Dataset Viewer
Auto-converted to Parquet Duplicate
task_id
stringlengths
8
10
docker_image
stringlengths
17
19
basedir
stringclasses
157 values
target_functions
listlengths
1
3
crash_type
stringclasses
85 values
project_name
stringclasses
157 values
sanitizer
stringclasses
3 values
sanitizer_output
stringlengths
1.13k
6.5M
language
stringclasses
2 values
vuln_commit
stringlengths
40
40
fix
stringlengths
69
110
vulnerability_description
stringlengths
38
824
arvo:10222
n132/arvo:10222-vul
/src/radare2
[ { "end_line": 731, "function_name": "r_bin_mdmp_init_directory", "start_line": 708, "target_file": "/src/radare2/libr/bin/format/mdmp/mdmp.c" } ]
Heap-buffer-overflow READ 8
radare2
asan
INFO: Seed: 1556718792 INFO: Loaded 1 modules (157202 inline 8-bit counters): 157202 [0x25919d0, 0x25b7fe2), INFO: Loaded 1 PC tables (157202 PCs): 157202 [0x25b7fe8,0x281e108), /out/ia_fuzz: Running 1 inputs 1 time(s) each. Running: /tmp/poc 3 [ERROR] Size Mismatch - Stream data is larger than file size! [ERROR] S...
cpp
ef5c59e0d443c5af25ddfc7e5c33cc6ba1e65f6b
https://github.com/radare/radare2/commit/533da1306534ece22d67eaa3c32e46b717cd9199
null
arvo:10252
n132/arvo:10252-vul
/src/aom
[ { "end_line": 769, "function_name": "foreach_rest_unit_in_planes_mt", "start_line": 708, "target_file": "/src/aom/av1/common/thread_common.c" } ]
Heap-buffer-overflow WRITE 4
aom
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/av1_dec_fuzzer_threaded < INPUT_FILE or /out/av1_dec_fuzzer_threaded INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz [afl-flags...
cpp
8ae39302e354781ba03012d4f211da97e1715f9c
https://aomedia.googlesource.com/aom/+/32017745b0b4cb6d69ced6250dd67d9faf6282f8%5E%21/
A vulnerability exists in the loop restoration multi-threading code where, when luma loop restoration is disabled, the initialization of cur_sb_col in lr_sync does not occur correctly.
arvo:10486
n132/arvo:10486-vul
/src/libssh
[ { "end_line": 1300, "function_name": "ssh_buffer_unpack_va", "start_line": 1083, "target_file": "/src/libssh/src/buffer.c" } ]
Stack-buffer-overflow READ 8
libssh
asan
INFO: Seed: 1418098331 INFO: Loaded 1 modules (6761 inline 8-bit counters): 6761 [0xb64588, 0xb65ff1), INFO: Loaded 1 PC tables (6761 PCs): 6761 [0x89f0a0,0x8b9730), /out/libssh_server_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==4310...
cpp
5123f7955b67341e946987642354c0b123f5e1ff
https://git.libssh.org/projects/libssh.git07f7fa7806e94ccaa271c185213afed80e13a77d
An invalid memory access occurs in the function ssh_buffer_unpack() in the buffer component.
arvo:10487
n132/arvo:10487-vul
/src/radare2
[ { "end_line": 731, "function_name": "r_bin_mdmp_init_directory", "start_line": 708, "target_file": "/src/radare2/libr/bin/format/mdmp/mdmp.c" } ]
Heap-buffer-overflow READ 1
radare2
asan
INFO: Seed: 2320425810 INFO: Loaded 1 modules (157202 inline 8-bit counters): 157202 [0x25919d0, 0x25b7fe2), INFO: Loaded 1 PC tables (157202 PCs): 157202 [0x25b7fe8,0x281e108), /out/ia_fuzz: Running 1 inputs 1 time(s) each. Running: /tmp/poc 3 [ERROR] Size Mismatch - Stream data is larger than file size! [ERROR] S...
cpp
ef5c59e0d443c5af25ddfc7e5c33cc6ba1e65f6b
https://github.com/radare/radare2/commit/533da1306534ece22d67eaa3c32e46b717cd9199
null
arvo:10604
n132/arvo:10604-vul
/src/open62541
[ { "end_line": 63, "function_name": "removeSecureChannel", "start_line": 48, "target_file": "/src/open62541/src/server/ua_securechannel_manager.c" }, { "end_line": 794, "function_name": "UA_Server_processBinaryMessage", "start_line": 757, "target_file": "/src/open62541/src/server/...
Use-of-uninitialized-value
open62541
msan
INFO: Seed: 1432192114 INFO: Loaded 1 modules (7027 inline 8-bit counters): 7027 [0xbfa488, 0xbfbffb), INFO: Loaded 1 PC tables (7027 PCs): 7027 [0xbfc000,0xc17730), /out/fuzz_binary_message: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==994==WARNING: MemorySanitizer: use-of-uninitialized-value #0 0x5322...
cpp
454b81b3ae282d93c2cbfad3530568a0ff358dd9
https://github.com/open62541/open62541/commit/27dc05196fc43036a2efcea060ae3711b3209cf2
null
arvo:10628
n132/arvo:10628-vul
/src/botan
[ { "end_line": 79, "function_name": "ref_oneandzero_unpad", "start_line": 54, "target_file": "/src/botan/src/fuzzer/mode_padding.cpp" } ]
Heap-buffer-overflow READ 1
botan
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/mode_padding < INPUT_FILE or /out/mode_padding INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz [afl-flags] /out/mode_padding [-...
cpp
97c7a8bf1d8af210b300b4d88a488b1c4cdaaa97
https://github.com/randombit/botan/commit/b859e175a0f2357dcfe2211ca487a7bde0e971b1
A crash occurs in the reference version of 1and0 padding in the mode padding fuzzer when processing an all-zero input.
arvo:1065
n132/arvo:1065-vul
/src/file
[ { "end_line": 515, "function_name": "file_regexec", "start_line": 507, "target_file": "/src/file/src/funcs.c" } ]
Use-of-uninitialized-value
file
msan
INFO: Seed: 1089329789 INFO: Loaded 1 modules (3771 guards): [0xa2f9a0, 0xa3348c), /out/magic_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==10654==WARNING: MemorySanitizer: use-of-uninitialized-value #0 0x590726 in match /src/file/src/softmagic.c:365:9 #1 0x58d2d3 in file_softmagic /src/file/src...
cpp
9b193be08bf7ecd374cd799844032671e869a1bf
https://github.com/file/file/commit/393dafa41b26a7d8ed593912e0ec1f1e7bd4e406
A bug in glibc/regex/msan causes regexec to return 0 but not initialize pmatch.
arvo:10811
n132/arvo:10811-vul
/src/wireshark
[ { "end_line": 12041, "function_name": "next_he_scidx", "start_line": 11910, "target_file": "/src/wireshark/epan/dissectors/packet-ieee80211.c" } ]
Global-buffer-overflow READ 4
wireshark
asan
oss-fuzzshark: disabling: ip oss-fuzzshark: disabling: udplite oss-fuzzshark: disabling: ospf oss-fuzzshark: disabling: bgp oss-fuzzshark: disabling: dhcp oss-fuzzshark: disabling: json oss-fuzzshark: disabling: snort oss-fuzzshark: configured for dissector: udp in table: ip.proto INFO: Seed: 1770710604 INFO: Loaded 1 ...
cpp
74903893d8be058bb51268d2b5e748e3ea2d9053
https://github.com/wireshark/wireshark/commit/ff73c307fae57fdb12e2fbbca87b9810d8b9cd27
null
arvo:10816
n132/arvo:10816-vul
/src/wireshark
[ { "end_line": 12041, "function_name": "next_he_scidx", "start_line": 11910, "target_file": "/src/wireshark/epan/dissectors/packet-ieee80211.c" } ]
Index-out-of-bounds
wireshark
ubsan
oss-fuzzshark: disabling: ip oss-fuzzshark: disabling: udplite oss-fuzzshark: disabling: ospf oss-fuzzshark: disabling: bgp oss-fuzzshark: disabling: dhcp oss-fuzzshark: disabling: json oss-fuzzshark: disabling: snort oss-fuzzshark: configured for dissector: udp in table: ip.proto INFO: Seed: 295136063 INFO: Loaded 1 m...
cpp
74903893d8be058bb51268d2b5e748e3ea2d9053
https://github.com/wireshark/wireshark/commit/ff73c307fae57fdb12e2fbbca87b9810d8b9cd27
null
arvo:10841
n132/arvo:10841-vul
/src/librawspeed
[ { "end_line": 54, "function_name": "PhaseOneDecompressor::PhaseOneDecompressor", "start_line": 38, "target_file": "/src/librawspeed/src/librawspeed/decompressors/PhaseOneDecompressor.cpp" } ]
Use-of-uninitialized-value
librawspeed
msan
INFO: Seed: 3104927159 INFO: Loaded 1 modules (1387 inline 8-bit counters): 1387 [0xa20870, 0xa20ddb), INFO: Loaded 1 PC tables (1387 PCs): 1387 [0xa20de0,0xa26490), /out/PhaseOneDecompressorFuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc Uninitialized bytes in __msan_check_mem_is_initialized at offset 0...
cpp
fb1a40c2d9585e9af75ea8a17ad78b10564991bf
https://github.com/darktable-org/rawspeed/commit/27808d5a8dc8d13c64e88c0a819f5cd29b274979
The PhaseOneDecompressor does not validate the 'strips' vector (the rows it specifies), assuming it is always correct as in the proper IIQDecoder. This allows incorrect 'strips' to be processed, resulting in broken images.
arvo:10850
n132/arvo:10850-vul
/src/openvswitch
[ { "end_line": 5551, "function_name": "parse_odp_key_mask_attr", "start_line": 5364, "target_file": "/src/openvswitch/lib/odp-util.c" } ]
Heap-buffer-overflow READ 1
openvswitch
asan
INFO: Seed: 1676868116 INFO: Loaded 1 modules (38168 inline 8-bit counters): 38168 [0xea6f20, 0xeb0438), INFO: Loaded 1 PC tables (38168 PCs): 38168 [0xa7a868,0xb0f9e8), /out/odp_target: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==29017==ERR...
cpp
7587e1daa673149575149716605ef78f260d9989
https://github.com/openvswitch/ovs/commit/a1da3f297717c2de70dab88f7783117b78f85e89
null
arvo:10863
n132/arvo:10863-vul
/src/openvswitch
[ { "end_line": 2141, "function_name": "parse_odp_push_nsh_action", "start_line": 2031, "target_file": "/src/openvswitch/lib/odp-util.c" } ]
Use-of-uninitialized-value
openvswitch
msan
INFO: Seed: 2546583034 INFO: Loaded 1 modules (38478 inline 8-bit counters): 38478 [0x11682f8, 0x1171946), INFO: Loaded 1 PC tables (38478 PCs): 38478 [0xda1870,0xe37d50), /out/odp_target: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==29384==WARNING: MemorySanitizer: use-of-uninitialized-value #0 0x72899...
cpp
c3a08624975cf42489e8e1710babccc8d0569c85
https://github.com/openvswitch/ovs/commit/2e38f13d70a9c049497a8cab681fe7b1f443c8b1
A vulnerability exists in odp-util within the parse_odp_push_nsh_action function, where 'struct ofpbuf b' is expected to always point to metadata so that metadata can be filled with values through ofpbuf operations such as ofpbuf_put_hex and ofpbuf_push_zeros. However, the use of ofpbuf_push_zeros may change the data p...
arvo:10864
n132/arvo:10864-vul
/src/wpantund
[ { "end_line": 929, "function_name": "NCPInstanceBase::on_mesh_prefix_was_removed", "start_line": 888, "target_file": "/src/wpantund/src/wpantund/NCPInstanceBase-Addresses.cpp" } ]
Heap-use-after-free READ 4
wpantund
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/wpantund-fuzz < INPUT_FILE or /out/wpantund-fuzz INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz [afl-flags] /out/wpantund-fuzz...
cpp
8a8c7f7621dea86aa3136444561facf141e65512
https://github.com/openthread/wpantund/commit/bd1361434619a52b296e6a94c4188aae1a693179
A "use after delete" vulnerability exists in the on_mesh_prefix_was_removed() function.
arvo:10865
n132/arvo:10865-vul
/src/openvswitch
[ { "end_line": 2141, "function_name": "parse_odp_push_nsh_action", "start_line": 2031, "target_file": "/src/openvswitch/lib/odp-util.c" } ]
Stack-buffer-overflow READ {*}
openvswitch
asan
INFO: Seed: 1915738978 INFO: Loaded 1 modules (38220 inline 8-bit counters): 38220 [0xea8240, 0xeb178c), INFO: Loaded 1 PC tables (38220 PCs): 38220 [0xa7b928,0xb10de8), /out/odp_target: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==29144==ERR...
cpp
581d3bec7b8c714a98744b0b5f48dd7c7c4db037
https://github.com/openvswitch/ovs/commit/33a3ee6b39acd9799301ec6cc0069bc9e4b4428b
A buffer overflow vulnerability exists in odp-util when parsing push_nsh, because the buffer size of 'struct ofpbuf b' is less than the size of 'char buf[512]'. This can cause memory overflow of ofpbuf when calling ofpbuf_put_hex.
arvo:10945
n132/arvo:10945-vul
/src/openvswitch
[ { "end_line": 5551, "function_name": "parse_odp_key_mask_attr", "start_line": 5364, "target_file": "/src/openvswitch/lib/odp-util.c" } ]
Use-of-uninitialized-value
openvswitch
msan
INFO: Seed: 1620371529 INFO: Loaded 1 modules (38125 inline 8-bit counters): 38125 [0x1159fb8, 0x11634a5), INFO: Loaded 1 PC tables (38125 PCs): 38125 [0xd95400,0xe2a2d0), /out/odp_target: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==29026==WARNING: MemorySanitizer: use-of-uninitialized-value #0 0x88b57...
cpp
7587e1daa673149575149716605ef78f260d9989
https://github.com/openvswitch/ovs/commit/a1da3f297717c2de70dab88f7783117b78f85e89
null
arvo:10999
n132/arvo:10999-vul
/src/libgit2
[ { "end_line": 160, "function_name": "tag_parse", "start_line": 68, "target_file": "/src/libgit2/src/tag.c" } ]
Heap-buffer-overflow READ 2
libgit2
asan
INFO: Seed: 1582894454 INFO: Loaded 1 modules (27409 inline 8-bit counters): 27409 [0xe07350, 0xe0de61), INFO: Loaded 1 PC tables (27409 PCs): 27409 [0xadbbc0,0xb46cd0), /out/objects_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==2647==...
cpp
4c738e563d0a52c7f06902a6bdac37fe3472b86b
https://github.com/libgit2/libgit2/commit/ee11d47e3d907b66eeff99e0ba1e1c71e05164b7
An out of bounds read occurs when searching for the tag message during tag parsing. The code uses `strstr(buffer, "\n\n")` to locate the separator between tag fields and the tag message, but since `strstr` does not accept a buffer length, it may read past the end of the buffer. This can result in `strstr` returning a p...
arvo:11007
n132/arvo:11007-vul
/src/libgit2
[ { "end_line": 478, "function_name": "git_commit__parse_raw", "start_line": 386, "target_file": "/src/libgit2/src/commit.c" } ]
Heap-buffer-overflow READ 1
libgit2
asan
INFO: Seed: 1435506579 INFO: Loaded 1 modules (27478 inline 8-bit counters): 27478 [0xe0a7d0, 0xe11326), INFO: Loaded 1 PC tables (27478 PCs): 27478 [0xadec00,0xb4a160), /out/objects_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==2656==...
cpp
11d33df802b00acf5ef1e437c12751b3e6a5d39b
https://github.com/libgit2/libgit2/commit/cb23c3efd22d34db279ceb39cc312473761db5ed
An out-of-bound read occurs when parsing truncated author fields in commit objects. The commit parser handles multiple author fields by checking if a line starts with "author " using `git__prefixcmp`. If given a non-NUL-terminated string that ends immediately after the space, the comparison may read one byte out of bou...
arvo:11011
n132/arvo:11011-vul
/src/libarchive
[ { "end_line": 1861, "function_name": "init_unpack", "start_line": 1837, "target_file": "/src/libarchive/libarchive/archive_read_support_format_rar5.c" } ]
Heap-buffer-overflow WRITE 1
libarchive
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/libarchive_fuzzer < INPUT_FILE or /out/libarchive_fuzzer INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz [afl-flags] /out/libar...
cpp
84f7fd01b68127454fcee321086b771bdc230630
https://github.com/libarchive/libarchive/commit/b52dd6c9e4ef7cf95c2a6ae5ab7ccac7f6d462a1
A vulnerability exists where the mask is not set to 0 for directories, which can lead to buffer overflows due to incorrect truncation of the window.
arvo:11078
n132/arvo:11078-vul
/src/librawspeed
[ { "end_line": 619, "function_name": "VC5Decompressor::parseLargeCodeblock", "start_line": 549, "target_file": "/src/librawspeed/src/librawspeed/decompressors/VC5Decompressor.cpp" } ]
Use-of-uninitialized-value
librawspeed
msan
INFO: Seed: 3246793481 INFO: Loaded 1 modules (1869 inline 8-bit counters): 1869 [0xa40e50, 0xa4159d), INFO: Loaded 1 PC tables (1869 PCs): 1869 [0xa415a0,0xa48a70), /out/VC5DecompressorFuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc VC5DecompressorFuzzer: /src/librawspeed/src/librawspeed/common/Optional...
cpp
732a81d2bbe06dfe3bd4eef836d8f874fe718978
https://github.com/darktable-org/rawspeed/commit/7473d21494834f72f984b0e2a06346bd68fb6e1c
A vulnerability exists in VC5Decompressor where Optional tags are not properly handled, leading to potential assertion failures.
arvo:11170
n132/arvo:11170-vul
/src/openvswitch
[ { "end_line": 4843, "function_name": "scan_vxlan_gbp", "start_line": 4802, "target_file": "/src/openvswitch/lib/odp-util.c" } ]
Heap-buffer-overflow READ 1
openvswitch
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/odp_target < INPUT_FILE or /out/odp_target INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz [afl-flags] /out/odp_target [-N] afl...
cpp
f31b8ae7a7a777dd9dc40997903a283409674eae
https://github.com/openvswitch/ovs/commit/2d3deb58df05c4686f19ecf16ddbd76a79b2d5a5
null
arvo:11173
n132/arvo:11173-vul
/src/libgit2
[ { "end_line": 164, "function_name": "git__strntol64", "start_line": 71, "target_file": "/src/libgit2/src/util.c" } ]
Heap-buffer-overflow READ 1
libgit2
asan
Reading 58 bytes from /tmp/poc ======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/objects_fuzzer < INPUT_FILE or /out/objects_fuzzer INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fu...
cpp
b5ae83bfac53fa3a17435ebf2fc3b79db8055dae
https://github.com/libgit2/libgit2/commit/41863a00f0d811c659c9ba87ae2cc0c3aae5a77f
The git__strntol family of functions accepts and skips leading spaces, but does not honor the provided buffer's length when doing so. This can lead to out-of-bounds reads if the input is not a simple NUL-terminated string. Additionally, when leading space is trimmed, the function advances the pointer without updating t...
arvo:11196
n132/arvo:11196-vul
/src/libarchive
[ { "end_line": 2764, "function_name": "merge_block", "start_line": 2673, "target_file": "/src/libarchive/libarchive/archive_read_support_format_rar5.c" } ]
Heap-buffer-overflow READ 1
libarchive
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/libarchive_fuzzer < INPUT_FILE or /out/libarchive_fuzzer INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz [afl-flags] /out/libar...
cpp
c3d742c9836f352af573d485aca9d312ed1320d5
https://github.com/libarchive/libarchive/commit/4bc5892128a042780f167ac35aa72f63c426f3b7
null
arvo:11253
n132/arvo:11253-vul
/src/openvswitch
[ { "end_line": 480, "function_name": "ofpbuf_insert", "start_line": 468, "target_file": "/src/openvswitch/lib/ofpbuf.c" } ]
Heap-buffer-overflow WRITE {*}
openvswitch
asan
Reading 32 bytes from /tmp/poc ======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/ofctl_parse_target < INPUT_FILE or /out/ofctl_parse_target INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: ...
cpp
b48aa1437df1d438d39d7c798ef93e0854911022
https://github.com/openvswitch/ovs/commit/39976b99178eaa4862c43eaf00959f2653a01a6f
An arithmetic error in the ofpbuf_insert() function in ofpbuf causes the memmove byte count to be calculated incorrectly, because ofpbuf_put_uninit increases b->size by n. This results in an incorrect number of bytes being moved during buffer operations.
arvo:11263
n132/arvo:11263-vul
/src/harfbuzz
[ { "end_line": 102, "function_name": "test_face", "start_line": 35, "target_file": "/src/harfbuzz/test/api/test-ot-face.c" } ]
Heap-buffer-overflow READ {*}
harfbuzz
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/hb-shape-fuzzer < INPUT_FILE or /out/hb-shape-fuzzer INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz [afl-flags] /out/hb-shape-...
cpp
252632c477b963f305116d69fcafacd8bf7b97bf
https://github.com/harfbuzz/harfbuzz/commit/6482fda519ca7d173e3bcb3717aa30e237f04b25
null
arvo:11300
n132/arvo:11300-vul
/src/yara
[ { "end_line": 1359, "function_name": "dotnet_parse_tilde_2", "start_line": 342, "target_file": "/src/yara/libyara/modules/dotnet.c" } ]
UNKNOWN READ
yara
msan
INFO: Seed: 2199298579 INFO: Loaded 1 modules (7698 inline 8-bit counters): 7698 [0xb2ac48, 0xb2ca5a), INFO: Loaded 1 PC tables (7698 PCs): 7698 [0x89c9a0,0x8baac0), /out/dotnet_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc MemorySanitizer:DEADLYSIGNAL ==37394==ERROR: MemorySanitizer: SEGV on unknown a...
cpp
ab99479c96ba9759193b3b1f42089e5fe1b647f6
https://github.com/VirusTotal/yara/commit/72c109ea85f1434237a292de3478f53554989453
null
arvo:11359
n132/arvo:11359-vul
/src/radare2
[ { "end_line": 252, "function_name": "r_core_task_decref", "start_line": 240, "target_file": "/src/radare2/libr/core/task.c" } ]
Heap-use-after-free READ 8
radare2
asan
INFO: Seed: 1412606771 INFO: Loaded 1 modules (150204 inline 8-bit counters): 150204 [0x2424da8, 0x2449864), INFO: Loaded 1 PC tables (150204 PCs): 150204 [0x2449868,0x2694428), /out/ia_fuzz: Running 1 inputs 1 time(s) each. Running: /tmp/poc Cannot allocate (0) 0 bytes cannot open file malloc://0 No file to load b...
cpp
8bc369ef3f67c3e074cccfe383922393fa11c89a
https://github.com/radare/radare2/commit/5783cf42c40aaed9b9180ae7069c7a60ea86dc45
null
arvo:11376
n132/arvo:11376-vul
/src/openthread
[ { "end_line": 1597, "function_name": "MeshForwarder::GetFramePriority", "start_line": 1560, "target_file": "/src/openthread/src/core/thread/mesh_forwarder.cpp" } ]
Heap-buffer-overflow READ 8
openthread
asan
Reading 13 bytes from /tmp/poc ======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/radio-receive-done-fuzzer < INPUT_FILE or /out/radio-receive-done-fuzzer INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz ...
cpp
33b0ee93308345316ca7a8a1ddc8aa86ba42983e
https://github.com/openthread/openthread/commit/bf72fd8f8d4a898c019f279c8605e66fc0b42878
null
arvo:11382
n132/arvo:11382-vul
/src/libgit2
[ { "end_line": 181, "function_name": "git__strntol64", "start_line": 71, "target_file": "/src/libgit2/src/util.c" } ]
Heap-buffer-overflow READ 1
libgit2
asan
INFO: Seed: 1749770194 INFO: Loaded 1 modules (27472 inline 8-bit counters): 27472 [0xe0a4e8, 0xe11038), INFO: Loaded 1 PC tables (27472 PCs): 27472 [0xade8a0,0xb49da0), /out/objects_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==2657==...
cpp
fd4e3b216c0881b5825c013a55b487ac2e8b8ab0
https://github.com/libgit2/libgit2/commit/4209a5125802e714a6342a74ff0835c5c4a2397d
The strntol function inappropriately handles parsing numbers with a leading plus or minus sign, resulting in potential out-of-bounds reads. When a leading sign is present, the function advances the pointer but fails to update the number of remaining bytes in the string, which can cause the parser to read beyond the buf...
arvo:11429
n132/arvo:11429-vul
/src/librawspeed
[ { "end_line": 558, "function_name": "VC5Decompressor::Wavelet::HighPassBand::decode", "start_line": 531, "target_file": "/src/librawspeed/src/librawspeed/decompressors/VC5Decompressor.cpp" } ]
Heap-buffer-overflow WRITE 2
librawspeed
asan
INFO: Seed: 2623466991 INFO: Loaded 1 modules (1999 inline 8-bit counters): 1999 [0x941870, 0x94203f), INFO: Loaded 1 PC tables (1999 PCs): 1999 [0x942040,0x949d30), /out/VC5DecompressorFuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==671...
cpp
021ce54ea210896d1f3de1d2c604c3472769ddf7
https://github.com/darktable-org/rawspeed/commit/0bcf3488a4989c2724f0c4383401b0d0dcfc3dcc
An off-by-one error exists in the output buffer check within the HighPassBand::decode() function of VC5Decompressor.
arvo:11444
n132/arvo:11444-vul
/src/imagemagick
[ { "end_line": 312, "function_name": "GetNextToken", "start_line": 167, "target_file": "/src/imagemagick/MagickCore/token.c" } ]
Use-of-uninitialized-value
imagemagick
msan
INFO: Seed: 1852361830 INFO: Loaded 1 modules (166115 inline 8-bit counters): 166115 [0x2be2b48, 0x2c0b42b), INFO: Loaded 1 PC tables (166115 PCs): 166115 [0x2c0b430,0x2e94260), /out/encoder_mvg_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==159048==WARNING: MemorySanitizer: use-of-uninitialized-value...
cpp
c7cdd6602365ce55a408e2d793c92a8a9e0027c0
https://github.com/imagemagick/imagemagick/commit/537c2ca0244889634ced3c3e0724431862d3ced5
null
arvo:11484
n132/arvo:11484-vul
/src/open62541
[ { "end_line": 415, "function_name": "Variant_clear", "start_line": 403, "target_file": "/src/open62541/src/ua_types.c" } ]
Heap-use-after-free READ 4
open62541
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/fuzz_binary_decode < INPUT_FILE or /out/fuzz_binary_decode INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz [afl-flags] /out/fuz...
cpp
94d61b6c13b975d711fe9027a6dd6eedbb4b6503
https://github.com/open62541/open62541/commit/f4f8cdc4c344ad75051f3785a53a956a644cba05
null
arvo:11517
n132/arvo:11517-vul
/src/aom
[ { "end_line": 1478, "function_name": "highbd_dr_prediction_z1_64xN_avx2", "start_line": 1380, "target_file": "/src/aom/aom_dsp/x86/intrapred_avx2.c" } ]
Stack-buffer-overflow READ 16
aom
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/av1_dec_fuzzer < INPUT_FILE or /out/av1_dec_fuzzer INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz [afl-flags] /out/av1_dec_fuz...
cpp
f48b0d22e2c1391351cb4ba75d033db1df9ad7ce
https://aomedia.googlesource.com/aom/+/fe996504f76f4204074c1f8f681925852c61b777%5E%21/
null
arvo:11523
n132/arvo:11523-vul
/src/aom
[ { "end_line": 4760, "function_name": "show_existing_frame_reset", "start_line": 4714, "target_file": "/src/aom/av1/decoder/decodeframe.c" } ]
Heap-buffer-overflow READ {*}
aom
asan
INFO: Seed: 2794871271 INFO: Loaded 1 modules (28001 inline 8-bit counters): 28001 [0x103b3a8, 0x1042109), INFO: Loaded 1 PC tables (28001 PCs): 28001 [0x1042110,0x10af720), /out/av1_dec_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==37...
cpp
352c10bb5b6466e21c657c2ef5de53d793e26724
https://aomedia.googlesource.com/aom/+/0ad5c625be27d7a3622dae95e9afe5e66b112d46%5E%21/
A vulnerability exists where the frame context is not set up using next_ref_frame_map, potentially leading to incorrect reference frame handling.
arvo:11752
n132/arvo:11752-vul
/src/yara
[ { "end_line": 522, "function_name": "yr_re_ast_split_at_chaining_point", "start_line": 456, "target_file": "/src/yara/libyara/re.c" } ]
Heap-use-after-free READ 4
yara
asan
INFO: Seed: 1032320226 INFO: Loaded 1 modules (7656 inline 8-bit counters): 7656 [0x9e1b88, 0x9e3970), INFO: Loaded 1 PC tables (7656 PCs): 7656 [0x7444a0,0x762320), /out/rules_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==37430==ERROR...
cpp
459d5a2bae0f4c9a2921be0d21fe920258cb5d6d
https://github.com/VirusTotal/yara/commit/8eeed3ef5e2bbd5b927bf1b72879c1fa9ab979cb
null
arvo:11753
n132/arvo:11753-vul
/src/yara
[ { "end_line": 522, "function_name": "yr_re_ast_split_at_chaining_point", "start_line": 456, "target_file": "/src/yara/libyara/re.c" } ]
Heap-use-after-free READ 4
yara
asan
INFO: Seed: 3471148202 INFO: Loaded 1 modules (7656 inline 8-bit counters): 7656 [0x9e1b88, 0x9e3970), INFO: Loaded 1 PC tables (7656 PCs): 7656 [0x7444a0,0x762320), /out/rules_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==37385==ERROR...
cpp
459d5a2bae0f4c9a2921be0d21fe920258cb5d6d
https://github.com/VirusTotal/yara/commit/8eeed3ef5e2bbd5b927bf1b72879c1fa9ab979cb
null
End of preview. Expand in Data Studio
README.md exists but content is empty.
Downloads last month
9