ssh_channel *c; if (enable == ssh->throttled_all) return; ssh->throttled_all = enable; ssh->overall_bufsize = bufsize; if (!ssh->channels) return; for (i = 0; NULL != (c = index234(ssh->channels, i)); i++) { s...
[ "CWE-119" ]
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
325909590182680995779527787302149618683
178,103
233
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
true
static void ssh_throttle_all(Ssh ssh, int enable, int bufsize) { int i; struct ssh_channel *c; if (enable == ssh->throttled_all) return; ssh->throttled_all = enable; ssh->overall_bufsize = bufsize; if (!ssh->channels) return; for (i = 0; NULL != (c = index234(ssh->channels, i)); i++) { s...
[ "CWE-119" ]
tartarus
4ff22863d895cb7ebfced4cf923a012a614adaa8
245301482448712873104203214442039471825
178,103
158,093
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
false
static int get_crl_sk(X509_STORE_CTX *ctx, X509_CRL **pcrl, X509_CRL **pdcrl, X509 **pissuer, int *pscore, unsigned int *preasons, STACK_OF(X509_CRL) *crls) { int i, crl_score, best_score = *pscore; unsigned int reasons, best_reasons = 0; X509 *x = ctx->current_ce...
[ "CWE-476" ]
openssl
6e629b5be45face20b4ca71c4fcbfed78b864a2e
135793188300012979952739633768625629213
178,112
234
The product dereferences a pointer that it expects to be valid but is NULL.
true
static int get_crl_sk(X509_STORE_CTX *ctx, X509_CRL **pcrl, X509_CRL **pdcrl, X509 **pissuer, int *pscore, unsigned int *preasons, STACK_OF(X509_CRL) *crls) { int i, crl_score, best_score = *pscore; unsigned int reasons, best_reasons = 0; X509 *x = ctx->current_ce...
[ "CWE-476" ]
openssl
6e629b5be45face20b4ca71c4fcbfed78b864a2e
282685569527671381524876751964696218430
178,112
158,094
The product dereferences a pointer that it expects to be valid but is NULL.
false
vcard_apdu_new(unsigned char *raw_apdu, int len, vcard_7816_status_t *status) { VCardAPDU *new_apdu; *status = VCARD7816_STATUS_EXC_ERROR_MEMORY_FAILURE; if (len < 4) { *status = VCARD7816_STATUS_ERROR_WRONG_LENGTH; return NULL; } new_apdu = g_new(VCardAPDU, 1); new_apdu->a_dat...
[ "CWE-772" ]
spice
9113dc6a303604a2d9812ac70c17d076ef11886c
336092549544277958136877844795822151529
178,113
235
The product does not release a resource after its effective lifetime has ended, i.e., after the resource is no longer needed.
true
vcard_apdu_new(unsigned char *raw_apdu, int len, vcard_7816_status_t *status) { VCardAPDU *new_apdu; *status = VCARD7816_STATUS_EXC_ERROR_MEMORY_FAILURE; if (len < 4) { *status = VCARD7816_STATUS_ERROR_WRONG_LENGTH; return NULL; } new_apdu = g_new(VCardAPDU, 1); new_apdu->a_dat...
[ "CWE-772" ]
spice
9113dc6a303604a2d9812ac70c17d076ef11886c
81348847311456679355137118764174459124
178,113
158,095
The product does not release a resource after its effective lifetime has ended, i.e., after the resource is no longer needed.
false
int vrend_create_shader(struct vrend_context *ctx, uint32_t handle, const struct pipe_stream_output_info *so_info, const char *shd_text, uint32_t offlen, uint32_t num_tokens, uint32_t type, uint32_t pkt_length) { struct v...
[ "CWE-190" ]
virglrenderer
93761787b29f37fa627dea9082cdfc1a1ec608d6
277560631509583395850123120925257608076
178,117
238
The product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value that is too large to store in the associated representation. When this occurs, ...
true
int vrend_create_shader(struct vrend_context *ctx, uint32_t handle, const struct pipe_stream_output_info *so_info, const char *shd_text, uint32_t offlen, uint32_t num_tokens, uint32_t type, uint32_t pkt_length) { struct v...
[ "CWE-190" ]
virglrenderer
93761787b29f37fa627dea9082cdfc1a1ec608d6
24883819423866269393027879732805252268
178,117
158,098
The product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value that is too large to store in the associated representation. When this occurs, ...
false
static struct vrend_linked_shader_program *add_shader_program(struct vrend_context *ctx, struct vrend_shader *vs, struct vrend_shader *fs, ...
[ "CWE-772" ]
virglrenderer
a2f12a1b0f95b13b6f8dc3d05d7b74b4386394e4
323217311057867578248239667496178090457
178,118
239
The product does not release a resource after its effective lifetime has ended, i.e., after the resource is no longer needed.
true
static struct vrend_linked_shader_program *add_shader_program(struct vrend_context *ctx, struct vrend_shader *vs, struct vrend_shader *fs, ...
[ "CWE-772" ]
virglrenderer
a2f12a1b0f95b13b6f8dc3d05d7b74b4386394e4
68470240422616925679336488813198975337
178,118
158,099
The product does not release a resource after its effective lifetime has ended, i.e., after the resource is no longer needed.
false
void vrend_renderer_context_destroy(uint32_t handle) { struct vrend_decode_ctx *ctx; bool ret; if (handle >= VREND_MAX_CTX) return; ctx = dec_ctx[handle]; if (!ctx) return; vrend_hw_switch_context(dec_ctx[0]->grctx, true); }
[ "CWE-476" ]
virglrenderer
0a5dff15912207b83018485f83e067474e818bab
248536757234533019908341843286492380403
178,121
240
The product dereferences a pointer that it expects to be valid but is NULL.
true
void vrend_renderer_context_destroy(uint32_t handle) { struct vrend_decode_ctx *ctx; bool ret; if (handle >= VREND_MAX_CTX) return; /* never destroy context 0 here, it will be destroyed in vrend_decode_reset()*/ if (handle == 0) { return; } ctx = dec_ctx[handle]; if (!ctx) ...
[ "CWE-476" ]
virglrenderer
0a5dff15912207b83018485f83e067474e818bab
154473925672822272321889471335487355877
178,121
158,100
The product dereferences a pointer that it expects to be valid but is NULL.
false
static boolean parse_identifier( const char **pcur, char *ret ) { const char *cur = *pcur; int i = 0; if (is_alpha_underscore( cur )) { ret[i++] = *cur++; while (is_alpha_underscore( cur ) || is_digit( cur )) ret[i++] = *cur++; ret[i++] = '\0'; *pcur = cur; retur...
[ "CWE-119" ]
virglrenderer
e534b51ca3c3cd25f3990589932a9ed711c59b27
142817990104108566810102542927701673732
178,123
241
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
true
static boolean parse_identifier( const char **pcur, char *ret ) static boolean parse_identifier( const char **pcur, char *ret, size_t len ) { const char *cur = *pcur; int i = 0; if (is_alpha_underscore( cur )) { ret[i++] = *cur++; while (is_alpha_underscore( cur ) || is_digit( cur )) { ...
[ "CWE-119" ]
virglrenderer
e534b51ca3c3cd25f3990589932a9ed711c59b27
72378232091169844659239787043415407980
178,123
158,101
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
false
int vrend_create_vertex_elements_state(struct vrend_context *ctx, uint32_t handle, unsigned num_elements, const struct pipe_vertex_element *elements) { struct vrend_vertex_element_array *v = CALLOC_ST...
[ "CWE-119" ]
virglrenderer
114688c526fe45f341d75ccd1d85473c3b08f7a7
127813115019639337707795536823961346235
178,126
242
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
true
int vrend_create_vertex_elements_state(struct vrend_context *ctx, uint32_t handle, unsigned num_elements, const struct pipe_vertex_element *elements) { struct vrend_vertex_element_array *v = CALLOC_ST...
[ "CWE-119" ]
virglrenderer
114688c526fe45f341d75ccd1d85473c3b08f7a7
226301324475184087438442572611658189614
178,126
158,102
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
false
static int vrend_decode_create_ve(struct vrend_decode_ctx *ctx, uint32_t handle, uint16_t length) { struct pipe_vertex_element *ve = NULL; int num_elements; int i; int ret; if (length < 1) return EINVAL; if ((length - 1) % 4) return EINVAL; num_elements = (length - 1) / 4; if (nu...
[ "CWE-125" ]
virglrenderer
a5ac49940c40ae415eac0cf912eac7070b4ba95d
279616717599430675241465878003165352261
178,129
243
The product reads data past the end, or before the beginning, of the intended buffer.
true
static int vrend_decode_create_ve(struct vrend_decode_ctx *ctx, uint32_t handle, uint16_t length) { struct pipe_vertex_element *ve = NULL; int num_elements; int i; int ret; if (length < 1) return EINVAL; if ((length - 1) % 4) return EINVAL; num_elements = (length - 1) / 4; if (nu...
[ "CWE-125" ]
virglrenderer
a5ac49940c40ae415eac0cf912eac7070b4ba95d
129688850372043760228352545289414617217
178,129
158,104
The product reads data past the end, or before the beginning, of the intended buffer.
false
static void set_banner(struct openconnect_info *vpninfo) { char *banner, *q; const char *p; if (!vpninfo->banner || !(banner = malloc(strlen(vpninfo->banner)))) { unsetenv("CISCO_BANNER"); return; } p = vpninfo->banner; q = banner; while (*p) { if ...
[ "CWE-119" ]
infradead
14cae65318d3ef1f7d449e463b72b6934e82f1c2
174272131383202600271920404270020112167
178,132
246
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
true
static void set_banner(struct openconnect_info *vpninfo) { char *banner, *q; const char *p; if (!vpninfo->banner || !(banner = malloc(strlen(vpninfo->banner)+1))) { unsetenv("CISCO_BANNER"); return; } p = vpninfo->banner; q = banner; while (*p) { i...
[ "CWE-119" ]
infradead
14cae65318d3ef1f7d449e463b72b6934e82f1c2
279834395077552091770358368547534380658
178,132
158,105
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
false
int ssl_parse_clienthello_tlsext(SSL *s, unsigned char **p, unsigned char *limit, int *al) { unsigned short type; unsigned short size; unsigned short len; unsigned char *data = *p; int renegotiate_seen = 0; int sigalg_seen = 0; s->servername_done = 0; s-...
[ "CWE-399" ]
openssl
2c0d295e26306e15a92eb23a84a1802005c1c137
29224115480775327782453555135433777408
178,136
249
This vulnerability category highlights issues in resource management where failures to properly release memory, file handles, or other resources can degrade system performance or enable denial-of-service conditions.
true
int ssl_parse_clienthello_tlsext(SSL *s, unsigned char **p, unsigned char *limit, int *al) { unsigned short type; unsigned short size; unsigned short len; unsigned char *data = *p; int renegotiate_seen = 0; int sigalg_seen = 0; s->servername_done = 0; s-...
[ "CWE-399" ]
openssl
2c0d295e26306e15a92eb23a84a1802005c1c137
50008233472111594579570026097454618108
178,136
158,108
This vulnerability category highlights issues in resource management where failures to properly release memory, file handles, or other resources can degrade system performance or enable denial-of-service conditions.
false
static int tls_decrypt_ticket(SSL *s, const unsigned char *etick, int eticklen, const unsigned char *sess_id, int sesslen, SSL_SESSION **psess) { SSL_SESSION *sess; unsigned char *sdec; const unsigned char *p; int slen, mlen, renew_ticket = 0, ...
[ "CWE-20" ]
openssl
e97763c92c655dcf4af2860b3abd2bc4c8a267f9
2230119928438274047665345409737174926
178,138
250
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
true
static int tls_decrypt_ticket(SSL *s, const unsigned char *etick, int eticklen, const unsigned char *sess_id, int sesslen, SSL_SESSION **psess) { SSL_SESSION *sess; unsigned char *sdec; const unsigned char *p; int slen, mlen, renew_ticket = 0, ...
[ "CWE-20" ]
openssl
e97763c92c655dcf4af2860b3abd2bc4c8a267f9
221161159369771407245687985156292409299
178,138
158,109
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
false
recv_and_process_client_pkt(void /*int fd*/) { ssize_t size; len_and_sockaddr *to; struct sockaddr *from; msg_t msg; uint8_t query_status; l_fixedpt_t query_xmttime; to = get_sock_lsa(G_listen_fd); from = xzalloc(to->len); size = recv_from_to(G_listen_fd, &msg, sizeof(msg),...
[ "CWE-399" ]
busybox
150dc7a2b483b8338a3e185c478b4b23ee884e71
156100728183473686227543895216612348906
178,139
251
This vulnerability category highlights issues in resource management where failures to properly release memory, file handles, or other resources can degrade system performance or enable denial-of-service conditions.
true
recv_and_process_client_pkt(void /*int fd*/) { ssize_t size; len_and_sockaddr *to; struct sockaddr *from; msg_t msg; uint8_t query_status; l_fixedpt_t query_xmttime; to = get_sock_lsa(G_listen_fd); from = xzalloc(to->len); size = recv_from_to(G_listen_fd, &msg, sizeof(msg),...
[ "CWE-399" ]
busybox
150dc7a2b483b8338a3e185c478b4b23ee884e71
21371049218394401264776342910550411194
178,139
158,110
This vulnerability category highlights issues in resource management where failures to properly release memory, file handles, or other resources can degrade system performance or enable denial-of-service conditions.
false
main (int argc, char *argv[]) { struct gengetopt_args_info args_info; char *line = NULL; size_t linelen = 0; char *p, *r; uint32_t *q; unsigned cmdn = 0; int rc; setlocale (LC_ALL, ""); set_program_name (argv[0]); bindtextdomain (PACKAGE, LOCALEDIR); textdomain (PACKAGE); if (cmdline_parser (a...
[ "CWE-125" ]
savannah
5e3cb9c7b5bf0ce665b9d68f5ddf095af5c9ba60
336554870084234386632359019600938342414
178,157
252
The product reads data past the end, or before the beginning, of the intended buffer.
true
main (int argc, char *argv[]) { struct gengetopt_args_info args_info; char *line = NULL; size_t linelen = 0; char *p, *r; uint32_t *q; unsigned cmdn = 0; int rc; setlocale (LC_ALL, ""); set_program_name (argv[0]); bindtextdomain (PACKAGE, LOCALEDIR); textdomain (PACKAGE); if (cmdline_parser (a...
[ "CWE-125" ]
savannah
5e3cb9c7b5bf0ce665b9d68f5ddf095af5c9ba60
47000565902019325067062732144193781212
178,157
158,111
The product reads data past the end, or before the beginning, of the intended buffer.
false
FT_Stream_EnterFrame( FT_Stream stream, FT_ULong count ) { FT_Error error = FT_Err_Ok; FT_ULong read_bytes; /* check for nested frame access */ FT_ASSERT( stream && stream->cursor == 0 ); if ( stream->read ) { /* allocate the frame in memory */ FT_...
[ "CWE-20" ]
savannah
45a3c76b547511fa9d97aca34b150a0663257375
171308526437072917405338067244329397761
178,158
253
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
true
FT_Stream_EnterFrame( FT_Stream stream, FT_ULong count ) { FT_Error error = FT_Err_Ok; FT_ULong read_bytes; /* check for nested frame access */ FT_ASSERT( stream && stream->cursor == 0 ); if ( stream->read ) { /* allocate the frame in memory */ FT_...
[ "CWE-20" ]
savannah
45a3c76b547511fa9d97aca34b150a0663257375
15593559594427562342568939375098455612
178,158
158,112
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
false
parse_instruction( struct translate_ctx *ctx, boolean has_label ) { uint i; uint saturate = 0; const struct tgsi_opcode_info *info; struct tgsi_full_instruction inst; const char *cur; uint advance; inst = tgsi_default_full_instruction(); /* Parse predicate. */ eat_opt_white( &ctx-...
[ "CWE-119" ]
virglrenderer
28894a30a17a84529be102b21118e55d6c9f23fa
207706300612945852467345419819110560855
178,159
254
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
true
parse_instruction( struct translate_ctx *ctx, boolean has_label ) { uint i; uint saturate = 0; const struct tgsi_opcode_info *info; struct tgsi_full_instruction inst; const char *cur; uint advance; inst = tgsi_default_full_instruction(); /* Parse predicate. */ eat_opt_white( &ctx-...
[ "CWE-119" ]
virglrenderer
28894a30a17a84529be102b21118e55d6c9f23fa
321254582650752893308442793791247099756
178,159
158,113
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
false
int http_request_forward_body(struct session *s, struct channel *req, int an_bit) { struct http_txn *txn = &s->txn; struct http_msg *msg = &s->txn.req; if (unlikely(msg->msg_state < HTTP_MSG_BODY)) return 0; if ((req->flags & (CF_READ_ERROR|CF_READ_TIMEOUT|CF_WRITE_ERROR|CF_WRITE_TIMEOUT)) || ((req->flags ...
[ "CWE-189" ]
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
74231898713312769363715897872246138359
178,162
256
This weakness involves numeric computation errors, such as integer overflows, underflows, or precision losses, which can lead to miscalculations and exploitable behaviors in software.
true
int http_request_forward_body(struct session *s, struct channel *req, int an_bit) { struct http_txn *txn = &s->txn; struct http_msg *msg = &s->txn.req; if (unlikely(msg->msg_state < HTTP_MSG_BODY)) return 0; if ((req->flags & (CF_READ_ERROR|CF_READ_TIMEOUT|CF_WRITE_ERROR|CF_WRITE_TIMEOUT)) || ((req->flags ...
[ "CWE-189" ]
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
232911459327632823261392605236293767883
178,162
158,115
This weakness involves numeric computation errors, such as integer overflows, underflows, or precision losses, which can lead to miscalculations and exploitable behaviors in software.
false
void Part::slotOpenExtractedEntry(KJob *job) { if (!job->error()) { OpenJob *openJob = qobject_cast<OpenJob*>(job); Q_ASSERT(openJob); m_tmpExtractDirList << openJob->tempDir(); const QString fullName = openJob->validatedFilePath(); bool isWritable = m_model->archive() &&...
[ "CWE-78" ]
kde
82fdfd24d46966a117fa625b68784735a40f9065
127189817454680839187942616776907215530
178,164
257
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
true
void Part::slotOpenExtractedEntry(KJob *job) { if (!job->error()) { OpenJob *openJob = qobject_cast<OpenJob*>(job); Q_ASSERT(openJob); m_tmpExtractDirList << openJob->tempDir(); const QString fullName = openJob->validatedFilePath(); bool isWritable = m_model->archive() &&...
[ "CWE-78" ]
kde
82fdfd24d46966a117fa625b68784735a40f9065
254744186026668512929911458145895625788
178,164
158,116
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
false
Ins_IUP( INS_ARG ) { IUP_WorkerRec V; FT_Byte mask; FT_UInt first_point; /* first point of contour */ FT_UInt end_point; /* end point (last+1) of contour */ FT_UInt first_touched; /* first touched point in contour */ FT_UInt cur_touched; /* current touched ...
[ "CWE-119" ]
savannah
888cd1843e935fe675cf2ac303116d4ed5b9d54b
271982803099189327229111379866845675067
178,174
263
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
true
Ins_IUP( INS_ARG ) { IUP_WorkerRec V; FT_Byte mask; FT_UInt first_point; /* first point of contour */ FT_UInt end_point; /* end point (last+1) of contour */ FT_UInt first_touched; /* first touched point in contour */ FT_UInt cur_touched; /* current touched ...
[ "CWE-119" ]
savannah
888cd1843e935fe675cf2ac303116d4ed5b9d54b
12490107828131494076459414255246754337
178,174
158,122
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
false
Mac_Read_POST_Resource( FT_Library library, FT_Stream stream, FT_Long *offsets, FT_Long resource_cnt, FT_Long face_index, FT_Face *aface ) { FT_Error error = FT_E...
[ "CWE-119" ]
savannah
b2ea64bcc6c385a8e8318f9c759450a07df58b6d
239474837185248719277265167606864341043
178,175
264
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
true
Mac_Read_POST_Resource( FT_Library library, FT_Stream stream, FT_Long *offsets, FT_Long resource_cnt, FT_Long face_index, FT_Face *aface ) { FT_Error error = FT_E...
[ "CWE-119" ]
savannah
b2ea64bcc6c385a8e8318f9c759450a07df58b6d
138045724524241880239158930414068620502
178,175
158,123
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
false
gray_render_span( int y, int count, const FT_Span* spans, PWorker worker ) { unsigned char* p; FT_Bitmap* map = &worker->target; /* first of all, compute the scanline offset */ p = (unsigned char*)...
[ "CWE-189" ]
savannah
6305b869d86ff415a33576df6d43729673c66eee
233903124056505689403424392136593938770
178,176
265
This weakness involves numeric computation errors, such as integer overflows, underflows, or precision losses, which can lead to miscalculations and exploitable behaviors in software.
true
gray_render_span( int y, int count, const FT_Span* spans, PWorker worker ) { unsigned char* p; FT_Bitmap* map = &worker->target; /* first of all, compute the scanline offset */ p = (unsigned char*)...
[ "CWE-189" ]
savannah
6305b869d86ff415a33576df6d43729673c66eee
34358703453298665322690073547254403786
178,176
158,124
This weakness involves numeric computation errors, such as integer overflows, underflows, or precision losses, which can lead to miscalculations and exploitable behaviors in software.
false
Mac_Read_POST_Resource( FT_Library library, FT_Stream stream, FT_Long *offsets, FT_Long resource_cnt, FT_Long face_index, FT_Face *aface ) { FT_Error error = FT_E...
[ "CWE-119" ]
savannah
c69891a1345640096fbf396e8dd567fe879ce233
66761366277063878236162927407801840545
178,178
267
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
true
Mac_Read_POST_Resource( FT_Library library, FT_Stream stream, FT_Long *offsets, FT_Long resource_cnt, FT_Long face_index, FT_Face *aface ) { FT_Error error = FT_E...
[ "CWE-119" ]
savannah
c69891a1345640096fbf396e8dd567fe879ce233
104194448279931618216830643509594183948
178,178
158,126
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
false
psh_glyph_find_strong_points( PSH_Glyph glyph, FT_Int dimension ) { /* a point is `strong' if it is located on a stem edge and */ /* has an `in' or `out' tangent parallel to the hint's direction */ PSH_Hint_Table table = &glyph->hint_tables[dimension]; ...
[ "CWE-399" ]
savannah
8d22746c9e5af80ff4304aef440986403a5072e2
238917502809110546701210284595052003786
178,179
268
This vulnerability category highlights issues in resource management where failures to properly release memory, file handles, or other resources can degrade system performance or enable denial-of-service conditions.
true
psh_glyph_find_strong_points( PSH_Glyph glyph, FT_Int dimension ) { /* a point is `strong' if it is located on a stem edge and */ /* has an `in' or `out' tangent parallel to the hint's direction */ PSH_Hint_Table table = &glyph->hint_tables[dimension]; ...
[ "CWE-399" ]
savannah
8d22746c9e5af80ff4304aef440986403a5072e2
125782867654545345190551371896398338847
178,179
158,127
This vulnerability category highlights issues in resource management where failures to properly release memory, file handles, or other resources can degrade system performance or enable denial-of-service conditions.
false
cff_decoder_parse_charstrings( CFF_Decoder* decoder, FT_Byte* charstring_base, FT_ULong charstring_len ) { FT_Error error; CFF_Decoder_Zone* zone; FT_Byte* ip; FT_Byte* limit; CFF_Builder*...
[ "CWE-189" ]
savannah
7d3d2cc4fef72c6be9c454b3809c387e12b44cfc
78533740565488192289380822412773176149
178,180
269
This weakness involves numeric computation errors, such as integer overflows, underflows, or precision losses, which can lead to miscalculations and exploitable behaviors in software.
true
cff_decoder_parse_charstrings( CFF_Decoder* decoder, FT_Byte* charstring_base, FT_ULong charstring_len ) { FT_Error error; CFF_Decoder_Zone* zone; FT_Byte* ip; FT_Byte* limit; CFF_Builder*...
[ "CWE-189" ]
savannah
7d3d2cc4fef72c6be9c454b3809c387e12b44cfc
338965105723107567424020450442881213658
178,180
158,128
This weakness involves numeric computation errors, such as integer overflows, underflows, or precision losses, which can lead to miscalculations and exploitable behaviors in software.
false
XvQueryAdaptors( Display *dpy, Window window, unsigned int *p_nAdaptors, XvAdaptorInfo **p_pAdaptors) { XExtDisplayInfo *info = xv_find_display(dpy); xvQueryAdaptorsReq *req; xvQueryAdaptorsReply rep; size_t size; unsigned int ii, jj; char *name; XvAdaptorInfo *pas = NULL...
[ "CWE-125" ]
libXv
d9da580b46a28ab497de2e94fdc7b9ff953dab17
25138831966304988672154482243921916552
178,181
270
The product reads data past the end, or before the beginning, of the intended buffer.
true
XvQueryAdaptors( Display *dpy, Window window, unsigned int *p_nAdaptors, XvAdaptorInfo **p_pAdaptors) { XExtDisplayInfo *info = xv_find_display(dpy); xvQueryAdaptorsReq *req; xvQueryAdaptorsReply rep; size_t size; unsigned int ii, jj; char *name; char *end; XvAdaptorI...
[ "CWE-125" ]
libXv
d9da580b46a28ab497de2e94fdc7b9ff953dab17
13775494404515584781393413951208073381
178,181
158,129
The product reads data past the end, or before the beginning, of the intended buffer.
false
intuit_diff_type (bool need_header, mode_t *p_file_type) { file_offset this_line = 0; file_offset first_command_line = -1; char first_ed_command_letter = 0; lin fcl_line = 0; /* Pacify 'gcc -W'. */ bool this_is_a_command = false; bool stars_this_line = false; bool extended_headers = false; ...
[ "CWE-476" ]
savannah
f290f48a621867084884bfff87f8093c15195e6a
119977677141531301071259218660699705481
178,192
274
The product dereferences a pointer that it expects to be valid but is NULL.
true
intuit_diff_type (bool need_header, mode_t *p_file_type) { file_offset this_line = 0; file_offset first_command_line = -1; char first_ed_command_letter = 0; lin fcl_line = 0; /* Pacify 'gcc -W'. */ bool this_is_a_command = false; bool stars_this_line = false; bool extended_headers = false; ...
[ "CWE-476" ]
savannah
f290f48a621867084884bfff87f8093c15195e6a
146473763077753726031355449366744801662
178,192
158,133
The product dereferences a pointer that it expects to be valid but is NULL.
false
Ins_GETVARIATION( TT_ExecContext exc, FT_Long* args ) { FT_UInt num_axes = exc->face->blend->num_axis; FT_Fixed* coords = exc->face->blend->normalizedcoords; FT_UInt i; if ( BOUNDS( num_axes, exc->stackSize + 1 - exc->top ) ) { exc->error = FT_THROW( S...
[ "CWE-476" ]
savannah
29c759284e305ec428703c9a5831d0b1fc3497ef
139567459660525946313428439964298096333
178,193
275
The product dereferences a pointer that it expects to be valid but is NULL.
true
Ins_GETVARIATION( TT_ExecContext exc, FT_Long* args ) { FT_UInt num_axes = exc->face->blend->num_axis; FT_Fixed* coords = exc->face->blend->normalizedcoords; FT_UInt i; if ( BOUNDS( num_axes, exc->stackSize + 1 - exc->top ) ) { exc->error = FT_THROW( S...
[ "CWE-476" ]
savannah
29c759284e305ec428703c9a5831d0b1fc3497ef
159806780920376373711216124732552440560
178,193
158,134
The product dereferences a pointer that it expects to be valid but is NULL.
false
int ssl3_get_server_hello(SSL *s) { STACK_OF(SSL_CIPHER) *sk; const SSL_CIPHER *c; unsigned char *p,*d; int i,al,ok; unsigned int j; long n; #ifndef OPENSSL_NO_COMP SSL_COMP *comp; #endif n=s->method->ssl_get_message(s, SSL3_ST_CR_SRVR_HELLO_A, SSL3_ST_CR_SRVR_HELLO_B, -1, 20000, /* ?? */ &ok); if...
[ "Other" ]
openssl
83764a989dcc87fbea337da5f8f86806fe767b7e
277497504299456757679652544715041856567
178,194
276
Unknown
true
int ssl3_get_server_hello(SSL *s) { STACK_OF(SSL_CIPHER) *sk; const SSL_CIPHER *c; unsigned char *p,*d; int i,al,ok; unsigned int j; long n; #ifndef OPENSSL_NO_COMP SSL_COMP *comp; #endif n=s->method->ssl_get_message(s, SSL3_ST_CR_SRVR_HELLO_A, SSL3_ST_CR_SRVR_HELLO_B, -1, 20000, /* ?? */ &ok); if...
[ "Other" ]
openssl
83764a989dcc87fbea337da5f8f86806fe767b7e
213542089899120777699331744298021444999
178,194
158,135
Unknown
false
void ssl_set_client_disabled(SSL *s) { CERT *c = s->cert; c->mask_a = 0; c->mask_k = 0; /* Don't allow TLS 1.2 only ciphers if we don't suppport them */ if (!SSL_CLIENT_USE_TLS1_2_CIPHERS(s)) c->mask_ssl = SSL_TLSV1_2; else c->mask_ssl = 0; ssl_set_sig_mask(&c->mask_a, s, SSL_SECOP_SIGALG_MASK); /* Disable...
[ "Other" ]
openssl
80bd7b41b30af6ee96f519e629463583318de3b0
145190138964748869120683088287665695350
178,195
277
Unknown
true
void ssl_set_client_disabled(SSL *s) { CERT *c = s->cert; c->mask_a = 0; c->mask_k = 0; /* Don't allow TLS 1.2 only ciphers if we don't suppport them */ if (!SSL_CLIENT_USE_TLS1_2_CIPHERS(s)) c->mask_ssl = SSL_TLSV1_2; else c->mask_ssl = 0; ssl_set_sig_mask(&c->mask_a, s, SSL_SECOP_SIGALG_MASK); /* Disable...
[ "Other" ]
openssl
80bd7b41b30af6ee96f519e629463583318de3b0
282690502176957429077395181909592930453
178,195
158,136
Unknown
false
void DelayedExecutor::delayedExecute(const QString &udi) { Solid::Device device(udi); QString exec = m_service.exec(); MacroExpander mx(device); mx.expandMacros(exec); KRun::runCommand(exec, QString(), m_service.icon(), 0); deleteLater(); }
[ "CWE-78" ]
kde
9db872df82c258315c6ebad800af59e81ffb9212
185460399545264476872601191691271963408
178,196
278
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
true
void DelayedExecutor::delayedExecute(const QString &udi) { Solid::Device device(udi); QString exec = m_service.exec(); MacroExpander mx(device); mx.expandMacrosShellQuote(exec); KRun::runCommand(exec, QString(), m_service.icon(), 0); deleteLater(); }
[ "CWE-78" ]
kde
9db872df82c258315c6ebad800af59e81ffb9212
323699902109915935156580630724126463315
178,196
158,137
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
false
uint NotificationsEngine::Notify(const QString &app_name, uint replaces_id, const QString &app_icon, const QString &summary, const QString &body, const QStringList &actions, const QVariantMap &hints, int timeout) { uint partOf = 0; const QString ...
[ "CWE-200" ]
kde
8164beac15ea34ec0d1564f0557fe3e742bdd938
66626965994794909671436631171592255350
178,197
279
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
true
uint NotificationsEngine::Notify(const QString &app_name, uint replaces_id, const QString &app_icon, const QString &summary, const QString &body, const QStringList &actions, const QVariantMap &hints, int timeout) { uint partOf = 0; const QString ...
[ "CWE-200" ]
kde
8164beac15ea34ec0d1564f0557fe3e742bdd938
307726928526403562600043842982225149020
178,197
158,138
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
false
uint NotificationsEngine::Notify(const QString &app_name, uint replaces_id, const QString &app_icon, const QString &summary, const QString &body, const QStringList &actions, const QVariantMap &hints, int timeout) { uint partOf = 0; const QString ...
[ "CWE-200" ]
kde
5bc696b5abcdb460c1017592e80b2d7f6ed3107c
49080920792690681565819742613436372042
178,198
280
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
true
uint NotificationsEngine::Notify(const QString &app_name, uint replaces_id, const QString &app_icon, const QString &summary, const QString &body, const QStringList &actions, const QVariantMap &hints, int timeout) { uint partOf = 0; const QString ...
[ "CWE-200" ]
kde
5bc696b5abcdb460c1017592e80b2d7f6ed3107c
114483981526891060266771495911529009869
178,198
158,139
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
false
dns_stricmp(const char* str1, const char* str2) { char c1, c2; *----------------------------------------------------------------------------*/ /* DNS variables */ static struct udp_pcb *dns_pcb; static u8_t dns_seqno; static struct dns_table_entry dns_table[DNS_TABLE_SIZE]; static str...
[ "CWE-345" ]
savannah
9fb46e120655ac481b2af8f865d5ae56c39b831a
181259810056970673184917548254526485235
178,220
283
The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.
true
dns_stricmp(const char* str1, const char* str2) { char c1, c2; *----------------------------------------------------------------------------*/ /* DNS variables */ static struct udp_pcb *dns_pcbs[DNS_MAX_SOURCE_PORTS]; #if ((LWIP_DNS_SECURE & LWIP_DNS_SECURE_RAND_SRC_PORT) != 0) static u8_t ...
[ "CWE-345" ]
savannah
9fb46e120655ac481b2af8f865d5ae56c39b831a
167319277236782062603877419055130451552
178,220
158,142
The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.
false
static void reply_sesssetup_and_X_spnego(struct smb_request *req) { const uint8 *p; DATA_BLOB blob1; size_t bufrem; char *tmp; const char *native_os; const char *native_lanman; const char *primary_domain; const char *p2; uint16 data_blob_len = SVAL(req->vwv+7, 0); enum remote_arch_types ra_type = get_remote_a...
[ "CWE-119" ]
samba
9280051bfba337458722fb157f3082f93cbd9f2b
252100526266913255109910552885875245221
178,226
287
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
true
static void reply_sesssetup_and_X_spnego(struct smb_request *req) { const uint8 *p; DATA_BLOB blob1; size_t bufrem; char *tmp; const char *native_os; const char *native_lanman; const char *primary_domain; const char *p2; uint16 data_blob_len = SVAL(req->vwv+7, 0); enum remote_arch_types ra_type = get_remote_a...
[ "CWE-119" ]
samba
9280051bfba337458722fb157f3082f93cbd9f2b
264029160300950657613398871836569816502
178,226
158,146
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
false
_asn1_extract_der_octet (asn1_node node, const unsigned char *der, int der_len, unsigned flags) { int len2, len3; int counter, counter_end; int result; len2 = asn1_get_length_der (der, der_len, &len3); if (len2 < -1) return ASN1_DER_ERROR; counter = len3 + 1; DECR_LEN(der_len, len3); if (l...
[ "CWE-399" ]
savannah
f435825c0f527a8e52e6ffbc3ad0bc60531d537e
199202175349742229581148475563569699182
178,249
288
This vulnerability category highlights issues in resource management where failures to properly release memory, file handles, or other resources can degrade system performance or enable denial-of-service conditions.
true
_asn1_extract_der_octet (asn1_node node, const unsigned char *der, int der_len, unsigned flags) { int len2, len3; int counter, counter_end; int result; len2 = asn1_get_length_der (der, der_len, &len3); if (len2 < -1) return ASN1_DER_ERROR; counter = len3 + 1; DECR_LEN(der_len, len3); if (l...
[ "CWE-399" ]
savannah
f435825c0f527a8e52e6ffbc3ad0bc60531d537e
67295952125339630714795122517192783264
178,249
158,148
This vulnerability category highlights issues in resource management where failures to properly release memory, file handles, or other resources can degrade system performance or enable denial-of-service conditions.
false
load(ImlibImage * im, ImlibProgressFunction progress, char progress_granularity, char immediate_load) { static const int intoffset[] = { 0, 4, 2, 1 }; static const int intjump[] = { 8, 8, 4, 2 }; int rc; DATA32 *ptr; GifFileType *gif; GifRowType *r...
[ "CWE-119" ]
enlightment
37a96801663b7b4cd3fbe56cc0eb8b6a17e766a8
29413401693515776488286177132255863480
178,251
289
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
true
load(ImlibImage * im, ImlibProgressFunction progress, char progress_granularity, char immediate_load) { static const int intoffset[] = { 0, 4, 2, 1 }; static const int intjump[] = { 8, 8, 4, 2 }; int rc; DATA32 *ptr; GifFileType *gif; GifRowType *r...
[ "CWE-119" ]
enlightment
37a96801663b7b4cd3fbe56cc0eb8b6a17e766a8
327794120807518814236575440422420435138
178,251
158,149
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
false
__imlib_MergeUpdate(ImlibUpdate * u, int w, int h, int hgapmax) { ImlibUpdate *nu = NULL, *uu; struct _tile *t; int tw, th, x, y, i; int *gaps = NULL; /* if theres no rects to process.. return NULL */ if (!u) return NULL; tw = w >> TB; if (w & T...
[ "CWE-119" ]
enlightment
ce94edca1ccfbe314cb7cd9453433fad404ec7ef
36599931638812584056030971307038057704
178,252
290
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
true
__imlib_MergeUpdate(ImlibUpdate * u, int w, int h, int hgapmax) { ImlibUpdate *nu = NULL, *uu; struct _tile *t; int tw, th, x, y, i; int *gaps = NULL; /* if theres no rects to process.. return NULL */ if (!u) return NULL; tw = w >> TB; if (w & T...
[ "CWE-119" ]
enlightment
ce94edca1ccfbe314cb7cd9453433fad404ec7ef
35689730528572601890660899349736969741
178,252
158,150
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
false
_gnutls_ciphertext2compressed (gnutls_session_t session, opaque * compress_data, int compress_size, gnutls_datum_t ciphertext, uint8_t type, record_parameters_st * params) { uint8_t MAC[MAX_HASH...
[ "CWE-310" ]
savannah
422214868061370aeeb0ac9cd0f021a5c350a57d
124737111803029213599184263327276296012
178,253
291
This weakness pertains to the use of cryptographic functions that are weak, misconfigured, or outdated, which undermines the intended protection of encrypted data and communications.
true
_gnutls_ciphertext2compressed (gnutls_session_t session, opaque * compress_data, int compress_size, gnutls_datum_t ciphertext, uint8_t type, record_parameters_st * params) { uint8_t MAC[MAX_HASH...
[ "CWE-310" ]
savannah
422214868061370aeeb0ac9cd0f021a5c350a57d
86024422305750338389798766305319221010
178,253
158,151
This weakness pertains to the use of cryptographic functions that are weak, misconfigured, or outdated, which undermines the intended protection of encrypted data and communications.