instance_id
stringlengths
17
28
repo
stringclasses
85 values
base_commit
stringlengths
40
40
date
timestamp[ns]date
2011-05-04 02:41:45
2025-11-08 00:00:00
project_name
stringclasses
85 values
lang
stringclasses
3 values
dockerfile
stringlengths
178
1.15k
build_sh
stringclasses
102 values
work_dir
stringclasses
85 values
sanitizer
stringclasses
4 values
bug_description
stringlengths
905
163k
additional_files
listlengths
0
6
candidate_fixes
listlengths
0
321
libass.cve-2020-24994
libass/libass
691b422247552a86e9d3310c4f1ea096dc52a3f2
2018-01-05T14:31:41
libass
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y make autoconf automake libtool pkg-config libfreetype6-dev libfontconfig1-dev RUN git clone https://github.com/libass/libass libass RUN git -C libass checkout 691b422247552a86e9d3310c4f1ea096dc52a3f2 WORKDIR $SRC/libass COPY build.sh $SRC/
#!/bin/bash -eux # Minimized build script with only core build commands set -eu cd $SRC/fribidi ./bootstrap ./configure --enable-static=yes --enable-shared=no --with-pic=yes --prefix=/work/ make install -j$(nproc) cd $SRC/libass export PKG_CONFIG_PATH=/work/lib/pkgconfig ./autogen.sh ./configure --disable-asm make -j$(...
/src/libass
address
================= Bug Report (1/3) ================== ## Source: GitHub Issue ## URL: https://github.com/libass/libass/issues/422 ## Description: Issue: libass/libass#422 Title: stack-overflow on ass_parse.c:234 *parse_tag State: closed Created by: Fstark-prog Created at: 2020-08-27 02:18:39+00:00 Issue Body: **Descri...
[ { "content": "\"0x\"\n\"\\\\1a\"\n\"\\\\2a\"\n\"\\\\2c\"\n\"\\\\3a\"\n\"\\\\3c\"\n\"\\\\4a\"\n\"\\\\4c\"\n\"\\\\a\"\n\"\\\\alpha\"\n\"\\\\an\"\n\"Arial\"\n\"\\\\b\"\n\"Banner;\"\n\"\\\\be\"\n\"\\\\blur\"\n\"\\\\bord\"\n\"\\\\c\"\n\"CFF\"\n\"CID Type 1\"\n\"\\\\clip\"\n\"clip\"\n\"Courier\"\n\"Courier New\"\n\"D...
[ { "sha": "6835731c2fe4164a0c50bc91d12c43b2a2b4e799", "url": "https://github.com/libass/libass/commit/6835731c2fe4164a0c50bc91d12c43b2a2b4e799" }, { "sha": "b3f9022b04ddf8872b99c28dd358d89e94dea12d", "url": "https://github.com/libass/libass/commit/b3f9022b04ddf8872b99c28dd358d89e94dea12d" }, ...
openjpeg.cve-2016-3182
uclouvain/openjpeg
788dff0a3650f8897eaafe951512a4bae63808dd
2016-05-15T12:19:15
openjpeg
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y make cmake g++ RUN git clone https://github.com/uclouvain/openjpeg openjpeg RUN git -C openjpeg checkout 788dff0a3650f8897eaafe951512a4bae63808dd WORKDIR $SRC/openjpeg COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu mkdir -p build cd build cmake .. make clean -s -j$(nproc) make -j$(nproc) -s
/src/openjpeg
address
================= Bug Report (1/2) ================== ## Source: Red Hat Bugzilla ## URL: https://bugzilla.redhat.com/show_bug.cgi?id=1317826 ## Description: Bugzilla ID: 1317826 Title: CVE-2016-3182 openjpeg: Heap corruption in opj_free function Description Adam Mariš 2016-03-15 10:17:38 UTC Double free or heap corru...
[]
[ { "sha": "ad593c9e0622e0d8d87228e67e4dbd36243ffd22", "url": "https://github.com/uclouvain/openjpeg/commit/ad593c9e0622e0d8d87228e67e4dbd36243ffd22" }, { "sha": "105892033756b9bd30c7ef90704b75618697e54f", "url": "https://github.com/mayeut/openjpeg/commit/105892033756b9bd30c7ef90704b75618697e54f" ...
freerdp.cve-2023-40569
freerdp/freerdp
16047bd16f159ee4aea581854170e83c36862793
2023-08-28T07:33:09
freerdp
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y build-essential git-core cmake ninja-build pkg-config zlib1g-dev ccache libx11-dev libxext-dev libxinerama-dev libxcursor-dev libxkbfile-dev libxv-dev libxi-dev libxdamage-dev libxrender-dev libxrandr-dev libssl-dev libasound2-dev libcups2-dev lib...
#!/bin/bash -eu # Minimized build script with only core build commands set -eu -DCMAKE_C_FLAGS="${CFLAGS}" -DCMAKE_CXX_FLAGS="${CXXFLAGS}" -DCMAKE_EXE_LINKER_FLAGS="${LDFLAGS}" -DCMAKE_MODULE_LINKER_FLAGS="${LDFLAGS}" -DCMAKE_SHARED_LINKER_FLAGS="${LDFLAGS}" cmake "${cmake_args[@]}" -S . -B build -G...
/src/freerdp
address
================= Bug Report (1/1) ================== ## Source: GitHub Advisory ## URL: https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-hm8c-rcjg-c8qp ## Description: Advisory ID: GHSA-hm8c-rcjg-c8qp Title: Out-Of-Bounds Write in progressive_decompress Description: Summary Out-Of-Bounds Write in progressi...
[]
[ { "sha": "5be5553e0da72178a4b94cc1ffbdace9ceb153e5", "url": "https://github.com/FreeRDP/FreeRDP/commit/5be5553e0da72178a4b94cc1ffbdace9ceb153e5" } ]
gpac.cve-2022-43042
gpac/gpac
65430e30593bb04579445e77df0a1207adfad357
2022-12-19T09:13:04
gpac
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y build-essential pkg-config libz-dev RUN git clone https://github.com/gpac/gpac gpac RUN git -C gpac checkout 65430e30593bb04579445e77df0a1207adfad357 WORKDIR $SRC/gpac COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu ./configure --static-build --extra-cflags="${CFLAGS}" --extra-ldflags="${CFLAGS}" make -j$(nproc)
/src/gpac
address
================= Bug Report (1/1) ================== ## Source: GitHub Issue ## URL: https://github.com/gpac/gpac/issues/2278 ## Description: Issue: gpac/gpac#2278 Title: heap-buffer-overflow isomedia/isom_intern.c:227 in FixSDTPInTRAF State: closed Created by: 17ssDP Created at: 2022-10-09 08:21:31+00:00 Issue Body:...
[]
[ { "sha": "3661da280b3eba75490e75ff20ad440c66e24de9", "url": "https://github.com/gpac/gpac/commit/3661da280b3eba75490e75ff20ad440c66e24de9" } ]
gpac.cve-2022-46489
gpac/gpac
65430e30593bb04579445e77df0a1207adfad357
2022-12-19T09:13:04
gpac
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y build-essential pkg-config libz-dev RUN git clone https://github.com/gpac/gpac gpac RUN git -C gpac checkout 65430e30593bb04579445e77df0a1207adfad357 WORKDIR $SRC/gpac COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu ./configure --static-build --extra-cflags="${CFLAGS}" --extra-ldflags="${CFLAGS}" make -j$(nproc)
/src/gpac
address
================= Bug Report (1/1) ================== ## Source: GitHub Issue ## URL: https://github.com/gpac/gpac/issues/2328 ## Description: Issue: gpac/gpac#2328 Title: Memory leak in gf_isom_box_parse_ex function of box_funcs.c:166:13 State: closed Created by: HotSpurzzZ Created at: 2022-11-28 06:47:39+00:00 Issue...
[]
[ { "sha": "b9577e6ad91ef96decbcd369227ab02b2842c77f", "url": "https://github.com/gpac/gpac/commit/b9577e6ad91ef96decbcd369227ab02b2842c77f" }, { "sha": "44e8616ec6d0c37498cdacb81375b09249fa9daa", "url": "https://github.com/gpac/gpac/commit/44e8616ec6d0c37498cdacb81375b09249fa9daa" } ]
gpac.cve-2019-20171
gpac/gpac
ed4ec31ea84a1a94abb17669db33f5c4e7a679cf
2020-06-15T05:33:03
gpac
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y build-essential pkg-config libz-dev RUN git clone https://github.com/gpac/gpac gpac RUN git -C gpac checkout ed4ec31ea84a1a94abb17669db33f5c4e7a679cf WORKDIR $SRC/gpac COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu ./configure --static-build --extra-cflags="${CFLAGS}" --extra-ldflags="${CFLAGS}" make -j$(nproc)
/src/gpac
address
================= Bug Report (1/1) ================== ## Source: GitHub Issue ## URL: https://github.com/gpac/gpac/issues/1337 ## Description: Issue: gpac/gpac#1337 Title: AddressSanitizer: 2 memory leaks of metx_New(), abst_Read() State: closed Created by: Clingto Created at: 2019-11-09 12:00:28+00:00 Issue Body: Sys...
[ { "content": "/* Copyright 2021 Google LLC\nLicensed under the Apache License, Version 2.0 (the \"License\");\nyou may not use this file except in compliance with the License.\nYou may obtain a copy of the License at\n http://www.apache.org/licenses/LICENSE-2.0\nUnless required by applicable law or agreed ...
[ { "sha": "72cdc5048dead86bb1df7d21e0b9975e49cf2d97", "url": "https://github.com/gpac/gpac/commit/72cdc5048dead86bb1df7d21e0b9975e49cf2d97" } ]
md4c.cve-2018-11546
mity/md4c
00ca0604f6ed8893d24eb8b227a6ef8445cd87c0
2018-05-28T15:06:15
md4c
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y make cmake RUN git clone https://github.com/mity/md4c md4c RUN git -C md4c checkout 00ca0604f6ed8893d24eb8b227a6ef8445cd87c0 WORKDIR $SRC/md4c COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu mkdir -p build && cd build cmake ../ -DBUILD_SHARED_LIBS=OFF make -j$(nproc)
/src/md4c
address
================= Bug Report (1/1) ================== ## Source: GitHub Issue ## URL: https://github.com/mity/md4c/issues/38 ## Description: Issue: mity/md4c#38 Title: Heap buffer overflow in md_is_named_entity_contents() State: closed Created by: ChijinZ Created at: 2018-05-29 15:41:25+00:00 Labels: bug Issue Body: c...
[]
[ { "sha": "e5feaf2c96a08390f89a72972b5f8b808ca34e79", "url": "https://github.com/mity/md4c/commit/e5feaf2c96a08390f89a72972b5f8b808ca34e79" } ]
md4c.cve-2018-11545
mity/md4c
00ca0604f6ed8893d24eb8b227a6ef8445cd87c0
2018-05-28T15:06:15
md4c
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y make cmake RUN git clone https://github.com/mity/md4c md4c RUN git -C md4c checkout 00ca0604f6ed8893d24eb8b227a6ef8445cd87c0 WORKDIR $SRC/md4c COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu mkdir -p build && cd build cmake ../ -DBUILD_SHARED_LIBS=OFF make -j$(nproc)
/src/md4c
address
================= Bug Report (1/1) ================== ## Source: GitHub Issue ## URL: https://github.com/mity/md4c/issues/39 ## Description: Issue: mity/md4c#39 Title: Heap buffer overflow in md_merge_lines() State: closed Created by: ChijinZ Created at: 2018-05-29 15:41:50+00:00 Labels: bug Issue Body: command: ./md2...
[]
[ { "sha": "7deaccf65d01d5bde104efb3b6fd18aab8ae8392", "url": "https://github.com/mity/md4c/commit/7deaccf65d01d5bde104efb3b6fd18aab8ae8392" } ]
gpac.cve-2020-22677
gpac/gpac
6b4ab401297be43b57f9eddd675971a8a5feab44
2019-06-27T05:20:45
gpac
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y build-essential pkg-config libz-dev RUN git clone https://github.com/gpac/gpac gpac RUN git -C gpac checkout 6b4ab401297be43b57f9eddd675971a8a5feab44 WORKDIR $SRC/gpac COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu ./configure --static-build --extra-cflags="${CFLAGS}" --extra-ldflags="${CFLAGS}" make -j$(nproc)
/src/gpac
address
================= Bug Report (1/1) ================== ## Source: GitHub Issue ## URL: https://github.com/gpac/gpac/issues/1341 ## Description: Issue: gpac/gpac#1341 Title: There is a heap-buffer-overflow in the dump_data_hex function of box_dump.c:51 State: closed Created by: gutiniao Created at: 2019-11-13 03:49:59+00...
[ { "content": "/* Copyright 2021 Google LLC\nLicensed under the Apache License, Version 2.0 (the \"License\");\nyou may not use this file except in compliance with the License.\nYou may obtain a copy of the License at\n http://www.apache.org/licenses/LICENSE-2.0\nUnless required by applicable law or agreed ...
[ { "sha": "eec9e058a9486fe4e99c33021481d9e1826ca9db", "url": "https://github.com/gpac/gpac/commit/eec9e058a9486fe4e99c33021481d9e1826ca9db" } ]
mruby.cve-2018-14337
mruby/mruby
023070a6396233974785a8fd5735b9380a884f27
2018-04-26T21:30:30
mruby
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y make autoconf automake libtool ruby bison RUN git clone https://github.com/mruby/mruby mruby RUN git -C mruby checkout 023070a6396233974785a8fd5735b9380a884f27 WORKDIR $SRC/mruby COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu export LD=clang export LDFLAGS="$CFLAGS" ./minirake clean && ./minirake -j$(nproc) all
/src/mruby
undefined
================= Bug Report (1/1) ================== ## Source: GitHub Issue ## URL: https://github.com/mruby/mruby/issues/4062 ## Description: Issue: mruby/mruby#4062 Title: Signed integer overflow in mrb_str_format State: closed Created by: clayton-shopify Created at: 2018-06-25 15:27:56+00:00 Issue Body: The check...
[]
[ { "sha": "351614bbddb5f612ecf9572e975e78e058d2bf11", "url": "https://github.com/mruby/mruby/commit/351614bbddb5f612ecf9572e975e78e058d2bf11" }, { "sha": "695f29cd604787f43be1af16e38d13610bf8312b", "url": "https://github.com/mruby/mruby/commit/695f29cd604787f43be1af16e38d13610bf8312b" }, { ...
libsass.cve-2018-11698
sass/libsass
1e52b74306b7d73a617396c912ca436dc55fd4d8
2018-04-25T00:47:16
libsass
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y make autoconf automake libtool RUN git clone https://github.com/sass/libsass libsass RUN git -C libsass checkout 1e52b74306b7d73a617396c912ca436dc55fd4d8 WORKDIR $SRC/libsass COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu export BUILD='static' make -j$(nproc)
/src/libsass
address
================= Bug Report (1/1) ================== ## Source: GitHub Issue ## URL: https://github.com/sass/libsass/issues/2662 ## Description: Issue: sass/libsass#2662 Title: AddressSanitizer: heap-buffer-overflow (OOB read) in Sass::handle_error (libsass/src/sass_context.cpp:85:28) State: closed Created by: glen-ma...
[ { "content": "#include \"sass.h\"\n\nextern \"C\" int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) {\n char* sass_data = (char*) malloc(sizeof(char) * size + 1);\n if (sass_data == NULL) return 0;\n\n memcpy(sass_data, data, size);\n sass_data[size] = '\\0';\n\n struct Sass_Data_Context* ctx = ...
[ { "sha": "aa6d5c635ea8faf44d542a23aaf85d27e5777d48", "url": "https://github.com/sass/sassc/commit/aa6d5c635ea8faf44d542a23aaf85d27e5777d48" }, { "sha": "60f839158eff1f1bb84cb44f0f0c4bce3ed86a6d", "url": "https://github.com/sass/libsass/commit/60f839158eff1f1bb84cb44f0f0c4bce3ed86a6d" }, { ...
openjpeg.cve-2016-9115
uclouvain/openjpeg
1f1e968269bbd7eaade7955892a6d8c281b91df2
2016-09-28T13:18:16
openjpeg
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y make cmake g++ RUN git clone https://github.com/uclouvain/openjpeg openjpeg RUN git -C openjpeg checkout 1f1e968269bbd7eaade7955892a6d8c281b91df2 WORKDIR $SRC/openjpeg COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu mkdir -p build cd build cmake .. make clean -s -j$(nproc) make -j$(nproc) -s
/src/openjpeg
address
================= Bug Report (1/1) ================== ## Source: GitHub Issue ## URL: https://github.com/uclouvain/openjpeg/issues/858 ## Description: Issue: uclouvain/openjpeg#858 Title: Heap Buffer Overflow in function imagetotga of convert.c(jp2):942 State: closed Created by: YangY-Xiao Created at: 2016-10-29 08:45:...
[]
[]
w3m.cve-2016-9431
tats/w3m
ce6fffae3d2b82eeef1cbec23a6f4849169f1211
2016-10-15T05:34:56
w3m
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y libgc-dev RUN git clone https://github.com/tats/w3m w3m RUN git -C w3m checkout ce6fffae3d2b82eeef1cbec23a6f4849169f1211 WORKDIR $SRC/w3m COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu ./configure make myctype.o -j$(nproc) make Str.o -j$(nproc) make libwc -j$(nproc)
/src/w3m
address
================= Bug Report (1/1) ================== ## Source: GitHub Issue ## URL: https://github.com/tats/w3m/issues/10 ## Description: Issue: tats/w3m#10 Title: stackoverflow in deleteFrameSet() on malform input State: closed Created by: kcwu Created at: 2016-08-14 13:38:48+00:00 Issue Body: How to reproduce: ``...
[]
[ { "sha": "9f0bdcfdf061db3520bd1f112bdc5e83acdec4be", "url": "https://github.com/tats/w3m/commit/9f0bdcfdf061db3520bd1f112bdc5e83acdec4be" }, { "sha": "f065a49616b8104973e30a2b031102d6b6e11080", "url": "https://github.com/tats/w3m/commit/f065a49616b8104973e30a2b031102d6b6e11080" }, { "sha...
imagemagick.cve-2017-14139
imagemagick/imagemagick
bbd2d43ed43631c37c0301ecc82479190cae611b
2017-07-21T20:11:36
imagemagick
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y make autoconf automake libtool RUN git clone https://github.com/imagemagick/imagemagick imagemagick RUN git -C imagemagick checkout bbd2d43ed43631c37c0301ecc82479190cae611b WORKDIR $SRC/imagemagick COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu ./configure --prefix="$WORK" --disable-shared --disable-docs make "-j$(nproc)" make install -j$(nproc)
/src/imagemagick
address
================= Bug Report (1/1) ================== ## Source: GitHub Issue ## URL: https://github.com/ImageMagick/ImageMagick/issues/578 ## Description: Issue: ImageMagick/ImageMagick#578 Title: memory leak in WriteMSLImage State: closed Created by: jgj212 Created at: 2017-07-17 04:58:46+00:00 Labels: bug Issue Bod...
[ { "content": "#include <cstdint>\n\n#include <Magick++/Blob.h>\n#include <Magick++/Image.h>\n\nextern \"C\" int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) {\n uint16_t Width;\n uint16_t Height;\n if (Size < (sizeof(Width) + sizeof(Height))) {\n return 0;\n }\n Width = *reinterpret_cast<con...
[ { "sha": "6ce596ba2c05cce1ad5ffabdeceb7f06ba0ae736", "url": "https://github.com/ImageMagick/ImageMagick/commit/6ce596ba2c05cce1ad5ffabdeceb7f06ba0ae736" }, { "sha": "13ee1160f9b2c2dc6945317bfbe8412be5999047", "url": "https://github.com/ImageMagick/ImageMagick/commit/13ee1160f9b2c2dc6945317bfbe84...
espeak-ng.cve-2023-49990
espeak-ng/espeak-ng
4870adfa25b1a32b4361592f1be8a40337c58d6c
2024-12-12T07:28:01
espeak-ng
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt install -y automake autoconf libtool pkg-config RUN git clone https://github.com/espeak-ng/espeak-ng espeak-ng RUN git -C espeak-ng checkout 4870adfa25b1a32b4361592f1be8a40337c58d6c WORKDIR $SRC/espeak-ng COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu export ASAN_OPTIONS=detect_leaks=0 ./autogen.sh ./configure --with-libfuzzer=yes --disable-shared --with-speechplayer=no make check || true -j$(nproc)
/src/espeak-ng
address
================= Bug Report (1/1) ================== ## Source: GitHub Issue ## URL: https://github.com/espeak-ng/espeak-ng/issues/1824 ## Description: Issue: espeak-ng/espeak-ng#1824 Title: global-buffer-overflow exists in the function SetUpPhonemeTable in synthdata.c State: closed Created by: SEU-SSL Created at: 202...
[]
[ { "sha": "58f1e0b6a4e6aa55621c6f01118994d01fd6f68c", "url": "https://github.com/espeak-ng/espeak-ng/commit/58f1e0b6a4e6aa55621c6f01118994d01fd6f68c" }, { "sha": "c4c05820c4a47369d5a81e4a506fe7abb2fa7ed6", "url": "https://github.com/espeak-ng/espeak-ng/commit/c4c05820c4a47369d5a81e4a506fe7abb2fa7...
exiv2.cve-2021-29458
exiv2/exiv2
9ac01692487e1fd5e5240ea95bf9c43bf281775a
2021-06-15T03:46:50
exiv2
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y cmake make ccache python3 libexpat1-dev zlib1g-dev libssh-dev libcurl4-openssl-dev libxml2-utils RUN git clone https://github.com/exiv2/exiv2 exiv2 RUN git -C exiv2 checkout 9ac01692487e1fd5e5240ea95bf9c43bf281775a WORKDIR $SRC/exiv2 COPY build.sh...
#!/bin/bash -eu # Minimized build script with only core build commands set -eu mkdir -p build cd build cmake -DEXIV2_ENABLE_PNG=ON -DEXIV2_ENABLE_WEBREADY=ON -DEXIV2_ENABLE_CURL=OFF -DEXIV2_ENABLE_BMFF=ON -DEXIV2_TEAM_WARNINGS_AS_ERRORS=ON -DBUILD_SHARED_LIBS=OFF -DCMAKE_CXX_COMPILER="${CXX}" -DCMAKE_CXX_FLAGS="${CXXFL...
/src/exiv2
address
================= Bug Report (1/2) ================== ## Source: GitHub Advisory ## URL: https://github.com/Exiv2/exiv2/security/advisories/GHSA-57jj-75fm-9rq5 ## Description: Advisory ID: GHSA-57jj-75fm-9rq5 Title: Out-of-bounds read in Exiv2::Internal::CrwMap::encode Description: Impact An out-of-bounds read was fou...
[]
[ { "sha": "05ec05342e17dc94670db1818447c06d0da8f41a", "url": "https://github.com/Exiv2/exiv2/commit/05ec05342e17dc94670db1818447c06d0da8f41a" }, { "sha": "0230620e6ea5e2da0911318e07ce6e66d1ebdf22", "url": "https://github.com/exiv2/exiv2/commit/0230620e6ea5e2da0911318e07ce6e66d1ebdf22" }, { ...
gpac.cve-2019-20628
gpac/gpac
1ab4860609f2e7a35634930571e7d0531297e090
2019-07-07T10:56:28
gpac
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y build-essential pkg-config libz-dev RUN git clone https://github.com/gpac/gpac gpac RUN git -C gpac checkout 1ab4860609f2e7a35634930571e7d0531297e090 WORKDIR $SRC/gpac COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu ./configure --static-build --extra-cflags="${CFLAGS}" --extra-ldflags="${CFLAGS}" make -j$(nproc)
/src/gpac
address
================= Bug Report (1/1) ================== ## Source: GitHub Issue ## URL: https://github.com/gpac/gpac/issues/1269 ## Description: Issue: gpac/gpac#1269 Title: Use After Free (mpegts.c:2183) State: closed Created by: strongcourage Created at: 2019-07-06 00:10:37+00:00 Issue Body: Hi, Our fuzzer found an UA...
[ { "content": "/* Copyright 2021 Google LLC\nLicensed under the Apache License, Version 2.0 (the \"License\");\nyou may not use this file except in compliance with the License.\nYou may obtain a copy of the License at\n http://www.apache.org/licenses/LICENSE-2.0\nUnless required by applicable law or agreed ...
[ { "sha": "1ab4860609f2e7a35634930571e7d0531297e090", "url": "https://github.com/gpac/gpac/commit/1ab4860609f2e7a35634930571e7d0531297e090" }, { "sha": "98b727637e32d1d4824101d8947e2dbd573d4fc8", "url": "https://github.com/gpac/gpac/commit/98b727637e32d1d4824101d8947e2dbd573d4fc8" } ]
imagemagick.cve-2022-48541
imagemagick/imagemagick
4660af18c654f36f0b054eb3c2d72d1f9928507d
2020-11-30T07:24:17
imagemagick
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y make autoconf automake groff libtool pkg-config cmake nasm autopoint po4a libc6:i386 libc6-dev:i386 RUN apt-get install -y make autoconf automake groff libtool pkg-config cmake nasm autopoint po4a libc6:i386 libc6-dev:i386 RUN git clone https://gi...
#!/bin/bash # Default build script template for C/C++ projects set -eu # Define configuration options CONFIG_OPTS="--disable-shared" CMAKE_OPTS="-DCMAKE_BUILD_TYPE=Debug" MAKE_OPTS="-j$(nproc)" BUILD_DIR="build" # 1. Run build preparation scripts if they exist for prep_script in buildconf autogen.sh bootstrap; do i...
/src/imagemagick
address
================= Bug Report (1/1) ================== ## Source: GitHub Issue ## URL: https://github.com/ImageMagick/ImageMagick/issues/2889 ## Description: Issue: ImageMagick/ImageMagick#2889 Title: Memory leak in identify -help State: closed Created by: luisfrod Created at: 2020-11-30 15:25:48+00:00 Issue Body: ### ...
[]
[]
imagemagick.cve-2017-12662
imagemagick/imagemagick
2ba8f335fa06daf1165e0878462686028e633a74
2017-07-17T18:09:14
imagemagick
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y make autoconf automake libtool RUN git clone https://github.com/imagemagick/imagemagick imagemagick RUN git -C imagemagick checkout 2ba8f335fa06daf1165e0878462686028e633a74 WORKDIR $SRC/imagemagick COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu ./configure --prefix="$WORK" --disable-shared --disable-docs make "-j$(nproc)" make install -j$(nproc)
/src/imagemagick
================= Bug Report (1/1) ================== ## Source: GitHub Issue ## URL: https://github.com/ImageMagick/ImageMagick/issues/576 ## Description: Issue: ImageMagick/ImageMagick#576 Title: memory leak in WritePDFImage State: closed Created by: jgj212 Created at: 2017-07-17 01:34:17+00:00 Labels: bug Issue Bod...
[ { "content": "#include <cstdint>\n\n#include <Magick++/Blob.h>\n#include <Magick++/Image.h>\n\nextern \"C\" int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) {\n uint16_t Width;\n uint16_t Height;\n if (Size < (sizeof(Width) + sizeof(Height))) {\n return 0;\n }\n Width = *reinterpret_cast<con...
[ { "sha": "bd40cc5f53067322861b881485cbd70f509f3829", "url": "https://github.com/ImageMagick/ImageMagick/commit/bd40cc5f53067322861b881485cbd70f509f3829" }, { "sha": "73a2bad43d157acfe360595feee739b4cc4406cb", "url": "https://github.com/ImageMagick/ImageMagick/commit/73a2bad43d157acfe360595feee73...
njs.cve-2022-34027
nginx/njs
d493f891f8f80a5474932ab14f6e397ef5463092
2022-05-24T11:07:58
njs
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y make autoconf automake libtool mercurial git libpcre2-dev RUN git clone https://github.com/nginx/njs njs RUN git -C njs checkout d493f891f8f80a5474932ab14f6e397ef5463092 WORKDIR $SRC/njs COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu ./autogen.sh CFLAGS="$CFLAGS -fno-use-cxa-atexit" CXXFLAGS="$CXXFLAGS -fno-use-cxa-atexit" ./configure make -j$(nproc) clean make -j$(nproc) all make install -j$(nproc) sed -i "s/\$libS\$libR \(-lpcre2-8$\)/\$libS\$libR -Wl,-Bstatic \1 -Wl,-...
/src/njs
address
================= Bug Report (1/1) ================== ## Source: GitHub Issue ## URL: https://github.com/nginx/njs/issues/504 ## Description: Issue: nginx/njs#504 Title: SEGV njs_value.c:1083:19 in njs_value_property State: closed Created by: dramthy Created at: 2022-05-19 08:33:21+00:00 Labels: bug, fuzzer Issue Body...
[]
[ { "sha": "6cef7f5055ec24275f0ae121c7f8709ff3e0c454", "url": "https://github.com/nginx/njs/commit/6cef7f5055ec24275f0ae121c7f8709ff3e0c454" }, { "sha": "1878e6b475720c7c51969e69ab2d276fae6d1dee", "url": "https://github.com/nginx/njs/commit/1878e6b475720c7c51969e69ab2d276fae6d1dee" }, { "s...
libredwg.cve-2019-20911
libredwg/libredwg
784829b23deead8f62fe49cf7d8dd082698a33a9
2019-12-31T11:30:48
libredwg
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y autoconf libtool texinfo RUN git clone https://github.com/libredwg/libredwg libredwg RUN git -C libredwg checkout 784829b23deead8f62fe49cf7d8dd082698a33a9 WORKDIR $SRC/libredwg COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu sh ./autogen.sh ./configure --disable-shared make -j$(nproc)
/src/libredwg
address
================= Bug Report (1/1) ================== ## Source: GitHub Issue ## URL: https://github.com/LibreDWG/libredwg/issues/178 ## Description: Issue: LibreDWG/libredwg#178 Title: Several bugs need to be fixed. State: closed Created by: skyvast404 Created at: 2019-12-31 06:04:23+00:00 Labels: bug, fuzzing Issue ...
[ { "content": "[libfuzzer]\ndetect_leaks=0\n", "filename": "fuzz_dwg_decode.options" } ]
[ { "sha": "c6f6668b82bfe595899cc820279ac37bb9ef16f5", "url": "https://github.com/LibreDWG/libredwg/commit/c6f6668b82bfe595899cc820279ac37bb9ef16f5" }, { "sha": "3f503dd294efc63a59608d8a16058c41d44ba13a", "url": "https://github.com/LibreDWG/libredwg/commit/3f503dd294efc63a59608d8a16058c41d44ba13a"...
gpac.cve-2021-40608
gpac/gpac
62bbb9f3977e358631ef395625471bbcf284785e
2022-02-22T07:38:45
gpac
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y build-essential pkg-config libz-dev RUN git clone https://github.com/gpac/gpac gpac RUN git -C gpac checkout 62bbb9f3977e358631ef395625471bbcf284785e WORKDIR $SRC/gpac COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu ./configure --static-build --extra-cflags="${CFLAGS}" --extra-ldflags="${CFLAGS}" make -j$(nproc)
/src/gpac
address
================= Bug Report (1/1) ================== ## Source: GitHub Issue ## URL: https://github.com/gpac/gpac/issues/1883 ## Description: Issue: gpac/gpac#1883 Title: BUG : free on unknown addrees in MP4BOX at gf_hinter_track_finalize media_tools/isom_hinter.c:956 State: closed Created by: AntsKnows Created at: 2...
[]
[ { "sha": "b09c75dc2d4bf68ac447daa71e72365aa30231a9", "url": "https://github.com/gpac/gpac/commit/b09c75dc2d4bf68ac447daa71e72365aa30231a9" } ]
imagemagick.cve-2017-11540
imagemagick/imagemagick
9871b4ad7400606bbecf7f979b198080f4b107c3
2017-07-15T12:32:46
imagemagick
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y make autoconf automake libtool RUN git clone https://github.com/imagemagick/imagemagick imagemagick RUN git -C imagemagick checkout 9871b4ad7400606bbecf7f979b198080f4b107c3 WORKDIR $SRC/imagemagick COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu ./configure --prefix="$WORK" --disable-shared --disable-docs make "-j$(nproc)" make install -j$(nproc)
/src/imagemagick
address
================= Bug Report (1/1) ================== ## Source: GitHub Issue ## URL: https://github.com/ImageMagick/ImageMagick/issues/581 ## Description: Issue: ImageMagick/ImageMagick#581 Title: Heap-Overflow in GetPixelIndex() MagickCore/pixel-accessor.h State: closed Created by: lcatro Created at: 2017-07-18 04:41...
[ { "content": "#include <cstdint>\n\n#include <Magick++/Blob.h>\n#include <Magick++/Image.h>\n\nextern \"C\" int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) {\n uint16_t Width;\n uint16_t Height;\n if (Size < (sizeof(Width) + sizeof(Height))) {\n return 0;\n }\n Width = *reinterpret_cast<con...
[ { "sha": "20635b9b859fc649f7682ab08a4c58c644a94bf5", "url": "https://github.com/ImageMagick/ImageMagick/commit/20635b9b859fc649f7682ab08a4c58c644a94bf5" } ]
libredwg.cve-2019-9776
libredwg/libredwg
3406d1e5b611cdb898e14d5a47e30fdc4d59c9a5
2018-12-05T17:15:15
libredwg
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y autoconf libtool texinfo RUN git clone https://github.com/libredwg/libredwg libredwg RUN git -C libredwg checkout 3406d1e5b611cdb898e14d5a47e30fdc4d59c9a5 WORKDIR $SRC/libredwg COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu sh ./autogen.sh ./configure --disable-shared make -j$(nproc)
/src/libredwg
address
================= Bug Report (1/1) ================== ## Source: GitHub Issue ## URL: https://github.com/LibreDWG/libredwg/issues/99 ## Description: Issue: LibreDWG/libredwg#99 Title: fuzzing results LibreDWG State: closed Created by: YourButterfly Created at: 2019-03-12 10:51:26+00:00 Labels: bug Issue Body: # libred...
[ { "content": "[libfuzzer]\ndetect_leaks=0\n", "filename": "fuzz_dwg_decode.options" } ]
[ { "sha": "c948548e175a9e5e4ed45623013ed20df62a920a", "url": "https://github.com/libredwg/libredwg/commit/c948548e175a9e5e4ed45623013ed20df62a920a" }, { "sha": "0c6a267ca01b811e837d5cec17a30061b4081dd2", "url": "https://github.com/libredwg/libredwg/commit/0c6a267ca01b811e837d5cec17a30061b4081dd2"...
libredwg.cve-2021-39525
libredwg/libredwg
aee0ea1f52ef9603b981362c83b3fec324ebb199
2020-07-30T12:58:51
libredwg
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y autoconf libtool texinfo RUN git clone https://github.com/libredwg/libredwg libredwg RUN git -C libredwg checkout aee0ea1f52ef9603b981362c83b3fec324ebb199 WORKDIR $SRC/libredwg COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu sh ./autogen.sh ./configure --disable-shared make -j$(nproc)
/src/libredwg
address
================= Bug Report (1/1) ================== ## Source: GitHub Issue ## URL: https://github.com/LibreDWG/libredwg/issues/261 ## Description: Issue: LibreDWG/libredwg#261 Title: A heap overflow in bits.c:1424 State: closed Created by: seviezhou Created at: 2020-08-02 04:51:37+00:00 Labels: bug, fuzzing Issue B...
[ { "content": "[libfuzzer]\ndetect_leaks=0\n", "filename": "fuzz_dwg_decode.options" } ]
[ { "sha": "39ef9439f35111170258cf57cc0c58eabc4748c7", "url": "https://github.com/LibreDWG/libredwg/commit/39ef9439f35111170258cf57cc0c58eabc4748c7" } ]
exiv2.cve-2017-9953
exiv2/exiv2
fa449a4d2c58d63f0d75ff259f25683a98a44630
2017-04-26T14:16:21
exiv2
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y cmake make ccache python3 libexpat1-dev zlib1g-dev libssh-dev libcurl4-openssl-dev libxml2-utils RUN git clone https://github.com/exiv2/exiv2 exiv2 RUN git -C exiv2 checkout fa449a4d2c58d63f0d75ff259f25683a98a44630 WORKDIR $SRC/exiv2 COPY build.sh...
#!/bin/bash -eu # Minimized build script with only core build commands set -eu mkdir -p build cd build cmake -DEXIV2_ENABLE_PNG=ON -DEXIV2_ENABLE_WEBREADY=ON -DEXIV2_ENABLE_CURL=OFF -DEXIV2_ENABLE_BMFF=ON -DEXIV2_TEAM_WARNINGS_AS_ERRORS=ON -DBUILD_SHARED_LIBS=OFF -DCMAKE_CXX_COMPILER="${CXX}" -DCMAKE_CXX_FLAGS="${CXXFL...
/src/exiv2
address
================= Bug Report (1/1) ================== ## Source: Red Hat Bugzilla ## URL: https://bugzilla.redhat.com/show_bug.cgi?id=1465061 ## Description: Bugzilla ID: 1465061 Title: There is an invalid free in Image::printIFDStructure that leads to a Segmentation fault at exiv2. A crafted input will lead to remote ...
[]
[ { "sha": "74cb5bab132ed76adf15df172c5e8b58cddaa96c", "url": null }, { "sha": "6e3855aed7ba8bb4731fc4087ca7f9078b2f3d97", "url": null }, { "sha": "8a8f60a4e7089fe7bb597770a2daab24a3941d3e", "url": null }, { "sha": "ec4dbb28c48de7713a628913d1e8f1fddaa94a60", "url": "https:/...
libsass.cve-2018-11693
sass/libsass
1e52b74306b7d73a617396c912ca436dc55fd4d8
2018-04-25T00:47:16
libsass
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y make autoconf automake libtool RUN git clone https://github.com/sass/libsass libsass RUN git -C libsass checkout 1e52b74306b7d73a617396c912ca436dc55fd4d8 WORKDIR $SRC/libsass COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu export BUILD='static' make -j$(nproc)
/src/libsass
address
================= Bug Report (1/1) ================== ## Source: GitHub Issue ## URL: https://github.com/sass/libsass/issues/2661 ## Description: Issue: sass/libsass#2661 Title: AddressSanitizer: heap-buffer-overflow (OOB read) in Sass::Prelexer::skip_over_scopes (libsass/src/prelexer.hpp:69:14) State: closed Created b...
[ { "content": "#include \"sass.h\"\n\nextern \"C\" int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) {\n char* sass_data = (char*) malloc(sizeof(char) * size + 1);\n if (sass_data == NULL) return 0;\n\n memcpy(sass_data, data, size);\n sass_data[size] = '\\0';\n\n struct Sass_Data_Context* ctx = ...
[ { "sha": "aa6d5c635ea8faf44d542a23aaf85d27e5777d48", "url": "https://github.com/sass/sassc/commit/aa6d5c635ea8faf44d542a23aaf85d27e5777d48" }, { "sha": "60f839158eff1f1bb84cb44f0f0c4bce3ed86a6d", "url": "https://github.com/sass/libsass/commit/60f839158eff1f1bb84cb44f0f0c4bce3ed86a6d" }, { ...
openjpeg.cve-2016-10504
uclouvain/openjpeg
11445eddad7e7fa5b273d1c83c91011c44e5d586
2017-07-29T12:03:13
openjpeg
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y make cmake g++ RUN git clone https://github.com/uclouvain/openjpeg openjpeg RUN git -C openjpeg checkout 11445eddad7e7fa5b273d1c83c91011c44e5d586 WORKDIR $SRC/openjpeg COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu mkdir -p build cd build cmake .. make clean -s -j$(nproc) make -j$(nproc) -s
/src/openjpeg
address
================= Bug Report (1/1) ================== ## Source: GitHub Issue ## URL: https://github.com/uclouvain/openjpeg/issues/835 ## Description: Issue: uclouvain/openjpeg#835 Title: [CVE-2016-10504] Out-of-Bounds Write in opj_mqc_byteout of mqc.c State: closed Created by: trylab Created at: 2016-09-13 10:13:45+00...
[]
[ { "sha": "397f62c0a838e15d667ef50e27d5d011d2c79c04", "url": "https://github.com/uclouvain/openjpeg/commit/397f62c0a838e15d667ef50e27d5d011d2c79c04" } ]
imagemagick.cve-2017-12666
imagemagick/imagemagick
73b6c35cede48ccb2e29dbe62c2d77488e5e70b7
2017-07-16T19:33:35
imagemagick
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y make autoconf automake libtool RUN git clone https://github.com/imagemagick/imagemagick imagemagick RUN git -C imagemagick checkout 73b6c35cede48ccb2e29dbe62c2d77488e5e70b7 WORKDIR $SRC/imagemagick COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu ./configure --prefix="$WORK" --disable-shared --disable-docs make "-j$(nproc)" make install -j$(nproc)
/src/imagemagick
================= Bug Report (1/1) ================== ## Source: GitHub Issue ## URL: https://github.com/ImageMagick/ImageMagick/issues/572 ## Description: Issue: ImageMagick/ImageMagick#572 Title: memory leak in WriteINLINEImage State: closed Created by: jgj212 Created at: 2017-07-17 00:39:44+00:00 Labels: bug Issue ...
[ { "content": "#include <cstdint>\n\n#include <Magick++/Blob.h>\n#include <Magick++/Image.h>\n\nextern \"C\" int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) {\n uint16_t Width;\n uint16_t Height;\n if (Size < (sizeof(Width) + sizeof(Height))) {\n return 0;\n }\n Width = *reinterpret_cast<con...
[ { "sha": "d5559407ce29f4371e5df9c1cbde65455fe5854c", "url": "https://github.com/ImageMagick/ImageMagick/commit/d5559407ce29f4371e5df9c1cbde65455fe5854c" }, { "sha": "45aeda5da9eb328689afc221fa3b7dfa5cdea54d", "url": "https://github.com/ImageMagick/ImageMagick/commit/45aeda5da9eb328689afc221fa3b7...
w3m.cve-2022-38223
tats/w3m
5397d09e585a1938fb64bc9c5cd5daed1959eb90
2011-05-04T02:41:45
w3m
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y libgc-dev RUN git clone https://github.com/tats/w3m w3m RUN git -C w3m checkout 5397d09e585a1938fb64bc9c5cd5daed1959eb90 WORKDIR $SRC/w3m COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu ./configure make myctype.o -j$(nproc) make Str.o -j$(nproc) make libwc -j$(nproc)
/src/w3m
address
================= Bug Report (1/1) ================== ## Source: GitHub Issue ## URL: https://github.com/tats/w3m/issues/242 ## Description: Issue: tats/w3m#242 Title: [BUG] out of bound write in checkType, etc.c:441 State: closed Created by: kdsjZh Created at: 2022-08-07 11:27:28+00:00 Issue Body: Hello, I found a ou...
[]
[ { "sha": "c515ea8a47b62408943390f579b2f377464f6658", "url": "https://github.com/tats/w3m/commit/c515ea8a47b62408943390f579b2f377464f6658" }, { "sha": "419ca82d57c72242817b55e2eaa4cdbf6916e7fa", "url": "https://github.com/tats/w3m/commit/419ca82d57c72242817b55e2eaa4cdbf6916e7fa" }, { "sha...
libjpeg-turbo.cve-2020-13790
libjpeg-turbo/libjpeg-turbo
a2291b252de1413a13db61b21863ae7aea0946f3
2020-05-05T00:38:39
libjpeg-turbo
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y make autoconf automake libtool nasm curl cmake RUN git clone https://github.com/libjpeg-turbo/libjpeg-turbo libjpeg-turbo RUN git -C libjpeg-turbo checkout a2291b252de1413a13db61b21863ae7aea0946f3 WORKDIR $SRC/libjpeg-turbo COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu cmake . -DCMAKE_INSTALL_PREFIX=$WORK -DENABLE_STATIC:bool=on make "-j$(nproc)" make install -j$(nproc)
/src/libjpeg-turbo
address
================= Bug Report (1/1) ================== ## Source: GitHub Issue ## URL: https://github.com/libjpeg-turbo/libjpeg-turbo/issues/433 ## Description: Issue: libjpeg-turbo/libjpeg-turbo#433 Title: Heap-based buffer over-read in get_rgb_row() in rdppm.c State: closed Created by: sanjeevk001 Created at: 2020-05-...
[ { "content": "/*\n# Copyright 2016 Google Inc.\n#\n# Licensed under the Apache License, Version 2.0 (the \"License\");\n# you may not use this file except in compliance with the License.\n# You may obtain a copy of the License at\n#\n# http://www.apache.org/licenses/LICENSE-2.0\n#\n# Unless required by app...
[ { "sha": "3de15e0c344d11d4b90f4a47136467053eb2d09a", "url": "https://github.com/libjpeg-turbo/libjpeg-turbo/commit/3de15e0c344d11d4b90f4a47136467053eb2d09a" }, { "sha": "5fad352f09d22b5ae3e553f32f8cf3ee570c72c1", "url": "https://github.com/libjpeg-turbo/libjpeg-turbo/commit/5fad352f09d22b5ae3e55...
gpac.cve-2019-20161
gpac/gpac
ed4ec31ea84a1a94abb17669db33f5c4e7a679cf
2020-06-15T05:33:03
gpac
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y build-essential pkg-config libz-dev RUN git clone https://github.com/gpac/gpac gpac RUN git -C gpac checkout ed4ec31ea84a1a94abb17669db33f5c4e7a679cf WORKDIR $SRC/gpac COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu ./configure --static-build --extra-cflags="${CFLAGS}" --extra-ldflags="${CFLAGS}" make -j$(nproc)
/src/gpac
address
================= Bug Report (1/1) ================== ## Source: GitHub Issue ## URL: https://github.com/gpac/gpac/issues/1320 ## Description: Issue: gpac/gpac#1320 Title: AddressSanitizer: heap-buffer-overflow in ReadGF_IPMPX_WatermarkingInit at ipmpx_code.c:1517 State: closed Created by: Clingto Created at: 2019-10-2...
[ { "content": "/* Copyright 2021 Google LLC\nLicensed under the Apache License, Version 2.0 (the \"License\");\nyou may not use this file except in compliance with the License.\nYou may obtain a copy of the License at\n http://www.apache.org/licenses/LICENSE-2.0\nUnless required by applicable law or agreed ...
[ { "sha": "7a09732d4978586e6284e84caa9c301b2fa5e956", "url": "https://github.com/gpac/gpac/commit/7a09732d4978586e6284e84caa9c301b2fa5e956" } ]
wabt.cve-2022-43280
webassembly/wabt
c32fa597218dbe2c25b43a9837a8475b493ddb71
2022-05-04T09:41:06
wabt
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y cmake libtool make python RUN git clone https://github.com/webassembly/wabt wabt RUN git -C wabt checkout c32fa597218dbe2c25b43a9837a8475b493ddb71 WORKDIR $SRC/wabt COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu mkdir -p build cd build cmake .. cmake --build .
/src/wabt
address
================= Bug Report (1/1) ================== ## Source: GitHub Issue ## URL: https://github.com/WebAssembly/wabt/issues/1982 ## Description: Issue: WebAssembly/wabt#1982 Title: Out-of-bound read in OnReturnCallExpr->GetReturnCallDropKeepCount State: closed Created by: Q1IQ Created at: 2022-09-05 12:50:49+00:00...
[ { "content": "// Copyright 2019 Google LLC\n//\n// Licensed under the Apache License, Version 2.0 (the \"License\");\n// you may not use this file except in compliance with the License.\n// You may obtain a copy of the License at\n//\n// http://www.apache.org/licenses/LICENSE-2.0\n//\n// Unless required by...
[ { "sha": "3054d61f703d609995798f872fc86b462617c294", "url": "https://github.com/webassembly/wabt/commit/3054d61f703d609995798f872fc86b462617c294" }, { "sha": "424f1fec10749568b15ca598b01e7259eec50af7", "url": "https://github.com/WebAssembly/wabt/commit/424f1fec10749568b15ca598b01e7259eec50af7" ...
exiv2.cve-2017-14863
exiv2/exiv2
fa449a4d2c58d63f0d75ff259f25683a98a44630
2017-04-26T14:16:21
exiv2
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y cmake make ccache python3 libexpat1-dev zlib1g-dev libssh-dev libcurl4-openssl-dev libxml2-utils RUN git clone https://github.com/exiv2/exiv2 exiv2 RUN git -C exiv2 checkout fa449a4d2c58d63f0d75ff259f25683a98a44630 WORKDIR $SRC/exiv2 COPY build.sh...
#!/bin/bash -eu # Minimized build script with only core build commands set -eu mkdir -p build cd build cmake -DEXIV2_ENABLE_PNG=ON -DEXIV2_ENABLE_WEBREADY=ON -DEXIV2_ENABLE_CURL=OFF -DEXIV2_ENABLE_BMFF=ON -DEXIV2_TEAM_WARNINGS_AS_ERRORS=ON -DBUILD_SHARED_LIBS=OFF -DCMAKE_CXX_COMPILER="${CXX}" -DCMAKE_CXX_FLAGS="${CXXFL...
/src/exiv2
address
================= Bug Report (1/1) ================== ## Source: Red Hat Bugzilla ## URL: https://bugzilla.redhat.com/show_bug.cgi?id=1494443 ## Description: Bugzilla ID: 1494443 Title: Null pointer dereference vulnerability in Exiv2::Image::printIFDStructure (image.cpp:408) Description Liu Zhu 2017-09-22 09:31:08 UTC...
[]
[ { "sha": "74cb5bab132ed76adf15df172c5e8b58cddaa96c", "url": null }, { "sha": "6e3855aed7ba8bb4731fc4087ca7f9078b2f3d97", "url": null }, { "sha": "8a8f60a4e7089fe7bb597770a2daab24a3941d3e", "url": null }, { "sha": "269f73090256617e2b9f07ccdbd0843b7f8051f1", "url": "https:/...
openjpeg.cve-2020-27814
uclouvain/openjpeg
a335b4d008359a32656026fa6780ef185b35cf0a
2020-12-28T14:49:48
openjpeg
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y make cmake g++ RUN git clone https://github.com/uclouvain/openjpeg openjpeg RUN git -C openjpeg checkout a335b4d008359a32656026fa6780ef185b35cf0a WORKDIR $SRC/openjpeg COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu mkdir -p build cd build cmake .. make clean -s -j$(nproc) make -j$(nproc) -s
/src/openjpeg
address
================= Bug Report (1/2) ================== ## Source: GitHub Issue ## URL: https://github.com/uclouvain/openjpeg/issues/1283 ## Description: Issue: uclouvain/openjpeg#1283 Title: Heap-buffer-overflow in lib/openjp2/mqc.c:499 State: closed Created by: zodf0055980 Created at: 2020-11-23 10:08:15+00:00 Issue B...
[]
[ { "sha": "491299eb073c80602ca8ee333303a31a581d3fa8", "url": "https://github.com/uclouvain/openjpeg/commit/491299eb073c80602ca8ee333303a31a581d3fa8" }, { "sha": "eaa098b59b346cb88e4d10d505061f669d7134fc", "url": "https://github.com/uclouvain/openjpeg/commit/eaa098b59b346cb88e4d10d505061f669d7134f...
libgd.cve-2016-6214
libgd/libgd
e6399f5a470f50285cef173e438638ae5bc741e0
2016-07-12T09:33:12
libgd
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y make autoconf automake libtool pkg-config libz-dev RUN apt-get install -y make autoconf automake libtool pkg-config libz-dev RUN git clone https://github.com/libgd/libgd libgd RUN git -C libgd checkout e6399f5a470f50285cef173e438638ae5bc741e0 WORK...
#!/bin/bash -eu # Minimized build script with only core build commands set -eu ./bootstrap.sh ./configure --prefix="$WORK" --disable-shared make -j$(nproc) install
/src/libgd
address
================= Bug Report (1/1) ================== ## Source: GitHub Issue ## URL: https://github.com/libgd/libgd/issues/247#issuecomment-232084241 ## Description: Issue: libgd/libgd#247 Title: [CVE-2016-6132]: A read out-of-bands was found in the parsing of TGA files Referenced comment by gaa-cifasis on 2016-07-12 ...
[ { "content": "// Copyright 2018 Google Inc.\n//\n// Licensed under the Apache License, Version 2.0 (the \"License\");\n// you may not use this file except in compliance with the License.\n// You may obtain a copy of the License at\n//\n// http://www.apache.org/licenses/LICENSE-2.0\n//\n// Unless required b...
[ { "sha": "10ef1dca63d62433fda13309b4a228782db823f7", "url": "https://github.com/libgd/libgd/commit/10ef1dca63d62433fda13309b4a228782db823f7" }, { "sha": "a6a0e7feabb2a9738086a5dc96348f233c87fa79", "url": "https://github.com/libgd/libgd/commit/a6a0e7feabb2a9738086a5dc96348f233c87fa79" }, { ...
yara.cve-2017-8294
virustotal/yara
f12262c21f0c98fec0647de0c3e76c0c55961d78
2017-04-27T02:34:34
yara
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y automake autoconf make libtool pkg-config bison flex RUN git clone https://github.com/virustotal/yara yara RUN git -C yara checkout f12262c21f0c98fec0647de0c3e76c0c55961d78 WORKDIR $SRC/yara COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu ./bootstrap.sh ./configure --enable-macho --enable-debug --enable-dex --enable-dotnet --without-crypto make clean -j$(nproc) make -j$(nproc) all make install -j$(nproc)
/src/yara
address
================= Bug Report (1/1) ================== ## Source: GitHub Issue ## URL: https://github.com/VirusTotal/yara/issues/646 ## Description: Issue: VirusTotal/yara#646 Title: Out of bounds read in yr_re_exec() State: closed Created by: fumfel Created at: 2017-04-26 05:33:55+00:00 Issue Body: **Out of bounds rea...
[]
[ { "sha": "83d799804648c2a0895d40a19835d9b757c6fa4e", "url": "https://github.com/VirusTotal/yara/commit/83d799804648c2a0895d40a19835d9b757c6fa4e" }, { "sha": "dac45955053e3650f9407e4bc50482bf025fb15e", "url": "https://github.com/virustotal/yara/commit/dac45955053e3650f9407e4bc50482bf025fb15e" }...
imagemagick.cve-2018-5246
imagemagick/imagemagick
c9d4c4ecd1f7fb5168e512a0ba183b4bf8b47ce3
2017-12-27T09:12:40
imagemagick
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y make autoconf automake libtool RUN git clone https://github.com/imagemagick/imagemagick imagemagick RUN git -C imagemagick checkout c9d4c4ecd1f7fb5168e512a0ba183b4bf8b47ce3 WORKDIR $SRC/imagemagick COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu ./configure --prefix="$WORK" --disable-shared --disable-docs make "-j$(nproc)" make install -j$(nproc)
/src/imagemagick
address
================= Bug Report (1/1) ================== ## Source: GitHub Issue ## URL: https://github.com/ImageMagick/ImageMagick/issues/929 ## Description: Issue: ImageMagick/ImageMagick#929 Title: memory leaks State: closed Created by: littleputa Created at: 2018-01-04 01:33:05+00:00 Labels: bug Issue Body: ubuntu@ub...
[ { "content": "#include <cstdint>\n\n#include <Magick++/Blob.h>\n#include <Magick++/Image.h>\n\nextern \"C\" int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) {\n uint16_t Width;\n uint16_t Height;\n if (Size < (sizeof(Width) + sizeof(Height))) {\n return 0;\n }\n Width = *reinterpret_cast<con...
[ { "sha": "1c3dd700bbb17837ee6f540aff3eafc76262accf", "url": "https://github.com/ImageMagick/ImageMagick/commit/1c3dd700bbb17837ee6f540aff3eafc76262accf" }, { "sha": "e59dc85e6ce58fd7618c3680b2a8def62050582f", "url": "https://github.com/ImageMagick/ImageMagick/commit/e59dc85e6ce58fd7618c3680b2a8d...
libredwg.cve-2021-39522
libredwg/libredwg
aee0ea1f52ef9603b981362c83b3fec324ebb199
2020-07-30T12:58:51
libredwg
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y autoconf libtool texinfo RUN git clone https://github.com/libredwg/libredwg libredwg RUN git -C libredwg checkout aee0ea1f52ef9603b981362c83b3fec324ebb199 WORKDIR $SRC/libredwg COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu sh ./autogen.sh ./configure --disable-shared make -j$(nproc)
/src/libredwg
address
================= Bug Report (1/1) ================== ## Source: GitHub Issue ## URL: https://github.com/LibreDWG/libredwg/issues/255 ## Description: Issue: LibreDWG/libredwg#255 Title: A heap buffer overflow in bit_wcs2len at bits.c:1634 State: closed Created by: seviezhou Created at: 2020-07-31 12:13:06+00:00 Labels:...
[ { "content": "[libfuzzer]\ndetect_leaks=0\n", "filename": "fuzz_dwg_decode.options" } ]
[ { "sha": "aee0ea1f52ef9603b981362c83b3fec324ebb199", "url": "https://github.com/LibreDWG/libredwg/commit/aee0ea1f52ef9603b981362c83b3fec324ebb199" }, { "sha": "4b99edb0ea26e99ef65c5fe68670e6b1f9382d44", "url": "https://github.com/LibreDWG/libredwg/commit/4b99edb0ea26e99ef65c5fe68670e6b1f9382d44"...
libgd.cve-2016-6905
libgd/libgd
2ea5232bfd021f85933385a1ad5a88e114fdcf80
2016-07-14T03:51:02
libgd
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y make autoconf automake libtool pkg-config libz-dev RUN apt-get install -y make autoconf automake libtool pkg-config libz-dev RUN git clone https://github.com/libgd/libgd libgd RUN git -C libgd checkout 2ea5232bfd021f85933385a1ad5a88e114fdcf80 WORK...
#!/bin/bash -eu # Minimized build script with only core build commands set -eu ./bootstrap.sh ./configure --prefix="$WORK" --disable-shared make -j$(nproc) install
/src/libgd
address
================= Bug Report (1/1) ================== ## Source: GitHub Issue ## URL: https://github.com/libgd/libgd/issues/248 ## Description: Issue: libgd/libgd#248 Title: Out-Of-Bounds Read in function read_image_tga of gd_tga.c (CVE-2016-6905) State: closed Created by: trylab Created at: 2016-07-05 04:45:01+00:00 L...
[ { "content": "// Copyright 2018 Google Inc.\n//\n// Licensed under the Apache License, Version 2.0 (the \"License\");\n// you may not use this file except in compliance with the License.\n// You may obtain a copy of the License at\n//\n// http://www.apache.org/licenses/LICENSE-2.0\n//\n// Unless required b...
[ { "sha": "01c61f8ab110a77ae64b5ca67c244c728c506f03", "url": "https://github.com/libgd/libgd/commit/01c61f8ab110a77ae64b5ca67c244c728c506f03" }, { "sha": "3c2b605d72e8b080dace1d98a6e50b46c1d12186", "url": "https://github.com/libgd/libgd/commit/3c2b605d72e8b080dace1d98a6e50b46c1d12186" }, { ...
faad2.cve-2023-38857
knik0/faad2
3918dee56063500d0aa23d6c3c94b211ac471a8c
2022-10-20T14:59:26
faad2
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y make autoconf automake libtool RUN git clone https://github.com/knik0/faad2 faad2 RUN git -C faad2 checkout 3918dee56063500d0aa23d6c3c94b211ac471a8c WORKDIR $SRC/faad2 COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu ./bootstrap ./configure make -j$(nproc)
/src/faad2
address
================= Bug Report (1/1) ================== ## Source: GitHub Issue ## URL: https://github.com/knik0/faad2/issues/171 ## Description: Issue: knik0/faad2#171 Title: A heap-buffer-overflow vulnerability found in mp4read.c:449:63 State: closed Created by: mondaylord Created at: 2023-07-18 04:19:21+00:00 Issue B...
[]
[ { "sha": "1d539788397713968d9660fe9f4e68af526bab73", "url": "https://github.com/knik0/faad2/commit/1d539788397713968d9660fe9f4e68af526bab73" }, { "sha": "c8f36e7d779d6ac34a902873975163c1c7793382", "url": "https://github.com/knik0/faad2/commit/c8f36e7d779d6ac34a902873975163c1c7793382" }, { ...
libxls.cve-2023-38851
libxls/libxls
448240067919707eb95fb009f76f3fdb439b1427
2021-01-03T22:31:47
libxls
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y make autoconf autoconf-archive automake gettext libtool RUN git clone https://github.com/libxls/libxls libxls RUN git -C libxls checkout 448240067919707eb95fb009f76f3fdb439b1427 WORKDIR $SRC/libxls COPY build.sh $SRC/
# Minimized build script with only core build commands set -eu ./bootstrap ./configure --enable-static make clean -j$(nproc) make -j$(nproc) make fuzz_xls -j$(nproc)
/src/libxls
address
================= Bug Report (1/1) ================== ## Source: GitHub Issue ## URL: https://github.com/libxls/libxls/issues/124 ## Description: Issue: libxls/libxls#124 Title: There are multiple heap-buffer-overflow vulnerability found in libxls State: closed Created by: mondaylord Created at: 2023-07-13 06:31:34+00:...
[]
[ { "sha": "8b025da4c5073b3038257e1c5d2dd3c704bb1e00", "url": "https://github.com/gaborcsardi/libxls/commit/8b025da4c5073b3038257e1c5d2dd3c704bb1e00" }, { "sha": "c009fa87fc775f8cc63e85d2018223143cb200e6", "url": "https://github.com/libxls/libxls/commit/c009fa87fc775f8cc63e85d2018223143cb200e6" ...
openjpeg.cve-2019-6988
uclouvain/openjpeg
081de4b15f54cb4482035b7bf5e3fb443e4bc84b
2017-10-04T17:23:14
openjpeg
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y make cmake g++ RUN git clone https://github.com/uclouvain/openjpeg openjpeg RUN git -C openjpeg checkout 081de4b15f54cb4482035b7bf5e3fb443e4bc84b WORKDIR $SRC/openjpeg COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu mkdir -p build cd build cmake .. make clean -s -j$(nproc) make -j$(nproc) -s
/src/openjpeg
address
================= Bug Report (1/1) ================== ## Source: GitHub Issue ## URL: https://github.com/uclouvain/openjpeg/issues/1178 ## Description: Issue: uclouvain/openjpeg#1178 Title: memory exhauted and hangs long time when use 64bit opj_decompress (CVE-2019-6988) State: open Created by: yanxxd Created at: 2019-...
[]
[ { "sha": "51f097e6d5754ddae93e716276fe8176b44ec548", "url": "https://github.com/uclouvain/openjpeg/commit/51f097e6d5754ddae93e716276fe8176b44ec548" }, { "sha": "563ecfb55ca77c0fc5ea19e4885e00f55ec82ca9", "url": "https://github.com/uclouvain/openjpeg/commit/563ecfb55ca77c0fc5ea19e4885e00f55ec82ca...
gpac.cve-2022-43254
gpac/gpac
65430e30593bb04579445e77df0a1207adfad357
2022-12-19T09:13:04
gpac
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y build-essential pkg-config libz-dev RUN git clone https://github.com/gpac/gpac gpac RUN git -C gpac checkout 65430e30593bb04579445e77df0a1207adfad357 WORKDIR $SRC/gpac COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu ./configure --static-build --extra-cflags="${CFLAGS}" --extra-ldflags="${CFLAGS}" make -j$(nproc)
/src/gpac
address
================= Bug Report (1/1) ================== ## Source: GitHub Issue ## URL: https://github.com/gpac/gpac/issues/2284 ## Description: Issue: gpac/gpac#2284 Title: Memory Leak in gf_list_new utils/list.c:601 State: closed Created by: fdu-sec Created at: 2022-10-11 07:44:42+00:00 Issue Body: ### Description Mem...
[]
[ { "sha": "4520e38aa030f059264c69b426bd8133206fbfe6", "url": "https://github.com/gpac/gpac/commit/4520e38aa030f059264c69b426bd8133206fbfe6" } ]
gpac.cve-2019-20168
gpac/gpac
ed4ec31ea84a1a94abb17669db33f5c4e7a679cf
2020-06-15T05:33:03
gpac
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y build-essential pkg-config libz-dev RUN git clone https://github.com/gpac/gpac gpac RUN git -C gpac checkout ed4ec31ea84a1a94abb17669db33f5c4e7a679cf WORKDIR $SRC/gpac COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu ./configure --static-build --extra-cflags="${CFLAGS}" --extra-ldflags="${CFLAGS}" make -j$(nproc)
/src/gpac
address
================= Bug Report (1/1) ================== ## Source: GitHub Issue ## URL: https://github.com/gpac/gpac/issues/1333 ## Description: Issue: gpac/gpac#1333 Title: AddressSanitizer: heap-use-after-free in gf_isom_box_dump_ex isomedia/box_funcs.c:1734 State: closed Created by: Clingto Created at: 2019-11-09 11:2...
[ { "content": "/* Copyright 2021 Google LLC\nLicensed under the Apache License, Version 2.0 (the \"License\");\nyou may not use this file except in compliance with the License.\nYou may obtain a copy of the License at\n http://www.apache.org/licenses/LICENSE-2.0\nUnless required by applicable law or agreed ...
[ { "sha": "00dfc93369329f1f549567d1b157566217bbfae0", "url": "https://github.com/gpac/gpac/commit/00dfc93369329f1f549567d1b157566217bbfae0" }, { "sha": "5250afecbc770c8f26829e9566d5b226a3c5fa80", "url": "https://github.com/gpac/gpac/commit/5250afecbc770c8f26829e9566d5b226a3c5fa80" } ]
imagemagick.cve-2019-13300
imagemagick/imagemagick
93b0af34ba1e43886018225d07f78170ecb192ea
2019-06-16T12:40:35
imagemagick
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y make autoconf automake libtool pkg-config cmake nasm autopoint RUN git clone https://github.com/imagemagick/imagemagick imagemagick RUN git -C imagemagick checkout 93b0af34ba1e43886018225d07f78170ecb192ea WORKDIR $SRC/imagemagick COPY build.sh $SR...
#!/bin/bash # Default build script template for C/C++ projects set -eu # Define configuration options CONFIG_OPTS="--disable-shared" CMAKE_OPTS="-DCMAKE_BUILD_TYPE=Debug" MAKE_OPTS="-j$(nproc)" BUILD_DIR="build" # 1. Run build preparation scripts if they exist for prep_script in buildconf autogen.sh bootstrap; do i...
/src/imagemagick
address
================= Bug Report (1/1) ================== ## Source: GitHub Issue ## URL: https://github.com/ImageMagick/ImageMagick/issues/1586 ## Description: Issue: ImageMagick/ImageMagick#1586 Title: heap-buffer-overflow in MagickCore/statistic.c State: closed Created by: SuhwanSong Created at: 2019-06-10 15:57:48+00:0...
[]
[ { "sha": "a906fe9298bf89e01d5272023db687935068849a", "url": "https://github.com/ImageMagick/ImageMagick/commit/a906fe9298bf89e01d5272023db687935068849a" }, { "sha": "5e409ae7a389cdf2ed17469303be3f3f21cec450", "url": "https://github.com/ImageMagick/ImageMagick6/commit/5e409ae7a389cdf2ed17469303be...
upx.cve-2023-23456
upx/upx
741cb3a136cc5158f2d8d7fa87fe238c315b9e0d
2022-11-26T12:12:26
upx
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y make autoconf automake libtool cmake RUN git clone https://github.com/upx/upx upx RUN git -C upx checkout 741cb3a136cc5158f2d8d7fa87fe238c315b9e0d WORKDIR $SRC/upx COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu sed -i 's/ \&\& __clang_major__ < 15//m' /src/upx/src/util/util.cpp mkdir -p build/debug cd build/debug cmake ../.. cmake --build . --target $fuzz_basename -v
/src/upx
address
================= Bug Report (1/2) ================== ## Source: GitHub Issue ## URL: https://github.com/upx/upx/issues/632 ## Description: Issue: upx/upx#632 Title: heap-buffer-overflow in PackTmt::pack State: closed Created by: MaggieCwj Created at: 2022-11-24 06:26:03+00:00 Issue Body: <!--- IF YOU REMOVE THIS TEM...
[]
[ { "sha": "510505a85cbe45e51fbd470f1aa8b02157c429d4", "url": "https://github.com/upx/upx/commit/510505a85cbe45e51fbd470f1aa8b02157c429d4" }, { "sha": "3e6e17980af856f71ab213cdefeb8ba8fd487eea", "url": "https://github.com/upx/upx/commit/3e6e17980af856f71ab213cdefeb8ba8fd487eea" } ]
wolfssl.cve-2019-16748
wolfssl/wolfssl
50fbdb961fd8c2d8123064e567ae8ec44167732d
2019-07-23T13:03:29
wolfssl
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y make autoconf automake libtool zip RUN git clone https://github.com/wolfssl/wolfssl wolfssl RUN git -C wolfssl checkout 50fbdb961fd8c2d8123064e567ae8ec44167732d WORKDIR $SRC/wolfssl COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu ./autogen.sh ./configure --enable-static --disable-shared --prefix=/usr CC="clang" make -j "$(nproc)" all -j$(nproc) make install -j$(nproc) export LDFLAGS="${LDFLAGS-""}" make -e all -j$(nproc) make -e export prefix="$OUT" -j$(nproc)
/src/wolfssl
address
================= Bug Report (1/1) ================== ## Source: GitHub Issue ## URL: https://github.com/wolfSSL/wolfssl/issues/2459 ## Description: Issue: wolfSSL/wolfssl#2459 Title: Heap-overread bug in checking cert signature State: closed Created by: flyroom Created at: 2019-09-10 10:29:02+00:00 Labels: bug, Resolv...
[]
[ { "sha": "326f02d76db7d4317688556e8bb51c72c5cbe00c", "url": "https://github.com/wolfSSL/wolfssl/commit/326f02d76db7d4317688556e8bb51c72c5cbe00c" } ]
libredwg.cve-2020-21827
libredwg/libredwg
d5a51c01023d5585ddf3dd17c83dbb3c81efc97e
2020-01-08T08:16:22
libredwg
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y autoconf libtool texinfo RUN git clone https://github.com/libredwg/libredwg libredwg RUN git -C libredwg checkout d5a51c01023d5585ddf3dd17c83dbb3c81efc97e WORKDIR $SRC/libredwg COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu sh ./autogen.sh ./configure --disable-shared make -j$(nproc)
/src/libredwg
address
================= Bug Report (1/1) ================== ## Source: GitHub Issue ## URL: https://github.com/LibreDWG/libredwg/issues/183 ## Description: Issue: LibreDWG/libredwg#183 Title: Heap over flow State: closed Created by: linhlhq Created at: 2020-01-13 02:49:42+00:00 Labels: bug, fuzzing Issue Body: I found a bug...
[ { "content": "[libfuzzer]\ndetect_leaks=0\n", "filename": "fuzz_dwg_decode.options" } ]
[ { "sha": "bcec483e73819af29787d5ed87fc515e1dfd0411", "url": "https://github.com/libredwg/libredwg/commit/bcec483e73819af29787d5ed87fc515e1dfd0411" } ]
mruby.cve-2022-1212
mruby/mruby
8aec568fc50c23f4062153fbc75b423ba22219e9
2022-04-03T04:39:40
mruby
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y build-essential ruby bison ninja-build cmake zlib1g-dev libbz2-dev liblzma-dev RUN git clone https://github.com/mruby/mruby mruby RUN git -C mruby checkout 8aec568fc50c23f4062153fbc75b423ba22219e9 WORKDIR $SRC/mruby COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu cd $SRC/mruby export LD=$CC export LDFLAGS="$CFLAGS" rake -m
/src/mruby
address
================= Bug Report (1/1) ================== ## Source: Huntr ## URL: https://huntr.dev/bounties/9fcc06d0-08e4-49c8-afda-2cae40946abe ## Description: Affected commit: 60cf382ff9765e36b21143d79688a3e758b66fd4 Proof of Concept v11 = '1111111111111111111111111111' v17 = {1=>1, 2 => 'b' , '3' => 1} v20 = [] [1,2,...
[]
[ { "sha": "9fcc06d0", "url": null }, { "sha": "3cf291f72224715942beaf8553e42ba8891ab3c6", "url": "https://github.com/mruby/mruby/commit/3cf291f72224715942beaf8553e42ba8891ab3c6" }, { "sha": "60cf382ff9765e36b21143d79688a3e758b66fd4", "url": "https://github.com/mruby/mruby/commit/60cf3...
upx.cve-2020-27797
upx/upx
69ca635c4c0ba474e9ca583dbb42e3d028c4533a
2022-10-28T03:38:03
upx
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y make autoconf automake libtool cmake RUN git clone https://github.com/upx/upx upx RUN git -C upx checkout 69ca635c4c0ba474e9ca583dbb42e3d028c4533a WORKDIR $SRC/upx COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu sed -i 's/ \&\& __clang_major__ < 15//m' /src/upx/src/util/util.cpp mkdir -p build/debug cd build/debug cmake ../.. cmake --build . --target $fuzz_basename -v
/src/upx
address
================= Bug Report (1/1) ================== ## Source: GitHub Issue ## URL: https://github.com/upx/upx/issues/390 ## Description: Issue: upx/upx#390 Title: Segmentation fault in PackLinuxElf32::elf_lookup(char const*) of /src/p_lx_elf.cpp State: closed Created by: giantbranch Created at: 2020-07-23 08:06:10+...
[]
[ { "sha": "87b73e5cfdc12da94c251b2cd83bb01c7d9f616c", "url": "https://github.com/upx/upx/commit/87b73e5cfdc12da94c251b2cd83bb01c7d9f616c" }, { "sha": "7d093174597483053e95f07d9f4614024c09890e", "url": "https://github.com/upx/upx/commit/7d093174597483053e95f07d9f4614024c09890e" }, { "sha":...
w3m.cve-2023-38252
tats/w3m
c8223fed7cc631ad85d8e5665e509e7988bedbab
2023-01-20T20:01:52
w3m
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y libgc-dev RUN git clone https://github.com/tats/w3m w3m RUN git -C w3m checkout c8223fed7cc631ad85d8e5665e509e7988bedbab WORKDIR $SRC/w3m COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu ./configure make myctype.o -j$(nproc) make Str.o -j$(nproc) make libwc -j$(nproc)
/src/w3m
address
================= Bug Report (1/2) ================== ## Source: GitHub Issue ## URL: https://github.com/tats/w3m/issues/270 ## Description: Issue: tats/w3m#270 Title: [BUG] Out of bound read in Strnew_size , Str.c:61 State: closed Created by: iskindar Created at: 2023-06-29 11:40:21+00:00 Issue Body: Hello, I found a...
[]
[ { "sha": "93ad5ee7da3bb3b6848434f0940321f345b7369c", "url": "https://github.com/tats/w3m/commit/93ad5ee7da3bb3b6848434f0940321f345b7369c" }, { "sha": "419ca82d57c72242817b55e2eaa4cdbf6916e7fa", "url": "https://github.com/tats/w3m/commit/419ca82d57c72242817b55e2eaa4cdbf6916e7fa" }, { "sha...
gpac.cve-2020-23931
gpac/gpac
348365dd176f4b03e607aaafce39674a4a0c8165
2020-09-01T08:47:25
gpac
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y build-essential pkg-config libz-dev RUN git clone https://github.com/gpac/gpac gpac RUN git -C gpac checkout 348365dd176f4b03e607aaafce39674a4a0c8165 WORKDIR $SRC/gpac COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu ./configure --static-build --extra-cflags="${CFLAGS}" --extra-ldflags="${CFLAGS}" make -j$(nproc)
/src/gpac
address
================= Bug Report (1/2) ================== ## Source: GitHub Issue ## URL: https://github.com/gpac/gpac/issues/1564 ## Description: Issue: gpac/gpac#1564 Title: A heap-buffer-overflow in box_code_adobe.c:109 State: closed Created by: seviezhou Created at: 2020-08-07 01:48:18+00:00 Issue Body: ## System info...
[ { "content": "/* Copyright 2021 Google LLC\nLicensed under the Apache License, Version 2.0 (the \"License\");\nyou may not use this file except in compliance with the License.\nYou may obtain a copy of the License at\n http://www.apache.org/licenses/LICENSE-2.0\nUnless required by applicable law or agreed ...
[ { "sha": "093283e727f396130651280609e687cd4778e0d1", "url": "https://github.com/gpac/gpac/commit/093283e727f396130651280609e687cd4778e0d1" }, { "sha": "2aa266dfaab6aaad9f9f4f216ad7d1e62adc7fa0", "url": "https://github.com/gpac/gpac/commit/2aa266dfaab6aaad9f9f4f216ad7d1e62adc7fa0" } ]
llamacpp.cve-2024-42477
ggerganov/llama.cpp
6afd1a99dc9792096d4567ab9fa1ad530c81c6cd
2024-08-09T11:53:09
llama.cpp
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y make autoconf automake xxd RUN git clone https://github.com/ggerganov/llama.cpp llama.cpp RUN git -C llama.cpp checkout 6afd1a99dc9792096d4567ab9fa1ad530c81c6cd WORKDIR $SRC/llama.cpp COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu export GGML_NO_OPENMP=1 sed -i 's/:= c++/:= ${CXX}/g' ./Makefile sed -i 's/:= cc/:= ${CC}/g' ./Makefile sed -i 's/ggml_print_backtrace();//g' ./ggml/src/ggml.c sed -i 's/static bool is_first_call/bool is_first_call/g' ./ggml/src/ggml.c FLAGS...
/src/llama.cpp
address
================= Bug Report (1/1) ================== ## Source: GitHub Advisory ## URL: https://github.com/ggerganov/llama.cpp/security/advisories/GHSA-mqp6-7pv6-fqjf ## Description: Advisory ID: GHSA-mqp6-7pv6-fqjf Title: global-buffer-overflow in ggml_type_size Description: global-buffer-overflow in ggml_type_size ...
[]
[ { "sha": "b72942fac998672a79a1ae3c03b340f7e629980b", "url": "https://github.com/ggerganov/llama.cpp/commit/b72942fac998672a79a1ae3c03b340f7e629980b" } ]
gpac.cve-2021-36417
gpac/gpac
d8538e8ae946b32d99c6b2c57cbb327146e9cd9d
2020-09-10T11:38:49
gpac
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y build-essential pkg-config libz-dev RUN git clone https://github.com/gpac/gpac gpac RUN git -C gpac checkout d8538e8ae946b32d99c6b2c57cbb327146e9cd9d WORKDIR $SRC/gpac COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu ./configure --static-build --extra-cflags="${CFLAGS}" --extra-ldflags="${CFLAGS}" make -j$(nproc)
/src/gpac
address
================= Bug Report (1/1) ================== ## Source: GitHub Issue ## URL: https://github.com/gpac/gpac/issues/1846 ## Description: Issue: gpac/gpac#1846 Title: A heap-buffer-overflow has occurred in function gf_isom_dovi_config_get State: closed Created by: dhbbb Created at: 2021-07-07 03:09:17+00:00 Issue...
[ { "content": "/* Copyright 2021 Google LLC\nLicensed under the Apache License, Version 2.0 (the \"License\");\nyou may not use this file except in compliance with the License.\nYou may obtain a copy of the License at\n http://www.apache.org/licenses/LICENSE-2.0\nUnless required by applicable law or agreed ...
[ { "sha": "737e1f39da80e02912953269966d89afd196ad30", "url": "https://github.com/gpac/gpac/commit/737e1f39da80e02912953269966d89afd196ad30" }, { "sha": "fef6242c69be4f7ba22b32578e4b62648a3d4ed3", "url": "https://github.com/gpac/gpac/commit/fef6242c69be4f7ba22b32578e4b62648a3d4ed3" } ]
upx.cve-2020-27787
upx/upx
1bb93d4fce9f1d764ba57bf5ac154af515b3fc83
2020-01-13T19:26:31
upx
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y make autoconf automake libtool cmake RUN git clone https://github.com/upx/upx upx RUN git -C upx checkout 1bb93d4fce9f1d764ba57bf5ac154af515b3fc83 WORKDIR $SRC/upx COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu sed -i 's/ \&\& __clang_major__ < 15//m' /src/upx/src/util/util.cpp mkdir -p build/debug cd build/debug cmake ../.. cmake --build . --target $fuzz_basename -v
/src/upx
address
================= Bug Report (1/1) ================== ## Source: GitHub Issue ## URL: https://github.com/upx/upx/issues/333 ## Description: Issue: upx/upx#333 Title: Segmentation fault in PackLinuxElf64::invert_pt_dynamic at p_lx_elf.cpp:5173 State: closed Created by: cxy20103657 Created at: 2020-01-14 07:02:22+00:00 ...
[]
[ { "sha": "e2f60adc95334f47e286838dac33160819c5d74d", "url": "https://github.com/upx/upx/commit/e2f60adc95334f47e286838dac33160819c5d74d" } ]
gpac.cve-2023-5520
gpac/gpac
28c4eb149f133ac42e95ef69d82183a917e7dbad
2023-10-11T05:51:42
gpac
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y build-essential pkg-config libz-dev RUN git clone https://github.com/gpac/gpac gpac RUN git -C gpac checkout 28c4eb149f133ac42e95ef69d82183a917e7dbad WORKDIR $SRC/gpac COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu ./configure --static-build --extra-cflags="${CFLAGS}" --extra-ldflags="${CFLAGS}" make -j$(nproc)
/src/gpac
address
================= Bug Report (1/1) ================== ## Source: Huntr ## URL: https://huntr.dev/bounties/681e42d0-18d4-4ebc-aba0-c5b0f77ac74a ## Description: Environment Distributor ID: Debian Description: Debian GNU/Linux bookworm/sid Version I checked against the latest release as of 10/08/23 the current master b...
[]
[ { "sha": "681e42d0", "url": null }, { "sha": "5692dc729491805e0e5f55c21d50ba1e6b19e88e", "url": "https://github.com/gpac/gpac/commit/5692dc729491805e0e5f55c21d50ba1e6b19e88e" }, { "sha": "50c2ab06f45a3101d73d6f317e98f041809f4923", "url": "https://github.com/gpac/gpac/commit/50c2ab06f...
gpac.cve-2024-50664
gpac/gpac
5d70253ac94e5840be7b86054131dd753af63cc7
2024-04-17T12:18:21
gpac
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y build-essential pkg-config libz-dev RUN git clone https://github.com/gpac/gpac gpac RUN git -C gpac checkout 5d70253ac94e5840be7b86054131dd753af63cc7 WORKDIR $SRC/gpac COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu ./configure --static-build --extra-cflags="${CFLAGS}" --extra-ldflags="${CFLAGS}" make -j$(nproc)
/src/gpac
address
================= Bug Report (1/1) ================== ## Source: GitHub Issue ## URL: https://github.com/gpac/gpac/issues/2988 ## Description: Issue: gpac/gpac#2988 Title: heap-buffer-overflow at isomedia/sample_descs.c:1799 in gf_isom_new_mpha_description in gpac/MP4Box State: closed Created by: Frank-Z7 Created at: 2...
[]
[ { "sha": "56ce0b952a0a3cbd39ec1b41237df062f9648cb9", "url": "https://github.com/Mu-L/gpac/commit/56ce0b952a0a3cbd39ec1b41237df062f9648cb9" } ]
openexr.cve-2020-16587
academysoftwarefoundation/openexr
d5800c14296527b3540da7aefd28b5937158d2cc
2019-07-24T10:20:11
openexr
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y make autoconf automake libtool zlib1g-dev RUN git clone https://github.com/academysoftwarefoundation/openexr openexr RUN git -C openexr checkout d5800c14296527b3540da7aefd28b5937158d2cc WORKDIR $SRC/openexr COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu cmake $SRC/openexr ${CMAKE_SETTINGS[@]} make -j$(nproc)
/src/openexr
address
================= Bug Report (1/1) ================== ## Source: GitHub Issue ## URL: https://github.com/AcademySoftwareFoundation/openexr/issues/491 ## Description: Issue: AcademySoftwareFoundation/openexr#491 Title: SEGV exrheader in ImfMultiPartInputFile.cpp:579 State: closed Created by: strongcourage Created at: 20...
[ { "content": "// Copyright 2020 Google LLC\n//\n// Licensed under the Apache License, Version 2.0 (the \"License\");\n// you may not use this file except in compliance with the License.\n// You may obtain a copy of the License at\n//\n// http://www.apache.org/licenses/LICENSE-2.0\n//\n// Unless required by...
[ { "sha": "8b5370c688a7362673c3a5256d93695617a4cd9a", "url": "https://github.com/fnordware/openexr/commit/8b5370c688a7362673c3a5256d93695617a4cd9a" }, { "sha": "ddc5ae0437c7b205de3215d4ce8fe16848045610", "url": "https://github.com/peterhillman/openexr/commit/ddc5ae0437c7b205de3215d4ce8fe168480456...
gpac.cve-2020-22678
gpac/gpac
6b4ab401297be43b57f9eddd675971a8a5feab44
2019-06-27T05:20:45
gpac
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y build-essential pkg-config libz-dev RUN git clone https://github.com/gpac/gpac gpac RUN git -C gpac checkout 6b4ab401297be43b57f9eddd675971a8a5feab44 WORKDIR $SRC/gpac COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu ./configure --static-build --extra-cflags="${CFLAGS}" --extra-ldflags="${CFLAGS}" make -j$(nproc)
/src/gpac
address
================= Bug Report (1/1) ================== ## Source: GitHub Issue ## URL: https://github.com/gpac/gpac/issues/1339 ## Description: Issue: gpac/gpac#1339 Title: There is a heap-buffer-overflow in the gf_media_nalu_remove_emulation_bytes function of av_parsers.c:4722 State: closed Created by: gutiniao Created...
[ { "content": "/* Copyright 2021 Google LLC\nLicensed under the Apache License, Version 2.0 (the \"License\");\nyou may not use this file except in compliance with the License.\nYou may obtain a copy of the License at\n http://www.apache.org/licenses/LICENSE-2.0\nUnless required by applicable law or agreed ...
[ { "sha": "eec9e058a9486fe4e99c33021481d9e1826ca9db", "url": "https://github.com/gpac/gpac/commit/eec9e058a9486fe4e99c33021481d9e1826ca9db" } ]
gpac.cve-2020-35982
gpac/gpac
dae9900580a8888969481cd72035408091edb11b
2021-01-04T05:04:18
gpac
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y build-essential pkg-config libz-dev RUN git clone https://github.com/gpac/gpac gpac RUN git -C gpac checkout dae9900580a8888969481cd72035408091edb11b WORKDIR $SRC/gpac COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu ./configure --static-build --extra-cflags="${CFLAGS}" --extra-ldflags="${CFLAGS}" make -j$(nproc)
/src/gpac
address
================= Bug Report (1/1) ================== ## Source: GitHub Issue ## URL: https://github.com/gpac/gpac/issues/1660 ## Description: Issue: gpac/gpac#1660 Title: A NULL pointer dereference in the function gf_hinter_track_finalize in media_tools/isom_hinter.c:970 State: closed Created by: Clingto Created at: ...
[ { "content": "/* Copyright 2021 Google LLC\nLicensed under the Apache License, Version 2.0 (the \"License\");\nyou may not use this file except in compliance with the License.\nYou may obtain a copy of the License at\n http://www.apache.org/licenses/LICENSE-2.0\nUnless required by applicable law or agreed ...
[ { "sha": "a4eb327049132359cae54b59faec9e2f14c5a619", "url": "https://github.com/gpac/gpac/commit/a4eb327049132359cae54b59faec9e2f14c5a619" } ]
libredwg.cve-2020-6612
libredwg/libredwg
722bfe6f285e1d31d2a85968ad353d59443f4280
2020-01-02T16:01:44
libredwg
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y autoconf libtool texinfo RUN git clone https://github.com/libredwg/libredwg libredwg RUN git -C libredwg checkout 722bfe6f285e1d31d2a85968ad353d59443f4280 WORKDIR $SRC/libredwg COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu sh ./autogen.sh ./configure --disable-shared make -j$(nproc)
/src/libredwg
address
================= Bug Report (1/1) ================== ## Source: GitHub Issue ## URL: https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447169 ## Description: Issue: LibreDWG/libredwg#179 Title: Several bugs found by fuzzing Referenced comment by linhlhq on 2020-01-03 03:20:33+00:00: **5.heap-buffer-over...
[ { "content": "[libfuzzer]\ndetect_leaks=0\n", "filename": "fuzz_dwg_decode.options" } ]
[ { "sha": "757b87f2d01127df1fa890f7a6c8608ffe9cd23e", "url": "https://github.com/LibreDWG/libredwg/commit/757b87f2d01127df1fa890f7a6c8608ffe9cd23e" }, { "sha": "540e1e432f3a48e7c1048a87da32640a5ac15007", "url": "https://github.com/LibreDWG/libredwg/commit/540e1e432f3a48e7c1048a87da32640a5ac15007"...
libredwg.cve-2020-21835
libredwg/libredwg
d5a51c01023d5585ddf3dd17c83dbb3c81efc97e
2020-01-08T08:16:22
libredwg
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y autoconf libtool texinfo RUN git clone https://github.com/libredwg/libredwg libredwg RUN git -C libredwg checkout d5a51c01023d5585ddf3dd17c83dbb3c81efc97e WORKDIR $SRC/libredwg COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu sh ./autogen.sh ./configure --disable-shared make -j$(nproc)
/src/libredwg
address
================= Bug Report (1/1) ================== ## Source: GitHub Issue ## URL: https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574493046 ## Description: Issue: LibreDWG/libredwg#188 Title: Several bugs found by fuzzing Referenced comment by linhlhq on 2020-01-15 04:41:13+00:00: **7.NULL pointer der...
[ { "content": "[libfuzzer]\ndetect_leaks=0\n", "filename": "fuzz_dwg_decode.options" } ]
[ { "sha": "6757b07c65742277ae2ff5c9fe32157195726258", "url": "https://github.com/LibreDWG/libredwg/commit/6757b07c65742277ae2ff5c9fe32157195726258" }, { "sha": "d447393a30df70531215e17baa609be5609c8614", "url": "https://github.com/LibreDWG/libredwg/commit/d447393a30df70531215e17baa609be5609c8614"...
libredwg.cve-2022-35164
libredwg/libredwg
89c4fa63a01e854eace1855c3d4e33f591df9d16
2022-05-14T14:35:09
libredwg
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y autoconf libtool texinfo RUN git clone https://github.com/libredwg/libredwg libredwg RUN git -C libredwg checkout 89c4fa63a01e854eace1855c3d4e33f591df9d16 WORKDIR $SRC/libredwg COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu sh ./autogen.sh ./configure --disable-shared --disable-bindings --enable-release make -j$(nproc)
/src/libredwg
address
================= Bug Report (1/1) ================== ## Source: GitHub Issue ## URL: https://github.com/LibreDWG/libredwg/issues/497 ## Description: Issue: LibreDWG/libredwg#497 Title: Heap use-after-free still exists in the bit_copy_chain State: closed Created by: 0xdd96 Created at: 2022-06-17 12:04:26+00:00 Labels: ...
[ { "content": "[libfuzzer]\ndetect_leaks=0\n", "filename": "llvmfuzz.options" } ]
[ { "sha": "f2dea296a0a3bb16afdae8d2ca16749a617a4383", "url": "https://github.com/LibreDWG/libredwg/commit/f2dea296a0a3bb16afdae8d2ca16749a617a4383" }, { "sha": "e95cc1eea8744c40e298208679eda14039b9b5d3", "url": "https://github.com/LibreDWG/libredwg/commit/e95cc1eea8744c40e298208679eda14039b9b5d3"...
libraw.cve-2017-14265
libraw/libraw
4d2aec21dc76bdf04e66b9dfce0a8442bb3fb375
2017-03-04T12:33:42
libraw
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y make autoconf automake libtool pkg-config RUN git clone https://github.com/libraw/libraw libraw RUN git -C libraw checkout 4d2aec21dc76bdf04e66b9dfce0a8442bb3fb375 WORKDIR $SRC/libraw COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu ./configure --disable-examples make -j$(nproc)
/src/libraw
address
================= Bug Report (1/1) ================== ## Source: GitHub Issue ## URL: https://github.com/LibRaw/LibRaw/issues/99 ## Description: Issue: LibRaw/LibRaw#99 Title: A Stack Buffer Overflow was discovered in internal/dcraw_common.cpp State: closed Created by: Twi1ight Created at: 2017-09-08 09:02:39+00:00 I...
[ { "content": "/* Copyright 2020 Google Inc.\n\nLicensed under the Apache License, Version 2.0 (the \"License\");\nyou may not use this file except in compliance with the License.\nYou may obtain a copy of the License at\n\n http://www.apache.org/licenses/LICENSE-2.0\n\nUnless required by applicable law or...
[ { "sha": "82616eff4c7f7437e96bdeeed238c3ef3dc12d60", "url": "https://github.com/LibRaw/LibRaw/commit/82616eff4c7f7437e96bdeeed238c3ef3dc12d60" } ]
openjpeg.cve-2020-8112
uclouvain/openjpeg
57096325457f96d8cd07bd3af04fe81d7a2ba788
2019-04-02T07:45:15
openjpeg
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y make cmake g++ RUN git clone https://github.com/uclouvain/openjpeg openjpeg RUN git -C openjpeg checkout 57096325457f96d8cd07bd3af04fe81d7a2ba788 WORKDIR $SRC/openjpeg COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu mkdir -p build cd build cmake .. make clean -s -j$(nproc) make -j$(nproc) -s
/src/openjpeg
address
================= Bug Report (1/1) ================== ## Source: GitHub Issue ## URL: https://github.com/uclouvain/openjpeg/issues/1231 ## Description: Issue: uclouvain/openjpeg#1231 Title: Another heap buffer overflow in libopenjp2 State: closed Created by: sebastianpoeplau Created at: 2020-01-28 11:05:53+00:00 Issue...
[]
[ { "sha": "b63a433ba168bad5fa10e83de04d6305e6a222e2", "url": "https://github.com/uclouvain/openjpeg/commit/b63a433ba168bad5fa10e83de04d6305e6a222e2" }, { "sha": "05f9b91e60debda0e83977e5e63b2e66486f7074", "url": "https://github.com/uclouvain/openjpeg/commit/05f9b91e60debda0e83977e5e63b2e66486f707...
exiv2.cve-2018-19535
exiv2/exiv2
fa449a4d2c58d63f0d75ff259f25683a98a44630
2017-04-26T14:16:21
exiv2
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y cmake make ccache python3 libexpat1-dev zlib1g-dev libssh-dev libcurl4-openssl-dev libxml2-utils RUN git clone https://github.com/exiv2/exiv2 exiv2 RUN git -C exiv2 checkout fa449a4d2c58d63f0d75ff259f25683a98a44630 WORKDIR $SRC/exiv2 COPY build.sh...
#!/bin/bash -eu # Minimized build script with only core build commands set -eu mkdir -p build cd build cmake -DEXIV2_ENABLE_PNG=ON -DEXIV2_ENABLE_WEBREADY=ON -DEXIV2_ENABLE_CURL=OFF -DEXIV2_ENABLE_BMFF=ON -DEXIV2_TEAM_WARNINGS_AS_ERRORS=ON -DBUILD_SHARED_LIBS=OFF -DCMAKE_CXX_COMPILER="${CXX}" -DCMAKE_CXX_FLAGS="${CXXFL...
/src/exiv2
address
================= Bug Report (1/1) ================== ## Source: GitHub Issue ## URL: https://github.com/Exiv2/exiv2/issues/428 ## Description: Issue: Exiv2/exiv2#428 Title: CVE-2018-19535: AddressSanitizer: heap-buffer-overflow at pngchunk_int.cpp:635 State: closed Created by: hongxuchen Created at: 2018-09-01 05:40:2...
[]
[ { "sha": "763d86e2607e5787b1d1d6c53c688f2d2f8c9e3e", "url": "https://github.com/Exiv2/exiv2/commit/763d86e2607e5787b1d1d6c53c688f2d2f8c9e3e" }, { "sha": "03173751b4d7053d6ddf52a15904e8f751f78f56", "url": "https://github.com/Exiv2/exiv2/commit/03173751b4d7053d6ddf52a15904e8f751f78f56" }, { ...
mruby.cve-2020-6838
mruby/mruby
57a56ddaa26d1bb7d67c8dde435b2e08dc17290f
2019-11-19T03:58:11
mruby
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y build-essential ruby bison ninja-build cmake zlib1g-dev libbz2-dev RUN git clone https://github.com/mruby/mruby mruby RUN git -C mruby checkout 57a56ddaa26d1bb7d67c8dde435b2e08dc17290f WORKDIR $SRC/mruby COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu cd $SRC/mruby export LD=clang export LDFLAGS="$CFLAGS" ./minirake clean && ./minirake -j$(nproc) all
/src/mruby
address
================= Bug Report (1/1) ================== ## Source: GitHub Issue ## URL: https://github.com/mruby/mruby/issues/4926 ## Description: Issue: mruby/mruby#4926 Title: heap use after free in hash_values_at in mrbgems/mruby-hash-ext/src/hash-ext.c:33 State: closed Created by: sleicasper Created at: 2020-01-10 08...
[]
[ { "sha": "694089fafe4eae36c379a3d918d540eb0c4b8661", "url": "https://github.com/mruby/mruby/commit/694089fafe4eae36c379a3d918d540eb0c4b8661" }, { "sha": "70e574689664c10ed2c47581999cc2ce3e3c5afb", "url": "https://github.com/mruby/mruby/commit/70e574689664c10ed2c47581999cc2ce3e3c5afb" }, { ...
gpac.cve-2019-12481
gpac/gpac
440d475f133038824dab08292b2e592ecd0e10b4
2017-04-26T06:33:17
gpac
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y build-essential pkg-config libz-dev RUN git clone https://github.com/gpac/gpac gpac RUN git -C gpac checkout 440d475f133038824dab08292b2e592ecd0e10b4 WORKDIR $SRC/gpac COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu ./configure --static-build --extra-cflags="${CFLAGS}" --extra-ldflags="${CFLAGS}" make -j$(nproc)
/src/gpac
address
================= Bug Report (1/1) ================== ## Source: GitHub Issue ## URL: https://github.com/gpac/gpac/issues/1249 ## Description: Issue: gpac/gpac#1249 Title: 4 bugs found in gpac v0.7.1 release State: closed Created by: YourButterfly Created at: 2019-05-27 07:11:13+00:00 Issue Body: Thanks for reporting ...
[ { "content": "/* Copyright 2021 Google LLC\nLicensed under the Apache License, Version 2.0 (the \"License\");\nyou may not use this file except in compliance with the License.\nYou may obtain a copy of the License at\n http://www.apache.org/licenses/LICENSE-2.0\nUnless required by applicable law or agreed ...
[ { "sha": "f40aaaf959d4d1f7fa0dcd04c0666592e615c8f1", "url": "https://github.com/gpac/gpac/commit/f40aaaf959d4d1f7fa0dcd04c0666592e615c8f1" }, { "sha": "eec9e058a9486fe4e99c33021481d9e1826ca9db", "url": "https://github.com/gpac/gpac/commit/eec9e058a9486fe4e99c33021481d9e1826ca9db" } ]
faad2.cve-2021-32278
knik0/faad2
f97f6e933a4ee3cf00b4e1ba4e3a1f05bc9de165
2020-10-20T01:24:05
faad2
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y make autoconf automake libtool RUN git clone https://github.com/knik0/faad2 faad2 RUN git -C faad2 checkout f97f6e933a4ee3cf00b4e1ba4e3a1f05bc9de165 WORKDIR $SRC/faad2 COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu ./bootstrap ./configure make -j$(nproc)
/src/faad2
address
================= Bug Report (1/1) ================== ## Source: GitHub Issue ## URL: https://github.com/knik0/faad2/issues/62 ## Description: Issue: knik0/faad2#62 Title: A heap-buffer-overflow in lt_predict.c:108:36 State: closed Created by: seviezhou Created at: 2020-09-04 14:47:28+00:00 Issue Body: ## System info ...
[]
[ { "sha": "f71b5e81f563d94fa284977a326520d269d8353e", "url": "https://github.com/knik0/faad2/commit/f71b5e81f563d94fa284977a326520d269d8353e" }, { "sha": "e19a5e491354e0e4664d02b796dacee28fb2521e", "url": "https://github.com/knik0/faad2/commit/e19a5e491354e0e4664d02b796dacee28fb2521e" } ]
fribidi.cve-2022-25309
fribidi/fribidi
cffa3047a0db9f4cd391d68bf98ce7b7425be245
2022-02-17T02:36:08
fribidi
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y python3-pip pkg-config && pip3 install meson==0.53.0 ninja RUN git clone https://github.com/fribidi/fribidi fribidi RUN git -C fribidi checkout cffa3047a0db9f4cd391d68bf98ce7b7425be245 WORKDIR $SRC/fribidi COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu mkdir -p $build meson --default-library=static --wrap-mode=nodownload -Ddocs=false \ -Dfuzzer_ldflags="$(echo $LIB_FUZZING_ENGINE)" \ $build \ || (cat build/meson-logs/meson-log.txt && false) ninja -v -j$(nproc) -C $build bin/f...
/src/fribidi
address
================= Bug Report (1/2) ================== ## Source: Red Hat Bugzilla ## URL: https://bugzilla.redhat.com/show_bug.cgi?id=2047896 ## Description: Bugzilla ID: 2047896 Title: CVE-2022-25309 fribidi: Heap-buffer-overflow in fribidi_cap_rtl_to_unicode Description Pedro Sampaio 2022-01-28 19:57:29 UTC A heap b...
[]
[ { "sha": "f22593b82b5d1668d1997dbccd10a9c31ffea3b3", "url": "https://github.com/fribidi/fribidi/commit/f22593b82b5d1668d1997dbccd10a9c31ffea3b3" }, { "sha": "a1ccd5ecf61110db0b1f4988842fab0df3a5de01", "url": "https://github.com/fribidi/fribidi/commit/a1ccd5ecf61110db0b1f4988842fab0df3a5de01" }...
gpac.cve-2022-47663
gpac/gpac
65430e30593bb04579445e77df0a1207adfad357
2022-12-19T09:13:04
gpac
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y build-essential pkg-config libz-dev RUN git clone https://github.com/gpac/gpac gpac RUN git -C gpac checkout 65430e30593bb04579445e77df0a1207adfad357 WORKDIR $SRC/gpac COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu ./configure --static-build --extra-cflags="${CFLAGS}" --extra-ldflags="${CFLAGS}" make -j$(nproc)
/src/gpac
address
================= Bug Report (1/1) ================== ## Source: GitHub Issue ## URL: https://github.com/gpac/gpac/issues/2360 ## Description: Issue: gpac/gpac#2360 Title: buffer overflow in h263dmx_process filters/reframe_h263.c:609 State: closed Created by: xidoo123 Created at: 2022-12-18 10:23:45+00:00 Issue Body: ...
[]
[ { "sha": "e7e8745f677010a5cb3366d5cbf39df7cffaaa2d", "url": "https://github.com/gpac/gpac/commit/e7e8745f677010a5cb3366d5cbf39df7cffaaa2d" } ]
gpac.cve-2023-42298
gpac/gpac
b34e3851670f4398a4e2efcb86b30a8b07743212
2023-04-24T07:57:53
gpac
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y build-essential pkg-config libz-dev RUN git clone https://github.com/gpac/gpac gpac RUN git -C gpac checkout b34e3851670f4398a4e2efcb86b30a8b07743212 WORKDIR $SRC/gpac COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu ./configure --static-build --extra-cflags="${CFLAGS}" --extra-ldflags="${CFLAGS}" make -j$(nproc)
/src/gpac
undefined
================= Bug Report (1/1) ================== ## Source: GitHub Issue ## URL: https://github.com/gpac/gpac/issues/2567 ## Description: Issue: gpac/gpac#2567 Title: Integer overflow issue in bifs/unquantize.c:298 State: closed Created by: xiaoxiaoafeifei Created at: 2023-08-29 07:37:50+00:00 Issue Body: Thanks ...
[]
[ { "sha": "16c4fafc2881112eba7051cac48f922eb2b94e06", "url": "https://github.com/gpac/gpac/commit/16c4fafc2881112eba7051cac48f922eb2b94e06" } ]
libical.cve-2016-5824
libical/libical
43858141030ba123a4959231cadc9951b983f0fd
2014-06-28T16:45:24
libical
c++
FROM hwiwonlee/secb.base:latest RUN apt-get install --yes cmake RUN git clone https://github.com/libical/libical libical RUN git -C libical checkout 43858141030ba123a4959231cadc9951b983f0fd WORKDIR $SRC/libical COPY build.sh $SRC/
# Minimized build script with only core build commands set -eu cmake . -DBUILD_SHARED_LIBS=OFF -DICAL_GLIB=False make install -j$(nproc)
/src/libical
address
================= Bug Report (1/3) ================== ## Source: GitHub Issue ## URL: https://github.com/libical/libical/issues/235 ## Description: Issue: libical/libical#235 Title: Potentially security-sensitive crashes, best way to get them to you? State: closed Created by: brandonprry Created at: 2016-05-22 19:42:45...
[ { "content": "/*\n# Copyright 2019 Google Inc.\n#\n# Licensed under the Apache License, Version 2.0 (the \"License\");\n# you may not use this file except in compliance with the License.\n# You may obtain a copy of the License at\n#\n# http://www.apache.org/licenses/LICENSE-2.0\n#\n# Unless required by app...
[ { "sha": "19acf43794ad4c99f7e6687cb39424a82b737828", "url": "https://github.com/libical/libical/commit/19acf43794ad4c99f7e6687cb39424a82b737828" }, { "sha": "38757abb495ea6cb40faa5418052278bf75040f7", "url": "https://github.com/libical/libical/commit/38757abb495ea6cb40faa5418052278bf75040f7" }...
freerdp.cve-2023-40187
freerdp/freerdp
f468a06d88c55b9ed484757326a9528cf27d33f4
2023-07-21T09:04:42
freerdp
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y build-essential git-core cmake ninja-build pkg-config zlib1g-dev libx11-dev libxext-dev libxinerama-dev libxcursor-dev libxkbfile-dev libxv-dev libxi-dev libxdamage-dev libxrender-dev libxrandr-dev libssl-dev libasound2-dev libcups2-dev libpulse-d...
#!/bin/bash -eu # Minimized build script with only core build commands set -eu -DCMAKE_C_FLAGS="${CFLAGS}" -DCMAKE_CXX_FLAGS="${CXXFLAGS}" -DCMAKE_EXE_LINKER_FLAGS="${LDFLAGS}" -DCMAKE_MODULE_LINKER_FLAGS="${LDFLAGS}" -DCMAKE_SHARED_LINKER_FLAGS="${LDFLAGS}" cmake "${cmake_args[@]}" -S . -B build -G...
/src/freerdp
address
================= Bug Report (1/1) ================== ## Source: GitHub Advisory ## URL: https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-pwf9-v5p9-ch4f ## Description: Advisory ID: GHSA-pwf9-v5p9-ch4f Title: Use-After-Free in avc420_ensure_buffer, avc444_ensure_buffer Description: Summary Use-After-Free in...
[]
[ { "sha": "5be5553e0da72178a4b94cc1ffbdace9ceb153e5", "url": "https://github.com/FreeRDP/FreeRDP/commit/5be5553e0da72178a4b94cc1ffbdace9ceb153e5" } ]
exiv2.cve-2017-17723
exiv2/exiv2
fa449a4d2c58d63f0d75ff259f25683a98a44630
2017-04-26T14:16:21
exiv2
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y cmake make ccache python3 libexpat1-dev zlib1g-dev libssh-dev libcurl4-openssl-dev libxml2-utils RUN git clone https://github.com/exiv2/exiv2 exiv2 RUN git -C exiv2 checkout fa449a4d2c58d63f0d75ff259f25683a98a44630 WORKDIR $SRC/exiv2 COPY build.sh...
#!/bin/bash -eu # Minimized build script with only core build commands set -eu mkdir -p build cd build cmake -DEXIV2_ENABLE_PNG=ON -DEXIV2_ENABLE_WEBREADY=ON -DEXIV2_ENABLE_CURL=OFF -DEXIV2_ENABLE_BMFF=ON -DEXIV2_TEAM_WARNINGS_AS_ERRORS=ON -DBUILD_SHARED_LIBS=OFF -DCMAKE_CXX_COMPILER="${CXX}" -DCMAKE_CXX_FLAGS="${CXXFL...
/src/exiv2
address
================= Bug Report (1/1) ================== ## Source: Red Hat Bugzilla ## URL: https://bugzilla.redhat.com/show_bug.cgi?id=1524104 ## Description: Bugzilla ID: 1524104 Title: exiv2 library: heap-based buffer over-read in Exiv2::Image::byteSwap4 (image.cpp) Description Wei You 2017-12-10 05:43:31 UTC Created...
[]
[]
imagemagick.cve-2020-19667
imagemagick/imagemagick
7aa934e39474da3433522dd3d55ad282142b71de
2020-04-19T16:40:17
imagemagick
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y make autoconf automake libtool pkg-config cmake nasm autopoint po4a libc6:i386 libc6-dev:i386 RUN apt-get install -y make autoconf automake libtool pkg-config cmake nasm autopoint po4a libc6:i386 libc6-dev:i386 RUN git clone https://github.com/ima...
#!/bin/bash # Default build script template for C/C++ projects set -eu # Define configuration options CONFIG_OPTS="--disable-shared" CMAKE_OPTS="-DCMAKE_BUILD_TYPE=Debug" MAKE_OPTS="-j$(nproc)" BUILD_DIR="build" # 1. Run build preparation scripts if they exist for prep_script in buildconf autogen.sh bootstrap; do i...
/src/imagemagick
address
================= Bug Report (1/1) ================== ## Source: GitHub Issue ## URL: https://github.com/ImageMagick/ImageMagick/issues/1895 ## Description: Issue: ImageMagick/ImageMagick#1895 Title: stack-buffer-overflow at /coders/xpm.c:232 in ReadXPMImage State: closed Created by: peanuts62 Created at: 2020-04-14 10...
[]
[ { "sha": "26538669546730c5b2dc36e7d48850f1f6928f94", "url": "https://github.com/ImageMagick/ImageMagick6/commit/26538669546730c5b2dc36e7d48850f1f6928f94" }, { "sha": "5462fd4725018567764c8f66bed98b7ee3e23006", "url": "https://github.com/ImageMagick/ImageMagick/commit/5462fd4725018567764c8f66bed9...
libredwg.cve-2023-36271
libredwg/libredwg
24cea42a1a2e96d2a6028a4d9f9ea1e7574af77f
2022-02-06T13:02:15
libredwg
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y autoconf libtool texinfo RUN git clone https://github.com/libredwg/libredwg libredwg RUN git -C libredwg checkout 24cea42a1a2e96d2a6028a4d9f9ea1e7574af77f WORKDIR $SRC/libredwg COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu sh ./autogen.sh ./configure --disable-shared --disable-bindings --enable-release make -j$(nproc)
/src/libredwg
address
================= Bug Report (1/1) ================== ## Source: GitHub Issue ## URL: https://github.com/LibreDWG/libredwg/issues/681#BUG2 ## Description: Issue: LibreDWG/libredwg#681 Title: [FUZZ] two bugs in dwg2SVG State: closed Created by: kdsjZh Created at: 2023-03-31 04:10:48+00:00 Issue Body: Hello, I was testi...
[ { "content": "[libfuzzer]\ndetect_leaks=0\n", "filename": "llvmfuzz.options" } ]
[ { "sha": "9df4ec3c524795a401acf371c8a953f5b1a6fadf", "url": "https://github.com/libredwg/libredwg/commit/9df4ec3c524795a401acf371c8a953f5b1a6fadf" }, { "sha": "c1ed1d91e28a6ddc7a9b5479d4795d58fb6be0ca", "url": "https://github.com/LibreDWG/libredwg/commit/c1ed1d91e28a6ddc7a9b5479d4795d58fb6be0ca"...
imagemagick.cve-2016-8678
imagemagick/imagemagick
faccddce0f6cb1e22df9d558b446a17f912e906d
2016-09-05T09:21:09
imagemagick
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y make autoconf automake libtool RUN git clone https://github.com/imagemagick/imagemagick imagemagick RUN git -C imagemagick checkout faccddce0f6cb1e22df9d558b446a17f912e906d WORKDIR $SRC/imagemagick COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu ./configure --prefix="$WORK" --disable-shared --disable-docs make "-j$(nproc)" make install -j$(nproc)
/src/imagemagick
address
================= Bug Report (1/2) ================== ## Source: Red Hat Bugzilla ## URL: https://bugzilla.redhat.com/show_bug.cgi?id=1385694 ## Description: Bugzilla ID: 1385694 Title: CVE-2016-8678 ImageMagick: Heap-buffer overflow in IsPixelMonochrome Description Andrej Nemec 2016-10-17 14:01:34 UTC A heap-buffer o...
[ { "content": "#include <cstdint>\n\n#include <Magick++/Blob.h>\n#include <Magick++/Image.h>\n\nextern \"C\" int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) {\n uint16_t Width;\n uint16_t Height;\n if (Size < (sizeof(Width) + sizeof(Height))) {\n return 0;\n }\n Width = *reinterpret_cast<con...
[]
libsndfile.cve-2022-33064
libsndfile/libsndfile
ea3ac90e98c6a98cd52cae39010446fba368a2e3
2022-03-27T06:48:57
libsndfile
c++
FROM hwiwonlee/secb.base:latest RUN git clone https://github.com/libsndfile/libsndfile libsndfile RUN git -C libsndfile checkout ea3ac90e98c6a98cd52cae39010446fba368a2e3 WORKDIR $SRC/libsndfile COPY build.sh $SRC/
#!/bin/bash # Default build script template for C/C++ projects set -eu # Define configuration options CONFIG_OPTS="--disable-shared" CMAKE_OPTS="-DCMAKE_BUILD_TYPE=Debug" MAKE_OPTS="-j$(nproc)" BUILD_DIR="build" # 1. Run build preparation scripts if they exist for prep_script in buildconf autogen.sh bootstrap; do i...
/src/libsndfile
address
================= Bug Report (1/1) ================== ## Source: GitHub Issue ## URL: https://github.com/libsndfile/libsndfile/issues/832 ## Description: Issue: libsndfile/libsndfile#832 Title: UndefinedBehaviorSanitizer: index 100 out of bounds for type 'SF_CUE_POINT [100]' State: open Created by: pietroborrello Creat...
[]
[ { "sha": "4b01368fd8a1e4541d7a5d125f70e99d30851718", "url": "https://github.com/libsndfile/libsndfile/commit/4b01368fd8a1e4541d7a5d125f70e99d30851718" }, { "sha": "48535fc2ab7a08596474ad9104bb14e26518385e", "url": "https://github.com/libsndfile/libsndfile/commit/48535fc2ab7a08596474ad9104bb14e26...
libjpeg-turbo.cve-2018-14498
libjpeg-turbo/libjpeg-turbo
0fa7850aeb273204acd57be11f328b2be5d97dc6
2018-07-20T12:21:20
libjpeg-turbo
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y make autoconf automake libtool nasm curl cmake RUN git clone https://github.com/libjpeg-turbo/libjpeg-turbo libjpeg-turbo RUN git -C libjpeg-turbo checkout 0fa7850aeb273204acd57be11f328b2be5d97dc6 WORKDIR $SRC/libjpeg-turbo COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu cmake . -DCMAKE_INSTALL_PREFIX=$WORK -DENABLE_STATIC:bool=on make "-j$(nproc)" make install -j$(nproc)
/src/libjpeg-turbo
address
================= Bug Report (1/2) ================== ## Source: GitHub Issue ## URL: https://github.com/libjpeg-turbo/libjpeg-turbo/issues/258 ## Description: Issue: libjpeg-turbo/libjpeg-turbo#258 Title: AddressSanitizer: heap-buffer-overflow inside get_8bit_row (rdbmp.c) State: closed Created by: hongxuchen Created ...
[ { "content": "/*\n# Copyright 2016 Google Inc.\n#\n# Licensed under the Apache License, Version 2.0 (the \"License\");\n# you may not use this file except in compliance with the License.\n# You may obtain a copy of the License at\n#\n# http://www.apache.org/licenses/LICENSE-2.0\n#\n# Unless required by app...
[ { "sha": "9c78a04df4e44ef6487eee99c4258397f4fdca55", "url": "https://github.com/libjpeg-turbo/libjpeg-turbo/commit/9c78a04df4e44ef6487eee99c4258397f4fdca55" }, { "sha": "cbe01e0c6757c918a220a63ce614fe77260a7a03", "url": "https://github.com/libjpeg-turbo/libjpeg-turbo/commit/cbe01e0c6757c918a220a...
njs.cve-2020-19695
nginx/njs
5e0f4a75dc137c6cfc60cfb094356b9f24d6fbba
2019-08-13T08:04:10
njs
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y make autoconf automake libtool mercurial libpcre3-dev libreadline-dev subversion RUN git clone https://github.com/nginx/njs njs RUN git -C njs checkout 5e0f4a75dc137c6cfc60cfb094356b9f24d6fbba WORKDIR $SRC/njs COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu ./autogen.sh CFLAGS="$CFLAGS -fno-use-cxa-atexit" CXXFLAGS="$CXXFLAGS -fno-use-cxa-atexit" ./configure make -j$(nproc) clean make -j$(nproc) all ./configure make njs -j$(nproc) mkdir -p $SEED_CORPUS_PATH
/src/njs
address
================= Bug Report (1/1) ================== ## Source: GitHub Issue ## URL: https://github.com/nginx/njs/issues/188 ## Description: Issue: nginx/njs#188 Title: Array elements left uninitialized in Array.prototype.slice() for primitive this values. State: closed Created by: l0kihardt Created at: 2019-07-03 02:...
[ { "content": "// Copyright 2019 Google LLC\n//\n// Licensed under the Apache License, Version 2.0 (the \"License\");\n// you may not use this file except in compliance with the License.\n// You may obtain a copy of the License at\n//\n// http://www.apache.org/licenses/LICENSE-2.0\n//\n// Unless required by...
[ { "sha": "e6263dd0086779138aa3ab5fbac9b6b012639b0c", "url": "https://github.com/nginx/njs/commit/e6263dd0086779138aa3ab5fbac9b6b012639b0c" }, { "sha": "b0f62312e39d4cf35515838174f11c2f500c3c1f", "url": "https://github.com/nginx/njs/commit/b0f62312e39d4cf35515838174f11c2f500c3c1f" } ]
w3m.cve-2016-9632
tats/w3m
8d2c4e9ec6ca3fb268dfe1e4eca72c45daeee2c7
2016-10-31T06:34:44
w3m
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y libgc-dev RUN git clone https://github.com/tats/w3m w3m RUN git -C w3m checkout 8d2c4e9ec6ca3fb268dfe1e4eca72c45daeee2c7 WORKDIR $SRC/w3m COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu ./configure make myctype.o -j$(nproc) make Str.o -j$(nproc) make libwc -j$(nproc)
/src/w3m
address
================= Bug Report (1/1) ================== ## Source: GitHub Issue ## URL: https://github.com/tats/w3m/issues/43 ## Description: Issue: tats/w3m#43 Title: global-buffer-overflow in wc_any_to_ucs() State: closed Created by: kcwu Created at: 2016-11-18 01:53:54+00:00 Issue Body: ``` 00000000: 3c6d 6574 6120 6...
[]
[ { "sha": "716bc126638393c733399d11d3228edb82877faa", "url": "https://github.com/tats/w3m/commit/716bc126638393c733399d11d3228edb82877faa" }, { "sha": "88110c2658ad9badd292430c75ebb0444c3312eb", "url": "https://github.com/tats/w3m/commit/88110c2658ad9badd292430c75ebb0444c3312eb" }, { "sha...
xs.cve-2019-16366
moddable-opensource/moddable
c87b3326497f4bbdab7c3e3d8a2c9fd8d1fc0805
2018-03-29T16:52:15
moddable
c++
FROM hwiwonlee/secb.base:latest RUN apt update && apt install -yqq npm libjpeg-dev zlib1g-dev libyaml-dev RUN git clone https://github.com/moddable-opensource/moddable moddable RUN git -C moddable checkout c87b3326497f4bbdab7c3e3d8a2c9fd8d1fc0805 WORKDIR $SRC/moddable COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu export MODDABLE=$PWD make -f xst.mk clean -j$(nproc)
/src/moddable
address
================= Bug Report (1/1) ================== ## Source: GitHub Issue ## URL: https://github.com/Moddable-OpenSource/moddable/issues/235 ## Description: Issue: Moddable-OpenSource/moddable#235 Title: XS: Heap-Buffer-Overflow State: closed Created by: sunlili Created at: 2019-07-25 07:08:13+00:00 Issue Body: H...
[]
[ { "sha": "5639abb24b6d725554969dc0be5822edb54a4a08", "url": "https://github.com/Moddable-OpenSource/moddable/commit/5639abb24b6d725554969dc0be5822edb54a4a08" }, { "sha": "100349c59c46fc67ffde33eebb8ccdffdd970679", "url": "https://github.com/Moddable-OpenSource/moddable/commit/100349c59c46fc67ffd...
llamacpp.cve-2024-42479
ggerganov/llama.cpp
6afd1a99dc9792096d4567ab9fa1ad530c81c6cd
2024-08-09T11:53:09
llama.cpp
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y make autoconf automake xxd RUN git clone https://github.com/ggerganov/llama.cpp llama.cpp RUN git -C llama.cpp checkout 6afd1a99dc9792096d4567ab9fa1ad530c81c6cd WORKDIR $SRC/llama.cpp COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu export GGML_NO_OPENMP=1 sed -i 's/:= c++/:= ${CXX}/g' ./Makefile sed -i 's/:= cc/:= ${CC}/g' ./Makefile sed -i 's/ggml_print_backtrace();//g' ./ggml/src/ggml.c sed -i 's/static bool is_first_call/bool is_first_call/g' ./ggml/src/ggml.c FLAGS...
/src/llama.cpp
address
================= Bug Report (1/1) ================== ## Source: GitHub Advisory ## URL: https://github.com/ggerganov/llama.cpp/security/advisories/GHSA-wcr5-566p-9cwj ## Description: Advisory ID: GHSA-wcr5-566p-9cwj Title: Write-what-where in rpc_server::set_tensor Description: Write-what-where in ggml_backend_cpu_bu...
[]
[ { "sha": "b72942fac998672a79a1ae3c03b340f7e629980b", "url": "https://github.com/ggerganov/llama.cpp/commit/b72942fac998672a79a1ae3c03b340f7e629980b" }, { "sha": "75af08c475e285888f66556d0f459c533b7deb95", "url": "https://github.com/ggerganov/llama.cpp/commit/75af08c475e285888f66556d0f459c533b7de...
exiv2.cve-2018-19107
exiv2/exiv2
fa449a4d2c58d63f0d75ff259f25683a98a44630
2017-04-26T14:16:21
exiv2
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y cmake make ccache python3 libexpat1-dev zlib1g-dev libssh-dev libcurl4-openssl-dev libxml2-utils RUN git clone https://github.com/exiv2/exiv2 exiv2 RUN git -C exiv2 checkout fa449a4d2c58d63f0d75ff259f25683a98a44630 WORKDIR $SRC/exiv2 COPY build.sh...
#!/bin/bash -eu # Minimized build script with only core build commands set -eu mkdir -p build cd build cmake -DEXIV2_ENABLE_PNG=ON -DEXIV2_ENABLE_WEBREADY=ON -DEXIV2_ENABLE_CURL=OFF -DEXIV2_ENABLE_BMFF=ON -DEXIV2_TEAM_WARNINGS_AS_ERRORS=ON -DBUILD_SHARED_LIBS=OFF -DCMAKE_CXX_COMPILER="${CXX}" -DCMAKE_CXX_FLAGS="${CXXFL...
/src/exiv2
address
================= Bug Report (1/1) ================== ## Source: GitHub Issue ## URL: https://github.com/Exiv2/exiv2/issues/427 ## Description: Issue: Exiv2/exiv2#427 Title: AddressSanitizer: heap-buffer-overflow at iptc.cpp:464 State: closed Created by: hongxuchen Created at: 2018-09-01 05:37:20+00:00 Labels: bug Iss...
[]
[ { "sha": "b642b97fb9b08f188cfc7d461d60cd6bc971cbbf", "url": "https://github.com/Exiv2/exiv2/commit/b642b97fb9b08f188cfc7d461d60cd6bc971cbbf" } ]
exiv2.cve-2017-11553
exiv2/exiv2
fa449a4d2c58d63f0d75ff259f25683a98a44630
2017-04-26T14:16:21
exiv2
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y cmake make ccache python3 libexpat1-dev zlib1g-dev libssh-dev libcurl4-openssl-dev libxml2-utils RUN git clone https://github.com/exiv2/exiv2 exiv2 RUN git -C exiv2 checkout fa449a4d2c58d63f0d75ff259f25683a98a44630 WORKDIR $SRC/exiv2 COPY build.sh...
#!/bin/bash -eu # Minimized build script with only core build commands set -eu mkdir -p build cd build cmake -DEXIV2_ENABLE_PNG=ON -DEXIV2_ENABLE_WEBREADY=ON -DEXIV2_ENABLE_CURL=OFF -DEXIV2_ENABLE_BMFF=ON -DEXIV2_TEAM_WARNINGS_AS_ERRORS=ON -DBUILD_SHARED_LIBS=OFF -DCMAKE_CXX_COMPILER="${CXX}" -DCMAKE_CXX_FLAGS="${CXXFL...
/src/exiv2
address
================= Bug Report (1/1) ================== ## Source: Red Hat Bugzilla ## URL: https://bugzilla.redhat.com/show_bug.cgi?id=1471772 ## Description: Bugzilla ID: 1471772 Title: There is an illegal address access in basicio.cpp of exiv2. Description owl337 2017-07-17 12:23:28 UTC Created attachment 1299839 [de...
[]
[ { "sha": "31fc5d2e30a84555d2974f32576f07e65b200b55", "url": null }, { "sha": "74cb5bab132ed76adf15df172c5e8b58cddaa96c", "url": "https://github.com/Exiv2/exiv2/commit/74cb5bab132ed76adf15df172c5e8b58cddaa96c" }, { "sha": "6e3855aed7ba8bb4731fc4087ca7f9078b2f3d97", "url": "https://git...
liblouis.cve-2017-13742
liblouis/liblouis
d1998f27ca0ca37c13343c6d22baf075919f4a0d
2017-06-06T07:46:08
liblouis
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y make autoconf automake libtool pkg-config zlib1g-dev libpci-dev RUN git clone https://github.com/liblouis/liblouis liblouis RUN git -C liblouis checkout d1998f27ca0ca37c13343c6d22baf075919f4a0d WORKDIR $SRC/liblouis COPY build.sh $SRC/
#!/bin/bash # Default build script template for C/C++ projects set -eu # Define configuration options CONFIG_OPTS="--disable-shared" CMAKE_OPTS="-DCMAKE_BUILD_TYPE=Debug" MAKE_OPTS="-j$(nproc)" BUILD_DIR="build" # 1. Run build preparation scripts if they exist for prep_script in buildconf autogen.sh bootstrap; do i...
/src/liblouis
address
================= Bug Report (1/1) ================== ## Source: Red Hat Bugzilla ## URL: https://bugzilla.redhat.com/show_bug.cgi?id=1484334 ## Description: Bugzilla ID: 1484334 Title: There is a stack overflow in liblouis which is triggered at function includeFile(). Description owl337 2017-08-23 09:39:52 UTC Create...
[]
[]
gpac.cve-2019-20162
gpac/gpac
ed4ec31ea84a1a94abb17669db33f5c4e7a679cf
2020-06-15T05:33:03
gpac
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y build-essential pkg-config libz-dev RUN git clone https://github.com/gpac/gpac gpac RUN git -C gpac checkout ed4ec31ea84a1a94abb17669db33f5c4e7a679cf WORKDIR $SRC/gpac COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu ./configure --static-build --extra-cflags="${CFLAGS}" --extra-ldflags="${CFLAGS}" make -j$(nproc)
/src/gpac
address
================= Bug Report (1/1) ================== ## Source: GitHub Issue ## URL: https://github.com/gpac/gpac/issues/1327 ## Description: Issue: gpac/gpac#1327 Title: ERROR: AddressSanitizer: heap-buffer-overflow in gf_isom_box_parse_ex isomedia/box_funcs.c:189 State: closed Created by: Clingto Created at: 2019-11...
[ { "content": "/* Copyright 2021 Google LLC\nLicensed under the Apache License, Version 2.0 (the \"License\");\nyou may not use this file except in compliance with the License.\nYou may obtain a copy of the License at\n http://www.apache.org/licenses/LICENSE-2.0\nUnless required by applicable law or agreed ...
[ { "sha": "3c0ba42546c8148c51169c3908e845c308746c77", "url": "https://github.com/gpac/gpac/commit/3c0ba42546c8148c51169c3908e845c308746c77" } ]
imagemagick.cve-2019-13301
imagemagick/imagemagick
d08250ec50eef2fd279f6fed859f50d051e58b53
2019-06-15T18:46:59
imagemagick
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y make autoconf automake libtool pkg-config cmake nasm autopoint RUN git clone https://github.com/imagemagick/imagemagick imagemagick RUN git -C imagemagick checkout d08250ec50eef2fd279f6fed859f50d051e58b53 WORKDIR $SRC/imagemagick COPY build.sh $SR...
#!/bin/bash # Default build script template for C/C++ projects set -eu # Define configuration options CONFIG_OPTS="--disable-shared" CMAKE_OPTS="-DCMAKE_BUILD_TYPE=Debug" MAKE_OPTS="-j$(nproc)" BUILD_DIR="build" # 1. Run build preparation scripts if they exist for prep_script in buildconf autogen.sh bootstrap; do i...
/src/imagemagick
address
================= Bug Report (1/2) ================== ## Source: GitHub Issue ## URL: https://github.com/ImageMagick/ImageMagick/issues/1585 ## Description: Issue: ImageMagick/ImageMagick#1585 Title: memory leaks in AcquireMagickMemory of MagickCore/memory.c State: closed Created by: SuhwanSong Created at: 2019-06-10 1...
[]
[ { "sha": "f595a1985233c399a05c0c37cc41de16a90dd025", "url": "https://github.com/ImageMagick/ImageMagick/commit/f595a1985233c399a05c0c37cc41de16a90dd025" }, { "sha": "0b7d3675438cbcde824e751895847a0794406e08", "url": "https://github.com/ImageMagick/ImageMagick6/commit/0b7d3675438cbcde824e75189584...
exiv2.cve-2020-18898
exiv2/exiv2
62826516778b96da5ddb38f5ec1499dc76994a6f
2018-12-20T04:09:32
exiv2
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y cmake make ccache python3 libexpat1-dev zlib1g-dev libssh-dev libcurl4-openssl-dev libxml2-utils RUN git clone https://github.com/exiv2/exiv2 exiv2 RUN git -C exiv2 checkout 62826516778b96da5ddb38f5ec1499dc76994a6f WORKDIR $SRC/exiv2 COPY build.sh...
#!/bin/bash -eu # Minimized build script with only core build commands set -eu mkdir -p build cd build cmake -DEXIV2_ENABLE_PNG=ON -DEXIV2_ENABLE_WEBREADY=ON -DEXIV2_ENABLE_CURL=OFF -DEXIV2_ENABLE_BMFF=ON -DEXIV2_TEAM_WARNINGS_AS_ERRORS=ON -DBUILD_SHARED_LIBS=OFF -DCMAKE_CXX_COMPILER="${CXX}" -DCMAKE_CXX_FLAGS="${CXXFL...
/src/exiv2
address
================= Bug Report (1/1) ================== ## Source: GitHub Issue ## URL: https://github.com/Exiv2/exiv2/issues/741 ## Description: Issue: Exiv2/exiv2#741 Title: [bug report] Stack Exhaustion Caused By Exiv2::Image::printIFDStructure function in image.cpp, making Recursive Calls to Itself State: closed Crea...
[]
[]
fast-dds.cve-2024-30259
eprosima/fast-dds
cf40a06ebf36cb7b69facea0dec2d2915d96c1ea
2024-04-25T08:14:40
fast-dds
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt install -y autoconf automake pkg-config RUN git clone https://github.com/eprosima/fast-dds fast-dds RUN git -C fast-dds checkout cf40a06ebf36cb7b69facea0dec2d2915d96c1ea WORKDIR $SRC/fast-dds COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu make clean -j$(nproc) make -j$(nproc) all ./configure make -j$(nproc) install mkdir -p Fast-CDR/build && cd Fast-CDR/build cmake .. -DBUILD_SHARED_LIBS=OFF cmake --build . --target install mkdir -p build && cd build make -j $(nproc)
/src/fast-dds
address
================= Bug Report (1/1) ================== ## Source: GitHub Advisory ## URL: https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-qcj9-939p-p662 ## Description: Advisory ID: GHSA-qcj9-939p-p662 Title: Heap buffer overflow when publisher send malformed packet Description: Summary When publisher ser...
[]
[ { "sha": "e94c4b1b0a51f6be0aa04ad44624b0edf741419d", "url": "https://github.com/eProsima/Fast-DDS/commit/e94c4b1b0a51f6be0aa04ad44624b0edf741419d" }, { "sha": "3c6195aefd11d46395caf7d8b29019b5ef5aaefd", "url": "https://github.com/eprosima/fast-dds/commit/3c6195aefd11d46395caf7d8b29019b5ef5aaefd"...
imagemagick.cve-2017-18272
imagemagick/imagemagick
a91afc45bd4db0094d54abff921419d65dea14ca
2018-01-06T07:49:17
imagemagick
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y make autoconf automake libtool RUN git clone https://github.com/imagemagick/imagemagick imagemagick RUN git -C imagemagick checkout a91afc45bd4db0094d54abff921419d65dea14ca WORKDIR $SRC/imagemagick COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu ./configure --prefix="$WORK" --disable-shared --disable-docs make "-j$(nproc)" make install -j$(nproc)
/src/imagemagick
address
================= Bug Report (1/1) ================== ## Source: GitHub Issue ## URL: https://github.com/ImageMagick/ImageMagick/issues/918 ## Description: Issue: ImageMagick/ImageMagick#918 Title: heap-use-after-free in MngInfoDiscardObject State: closed Created by: henices Created at: 2017-12-26 01:16:50+00:00 Labels...
[ { "content": "#include <cstdint>\n\n#include <Magick++/Blob.h>\n#include <Magick++/Image.h>\n\nextern \"C\" int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) {\n uint16_t Width;\n uint16_t Height;\n if (Size < (sizeof(Width) + sizeof(Height))) {\n return 0;\n }\n Width = *reinterpret_cast<con...
[ { "sha": "2460f71fcdb112dacbc14e3d9b9913dec66af820", "url": "https://github.com/ImageMagick/ImageMagick/commit/2460f71fcdb112dacbc14e3d9b9913dec66af820" }, { "sha": "f8a4240c17f3c2e72be30f4857265275bfb13a86", "url": "https://github.com/ImageMagick/ImageMagick/commit/f8a4240c17f3c2e72be30f4857265...
libredwg.cve-2019-9770
libredwg/libredwg
3406d1e5b611cdb898e14d5a47e30fdc4d59c9a5
2018-12-05T17:15:15
libredwg
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y autoconf libtool texinfo RUN git clone https://github.com/libredwg/libredwg libredwg RUN git -C libredwg checkout 3406d1e5b611cdb898e14d5a47e30fdc4d59c9a5 WORKDIR $SRC/libredwg COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu sh ./autogen.sh ./configure --disable-shared make -j$(nproc)
/src/libredwg
address
================= Bug Report (1/1) ================== ## Source: GitHub Issue ## URL: https://github.com/LibreDWG/libredwg/issues/99 ## Description: Issue: LibreDWG/libredwg#99 Title: fuzzing results LibreDWG State: closed Created by: YourButterfly Created at: 2019-03-12 10:51:26+00:00 Labels: bug Issue Body: # libred...
[ { "content": "[libfuzzer]\ndetect_leaks=0\n", "filename": "fuzz_dwg_decode.options" } ]
[ { "sha": "c948548e175a9e5e4ed45623013ed20df62a920a", "url": "https://github.com/libredwg/libredwg/commit/c948548e175a9e5e4ed45623013ed20df62a920a" }, { "sha": "0c6a267ca01b811e837d5cec17a30061b4081dd2", "url": "https://github.com/libredwg/libredwg/commit/0c6a267ca01b811e837d5cec17a30061b4081dd2"...
libsass.cve-2017-11554
sass/libsass
31573210c0d120ae56aaea543a0dbab5255cdfb7
2017-05-22T14:06:38
libsass
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y make autoconf automake libtool RUN git clone https://github.com/sass/libsass libsass RUN git -C libsass checkout 31573210c0d120ae56aaea543a0dbab5255cdfb7 WORKDIR $SRC/libsass COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu export BUILD='static' make -j$(nproc)
/src/libsass
address
================= Bug Report (1/2) ================== ## Source: Red Hat Bugzilla ## URL: https://bugzilla.redhat.com/show_bug.cgi?id=1471780 ## Description: Bugzilla ID: 1471780 Title: There is a stack-overflow in the sassc of libsass library. Description owl337 2017-07-17 12:29:15 UTC Created attachment 1299840 [det...
[ { "content": "#include \"sass.h\"\n\nextern \"C\" int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) {\n char* sass_data = (char*) malloc(sizeof(char) * size + 1);\n if (sass_data == NULL) return 0;\n\n memcpy(sass_data, data, size);\n sass_data[size] = '\\0';\n\n struct Sass_Data_Context* ctx = ...
[ { "sha": "7664114543757e932f5b1a2ff5295aa9b34f8623", "url": "https://github.com/sass/libsass/commit/7664114543757e932f5b1a2ff5295aa9b34f8623" } ]
liblouis.cve-2018-11440
liblouis/liblouis
0dee1fcc102678e8a57f59ba53f0a9784b93b4ae
2018-03-05T10:09:58
liblouis
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y make autoconf automake libtool pkg-config zlib1g-dev libpci-dev RUN git clone https://github.com/liblouis/liblouis liblouis RUN git -C liblouis checkout 0dee1fcc102678e8a57f59ba53f0a9784b93b4ae WORKDIR $SRC/liblouis COPY build.sh $SRC/
#!/bin/bash # Default build script template for C/C++ projects set -eu # Define configuration options CONFIG_OPTS="--disable-shared" CMAKE_OPTS="-DCMAKE_BUILD_TYPE=Debug" MAKE_OPTS="-j$(nproc)" BUILD_DIR="build" # 1. Run build preparation scripts if they exist for prep_script in buildconf autogen.sh bootstrap; do i...
/src/liblouis
address
================= Bug Report (1/1) ================== ## Source: GitHub Issue ## URL: https://github.com/liblouis/liblouis/issues/575 ## Description: Issue: liblouis/liblouis#575 Title: CVE-2018-11440: ASAn stack-based buffer overflow in compileTranslationTable.c parseChars State: closed Created by: fgeek Created at: 2...
[]
[ { "sha": "5ce93fef85b68c5ecb4561bf1aedb52d1b1f368e", "url": "https://github.com/liblouis/liblouis/commit/5ce93fef85b68c5ecb4561bf1aedb52d1b1f368e" }, { "sha": "ed6b00aea08005945c9ae8a4a4503acc43f3a844", "url": "https://github.com/liblouis/liblouis/commit/ed6b00aea08005945c9ae8a4a4503acc43f3a844"...
libjpeg-turbo.cve-2018-19664
libjpeg-turbo/libjpeg-turbo
bb3d325624526c91646bb9af9578d7198c082d51
2018-11-12T13:20:28
libjpeg-turbo
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y make autoconf automake libtool nasm curl cmake RUN git clone https://github.com/libjpeg-turbo/libjpeg-turbo libjpeg-turbo RUN git -C libjpeg-turbo checkout bb3d325624526c91646bb9af9578d7198c082d51 WORKDIR $SRC/libjpeg-turbo COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu cmake . -DCMAKE_INSTALL_PREFIX=$WORK -DENABLE_STATIC:bool=on make "-j$(nproc)" make install -j$(nproc)
/src/libjpeg-turbo
address
================= Bug Report (1/1) ================== ## Source: GitHub Issue ## URL: https://github.com/libjpeg-turbo/libjpeg-turbo/issues/305 ## Description: Issue: libjpeg-turbo/libjpeg-turbo#305 Title: heap-buffer-overflow in function put_pixel_rows in wrbmp.c:145 State: closed Created by: cool-tomato Created at: 2...
[ { "content": "/*\n# Copyright 2016 Google Inc.\n#\n# Licensed under the Apache License, Version 2.0 (the \"License\");\n# you may not use this file except in compliance with the License.\n# You may obtain a copy of the License at\n#\n# http://www.apache.org/licenses/LICENSE-2.0\n#\n# Unless required by app...
[ { "sha": "f8cca819a4fb42aafa5f70df43c45e8c416d716f", "url": "https://github.com/libjpeg-turbo/libjpeg-turbo/commit/f8cca819a4fb42aafa5f70df43c45e8c416d716f" }, { "sha": "11c98abd417c98cf05974c55c9f483e278950529", "url": "https://github.com/libjpeg-turbo/libjpeg-turbo/commit/11c98abd417c98cf05974...
njs.cve-2022-43286
nginx/njs
9d68e0e7f516f3d614931399f37becf673250d01
2022-05-04T18:23:46
njs
c++
FROM hwiwonlee/secb.base:latest RUN apt-get update && apt-get install -y make autoconf automake libtool mercurial git libpcre2-dev RUN git clone https://github.com/nginx/njs njs RUN git -C njs checkout 9d68e0e7f516f3d614931399f37becf673250d01 WORKDIR $SRC/njs COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu ./autogen.sh CFLAGS="$CFLAGS -fno-use-cxa-atexit" CXXFLAGS="$CXXFLAGS -fno-use-cxa-atexit" ./configure make -j$(nproc) clean make -j$(nproc) all make install -j$(nproc) sed -i "s/\$libS\$libR \(-lpcre2-8$\)/\$libS\$libR -Wl,-Bstatic \1 -Wl,-...
/src/njs
address
================= Bug Report (1/1) ================== ## Source: GitHub Issue ## URL: https://github.com/nginx/njs/issues/480 ## Description: Issue: nginx/njs#480 Title: illegal memory copy in njs_json_parse_iterator_call of njs_json.c:1008 State: closed Created by: Q1IQ Created at: 2022-03-02 11:45:19+00:00 Labels: bu...
[]
[ { "sha": "2ad0ea24a58d570634e09c2e58c3b314505eaa6a", "url": "https://github.com/nginx/njs/commit/2ad0ea24a58d570634e09c2e58c3b314505eaa6a" }, { "sha": "f65981b0b8fcf02d69a40bc934803c25c9f607ab", "url": "https://github.com/nginx/njs/commit/f65981b0b8fcf02d69a40bc934803c25c9f607ab" } ]
gpac.cve-2025-7797
gpac/gpac
153ea314b6b053db17164f8bc3c7e1e460938eaa
2025-11-08T00:00:00
gpac
c
FROM hwiwonlee/secb.base:latest RUN apt-get update RUN apt-get install -y pkg-config wget RUN git clone https://github.com/gpac/gpac gpac RUN git -C gpac checkout 153ea314b6b053db17164f8bc3c7e1e460938eaa WORKDIR $SRC/gpac COPY build.sh $SRC/
#!/bin/bash -eu # Minimized build script with only core build commands set -eu ./configure --enable-debug make -j$(nproc)
/src/gpac
address
================= Bug Report ================== ## Source: NVD CVE-2025-7797 ## CVE ID: CVE-2025-7797 ## Title: Null Pointer Dereference in GPAC ## Description: A vulnerability was found in GPAC up to 2.4. It has been rated as problematic. Affected by this issue is the function gf_dash_download_init_segment of the file...
[ { "content": "[libfuzzer]\ndetect_leaks=0\n", "filename": "default.options" } ]
[ { "sha": "153ea314b6b053db17164f8bc3c7e1e460938eaa", "url": "https://github.com/gpac/gpac/commit/153ea314b6b053db17164f8bc3c7e1e460938eaa" } ]