task_id stringlengths 8 10 | docker_image stringlengths 17 19 | basedir stringclasses 157
values | target_functions listlengths 1 3 | crash_type stringclasses 85
values | project_name stringclasses 157
values | sanitizer stringclasses 3
values | sanitizer_output stringlengths 1.13k 6.5M | language stringclasses 2
values | vuln_commit stringlengths 40 40 | fix stringlengths 69 110 | vulnerability_description stringlengths 38 824 ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
arvo:10222 | n132/arvo:10222-vul | /src/radare2 | [
{
"end_line": 731,
"function_name": "r_bin_mdmp_init_directory",
"start_line": 708,
"target_file": "/src/radare2/libr/bin/format/mdmp/mdmp.c"
}
] | Heap-buffer-overflow READ 8 | radare2 | asan | INFO: Seed: 1556718792
INFO: Loaded 1 modules (157202 inline 8-bit counters): 157202 [0x25919d0, 0x25b7fe2),
INFO: Loaded 1 PC tables (157202 PCs): 157202 [0x25b7fe8,0x281e108),
/out/ia_fuzz: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
3
[ERROR] Size Mismatch - Stream data is larger than file size!
[ERROR] S... | cpp | ef5c59e0d443c5af25ddfc7e5c33cc6ba1e65f6b | https://github.com/radare/radare2/commit/533da1306534ece22d67eaa3c32e46b717cd9199 | null |
arvo:10252 | n132/arvo:10252-vul | /src/aom | [
{
"end_line": 769,
"function_name": "foreach_rest_unit_in_planes_mt",
"start_line": 708,
"target_file": "/src/aom/av1/common/thread_common.c"
}
] | Heap-buffer-overflow WRITE 4 | aom | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/av1_dec_fuzzer_threaded < INPUT_FILE
or
/out/av1_dec_fuzzer_threaded INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags... | cpp | 8ae39302e354781ba03012d4f211da97e1715f9c | https://aomedia.googlesource.com/aom/+/32017745b0b4cb6d69ced6250dd67d9faf6282f8%5E%21/ | A vulnerability exists in the loop restoration multi-threading code where, when luma loop restoration is disabled, the initialization of cur_sb_col in lr_sync does not occur correctly. |
arvo:10486 | n132/arvo:10486-vul | /src/libssh | [
{
"end_line": 1300,
"function_name": "ssh_buffer_unpack_va",
"start_line": 1083,
"target_file": "/src/libssh/src/buffer.c"
}
] | Stack-buffer-overflow READ 8 | libssh | asan | INFO: Seed: 1418098331
INFO: Loaded 1 modules (6761 inline 8-bit counters): 6761 [0xb64588, 0xb65ff1),
INFO: Loaded 1 PC tables (6761 PCs): 6761 [0x89f0a0,0x8b9730),
/out/libssh_server_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==4310... | cpp | 5123f7955b67341e946987642354c0b123f5e1ff | https://git.libssh.org/projects/libssh.git07f7fa7806e94ccaa271c185213afed80e13a77d | An invalid memory access occurs in the function ssh_buffer_unpack() in the buffer component. |
arvo:10487 | n132/arvo:10487-vul | /src/radare2 | [
{
"end_line": 731,
"function_name": "r_bin_mdmp_init_directory",
"start_line": 708,
"target_file": "/src/radare2/libr/bin/format/mdmp/mdmp.c"
}
] | Heap-buffer-overflow READ 1 | radare2 | asan | INFO: Seed: 2320425810
INFO: Loaded 1 modules (157202 inline 8-bit counters): 157202 [0x25919d0, 0x25b7fe2),
INFO: Loaded 1 PC tables (157202 PCs): 157202 [0x25b7fe8,0x281e108),
/out/ia_fuzz: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
3
[ERROR] Size Mismatch - Stream data is larger than file size!
[ERROR] S... | cpp | ef5c59e0d443c5af25ddfc7e5c33cc6ba1e65f6b | https://github.com/radare/radare2/commit/533da1306534ece22d67eaa3c32e46b717cd9199 | null |
arvo:10604 | n132/arvo:10604-vul | /src/open62541 | [
{
"end_line": 63,
"function_name": "removeSecureChannel",
"start_line": 48,
"target_file": "/src/open62541/src/server/ua_securechannel_manager.c"
},
{
"end_line": 794,
"function_name": "UA_Server_processBinaryMessage",
"start_line": 757,
"target_file": "/src/open62541/src/server/... | Use-of-uninitialized-value | open62541 | msan | INFO: Seed: 1432192114
INFO: Loaded 1 modules (7027 inline 8-bit counters): 7027 [0xbfa488, 0xbfbffb),
INFO: Loaded 1 PC tables (7027 PCs): 7027 [0xbfc000,0xc17730),
/out/fuzz_binary_message: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==994==WARNING: MemorySanitizer: use-of-uninitialized-value
#0 0x5322... | cpp | 454b81b3ae282d93c2cbfad3530568a0ff358dd9 | https://github.com/open62541/open62541/commit/27dc05196fc43036a2efcea060ae3711b3209cf2 | null |
arvo:10628 | n132/arvo:10628-vul | /src/botan | [
{
"end_line": 79,
"function_name": "ref_oneandzero_unpad",
"start_line": 54,
"target_file": "/src/botan/src/fuzzer/mode_padding.cpp"
}
] | Heap-buffer-overflow READ 1 | botan | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/mode_padding < INPUT_FILE
or
/out/mode_padding INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /out/mode_padding [-... | cpp | 97c7a8bf1d8af210b300b4d88a488b1c4cdaaa97 | https://github.com/randombit/botan/commit/b859e175a0f2357dcfe2211ca487a7bde0e971b1 | A crash occurs in the reference version of 1and0 padding in the mode padding fuzzer when processing an all-zero input. |
arvo:1065 | n132/arvo:1065-vul | /src/file | [
{
"end_line": 515,
"function_name": "file_regexec",
"start_line": 507,
"target_file": "/src/file/src/funcs.c"
}
] | Use-of-uninitialized-value | file | msan | INFO: Seed: 1089329789
INFO: Loaded 1 modules (3771 guards): [0xa2f9a0, 0xa3348c),
/out/magic_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==10654==WARNING: MemorySanitizer: use-of-uninitialized-value
#0 0x590726 in match /src/file/src/softmagic.c:365:9
#1 0x58d2d3 in file_softmagic /src/file/src... | cpp | 9b193be08bf7ecd374cd799844032671e869a1bf | https://github.com/file/file/commit/393dafa41b26a7d8ed593912e0ec1f1e7bd4e406 | A bug in glibc/regex/msan causes regexec to return 0 but not initialize pmatch. |
arvo:10811 | n132/arvo:10811-vul | /src/wireshark | [
{
"end_line": 12041,
"function_name": "next_he_scidx",
"start_line": 11910,
"target_file": "/src/wireshark/epan/dissectors/packet-ieee80211.c"
}
] | Global-buffer-overflow READ 4 | wireshark | asan | oss-fuzzshark: disabling: ip
oss-fuzzshark: disabling: udplite
oss-fuzzshark: disabling: ospf
oss-fuzzshark: disabling: bgp
oss-fuzzshark: disabling: dhcp
oss-fuzzshark: disabling: json
oss-fuzzshark: disabling: snort
oss-fuzzshark: configured for dissector: udp in table: ip.proto
INFO: Seed: 1770710604
INFO: Loaded 1 ... | cpp | 74903893d8be058bb51268d2b5e748e3ea2d9053 | https://github.com/wireshark/wireshark/commit/ff73c307fae57fdb12e2fbbca87b9810d8b9cd27 | null |
arvo:10816 | n132/arvo:10816-vul | /src/wireshark | [
{
"end_line": 12041,
"function_name": "next_he_scidx",
"start_line": 11910,
"target_file": "/src/wireshark/epan/dissectors/packet-ieee80211.c"
}
] | Index-out-of-bounds | wireshark | ubsan | oss-fuzzshark: disabling: ip
oss-fuzzshark: disabling: udplite
oss-fuzzshark: disabling: ospf
oss-fuzzshark: disabling: bgp
oss-fuzzshark: disabling: dhcp
oss-fuzzshark: disabling: json
oss-fuzzshark: disabling: snort
oss-fuzzshark: configured for dissector: udp in table: ip.proto
INFO: Seed: 295136063
INFO: Loaded 1 m... | cpp | 74903893d8be058bb51268d2b5e748e3ea2d9053 | https://github.com/wireshark/wireshark/commit/ff73c307fae57fdb12e2fbbca87b9810d8b9cd27 | null |
arvo:10841 | n132/arvo:10841-vul | /src/librawspeed | [
{
"end_line": 54,
"function_name": "PhaseOneDecompressor::PhaseOneDecompressor",
"start_line": 38,
"target_file": "/src/librawspeed/src/librawspeed/decompressors/PhaseOneDecompressor.cpp"
}
] | Use-of-uninitialized-value | librawspeed | msan | INFO: Seed: 3104927159
INFO: Loaded 1 modules (1387 inline 8-bit counters): 1387 [0xa20870, 0xa20ddb),
INFO: Loaded 1 PC tables (1387 PCs): 1387 [0xa20de0,0xa26490),
/out/PhaseOneDecompressorFuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
Uninitialized bytes in __msan_check_mem_is_initialized at offset 0... | cpp | fb1a40c2d9585e9af75ea8a17ad78b10564991bf | https://github.com/darktable-org/rawspeed/commit/27808d5a8dc8d13c64e88c0a819f5cd29b274979 | The PhaseOneDecompressor does not validate the 'strips' vector (the rows it specifies), assuming it is always correct as in the proper IIQDecoder. This allows incorrect 'strips' to be processed, resulting in broken images. |
arvo:10850 | n132/arvo:10850-vul | /src/openvswitch | [
{
"end_line": 5551,
"function_name": "parse_odp_key_mask_attr",
"start_line": 5364,
"target_file": "/src/openvswitch/lib/odp-util.c"
}
] | Heap-buffer-overflow READ 1 | openvswitch | asan | INFO: Seed: 1676868116
INFO: Loaded 1 modules (38168 inline 8-bit counters): 38168 [0xea6f20, 0xeb0438),
INFO: Loaded 1 PC tables (38168 PCs): 38168 [0xa7a868,0xb0f9e8),
/out/odp_target: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==29017==ERR... | cpp | 7587e1daa673149575149716605ef78f260d9989 | https://github.com/openvswitch/ovs/commit/a1da3f297717c2de70dab88f7783117b78f85e89 | null |
arvo:10863 | n132/arvo:10863-vul | /src/openvswitch | [
{
"end_line": 2141,
"function_name": "parse_odp_push_nsh_action",
"start_line": 2031,
"target_file": "/src/openvswitch/lib/odp-util.c"
}
] | Use-of-uninitialized-value | openvswitch | msan | INFO: Seed: 2546583034
INFO: Loaded 1 modules (38478 inline 8-bit counters): 38478 [0x11682f8, 0x1171946),
INFO: Loaded 1 PC tables (38478 PCs): 38478 [0xda1870,0xe37d50),
/out/odp_target: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==29384==WARNING: MemorySanitizer: use-of-uninitialized-value
#0 0x72899... | cpp | c3a08624975cf42489e8e1710babccc8d0569c85 | https://github.com/openvswitch/ovs/commit/2e38f13d70a9c049497a8cab681fe7b1f443c8b1 | A vulnerability exists in odp-util within the parse_odp_push_nsh_action function, where 'struct ofpbuf b' is expected to always point to metadata so that metadata can be filled with values through ofpbuf operations such as ofpbuf_put_hex and ofpbuf_push_zeros. However, the use of ofpbuf_push_zeros may change the data p... |
arvo:10864 | n132/arvo:10864-vul | /src/wpantund | [
{
"end_line": 929,
"function_name": "NCPInstanceBase::on_mesh_prefix_was_removed",
"start_line": 888,
"target_file": "/src/wpantund/src/wpantund/NCPInstanceBase-Addresses.cpp"
}
] | Heap-use-after-free READ 4 | wpantund | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/wpantund-fuzz < INPUT_FILE
or
/out/wpantund-fuzz INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /out/wpantund-fuzz... | cpp | 8a8c7f7621dea86aa3136444561facf141e65512 | https://github.com/openthread/wpantund/commit/bd1361434619a52b296e6a94c4188aae1a693179 | A "use after delete" vulnerability exists in the on_mesh_prefix_was_removed() function. |
arvo:10865 | n132/arvo:10865-vul | /src/openvswitch | [
{
"end_line": 2141,
"function_name": "parse_odp_push_nsh_action",
"start_line": 2031,
"target_file": "/src/openvswitch/lib/odp-util.c"
}
] | Stack-buffer-overflow READ {*} | openvswitch | asan | INFO: Seed: 1915738978
INFO: Loaded 1 modules (38220 inline 8-bit counters): 38220 [0xea8240, 0xeb178c),
INFO: Loaded 1 PC tables (38220 PCs): 38220 [0xa7b928,0xb10de8),
/out/odp_target: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==29144==ERR... | cpp | 581d3bec7b8c714a98744b0b5f48dd7c7c4db037 | https://github.com/openvswitch/ovs/commit/33a3ee6b39acd9799301ec6cc0069bc9e4b4428b | A buffer overflow vulnerability exists in odp-util when parsing push_nsh, because the buffer size of 'struct ofpbuf b' is less than the size of 'char buf[512]'. This can cause memory overflow of ofpbuf when calling ofpbuf_put_hex. |
arvo:10945 | n132/arvo:10945-vul | /src/openvswitch | [
{
"end_line": 5551,
"function_name": "parse_odp_key_mask_attr",
"start_line": 5364,
"target_file": "/src/openvswitch/lib/odp-util.c"
}
] | Use-of-uninitialized-value | openvswitch | msan | INFO: Seed: 1620371529
INFO: Loaded 1 modules (38125 inline 8-bit counters): 38125 [0x1159fb8, 0x11634a5),
INFO: Loaded 1 PC tables (38125 PCs): 38125 [0xd95400,0xe2a2d0),
/out/odp_target: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==29026==WARNING: MemorySanitizer: use-of-uninitialized-value
#0 0x88b57... | cpp | 7587e1daa673149575149716605ef78f260d9989 | https://github.com/openvswitch/ovs/commit/a1da3f297717c2de70dab88f7783117b78f85e89 | null |
arvo:10999 | n132/arvo:10999-vul | /src/libgit2 | [
{
"end_line": 160,
"function_name": "tag_parse",
"start_line": 68,
"target_file": "/src/libgit2/src/tag.c"
}
] | Heap-buffer-overflow READ 2 | libgit2 | asan | INFO: Seed: 1582894454
INFO: Loaded 1 modules (27409 inline 8-bit counters): 27409 [0xe07350, 0xe0de61),
INFO: Loaded 1 PC tables (27409 PCs): 27409 [0xadbbc0,0xb46cd0),
/out/objects_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==2647==... | cpp | 4c738e563d0a52c7f06902a6bdac37fe3472b86b | https://github.com/libgit2/libgit2/commit/ee11d47e3d907b66eeff99e0ba1e1c71e05164b7 | An out of bounds read occurs when searching for the tag message during tag parsing. The code uses `strstr(buffer, "\n\n")` to locate the separator between tag fields and the tag message, but since `strstr` does not accept a buffer length, it may read past the end of the buffer. This can result in `strstr` returning a p... |
arvo:11007 | n132/arvo:11007-vul | /src/libgit2 | [
{
"end_line": 478,
"function_name": "git_commit__parse_raw",
"start_line": 386,
"target_file": "/src/libgit2/src/commit.c"
}
] | Heap-buffer-overflow READ 1 | libgit2 | asan | INFO: Seed: 1435506579
INFO: Loaded 1 modules (27478 inline 8-bit counters): 27478 [0xe0a7d0, 0xe11326),
INFO: Loaded 1 PC tables (27478 PCs): 27478 [0xadec00,0xb4a160),
/out/objects_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==2656==... | cpp | 11d33df802b00acf5ef1e437c12751b3e6a5d39b | https://github.com/libgit2/libgit2/commit/cb23c3efd22d34db279ceb39cc312473761db5ed | An out-of-bound read occurs when parsing truncated author fields in commit objects. The commit parser handles multiple author fields by checking if a line starts with "author " using `git__prefixcmp`. If given a non-NUL-terminated string that ends immediately after the space, the comparison may read one byte out of bou... |
arvo:11011 | n132/arvo:11011-vul | /src/libarchive | [
{
"end_line": 1861,
"function_name": "init_unpack",
"start_line": 1837,
"target_file": "/src/libarchive/libarchive/archive_read_support_format_rar5.c"
}
] | Heap-buffer-overflow WRITE 1 | libarchive | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/libarchive_fuzzer < INPUT_FILE
or
/out/libarchive_fuzzer INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /out/libar... | cpp | 84f7fd01b68127454fcee321086b771bdc230630 | https://github.com/libarchive/libarchive/commit/b52dd6c9e4ef7cf95c2a6ae5ab7ccac7f6d462a1 | A vulnerability exists where the mask is not set to 0 for directories, which can lead to buffer overflows due to incorrect truncation of the window. |
arvo:11078 | n132/arvo:11078-vul | /src/librawspeed | [
{
"end_line": 619,
"function_name": "VC5Decompressor::parseLargeCodeblock",
"start_line": 549,
"target_file": "/src/librawspeed/src/librawspeed/decompressors/VC5Decompressor.cpp"
}
] | Use-of-uninitialized-value | librawspeed | msan | INFO: Seed: 3246793481
INFO: Loaded 1 modules (1869 inline 8-bit counters): 1869 [0xa40e50, 0xa4159d),
INFO: Loaded 1 PC tables (1869 PCs): 1869 [0xa415a0,0xa48a70),
/out/VC5DecompressorFuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
VC5DecompressorFuzzer: /src/librawspeed/src/librawspeed/common/Optional... | cpp | 732a81d2bbe06dfe3bd4eef836d8f874fe718978 | https://github.com/darktable-org/rawspeed/commit/7473d21494834f72f984b0e2a06346bd68fb6e1c | A vulnerability exists in VC5Decompressor where Optional tags are not properly handled, leading to potential assertion failures. |
arvo:11170 | n132/arvo:11170-vul | /src/openvswitch | [
{
"end_line": 4843,
"function_name": "scan_vxlan_gbp",
"start_line": 4802,
"target_file": "/src/openvswitch/lib/odp-util.c"
}
] | Heap-buffer-overflow READ 1 | openvswitch | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/odp_target < INPUT_FILE
or
/out/odp_target INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /out/odp_target [-N]
afl... | cpp | f31b8ae7a7a777dd9dc40997903a283409674eae | https://github.com/openvswitch/ovs/commit/2d3deb58df05c4686f19ecf16ddbd76a79b2d5a5 | null |
arvo:11173 | n132/arvo:11173-vul | /src/libgit2 | [
{
"end_line": 164,
"function_name": "git__strntol64",
"start_line": 71,
"target_file": "/src/libgit2/src/util.c"
}
] | Heap-buffer-overflow READ 1 | libgit2 | asan | Reading 58 bytes from /tmp/poc
======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/objects_fuzzer < INPUT_FILE
or
/out/objects_fuzzer INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fu... | cpp | b5ae83bfac53fa3a17435ebf2fc3b79db8055dae | https://github.com/libgit2/libgit2/commit/41863a00f0d811c659c9ba87ae2cc0c3aae5a77f | The git__strntol family of functions accepts and skips leading spaces, but does not honor the provided buffer's length when doing so. This can lead to out-of-bounds reads if the input is not a simple NUL-terminated string. Additionally, when leading space is trimmed, the function advances the pointer without updating t... |
arvo:11196 | n132/arvo:11196-vul | /src/libarchive | [
{
"end_line": 2764,
"function_name": "merge_block",
"start_line": 2673,
"target_file": "/src/libarchive/libarchive/archive_read_support_format_rar5.c"
}
] | Heap-buffer-overflow READ 1 | libarchive | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/libarchive_fuzzer < INPUT_FILE
or
/out/libarchive_fuzzer INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /out/libar... | cpp | c3d742c9836f352af573d485aca9d312ed1320d5 | https://github.com/libarchive/libarchive/commit/4bc5892128a042780f167ac35aa72f63c426f3b7 | null |
arvo:11253 | n132/arvo:11253-vul | /src/openvswitch | [
{
"end_line": 480,
"function_name": "ofpbuf_insert",
"start_line": 468,
"target_file": "/src/openvswitch/lib/ofpbuf.c"
}
] | Heap-buffer-overflow WRITE {*} | openvswitch | asan | Reading 32 bytes from /tmp/poc
======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/ofctl_parse_target < INPUT_FILE
or
/out/ofctl_parse_target INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
... | cpp | b48aa1437df1d438d39d7c798ef93e0854911022 | https://github.com/openvswitch/ovs/commit/39976b99178eaa4862c43eaf00959f2653a01a6f | An arithmetic error in the ofpbuf_insert() function in ofpbuf causes the memmove byte count to be calculated incorrectly, because ofpbuf_put_uninit increases b->size by n. This results in an incorrect number of bytes being moved during buffer operations. |
arvo:11263 | n132/arvo:11263-vul | /src/harfbuzz | [
{
"end_line": 102,
"function_name": "test_face",
"start_line": 35,
"target_file": "/src/harfbuzz/test/api/test-ot-face.c"
}
] | Heap-buffer-overflow READ {*} | harfbuzz | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/hb-shape-fuzzer < INPUT_FILE
or
/out/hb-shape-fuzzer INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /out/hb-shape-... | cpp | 252632c477b963f305116d69fcafacd8bf7b97bf | https://github.com/harfbuzz/harfbuzz/commit/6482fda519ca7d173e3bcb3717aa30e237f04b25 | null |
arvo:11300 | n132/arvo:11300-vul | /src/yara | [
{
"end_line": 1359,
"function_name": "dotnet_parse_tilde_2",
"start_line": 342,
"target_file": "/src/yara/libyara/modules/dotnet.c"
}
] | UNKNOWN READ | yara | msan | INFO: Seed: 2199298579
INFO: Loaded 1 modules (7698 inline 8-bit counters): 7698 [0xb2ac48, 0xb2ca5a),
INFO: Loaded 1 PC tables (7698 PCs): 7698 [0x89c9a0,0x8baac0),
/out/dotnet_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
MemorySanitizer:DEADLYSIGNAL
==37394==ERROR: MemorySanitizer: SEGV on unknown a... | cpp | ab99479c96ba9759193b3b1f42089e5fe1b647f6 | https://github.com/VirusTotal/yara/commit/72c109ea85f1434237a292de3478f53554989453 | null |
arvo:11359 | n132/arvo:11359-vul | /src/radare2 | [
{
"end_line": 252,
"function_name": "r_core_task_decref",
"start_line": 240,
"target_file": "/src/radare2/libr/core/task.c"
}
] | Heap-use-after-free READ 8 | radare2 | asan | INFO: Seed: 1412606771
INFO: Loaded 1 modules (150204 inline 8-bit counters): 150204 [0x2424da8, 0x2449864),
INFO: Loaded 1 PC tables (150204 PCs): 150204 [0x2449868,0x2694428),
/out/ia_fuzz: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
Cannot allocate (0) 0 bytes
cannot open file malloc://0
No file to load b... | cpp | 8bc369ef3f67c3e074cccfe383922393fa11c89a | https://github.com/radare/radare2/commit/5783cf42c40aaed9b9180ae7069c7a60ea86dc45 | null |
arvo:11376 | n132/arvo:11376-vul | /src/openthread | [
{
"end_line": 1597,
"function_name": "MeshForwarder::GetFramePriority",
"start_line": 1560,
"target_file": "/src/openthread/src/core/thread/mesh_forwarder.cpp"
}
] | Heap-buffer-overflow READ 8 | openthread | asan | Reading 13 bytes from /tmp/poc
======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/radio-receive-done-fuzzer < INPUT_FILE
or
/out/radio-receive-done-fuzzer INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz ... | cpp | 33b0ee93308345316ca7a8a1ddc8aa86ba42983e | https://github.com/openthread/openthread/commit/bf72fd8f8d4a898c019f279c8605e66fc0b42878 | null |
arvo:11382 | n132/arvo:11382-vul | /src/libgit2 | [
{
"end_line": 181,
"function_name": "git__strntol64",
"start_line": 71,
"target_file": "/src/libgit2/src/util.c"
}
] | Heap-buffer-overflow READ 1 | libgit2 | asan | INFO: Seed: 1749770194
INFO: Loaded 1 modules (27472 inline 8-bit counters): 27472 [0xe0a4e8, 0xe11038),
INFO: Loaded 1 PC tables (27472 PCs): 27472 [0xade8a0,0xb49da0),
/out/objects_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==2657==... | cpp | fd4e3b216c0881b5825c013a55b487ac2e8b8ab0 | https://github.com/libgit2/libgit2/commit/4209a5125802e714a6342a74ff0835c5c4a2397d | The strntol function inappropriately handles parsing numbers with a leading plus or minus sign, resulting in potential out-of-bounds reads. When a leading sign is present, the function advances the pointer but fails to update the number of remaining bytes in the string, which can cause the parser to read beyond the buf... |
arvo:11429 | n132/arvo:11429-vul | /src/librawspeed | [
{
"end_line": 558,
"function_name": "VC5Decompressor::Wavelet::HighPassBand::decode",
"start_line": 531,
"target_file": "/src/librawspeed/src/librawspeed/decompressors/VC5Decompressor.cpp"
}
] | Heap-buffer-overflow WRITE 2 | librawspeed | asan | INFO: Seed: 2623466991
INFO: Loaded 1 modules (1999 inline 8-bit counters): 1999 [0x941870, 0x94203f),
INFO: Loaded 1 PC tables (1999 PCs): 1999 [0x942040,0x949d30),
/out/VC5DecompressorFuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==671... | cpp | 021ce54ea210896d1f3de1d2c604c3472769ddf7 | https://github.com/darktable-org/rawspeed/commit/0bcf3488a4989c2724f0c4383401b0d0dcfc3dcc | An off-by-one error exists in the output buffer check within the HighPassBand::decode() function of VC5Decompressor. |
arvo:11444 | n132/arvo:11444-vul | /src/imagemagick | [
{
"end_line": 312,
"function_name": "GetNextToken",
"start_line": 167,
"target_file": "/src/imagemagick/MagickCore/token.c"
}
] | Use-of-uninitialized-value | imagemagick | msan | INFO: Seed: 1852361830
INFO: Loaded 1 modules (166115 inline 8-bit counters): 166115 [0x2be2b48, 0x2c0b42b),
INFO: Loaded 1 PC tables (166115 PCs): 166115 [0x2c0b430,0x2e94260),
/out/encoder_mvg_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==159048==WARNING: MemorySanitizer: use-of-uninitialized-value... | cpp | c7cdd6602365ce55a408e2d793c92a8a9e0027c0 | https://github.com/imagemagick/imagemagick/commit/537c2ca0244889634ced3c3e0724431862d3ced5 | null |
arvo:11484 | n132/arvo:11484-vul | /src/open62541 | [
{
"end_line": 415,
"function_name": "Variant_clear",
"start_line": 403,
"target_file": "/src/open62541/src/ua_types.c"
}
] | Heap-use-after-free READ 4 | open62541 | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/fuzz_binary_decode < INPUT_FILE
or
/out/fuzz_binary_decode INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /out/fuz... | cpp | 94d61b6c13b975d711fe9027a6dd6eedbb4b6503 | https://github.com/open62541/open62541/commit/f4f8cdc4c344ad75051f3785a53a956a644cba05 | null |
arvo:11517 | n132/arvo:11517-vul | /src/aom | [
{
"end_line": 1478,
"function_name": "highbd_dr_prediction_z1_64xN_avx2",
"start_line": 1380,
"target_file": "/src/aom/aom_dsp/x86/intrapred_avx2.c"
}
] | Stack-buffer-overflow READ 16 | aom | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/av1_dec_fuzzer < INPUT_FILE
or
/out/av1_dec_fuzzer INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /out/av1_dec_fuz... | cpp | f48b0d22e2c1391351cb4ba75d033db1df9ad7ce | https://aomedia.googlesource.com/aom/+/fe996504f76f4204074c1f8f681925852c61b777%5E%21/ | null |
arvo:11523 | n132/arvo:11523-vul | /src/aom | [
{
"end_line": 4760,
"function_name": "show_existing_frame_reset",
"start_line": 4714,
"target_file": "/src/aom/av1/decoder/decodeframe.c"
}
] | Heap-buffer-overflow READ {*} | aom | asan | INFO: Seed: 2794871271
INFO: Loaded 1 modules (28001 inline 8-bit counters): 28001 [0x103b3a8, 0x1042109),
INFO: Loaded 1 PC tables (28001 PCs): 28001 [0x1042110,0x10af720),
/out/av1_dec_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==37... | cpp | 352c10bb5b6466e21c657c2ef5de53d793e26724 | https://aomedia.googlesource.com/aom/+/0ad5c625be27d7a3622dae95e9afe5e66b112d46%5E%21/ | A vulnerability exists where the frame context is not set up using next_ref_frame_map, potentially leading to incorrect reference frame handling. |
arvo:11752 | n132/arvo:11752-vul | /src/yara | [
{
"end_line": 522,
"function_name": "yr_re_ast_split_at_chaining_point",
"start_line": 456,
"target_file": "/src/yara/libyara/re.c"
}
] | Heap-use-after-free READ 4 | yara | asan | INFO: Seed: 1032320226
INFO: Loaded 1 modules (7656 inline 8-bit counters): 7656 [0x9e1b88, 0x9e3970),
INFO: Loaded 1 PC tables (7656 PCs): 7656 [0x7444a0,0x762320),
/out/rules_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==37430==ERROR... | cpp | 459d5a2bae0f4c9a2921be0d21fe920258cb5d6d | https://github.com/VirusTotal/yara/commit/8eeed3ef5e2bbd5b927bf1b72879c1fa9ab979cb | null |
arvo:11753 | n132/arvo:11753-vul | /src/yara | [
{
"end_line": 522,
"function_name": "yr_re_ast_split_at_chaining_point",
"start_line": 456,
"target_file": "/src/yara/libyara/re.c"
}
] | Heap-use-after-free READ 4 | yara | asan | INFO: Seed: 3471148202
INFO: Loaded 1 modules (7656 inline 8-bit counters): 7656 [0x9e1b88, 0x9e3970),
INFO: Loaded 1 PC tables (7656 PCs): 7656 [0x7444a0,0x762320),
/out/rules_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==37385==ERROR... | cpp | 459d5a2bae0f4c9a2921be0d21fe920258cb5d6d | https://github.com/VirusTotal/yara/commit/8eeed3ef5e2bbd5b927bf1b72879c1fa9ab979cb | null |
End of preview. Expand in Data Studio
README.md exists but content is empty.
- Downloads last month
- 9