Dataset Viewer
Auto-converted to Parquet Duplicate
instance_id
string
description
string
exploit(poc)_url
string
patch_url
string
weakness_enumeration
string
github_repo
string
base_commit
string
developers_patch
string
bug_report
string
sanitizer_report
string
sanitizer
string
github_issue
string
nvd_url
string
njs.cve-2022-32414
Nginx NJS v0.7.2 was discovered to contain a segmentation violation in the function njs_vmcode_interpreter at src/njs_vmcode.c.
https://github.com/nginx/njs/issues/483
https://github.com/nginx/njs/commit/31ed93a5623f24ca94e6d47e895ba735d9d97d46
CWE-416
nginx/njs
31ed93a5623f24ca94e6d47e895ba735d9d97d46~1
diff --git a/src/njs_promise.c b/src/njs_promise.c index 52ae5b570..ea162d533 100644 --- a/src/njs_promise.c +++ b/src/njs_promise.c @@ -1369,6 +1369,10 @@ njs_promise_perform_all_handler(njs_vm_t *vm, njs_iterator_args_t *args, njs_promise_all_context_t *context; njs_promise_iterator_args_t *pargs; + ...
https://github.com/nginx/njs/issues/483
AddressSanitizer:DEADLYSIGNAL ================================================================= ==732128==ERROR: AddressSanitizer: SEGV on unknown address (pc 0x0000004e3e53 bp 0x7ffe6e1f76b0 sp 0x7ffe6e1f6e80 T0) ==732128==The signal is caused by a READ memory access. ==732128==Hint: this fault was caused by a derefer...
=== https://github.com/nginx/njs/issues/483 === Title: SEGV njs_vmcode.c:802:27 in njs_vmcode_interpreter --- Body: ### Environment ``` OS : Linux ubuntu 5.13.0-27-generic #29~20.04.1-Ubuntu SMP Fri Jan 14 00:32:30 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux Commit : f65981b0b8fcf02d69a40bc934803c25c9f607ab V...
https://nvd.nist.gov/vuln/detail/CVE-2022-32414
gpac.cve-2023-5586
NULL Pointer Dereference in GitHub repository gpac/gpac prior to 2.3.0-DEV.
https://huntr.dev/bounties/d2a6ea71-3555-47a6-9b18-35455d103740
https://github.com/gpac/gpac/commit/ca1b48f0abe71bf81a58995d7d75dc27f5a17ddc, https://huntr.dev/bounties/d2a6ea71-3555-47a6-9b18-35455d103740
CWE-476
gpac/gpac
5692dc729491805e0e5f55c21d50ba1e6b19e88e
diff --git a/src/filters/reframe_rawpcm.c b/src/filters/reframe_rawpcm.c index 37decc00e6..406c6638de 100644 --- a/src/filters/reframe_rawpcm.c +++ b/src/filters/reframe_rawpcm.c @@ -360,6 +360,14 @@ GF_Err pcmreframe_process(GF_Filter *filter) } wav_ok = GF_FALSE; } + if (!ctx->ch) { + GF_LOG(GF_LOG_ERRO...
https://nvd.nist.gov/vuln/detail/CVE-2023-5586
mruby.cve-2022-0240
mruby is vulnerable to NULL Pointer Dereference
https://huntr.dev/bounties/5857eced-aad9-417d-864e-0bdf17226cbb
https://github.com/mruby/mruby/commit/31fa3304049fc406a201a72293cce140f0557dca
CWE-476
mruby/mruby
171d32c0071d776207174a40a8fa26def3dbb931
diff --git a/src/class.c b/src/class.c index ec9c648e5d..8751dcaf05 100644 --- a/src/class.c +++ b/src/class.c @@ -357,6 +357,7 @@ prepare_singleton_class(mrb_state *mrb, struct RBasic *o) { struct RClass *sc, *c; + mrb_assert(o->c); if (o->c->tt == MRB_TT_SCLASS) return; sc = MRB_OBJ_ALLOC(mrb, MRB_TT_SCL...
https://nvd.nist.gov/vuln/detail/CVE-2022-0240
njs.cve-2022-28049
NGINX NJS 0.7.2 was discovered to contain a NULL pointer dereference via the component njs_vmcode_array at /src/njs_vmcode.c.
https://github.com/nginx/njs/issues/473
https://github.com/nginx/njs/commit/f65981b0b8fcf02d69a40bc934803c25c9f607ab
CWE-476
nginx/njs
f65981b0b8fcf02d69a40bc934803c25c9f607ab~1
diff --git a/src/njs_vmcode.c b/src/njs_vmcode.c index ef0beb5e0..ec478659c 100644 --- a/src/njs_vmcode.c +++ b/src/njs_vmcode.c @@ -1055,14 +1055,16 @@ njs_vmcode_array(njs_vm_t *vm, u_char *pc) if (code->ctor) { /* Array of the form [,,,], [1,,]. */ - value = array->start; - ...
https://github.com/nginx/njs/issues/473
INFO: Seed: 2125423890 INFO: Loaded 1 modules (53334 inline 8-bit counters): 53334 [0x95f010, 0x96c066), INFO: Loaded 1 PC tables (53334 PCs): 53334 [0x96c068,0xa3c5c8), /out/njs_process_script_fuzzer: Running 1 inputs 1 time(s) each. Running: crashes/njs_njs_process_script_fuzzer/id:000002,sig:06,src:001260+005121...
=== https://github.com/nginx/njs/issues/473 === Title: Null pointer dereference in src/njs_vmcode.c:1049:17 --- Body: Hi, this bug was found by fuzzing the current master branch, to reproduce build the OSS-Fuzz harness with ASan and UBSan. The bug is a write to a NULL pointer, this is the sanitizer report: ```...
https://nvd.nist.gov/vuln/detail/CVE-2022-28049
njs.cve-2022-38890
Nginx NJS v0.7.7 was discovered to contain a segmentation violation via njs_utf8_next at src/njs_utf8.h
https://github.com/nginx/njs/issues/569
https://github.com/nginx/njs/commit/b9aea5854bcf6f2de8f7a7f1550874e392b94be2
CWE-125
nginx/njs
b9aea5854bcf6f2de8f7a7f1550874e392b94be2~1
diff --git a/src/njs_string.c b/src/njs_string.c index 83cede548..62bece0de 100644 --- a/src/njs_string.c +++ b/src/njs_string.c @@ -2849,6 +2849,7 @@ njs_string_trim(const njs_value_t *value, njs_string_prop_t *string, for ( ;; ) { if (start == prev) { + end = prev; ...
https://github.com/nginx/njs/issues/569
AddressSanitizer:DEADLYSIGNAL ================================================================= ==1550478==ERROR: AddressSanitizer: SEGV on unknown address 0x6170bebedece (pc 0x000000505f0e bp 0x7fff88dc8f70 sp 0x7fff88dc8e40 T0) ==1550478==The signal is caused by a READ memory access. #0 0x505f0e in njs_utf8_next ...
=== https://github.com/nginx/njs/issues/569 === Title: Another way to trigger SEGV in njs_utf8_next cause oob read --- Body: the call stack is different with https://github.com/nginx/njs/issues/522 ``` Environment commit: 569292e0a74f2b1ec09566f3329f82bdd0d58e87 version: 0.7.7 Build : ./configure --cc=c...
https://nvd.nist.gov/vuln/detail/CVE-2022-38890
libredwg.cve-2020-21816
A heab based buffer overflow issue exists in GNU LibreDWG 0.10.2641 via htmlescape ../../programs/escape.c:46.
https://github.com/LibreDWG/libredwg/issues/182#issuecomment-572890865
https://github.com/LibreDWG/libredwg/commit/7e4c59b63d9c5b4b513cba1d0f33612042524563
CWE-787
LibreDWG/libredwg
7b9cb829f93d1c1f67584345ed65ea830de8bdda
diff --git a/programs/escape.c b/programs/escape.c index 8a907414e0..4d409ea43f 100644 --- a/programs/escape.c +++ b/programs/escape.c @@ -27,42 +27,74 @@ char * ATTRIBUTE_MALLOC htmlescape (const char *restrict src, const int cp) { int len; - char *dest, *d; + char *dest, *d, *end; unsigned char *s; if (!...
https://github.com/LibreDWG/libredwg/issues/182#issuecomment-572890865
=== https://github.com/LibreDWG/libredwg/issues/182#issuecomment-572890865 === Title: Several bugs found by fuzzing --- Body: Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: ./dwg2SVG $PoC **1.NULL pointer dereference in htmlescape ../../programs/escape.c:29** POC: ...
https://nvd.nist.gov/vuln/detail/CVE-2020-21816
gpac.cve-2023-46929
An issue discovered in GPAC 2.3-DEV-rev605-gfc9e29089-master in MP4Box in gf_avc_change_vui /afltest/gpac/src/media_tools/av_parsers.c:6872:55 allows attackers to crash the application.
https://github.com/gpac/gpac/issues/2662
https://github.com/gpac/gpac/commit/4248def5d24325aeb0e35cacde3d56c9411816a6
CWE-20
gpac/gpac
4248def5d24325aeb0e35cacde3d56c9411816a6~1
diff --git a/src/media_tools/av_parsers.c b/src/media_tools/av_parsers.c index 43c3200b90..84e6601b64 100644 --- a/src/media_tools/av_parsers.c +++ b/src/media_tools/av_parsers.c @@ -6865,6 +6865,9 @@ GF_Err gf_avc_change_vui(GF_AVCConfig *avcc, GF_VUIInfo *vui_info) GF_AVCConfigSlot *slc; orig = NULL; + if (!avc...
https://github.com/gpac/gpac/issues/2662
AddressSanitizer:DEADLYSIGNAL ================================================================= ==3037856==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000008 (pc 0x7ffff67d35c7 bp 0x7ffffffec090 sp 0x7ffffffe29c0 T0) ==3037856==The signal is caused by a READ memory access. ==3037856==Hint: address points t...
=== https://github.com/gpac/gpac/issues/2662 === Title: SEGV in MP4Box in gf_avc_change_vui /afltest/gpac/src/media_tools/av_parsers.c:6872:55 --- Body: # SEGV in MP4Box ### Description SEGV in gpac/MP4Box. #0 0x7ffff67d35c7 in gf_avc_change_vui /afltest/gpac/src/media_tools/av_parsers.c:6872:55 ### Versi...
https://nvd.nist.gov/vuln/detail/CVE-2023-46929
gpac.cve-2024-0321
Stack-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.3-DEV.
https://huntr.com/bounties/4c027b94-8e9c-4c31-a169-893b25047769
https://github.com/gpac/gpac/commit/d0ced41651b279bb054eb6390751e2d4eb84819a
CWE-121, CWE-787
gpac/gpac
d0ced41651b279bb054eb6390751e2d4eb84819a~1
diff --git a/src/filters/load_text.c b/src/filters/load_text.c index 6373398228..877b285a80 100644 --- a/src/filters/load_text.c +++ b/src/filters/load_text.c @@ -377,6 +377,10 @@ char *gf_text_get_utf8_line(char *szLine, u32 lineSize, FILE *txt_in, s32 unicod GF_LOG(GF_LOG_DEBUG, GF_LOG_PARSER, ("[TXTIn] Line too ...
https://nvd.nist.gov/vuln/detail/CVE-2024-0321
libarchive.cve-2017-14503
libarchive 3.3.2 suffers from an out-of-bounds read within lha_read_data_none() in archive_read_support_format_lha.c when extracting a specially crafted lha archive, related to lha_crc16.
https://github.com/libarchive/libarchive/commit/2c8c83b9731ff822fad6cc8c670ea5519c366a14
CWE-125
libarchive/libarchive
2c8c83b9731ff822fad6cc8c670ea5519c366a14~1
diff --git a/libarchive/archive_read_support_format_lha.c b/libarchive/archive_read_support_format_lha.c index b8ef4ae10e..95c99bb1f3 100644 --- a/libarchive/archive_read_support_format_lha.c +++ b/libarchive/archive_read_support_format_lha.c @@ -701,6 +701,12 @@ archive_read_format_lha_read_header(struct archive_read ...
https://bugs.debian.org/875960, https://github.com/libarchive/libarchive/issues/948
==21722==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x631000024800 at pc 0x56536be61878 bp 0x7fffa2254ec0 sp 0x7fffa2254eb8 READ of size 2 at 0x631000024800 thread T0 #0 0x56536be61877 in lha_crc16 libarchive/archive_read_support_format_lha.c:1740 #1 0x56536be5f791 in lha_read_data_none libarchive...
ASan (inferred)
=== https://github.com/libarchive/libarchive/issues/948 === Title: out-of-bounds read in lha_read_data_none() --- Body: Hi The following was reported downstream in Debian at https://bugs.debian.org/875960 The `oob.lha` base64 encoded is: ```` YQAtbGgwLQwAAAAMAAAAADs9SyACeJdNBwBh5AQAAAwAAWhlbGxvLnR4dBMAQv9zd...
https://nvd.nist.gov/vuln/detail/CVE-2017-14503
gpac.cve-2023-0760
Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to V2.1.0-DEV.
https://github.com/gpac/gpac/commit/ea7395f39f601a7750d48d606e9d10ea0b7beefe, https://huntr.dev/bounties/d06223df-a473-4c82-96d0-23726b844b21
https://github.com/gpac/gpac/commit/ea7395f39f601a7750d48d606e9d10ea0b7beefe, https://huntr.dev/bounties/d06223df-a473-4c82-96d0-23726b844b21
CWE-122, CWE-787
gpac/gpac
ea7395f39f601a7750d48d606e9d10ea0b7beefe~1
diff --git a/src/isomedia/box_code_base.c b/src/isomedia/box_code_base.c index baf07ff352..9a9ad09b45 100644 --- a/src/isomedia/box_code_base.c +++ b/src/isomedia/box_code_base.c @@ -4429,7 +4429,7 @@ GF_Err video_sample_entry_box_size(GF_Box *s) /*VVC*/ gf_isom_check_position(s, (GF_Box *)ptr->vvc_config, &pos);...
https://huntr.dev/bounties/d06223df-a473-4c82-96d0-23726b844b21
https://nvd.nist.gov/vuln/detail/CVE-2023-0760
njs.cve-2022-31307
Nginx NJS v0.7.2 was discovered to contain a segmentation violation in the function njs_string_offset at src/njs_string.c.
https://github.com/nginx/njs/issues/482
https://github.com/nginx/njs/commit/eafe4c7a326b163612f10861392622b5da5b1792
CWE-416
nginx/njs
eafe4c7a326b163612f10861392622b5da5b1792~1
diff --git a/src/njs_iterator.c b/src/njs_iterator.c index 90c3046fb..043e4483c 100644 --- a/src/njs_iterator.c +++ b/src/njs_iterator.c @@ -560,11 +560,14 @@ njs_object_iterate_reverse(njs_vm_t *vm, njs_iterator_args_t *args, } else { /* UTF-8 string. */ - p = njs_string_offset(strin...
https://github.com/nginx/njs/issues/482
AddressSanitizer:DEADLYSIGNAL ================================================================= ==732134==ERROR: AddressSanitizer: SEGV on unknown address (pc 0x0000004f44ab bp 0x7ffee1c1f9b0 sp 0x7ffee1c1f9b0 T0) ==732134==The signal is caused by a READ memory access. ==732134==Hint: this fault was caused by a derefer...
=== https://github.com/nginx/njs/issues/482 === Title: SEGV njs_string.c:2535:18 in njs_string_offset --- Body: ### Environment ``` OS : Linux ubuntu 5.13.0-27-generic #29~20.04.1-Ubuntu SMP Fri Jan 14 00:32:30 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux Commit : f65981b0b8fcf02d69a40bc934803c25c9f607ab Versi...
https://nvd.nist.gov/vuln/detail/CVE-2022-31307
njs.cve-2021-46462
njs through 0.7.1, used in NGINX, was discovered to contain a segmentation violation via njs_object_set_prototype in /src/njs_object.c.
https://github.com/nginx/njs/issues/449
https://github.com/nginx/njs/commit/39e8fa1b7db1680654527f8fa0e9ee93b334ecba, https://github.com/nginx/njs/issues/449
nginx/njs
39e8fa1b7db1680654527f8fa0e9ee93b334ecba~1
diff --git a/src/njs_function.c b/src/njs_function.c index 0c23ca05c..ae0fa11ff 100644 --- a/src/njs_function.c +++ b/src/njs_function.c @@ -1385,18 +1385,10 @@ njs_function_prototype_apply(njs_vm_t *vm, njs_value_t *args, njs_uint_t nargs, if (njs_is_null_or_undefined(arr_like)) { length = 0; - - ...
https://github.com/nginx/njs/issues/449
AddressSanitizer:DEADLYSIGNAL ================================================================= ==466519==ERROR: AddressSanitizer: SEGV on unknown address (pc 0x00000050d6d4 bp 0x7ffc8e2432f0 sp 0x7ffc8e2432e0 T0) ==466519==The signal is caused by a READ memory access. ==466519==Hint: this fault was caused by a derefer...
=== https://github.com/nginx/njs/issues/449 === Title: SEGV /njs/src/njs_object.c:2136:24 in njs_object_set_prototype --- Body: ## Env ``` Version : 0.7.0 Git Commit : 2da5d8b246b806bee6f74b575217ec3b61a25548 OS : Ubuntu 20.04 Configure : ./configure --address-sanitizer=YES ``` ## POC ``` functio...
https://nvd.nist.gov/vuln/detail/CVE-2021-46462
njs.cve-2022-29779
Nginx NJS v0.7.2 was discovered to contain a segmentation violation in the function njs_value_own_enumerate at src/njs_value.c.
https://github.com/nginx/njs/issues/485
https://github.com/nginx/njs/commit/2e00e95473861846aa8538be87db07699d9f676d
nginx/njs
2e00e95473861846aa8538be87db07699d9f676d~1
diff --git a/src/njs_array.c b/src/njs_array.c index 0b8c7b919..2ceb6be7e 100644 --- a/src/njs_array.c +++ b/src/njs_array.c @@ -1284,6 +1284,11 @@ njs_array_prototype_splice(njs_vm_t *vm, njs_value_t *args, njs_uint_t nargs, if (njs_slow_path(ret == NJS_ERROR)) { return ret; ...
https://github.com/nginx/njs/issues/485
AddressSanitizer:DEADLYSIGNAL ================================================================= ==2523460==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x555b64452f1c bp 0x7ffdcdd97650 sp 0x7ffdcdd97520 T0) ==2523460==The signal is caused by a READ memory access. ==2523460==Hint: address points t...
=== https://github.com/nginx/njs/issues/485 === Title: SEGV src/njs_value.c:240 in njs_value_own_enumerate --- Body: # Environment OS : Linux leanderwang-LC2 5.13.0-30-generic https://github.com/nginx/njs/issues/33 SMP Mon Feb 7 14:25:10 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux Commit : https://github.com/nginx/njs/...
https://nvd.nist.gov/vuln/detail/CVE-2022-29779
njs.cve-2022-29369
Nginx NJS v0.7.2 was discovered to contain a segmentation violation via njs_lvlhsh_bucket_find at njs_lvlhsh.c.
https://github.com/nginx/njs/commit/222d6fdcf0c6485ec8e175f3a7b70d650c234b4e
CWE-754
nginx/njs
222d6fdcf0c6485ec8e175f3a7b70d650c234b4e~1
diff --git a/src/njs_vmcode.c b/src/njs_vmcode.c index 0b07ec67e..6b10200ee 100644 --- a/src/njs_vmcode.c +++ b/src/njs_vmcode.c @@ -700,7 +700,7 @@ njs_vmcode_interpreter(njs_vm_t *vm, u_char *pc, void *promise_cap, ret = njs_object_prop_define(vm, value1, &name, function, ...
https://github.com/nginx/njs/issues/467
AddressSanitizer:DEADLYSIGNAL ================================================================= ==2064577==ERROR: AddressSanitizer: SEGV on unknown address (pc 0x0000004cac48 bp 0x7ffcc1edfbf0 sp 0x7ffcc1edfbb0 T0) ==2064577==The signal is caused by a READ memory access. ==2064577==Hint: this fault was caused by a dere...
=== https://github.com/nginx/njs/issues/467 === Title: SEGV njs_lvlhsh.c:231:17 in njs_lvlhsh_bucket_find --- Body: ### Environment ``` OS : Linux ubuntu 5.13.0-27-generic #29~20.04.1-Ubuntu SMP Fri Jan 14 00:32:30 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux Commit : 7bd570b39297d3d91902c93a624c89b08be7a6fe V...
https://nvd.nist.gov/vuln/detail/CVE-2022-29369
mruby.cve-2022-1201
NULL Pointer Dereference in mrb_vm_exec with super in GitHub repository mruby/mruby prior to 3.2. This vulnerability is capable of making the mruby interpreter crash, thus affecting the availability of the system.
https://huntr.dev/bounties/6f930add-c9d8-4870-ae56-d4bd8354703b
https://github.com/mruby/mruby/commit/00acae117da1b45b318dc36531a7b0021b8097ae
CWE-476
mruby/mruby
00acae117da1b45b318dc36531a7b0021b8097ae~1
diff --git a/src/vm.c b/src/vm.c index 77edbb38fc..3bb9510ec1 100644 --- a/src/vm.c +++ b/src/vm.c @@ -1749,7 +1749,7 @@ mrb_vm_exec(mrb_state *mrb, const struct RProc *proc, const mrb_code *pc) } else if (target_class->tt == MRB_TT_MODULE) { target_class = mrb_vm_ci_target_class(ci); - if...
https://nvd.nist.gov/vuln/detail/CVE-2022-1201
faad2.cve-2018-20198
A NULL pointer dereference was discovered in ifilter_bank of libfaad/filtbank.c in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8. The vulnerability causes a segmentation fault and application crash, which leads to denial of service because adding to windowed output is mishandled in the LONG_START_SEQUENCE case.
https://github.com/fantasy7082/image_test/blob/master/002-null-point-filtbank_246
https://github.com/knik0/faad2/commit/466b01d504d7e45f1e9169ac90b3e34ab94aed14
CWE-476
knik0/faad2
466b01d504d7e45f1e9169ac90b3e34ab94aed14~1
diff --git a/libfaad/syntax.c b/libfaad/syntax.c index f8e808c2..e7fb1138 100644 --- a/libfaad/syntax.c +++ b/libfaad/syntax.c @@ -344,6 +344,12 @@ static void decode_sce_lfe(NeAACDecStruct *hDecoder, can become 2 when some form of Parametric Stereo coding is used */ + if (hDecoder->frame && hDecoder-...
https://github.com/knik0/faad2/issues/23, https://seclists.org/bugtraq/2019/Sep/28
./faad faad_res/002-null-point-filtbank_246 -o out.wav *********** Ahead Software MPEG-4 AAC Decoder V2.8.8 ****************** Build: Dec 13 2018 Copyright 2002-2004: Ahead Software AG http://www.audiocoding.com bug tracking: https://sourceforge.net/p/faac/bugs/ Floating point version This program is free soft...
=== https://github.com/knik0/faad2/issues/23 === Title: Null pointer dereference vulnerability in ifilter_bank(libfaad/filtbank.c:246) --- Body: Hi, i found a null pointer dereference bug in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8. It crashed in function ifilter_bank.the details are below(ASAN): ``` ./faa...
https://nvd.nist.gov/vuln/detail/CVE-2018-20198
mruby.cve-2022-1427
Out-of-bounds Read in mrb_obj_is_kind_of in in GitHub repository mruby/mruby prior to 3.2. # Impact: Possible arbitrary code execution if being exploited.
https://huntr.dev/bounties/23b6f0a9-64f5-421e-a55f-b5b7a671f301
https://github.com/mruby/mruby/commit/a4d97934d51cb88954cc49161dc1d151f64afb6b
CWE-125
mruby/mruby
a4d97934d51cb88954cc49161dc1d151f64afb6b~1
diff --git a/src/vm.c b/src/vm.c index 5013c877d4..aa043b06ae 100644 --- a/src/vm.c +++ b/src/vm.c @@ -1750,10 +1750,7 @@ mrb_vm_exec(mrb_state *mrb, const struct RProc *proc, const mrb_code *pc) mrb_exc_set(mrb, exc); goto L_RAISE; } - if (target_class->flags & MRB_FL_CLASS_IS_PREPENDED) ...
ASan (inferred)
https://nvd.nist.gov/vuln/detail/CVE-2022-1427
gpac.cve-2023-48013
GPAC v2.3-DEV-rev566-g50c2ab06f-master was discovered to contain a double free via the gf_filterpacket_del function at /gpac/src/filter_core/filter.c.
https://github.com/gpac/gpac/issues/2612
https://github.com/gpac/gpac/commit/cd8a95c1efb8f5bfc950b86c2ef77b4c76f6b893
CWE-415
gpac/gpac
cd8a95c1efb8f5bfc950b86c2ef77b4c76f6b893~1
diff --git a/src/filters/isoffin_read_ch.c b/src/filters/isoffin_read_ch.c index bd96400689..6e74ce8e3f 100644 --- a/src/filters/isoffin_read_ch.c +++ b/src/filters/isoffin_read_ch.c @@ -395,6 +395,8 @@ void isor_reader_get_sample(ISOMChannel *ch) if (ch->edit_sync_frame) { ch->edit_sync_frame++; if (ch->...
https://github.com/gpac/gpac/issues/2612
==827317==ERROR: AddressSanitizer: attempting double-free on 0x619000015980 in thread T0: #0 0x55e7797a5972 in free (/home/user/fuzzing_gpac/gpac/bin/gcc/MP4Box+0x105972) (BuildId: 53333ca7bff59dd9a3d1b2821e7c5f3a9aac76b9) #1 0x7f525cd97945 in gf_filterpacket_del /home/user/fuzzing_gpac/gpac/src/filter_core/fil...
=== https://github.com/gpac/gpac/issues/2612 === Title: double-free in gf_filterpacket_del /home/user/fuzzing_gpac/gpac/src/filter_core/filter.c:38:17 --- Body: # Version ``` $ ./MP4Box -version MP4Box - GPAC version 2.3-DEV-rev566-g50c2ab06f-master ``` # Platform ``` $ uname -a Linux user-GE40-2PC-Dragon-E...
https://nvd.nist.gov/vuln/detail/CVE-2023-48013
gpac.cve-2023-48011
GPAC v2.3-DEV-rev566-g50c2ab06f-master was discovered to contain a heap-use-after-free via the flush_ref_samples function at /gpac/src/isomedia/movie_fragments.c.
https://github.com/gpac/gpac/issues/2611
https://github.com/gpac/gpac/commit/c70f49dda4946d6db6aa55588f6a756b76bd84ea
CWE-416
gpac/gpac
c70f49dda4946d6db6aa55588f6a756b76bd84ea~1
diff --git a/src/isomedia/movie_fragments.c b/src/isomedia/movie_fragments.c index b7f7ade327..d665eeb9d0 100644 --- a/src/isomedia/movie_fragments.c +++ b/src/isomedia/movie_fragments.c @@ -591,6 +591,7 @@ u32 UpdateRuns(GF_ISOFile *movie, GF_TrackFragmentBox *traf) while (gf_list_count(traf->TrackRuns)) { trun...
https://github.com/gpac/gpac/issues/2611
==836900==ERROR: AddressSanitizer: heap-use-after-free on address 0x60b000001d88 at pc 0x7f57c0120bf1 bp 0x7ffeac405a70 sp 0x7ffeac405a68 READ of size 8 at 0x60b000001d88 thread T0 #0 0x7f57c0120bf0 in flush_ref_samples /home/user/fuzzing_gpac/gpac/src/isomedia/movie_fragments.c:936:37 #1 0x7f57c0128df2 in gf_i...
ASan (inferred)
=== https://github.com/gpac/gpac/issues/2611 === Title: heap-use-after-free in ./gpac/src/isomedia/movie_fragments.c:936:37 in flush_ref_samples --- Body: # Version ``` $ ./MP4Box -version MP4Box - GPAC version 2.3-DEV-rev566-g50c2ab06f-master ``` # Platform ``` $ uname -a Linux user-GE40-2PC-Dragon-Eyes 6....
https://nvd.nist.gov/vuln/detail/CVE-2023-48011
libredwg.cve-2021-28237
LibreDWG v0.12.3 was discovered to contain a heap-buffer overflow via decode_preR13.
https://github.com/LibreDWG/libredwg/issues/325
https://github.com/LibreDWG/libredwg/commit/ea0b9522f63d049ded2c3cff8d9a8c360119951c
CWE-787
LibreDWG/libredwg
ea0b9522f63d049ded2c3cff8d9a8c360119951c~1
diff --git a/src/decode.c b/src/decode.c index 444775afd1..79134db0b3 100644 --- a/src/decode.c +++ b/src/decode.c @@ -329,19 +329,20 @@ decode_preR13_section (Dwg_Section_Type_r11 id, Bit_Chain *restrict dat, // TODO: move to a spec dwg_r11.spec, and dwg_decode_r11_NAME #define PREP_TABLE(token) ...
https://github.com/LibreDWG/libredwg/issues/325
➜ ./dwgread ./poc ERROR: This version of LibreDWG is only capable of decoding version r13-r2018 (code: AC1012-AC1032) DWG files. We don't decode many entities and no blocks yet. ERROR: offset -39 ERROR: offset -85 ================================================================= ==12538==ERROR: AddressSanitizer: heap-...
=== https://github.com/LibreDWG/libredwg/issues/325 === Title: Heap-buffer-overflow in decode_preR13 line 470 --- Body: I found a heap buffer overflow in the current master (8072563). # Configure CFLAGS="-g -fsanitize=address" LDFLAGS="-fsanitize=address" ./configure # Command `./dwgread ./poc` # ASAN repo...
https://nvd.nist.gov/vuln/detail/CVE-2021-28237
mruby.cve-2022-0631
Heap-based Buffer Overflow in Homebrew mruby prior to 3.2.
https://huntr.dev/bounties/9bdc49ca-6697-4adc-a785-081e1961bf40
https://github.com/mruby/mruby/commit/47068ae07a5fa3aa9a1879cdfe98a9ce0f339299, https://huntr.dev/bounties/9bdc49ca-6697-4adc-a785-081e1961bf40
CWE-122
mruby/mruby
47068ae07a5fa3aa9a1879cdfe98a9ce0f339299~1
diff --git a/src/vm.c b/src/vm.c index 9cb50847f2..aa5569503e 100644 --- a/src/vm.c +++ b/src/vm.c @@ -689,9 +689,11 @@ mrb_f_send(mrb_state *mrb, mrb_value self) regs = mrb->c->ci->stack+1; if (n == 0) { + argnum_error: mrb_argnum_error(mrb, 0, 1, -1); } else if (n == 15) { + if (RARRAY_LEN(regs...
https://nvd.nist.gov/vuln/detail/CVE-2022-0631
mruby.cve-2022-1934
Use After Free in GitHub repository mruby/mruby prior to 3.2.
https://huntr.dev/bounties/99e6df06-b9f7-4c53-a722-6bb89fbfb51f
https://github.com/mruby/mruby/commit/aa7f98dedb68d735a1665d3a289036c88b0c47ce, https://huntr.dev/bounties/99e6df06-b9f7-4c53-a722-6bb89fbfb51f
CWE-416
mruby/mruby
aa7f98dedb68d735a1665d3a289036c88b0c47ce~1
diff --git a/src/vm.c b/src/vm.c index b04c9d7e58..09e557dc8e 100644 --- a/src/vm.c +++ b/src/vm.c @@ -1159,18 +1159,20 @@ check_target_class(mrb_state *mrb) return target; } +#define regs (mrb->c->ci->stack) + static mrb_value -hash_new_from_values(mrb_state *mrb, mrb_int argc, mrb_value *regs) +hash_new_from_r...
https://nvd.nist.gov/vuln/detail/CVE-2022-1934
njs.cve-2022-34029
Nginx NJS v0.7.4 was discovered to contain an out-of-bounds read via njs_scope_value at njs_scope.h.
https://github.com/nginx/njs/issues/506
https://github.com/nginx/njs/commit/d09868bc71f9a990445959329ad8c1b10d3898f5
CWE-125
nginx/njs
d09868bc71f9a990445959329ad8c1b10d3898f5~1
diff --git a/src/njs_vmcode.c b/src/njs_vmcode.c index 9833ada03..cc33d20b2 100644 --- a/src/njs_vmcode.c +++ b/src/njs_vmcode.c @@ -856,9 +856,15 @@ njs_vmcode_interpreter(njs_vm_t *vm, u_char *pc, void *promise_cap, case NJS_VMCODE_AWAIT: await = (njs_vmcode_await_t *) pc; + ...
https://github.com/nginx/njs/issues/506
AddressSanitizer:DEADLYSIGNAL ================================================================= ==815==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000040 (pc 0x0000004ff20b bp 0x7ffc7abf6030 sp 0x7ffc7abf5880 T0) ==815==The signal is caused by a READ memory access. ==815==Hint: address points to the zero p...
ASan (inferred)
=== https://github.com/nginx/njs/issues/506 === Title: SEGV njs_scope.h:74:12 Out-of-bounds Read in njs_scope_value --- Body: Environment ```OS : Linux ubuntu 5.13.0-27-generic #29~20.04.1-Ubuntu SMP Fri Jan 14 00:32:30 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux Commit : 9f4ebc96148308a8ce12f2b54432c87e6d78b881 ...
https://nvd.nist.gov/vuln/detail/CVE-2022-34029
libarchive.cve-2019-11463
A memory leak in archive_read_format_zip_cleanup in archive_read_support_format_zip.c in libarchive 3.3.4-dev allows remote attackers to cause a denial of service via a crafted ZIP file because of a HAVE_LZMA_H typo. NOTE: this only affects users who downloaded the development code from GitHub. Users of the product's o...
https://github.com/libarchive/libarchive/issues/1165
https://github.com/libarchive/libarchive/commit/ba641f73f3d758d9032b3f0e5597a9c6e593a505
CWE-401
libarchive/libarchive
ba641f73f3d758d9032b3f0e5597a9c6e593a505~1
diff --git a/libarchive/archive_read_support_format_zip.c b/libarchive/archive_read_support_format_zip.c index 677c437095..6937969c16 100644 --- a/libarchive/archive_read_support_format_zip.c +++ b/libarchive/archive_read_support_format_zip.c @@ -2751,7 +2751,7 @@ archive_read_format_zip_cleanup(struct archive_read *a)...
https://github.com/libarchive/libarchive/issues/1165
==15753==ERROR: LeakSanitizer: detected memory leaks Direct leak of 96 byte(s) in 1 object(s) allocated from: #0 0x7f4c0b1dfb50 in __interceptor_malloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xdeb50) #1 0x7f4c0a85dced (/lib/x86_64-linux-gnu/liblzma.so.5+0x2ced) Indirect leak of 224 byte(s) in 1 object(s) al...
=== https://github.com/libarchive/libarchive/issues/1165 === Title: Memory leak when decoding LZMA --- Body: I've encountered a memory leak while fuzzing libarchive. A 32-byte reproducer input is attached: [input.zip](https://github.com/libarchive/libarchive/files/3019394/input.zip). Do not extract this zip file -- ...
https://nvd.nist.gov/vuln/detail/CVE-2019-11463
mruby.cve-2022-0614
Use of Out-of-range Pointer Offset in Homebrew mruby prior to 3.2.
https://huntr.dev/bounties/a980ce4d-c359-4425-92c4-e844c0055879
https://github.com/mruby/mruby/commit/ff3a5ebed6ffbe3e70481531cfb969b497aa73ad, https://huntr.dev/bounties/a980ce4d-c359-4425-92c4-e844c0055879
CWE-119, CWE-823
mruby/mruby
ff3a5ebed6ffbe3e70481531cfb969b497aa73ad~1
diff --git a/src/vm.c b/src/vm.c index 6133cbccac..9cb50847f2 100644 --- a/src/vm.c +++ b/src/vm.c @@ -2766,7 +2766,7 @@ mrb_vm_exec(mrb_state *mrb, const struct RProc *proc, const mrb_code *pc) int lim = a+b*2+1; hash = regs[a]; - mrb_assert(mrb_hash_p(hash)); + mrb_ensure_hash_type(mrb, hash...
https://nvd.nist.gov/vuln/detail/CVE-2022-0614
faad2.cve-2018-20194
There is a stack-based buffer underflow in the third instance of the calculate_gain function in libfaad/sbr_hfadj.c in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8. A crafted input will lead to a denial of service or possibly unspecified other impact because limiting the additional noise energy level is mishandled f...
https://github.com/knik0/faad2/issues/21
https://github.com/hlef/faad2/commit/6b4a7cde30f2e2cb03e78ef476cc73179cfffda3
CWE-787
hlef/faad2
5d380279cb00ea7a8b24f647f3790a1fc5342731
diff --git a/libfaad/sbr_hfadj.c b/libfaad/sbr_hfadj.c index 3f310b81..dda1ce8e 100644 --- a/libfaad/sbr_hfadj.c +++ b/libfaad/sbr_hfadj.c @@ -485,6 +485,12 @@ static void calculate_gain(sbr_info *sbr, sbr_hfadj_info *adj, uint8_t ch) ml1 = sbr->f_table_lim[sbr->bs_limiter_bands][k]; ml2 = sbr...
https://github.com/knik0/faad2/issues/21, https://seclists.org/bugtraq/2019/Sep/28
./faad faad_res/015-stack-buffer-underflow-sbr_hfadj_1314 -o out.wav *********** Ahead Software MPEG-4 AAC Decoder V2.8.8 ****************** Build: Dec 13 2018 Copyright 2002-2004: Ahead Software AG http://www.audiocoding.com bug tracking: https://sourceforge.net/p/faac/bugs/ Floating point version This progra...
=== https://github.com/knik0/faad2/issues/21 === Title: stack-buffer-underflow in function calculate_gain(libfaad/sbr_hfadj.c:1314) --- Body: Hi, i found a stack-buffer-overflow bug in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8, the details are below(ASAN): ``` ./faad faad_res/015-stack-buffer-underflow-sb...
https://nvd.nist.gov/vuln/detail/CVE-2018-20194
gpac.cve-2023-4721
Out-of-bounds Read in GitHub repository gpac/gpac prior to 2.3-DEV.
https://huntr.dev/bounties/f457dc62-3cff-47bd-8fd2-1cb2b4a832fc
https://github.com/gpac/gpac/commit/3ec93d73d048ed7b46fe6e9f307cc7a0cc13db63, https://huntr.dev/bounties/f457dc62-3cff-47bd-8fd2-1cb2b4a832fc
CWE-125
gpac/gpac
3ec93d73d048ed7b46fe6e9f307cc7a0cc13db63~1
diff --git a/src/media_tools/mpeg2_ps.c b/src/media_tools/mpeg2_ps.c index 0af7a31f32..b0182f2249 100644 --- a/src/media_tools/mpeg2_ps.c +++ b/src/media_tools/mpeg2_ps.c @@ -266,6 +266,8 @@ int MPEG12_ParseSeqHdr(unsigned char *pbuffer, u32 buflen, s32 *have_mpeg2, u32 u32 scode, ix; s32 found = -1; *have_mpeg2 ...
ASan (inferred)
https://nvd.nist.gov/vuln/detail/CVE-2023-4721
gpac.cve-2022-3178
Buffer Over-read in GitHub repository gpac/gpac prior to 2.1.0-DEV.
https://huntr.dev/bounties/f022fc50-3dfd-450a-ab47-3d75d2bf44c0
https://github.com/gpac/gpac/commit/77510778516803b7f7402d7423c6d6bef50254c3, https://huntr.dev/bounties/f022fc50-3dfd-450a-ab47-3d75d2bf44c0
CWE-125, CWE-126
gpac/gpac
77510778516803b7f7402d7423c6d6bef50254c3~1
diff --git a/src/isomedia/box_code_base.c b/src/isomedia/box_code_base.c index 3cf6b3bd38..b7ee3e356e 100644 --- a/src/isomedia/box_code_base.c +++ b/src/isomedia/box_code_base.c @@ -12886,11 +12886,12 @@ GF_Err xtra_box_read(GF_Box *s, GF_BitStream *bs) prop_type = gf_bs_read_u16(bs); prop_size -= 6; ISOM_...
https://nvd.nist.gov/vuln/detail/CVE-2022-3178
exiv2.cve-2018-19607
Exiv2::isoSpeed in easyaccess.cpp in Exiv2 v0.27-RC2 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file.
https://github.com/Exiv2/exiv2/issues/561
https://github.com/Exiv2/exiv2/commit/6e42c1b55e0fc4f360cc56010b0ffe19aa6062d9
CWE-476
Exiv2/exiv2
6e42c1b55e0fc4f360cc56010b0ffe19aa6062d9~1
diff --git a/src/easyaccess.cpp b/src/easyaccess.cpp index 1eed30c47e..9302d6cc91 100644 --- a/src/easyaccess.cpp +++ b/src/easyaccess.cpp @@ -154,7 +154,7 @@ namespace Exiv2 { std::ostringstream os; md_st->write(os, &ed); bool ok = false; - long st_val = parseLong(os.s...
https://github.com/Exiv2/exiv2/issues/561
==91500==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x7f186e2da05a bp 0x7fff4e8fe260 sp 0x7fff4e8fd9f0 T0) #0 0x7f186e2da059 (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x47059) #1 0x7f186db38b0c in Exiv2::isoSpeed(Exiv2::ExifData const&) /home/marsman/Desktop/crashana/exiv2/exiv2-3f2e0de/...
=== https://github.com/Exiv2/exiv2/issues/561 === Title: CVE-2018-19607: SEGV in Exiv2::isoSpeed at easyaccess.cpp:178 --- Body: Tested in ubuntu 16.04 64bit, exiv2 (master 3f2e0de && 0.27-RC2) `$ exiv2 $POC` [POC file](https://github.com/Marsman1996/pocs/blob/master/exiv2/CVE-2018-19607/poc9-isoSpeed) gdb inf...
https://nvd.nist.gov/vuln/detail/CVE-2018-19607
gpac.cve-2023-3012
NULL Pointer Dereference in GitHub repository gpac/gpac prior to 2.2.2.
https://huntr.dev/bounties/916b787a-c603-409d-afc6-25bb02070e69
https://github.com/gpac/gpac/commit/53387aa86c1af1228d0fa57c67f9c7330716d5a7, https://huntr.dev/bounties/916b787a-c603-409d-afc6-25bb02070e69
CWE-476
gpac/gpac
53387aa86c1af1228d0fa57c67f9c7330716d5a7~1
diff --git a/src/utils/xml_parser.c b/src/utils/xml_parser.c index 49df338164..11f6f2f5ca 100644 --- a/src/utils/xml_parser.c +++ b/src/utils/xml_parser.c @@ -704,6 +704,8 @@ static void xml_sax_parse_entity(GF_SAXParser *parser) } } if (ent_name) gf_free(ent_name); + if (ent && !ent->value) + parser->sax_state...
https://nvd.nist.gov/vuln/detail/CVE-2023-3012
End of preview. Expand in Data Studio
README.md exists but content is empty.
Downloads last month
242