idx
int64
0
522k
project
stringclasses
631 values
commit_id
stringlengths
7
40
project_url
stringclasses
630 values
commit_url
stringlengths
4
164
commit_message
stringlengths
0
11.5k
target
int64
0
1
func
stringlengths
5
484k
func_hash
float64
1,559,120,642,045,605,000,000,000B
340,279,892,905,069,500,000,000,000,000B
file_name
stringlengths
4
45
file_hash
float64
25,942,829,220,065,710,000,000,000B
340,272,304,251,680,200,000,000,000,000B
cwe
listlengths
0
1
cve
stringlengths
4
16
cve_desc
stringlengths
0
2.3k
nvd_url
stringlengths
37
49
520,816
jsish
430ea27accd4d4ffddc946c9402e7c9064835a18
https://github.com/pcmacdon/jsish
https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18
Release "3.0.7": Fix toPrecision bug "stack overflow #4". FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de
0
Jsi_RC Jsi_FSUnregister(Jsi_Filesystem *fsPtr) { FSList *fsl = jsiFSList, *flast = NULL; while (fsl) { if (fsl->fsPtr == fsPtr) { if (flast) flast->next = fsl->next; else jsiFSList = fsl->next; Jsi_Free(fsl); break; ...
80,723,876,479,438,970,000,000,000,000,000,000,000
None
null
[ "CWE-120" ]
CVE-2020-22873
Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2020-22873
520,817
jsish
430ea27accd4d4ffddc946c9402e7c9064835a18
https://github.com/pcmacdon/jsish
https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18
Release "3.0.7": Fix toPrecision bug "stack overflow #4". FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de
0
static Jsi_RC jsi_ValueToBitset(Jsi_Interp *interp, Jsi_OptionSpec* spec, Jsi_Value *inValue, const char *inStr, void *record, Jsi_Wide flags) { // TODO: change this to not use byte instead of int... int i, argc, n; char *s =(((char*)record) + spec->offset); char **argv; const char *cp, **list = (co...
195,635,772,770,759,900,000,000,000,000,000,000,000
None
null
[ "CWE-120" ]
CVE-2020-22873
Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2020-22873
520,818
jsish
430ea27accd4d4ffddc946c9402e7c9064835a18
https://github.com/pcmacdon/jsish
https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18
Release "3.0.7": Fix toPrecision bug "stack overflow #4". FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de
0
static Jsi_RC SqliteConstructor(Jsi_Interp *interp, Jsi_Value *args, Jsi_Value *_this, Jsi_Value **ret, Jsi_Func *funcPtr) { Jsi_RC rc = JSI_ERROR; /* void *cd = clientData; */ int flags; char *zErrMsg; const char *zFile = NULL, *vfs = 0; /* In normal use, each JSI ...
328,822,905,687,274,100,000,000,000,000,000,000,000
None
null
[ "CWE-120" ]
CVE-2020-22873
Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2020-22873
520,819
jsish
430ea27accd4d4ffddc946c9402e7c9064835a18
https://github.com/pcmacdon/jsish
https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18
Release "3.0.7": Fix toPrecision bug "stack overflow #4". FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de
0
int Jsi_Scandir(Jsi_Interp *interp, Jsi_Value* path, Jsi_Dirent ***namelist, int (*filter)(const Jsi_Dirent *), int (*compar)(const Jsi_Dirent **, const Jsi_Dirent**)) { void *data; Jsi_Filesystem *fsPtr = Jsi_FilesystemForPath(interp, path, &data); if (fsPtr == NULL || !fsPtr->scandirProc) return -1; ...
98,927,031,629,546,230,000,000,000,000,000,000,000
None
null
[ "CWE-120" ]
CVE-2020-22873
Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2020-22873
520,820
jsish
430ea27accd4d4ffddc946c9402e7c9064835a18
https://github.com/pcmacdon/jsish
https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18
Release "3.0.7": Fix toPrecision bug "stack overflow #4". FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de
0
char* Jsi_NormalPath(Jsi_Interp *interp, const char *path, Jsi_DString *dStr) { char prefix[3] = ""; char cdbuf[PATH_MAX]; Jsi_DSInit(dStr); if (!path || !path[0]) return NULL; if (*path == '/') Jsi_DSAppend(dStr, path, NULL); #ifdef __WIN32 /* TODO: add proper handling for windows paths. *...
4,524,698,911,385,806,500,000,000,000,000,000,000
None
null
[ "CWE-120" ]
CVE-2020-22873
Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2020-22873
520,821
jsish
430ea27accd4d4ffddc946c9402e7c9064835a18
https://github.com/pcmacdon/jsish
https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18
Release "3.0.7": Fix toPrecision bug "stack overflow #4". FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de
0
void Jsi_TreeSearchDone(Jsi_TreeSearch *searchPtr) { if (searchPtr->Ptrs != searchPtr->staticPtrs) Jsi_Free(searchPtr->Ptrs); searchPtr->Ptrs = searchPtr->staticPtrs; searchPtr->top = 0; }
152,258,907,704,951,750,000,000,000,000,000,000,000
None
null
[ "CWE-120" ]
CVE-2020-22873
Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2020-22873
520,822
jsish
430ea27accd4d4ffddc946c9402e7c9064835a18
https://github.com/pcmacdon/jsish
https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18
Release "3.0.7": Fix toPrecision bug "stack overflow #4". FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de
0
bool Jsi_NumberIsNormal(Jsi_Number a) { return (fpclassify(a) == FP_ZERO || isnormal(a)); }
185,520,048,852,753,400,000,000,000,000,000,000,000
None
null
[ "CWE-120" ]
CVE-2020-22873
Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2020-22873
520,823
jsish
430ea27accd4d4ffddc946c9402e7c9064835a18
https://github.com/pcmacdon/jsish
https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18
Release "3.0.7": Fix toPrecision bug "stack overflow #4". FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de
0
static Jsi_RC jsi_AliasFree(Jsi_Interp *interp, Jsi_HashEntry *hPtr, void *data) { /* TODO: deal with other copies of func may be floating around (refCount). */ AliasCmd *ac = (AliasCmd *)data; if (!ac) return JSI_ERROR; SIGASSERT(ac,ALIASCMD); if (ac->func) Jsi_DecrRefCount(ac->dinterp, ac-...
218,799,581,343,029,660,000,000,000,000,000,000,000
None
null
[ "CWE-120" ]
CVE-2020-22873
Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2020-22873
520,824
jsish
430ea27accd4d4ffddc946c9402e7c9064835a18
https://github.com/pcmacdon/jsish
https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18
Release "3.0.7": Fix toPrecision bug "stack overflow #4". FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de
0
const char* jsi_opcode_string(uint opCode) { if (opCode >= (sizeof(jsi_op_names)/sizeof(jsi_op_names[0]))) return "NULL"; return jsi_op_names[opCode]; }
270,775,758,774,835,640,000,000,000,000,000,000,000
None
null
[ "CWE-120" ]
CVE-2020-22873
Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2020-22873
520,825
jsish
430ea27accd4d4ffddc946c9402e7c9064835a18
https://github.com/pcmacdon/jsish
https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18
Release "3.0.7": Fix toPrecision bug "stack overflow #4". FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de
0
int Jsi_Access(Jsi_Interp *interp, Jsi_Value* path, int mode) { void *data; Jsi_Filesystem *fsPtr = Jsi_FilesystemForPath(interp, path, &data); if (fsPtr == NULL || !fsPtr->accessProc) return -1; if (interp->isSafe && fsPtr && fsPtr == &jsiFilesystem) { int aflag = (mode&W_OK ? JSI_INTACCESS_WRI...
186,867,692,718,159,160,000,000,000,000,000,000,000
None
null
[ "CWE-120" ]
CVE-2020-22873
Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2020-22873
520,826
jsish
430ea27accd4d4ffddc946c9402e7c9064835a18
https://github.com/pcmacdon/jsish
https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18
Release "3.0.7": Fix toPrecision bug "stack overflow #4". FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de
0
static Jsi_OpCodes *code_jfalse(int off) { JSI_NEW_CODES(0,OP_JFALSE, off); }
219,065,136,698,585,260,000,000,000,000,000,000,000
None
null
[ "CWE-120" ]
CVE-2020-22873
Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2020-22873
520,827
jsish
430ea27accd4d4ffddc946c9402e7c9064835a18
https://github.com/pcmacdon/jsish
https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18
Release "3.0.7": Fix toPrecision bug "stack overflow #4". FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de
0
static Jsi_OpCodes *code_ret(jsi_Pstate *p, jsi_Pline *line, int n) { JSI_NEW_CODESLN(0,OP_RET, n); }
66,046,521,816,693,670,000,000,000,000,000,000,000
None
null
[ "CWE-120" ]
CVE-2020-22873
Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2020-22873
520,828
jsish
430ea27accd4d4ffddc946c9402e7c9064835a18
https://github.com/pcmacdon/jsish
https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18
Release "3.0.7": Fix toPrecision bug "stack overflow #4". FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de
0
char *Jsi_ValueArrayIndexToStr(Jsi_Interp *interp, Jsi_Value *args, int index, int *lenPtr) { Jsi_Value *arg = Jsi_ValueArrayIndex(interp, args, index); if (!arg) return NULL; char *res = Jsi_ValueString(interp, arg, lenPtr); if (res) return res; res = (char*)Jsi_ValueToString(interp...
218,128,720,555,327,700,000,000,000,000,000,000,000
None
null
[ "CWE-120" ]
CVE-2020-22873
Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2020-22873
520,829
jsish
430ea27accd4d4ffddc946c9402e7c9064835a18
https://github.com/pcmacdon/jsish
https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18
Release "3.0.7": Fix toPrecision bug "stack overflow #4". FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de
0
Jsi_Db* Jsi_DbNew(const char *zFile, int inFlags /* JSI_DBI_* */) { if (!jsi_dbVfsPtr) { printf( "Sqlite unsupported\n"); return NULL; } return jsi_dbVfsPtr->dbNew(zFile, inFlags); }
710,917,260,666,666,500,000,000,000,000,000,000
None
null
[ "CWE-120" ]
CVE-2020-22873
Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2020-22873
520,830
jsish
430ea27accd4d4ffddc946c9402e7c9064835a18
https://github.com/pcmacdon/jsish
https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18
Release "3.0.7": Fix toPrecision bug "stack overflow #4". FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de
0
static Jsi_RC jsiInterpDelete(Jsi_Interp* interp, void *unused) { SIGASSERT(interp,INTERP); bool isMainInt = (interp == jsiIntData.mainInterp); int mainFlag = (isMainInt ? 2 : 1); if (isMainInt) DeleteAllInterps(); if (interp->opts.initProc) (*interp->opts.initProc)(interp, mainFlag)...
86,529,672,574,519,680,000,000,000,000,000,000,000
None
null
[ "CWE-120" ]
CVE-2020-22873
Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2020-22873
520,831
jsish
430ea27accd4d4ffddc946c9402e7c9064835a18
https://github.com/pcmacdon/jsish
https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18
Release "3.0.7": Fix toPrecision bug "stack overflow #4". FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de
0
static Jsi_RC SqliteBackupCmd(Jsi_Interp *interp, Jsi_Value *args, Jsi_Value *_this, Jsi_Value **ret, Jsi_Func *funcPtr) { Jsi_Db *jdb; Jsi_RC rv = JSI_OK; int rc; const char *zDestFile; const char *zSrcDb; sqlite3 *pDest; sqlite3_backup *pBackup; if (!(jdb = ...
45,298,365,520,330,980,000,000,000,000,000,000,000
None
null
[ "CWE-120" ]
CVE-2020-22873
Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2020-22873
520,832
jsish
430ea27accd4d4ffddc946c9402e7c9064835a18
https://github.com/pcmacdon/jsish
https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18
Release "3.0.7": Fix toPrecision bug "stack overflow #4". FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de
0
static Jsi_RC jsi_wsFileRead(Jsi_Interp *interp, Jsi_Value *name, Jsi_DString *dStr, jsi_wsCmdObj *cmdPtr, jsi_wsPss *pss) { Jsi_StatBuf sb; Jsi_RC rc = JSI_ERROR; int n = Jsi_Stat(interp, name, &sb); if (!n && sb.st_size>0) { char fdir[PATH_MAX]; const char* cr = cmdPtr->curRoot, *fpath...
134,515,354,387,194,060,000,000,000,000,000,000,000
None
null
[ "CWE-120" ]
CVE-2020-22873
Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2020-22873
520,833
jsish
430ea27accd4d4ffddc946c9402e7c9064835a18
https://github.com/pcmacdon/jsish
https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18
Release "3.0.7": Fix toPrecision bug "stack overflow #4". FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de
0
static Jsi_OpCodes *code_not() { JSI_NEW_CODES(0,OP_NOT, 0); }
153,728,191,345,898,490,000,000,000,000,000,000,000
None
null
[ "CWE-120" ]
CVE-2020-22873
Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2020-22873
520,834
jsish
430ea27accd4d4ffddc946c9402e7c9064835a18
https://github.com/pcmacdon/jsish
https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18
Release "3.0.7": Fix toPrecision bug "stack overflow #4". FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de
0
Jsi_Value* Jsi_ValueMakeBlob(Jsi_Interp *interp, Jsi_Value **vPtr, unsigned char *s, int len) { Jsi_Value *v = (vPtr?*vPtr:NULL); if (!v) v = Jsi_ValueNew(interp); else Jsi_ValueReset(interp, vPtr); Jsi_Obj *obj = Jsi_ObjNewType(interp, JSI_OT_STRING); Jsi_ValueMakeObject(interp, &v,...
51,532,919,170,752,640,000,000,000,000,000,000,000
None
null
[ "CWE-120" ]
CVE-2020-22873
Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2020-22873
520,835
jsish
430ea27accd4d4ffddc946c9402e7c9064835a18
https://github.com/pcmacdon/jsish
https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18
Release "3.0.7": Fix toPrecision bug "stack overflow #4". FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de
0
static void dbOutputQuotedString(Jsi_DString *dStr, const char *z) { int i; int nSingle = 0; for(i=0; z[i]; i++) { if( z[i]=='\'' ) nSingle++; } if( nSingle==0 ) { Jsi_DSAppend(dStr,"'", z, "'", NULL); } else { Jsi_DSAppend(dStr,"'", NULL); while( *z ) { ...
242,145,618,564,523,600,000,000,000,000,000,000,000
None
null
[ "CWE-120" ]
CVE-2020-22873
Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2020-22873
520,836
jsish
430ea27accd4d4ffddc946c9402e7c9064835a18
https://github.com/pcmacdon/jsish
https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18
Release "3.0.7": Fix toPrecision bug "stack overflow #4". FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de
0
static Jsi_TreeEntry* maximum_node(Jsi_TreeEntry* n) { Assert (n != NULL); while (n->right != NULL) { n = n->right; } return n; }
102,096,612,285,266,430,000,000,000,000,000,000,000
None
null
[ "CWE-120" ]
CVE-2020-22873
Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2020-22873
520,837
jsish
430ea27accd4d4ffddc946c9402e7c9064835a18
https://github.com/pcmacdon/jsish
https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18
Release "3.0.7": Fix toPrecision bug "stack overflow #4". FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de
0
static Jsi_RC jsi_AliasCreateCmd(Jsi_Interp* interp, const char* key, AliasCmd* ac) { if (Jsi_InterpGone(interp)) return JSI_ERROR; key = Jsi_KeyAdd(interp, key); Jsi_Value *cmd = jsi_CommandCreate(interp, key, jsi_AliasInvoke, NULL, 0, 0); if (!cmd) return Jsi_LogBug("command create fai...
318,525,960,491,245,800,000,000,000,000,000,000,000
None
null
[ "CWE-120" ]
CVE-2020-22873
Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2020-22873
520,838
jsish
430ea27accd4d4ffddc946c9402e7c9064835a18
https://github.com/pcmacdon/jsish
https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18
Release "3.0.7": Fix toPrecision bug "stack overflow #4". FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de
0
int Jsi_Rename(Jsi_Interp *interp, Jsi_Value *src, Jsi_Value *dst) { void *data; Jsi_Filesystem *fsPtr = Jsi_FilesystemForPath(interp, src, &data); if (fsPtr != Jsi_FilesystemForPath(interp, src, &data)) return -1; if (fsPtr == NULL || !fsPtr->renameProc) return -1; return fsPtr->renameProc(interp, ...
209,467,734,178,921,730,000,000,000,000,000,000,000
None
null
[ "CWE-120" ]
CVE-2020-22873
Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2020-22873
520,839
jsish
430ea27accd4d4ffddc946c9402e7c9064835a18
https://github.com/pcmacdon/jsish
https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18
Release "3.0.7": Fix toPrecision bug "stack overflow #4". FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de
0
static Jsi_Value* dbGetValueGet(Jsi_Interp *interp, sqlite3_value *pIn) { Jsi_Value *v = Jsi_ValueNew(interp); switch (sqlite3_value_type(pIn)) { case SQLITE_BLOB: { int bytes; bytes = sqlite3_value_bytes(pIn); const char *zBlob = (char*) sqlite3_value_blob(pIn); if(!zBlob ) ...
215,067,176,074,266,000,000,000,000,000,000,000,000
None
null
[ "CWE-120" ]
CVE-2020-22873
Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2020-22873
520,840
jsish
430ea27accd4d4ffddc946c9402e7c9064835a18
https://github.com/pcmacdon/jsish
https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18
Release "3.0.7": Fix toPrecision bug "stack overflow #4". FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de
0
static Jsi_RC SqliteRestoreCmd(Jsi_Interp *interp, Jsi_Value *args, Jsi_Value *_this, Jsi_Value **ret, Jsi_Func *funcPtr) { Jsi_Db *jdb; const char *zSrcFile; const char *zDestDb; sqlite3 *pSrc; sqlite3_backup *pBackup; int nTimeout = 0; int rc; if (!(jdb = d...
64,242,374,379,968,130,000,000,000,000,000,000,000
None
null
[ "CWE-120" ]
CVE-2020-22873
Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2020-22873
520,841
jsish
430ea27accd4d4ffddc946c9402e7c9064835a18
https://github.com/pcmacdon/jsish
https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18
Release "3.0.7": Fix toPrecision bug "stack overflow #4". FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de
0
Jsi_HashEntryNew(Jsi_Hash *tablePtr, const void *key, bool *newPtr) { if (tablePtr->opts.lockHashProc && (*tablePtr->opts.lockHashProc)(tablePtr, 1) != JSI_OK) return NULL; Jsi_HashEntry *hPtr = (*((tablePtr)->createProc))(tablePtr, key, newPtr); #ifdef JSI_HAS_SIG_HASHENTRY SIGINIT(hPtr, HASHENTRY...
224,846,975,247,741,500,000,000,000,000,000,000,000
None
null
[ "CWE-120" ]
CVE-2020-22873
Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2020-22873
520,842
jsish
430ea27accd4d4ffddc946c9402e7c9064835a18
https://github.com/pcmacdon/jsish
https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18
Release "3.0.7": Fix toPrecision bug "stack overflow #4". FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de
0
Jsi_RC Jsi_ValueInsert(Jsi_Interp *interp, Jsi_Value *target, const char *key, Jsi_Value *val, int flags) { if (target == NULL) target = interp->csc; if (target->vt != JSI_VT_OBJECT) { if (interp->strict) Jsi_LogWarn("Target is not object"); return JSI_ERROR; } target...
330,836,422,110,134,700,000,000,000,000,000,000,000
None
null
[ "CWE-120" ]
CVE-2020-22873
Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2020-22873
520,843
jsish
430ea27accd4d4ffddc946c9402e7c9064835a18
https://github.com/pcmacdon/jsish
https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18
Release "3.0.7": Fix toPrecision bug "stack overflow #4". FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de
0
Jsi_Value* jsi_ValueMakeBlobDup(Jsi_Interp *interp, Jsi_Value **ret, unsigned char *s, int len) { if (len<0) len = Jsi_Strlen((char*)s); uchar *dp = (uchar*)Jsi_Malloc(len+1); memcpy(dp, s, len); dp[len] = 0; return Jsi_ValueMakeBlob(interp, ret, dp, len); }
71,343,373,577,338,490,000,000,000,000,000,000,000
None
null
[ "CWE-120" ]
CVE-2020-22873
Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2020-22873
520,844
jsish
430ea27accd4d4ffddc946c9402e7c9064835a18
https://github.com/pcmacdon/jsish
https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18
Release "3.0.7": Fix toPrecision bug "stack overflow #4". FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de
0
static void dbEvalRowInfo( DbEvalContext *p, /* Evaluation context */ int *pnCol, /* OUT: Number of column names */ char ***papColName, /* OUT: Array of column names */ int **papColType ) { /* Compute column names */ // Jsi_Interp *interp = p->jdb->int...
73,264,534,785,316,380,000,000,000,000,000,000,000
None
null
[ "CWE-120" ]
CVE-2020-22873
Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2020-22873
520,845
jsish
430ea27accd4d4ffddc946c9402e7c9064835a18
https://github.com/pcmacdon/jsish
https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18
Release "3.0.7": Fix toPrecision bug "stack overflow #4". FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de
0
static Jsi_OpCodes *code_scatch(jsi_Pstate *p, jsi_Pline *line, const char *var) { JSI_NEW_CODESLN(0,OP_SCATCH, var); }
124,937,028,650,948,280,000,000,000,000,000,000
None
null
[ "CWE-120" ]
CVE-2020-22873
Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2020-22873
520,846
jsish
430ea27accd4d4ffddc946c9402e7c9064835a18
https://github.com/pcmacdon/jsish
https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18
Release "3.0.7": Fix toPrecision bug "stack overflow #4". FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de
0
void Jsi_RegExpFree(Jsi_Regex* re) { regfree(&re->reg); _JSI_MEMCLEAR(re); Jsi_Free(re); }
124,637,505,591,240,360,000,000,000,000,000,000,000
None
null
[ "CWE-120" ]
CVE-2020-22873
Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2020-22873
520,847
jsish
430ea27accd4d4ffddc946c9402e7c9064835a18
https://github.com/pcmacdon/jsish
https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18
Release "3.0.7": Fix toPrecision bug "stack overflow #4". FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de
0
static Jsi_OpCodes *code_eval(jsi_Pstate *p, jsi_Pline *line, int argc, Jsi_OpCodes *c) { jsi_FreeOpcodes(c); // Eliminate leak of unused opcodes. JSI_NEW_CODESLN(0,OP_EVAL, argc); }
151,237,612,472,150,300,000,000,000,000,000,000,000
None
null
[ "CWE-120" ]
CVE-2020-22873
Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2020-22873
520,848
jsish
430ea27accd4d4ffddc946c9402e7c9064835a18
https://github.com/pcmacdon/jsish
https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18
Release "3.0.7": Fix toPrecision bug "stack overflow #4". FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de
0
int Jsi_DecrRefCount(Jsi_Interp* interp, Jsi_Value *v) { SIGASSERT(v,VALUE); if (v->refCnt<=0) { #ifdef JSI_MEM_DEBUG fprintf(stderr, "Value decr with ref %d: VD.Idx=%d\n", v->refCnt, v->VD.Idx); #endif return -2; } int ref; jsi_DebugValue(v,"Decr", jsi_DebugValueCallIdx(), interp); ...
254,347,709,165,450,930,000,000,000,000,000,000,000
None
null
[ "CWE-120" ]
CVE-2020-22873
Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2020-22873
520,849
jsish
430ea27accd4d4ffddc946c9402e7c9064835a18
https://github.com/pcmacdon/jsish
https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18
Release "3.0.7": Fix toPrecision bug "stack overflow #4". FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de
0
static void NormalizeUnixPath(Jsi_Interp *interp, char *path) { char **argv; int argc, i; if (!Jsi_Strstr(path, "./")) return; Jsi_DString dStr = {}, eStr = {}; if (path[0] != '/' && Jsi_Strstr(path, "..")) { char *npath = Jsi_GetCwd(interp, &eStr); if (npath && Jsi_Strcmp(npath,"/")) { ...
146,308,528,084,068,800,000,000,000,000,000,000,000
None
null
[ "CWE-120" ]
CVE-2020-22873
Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2020-22873
520,850
jsish
430ea27accd4d4ffddc946c9402e7c9064835a18
https://github.com/pcmacdon/jsish
https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18
Release "3.0.7": Fix toPrecision bug "stack overflow #4". FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de
0
void dbTypeNameHashInit(Jsi_Db *jdb) { Jsi_Interp *interp = jdb->interp; Jsi_Hash *hPtr = jdb->typeNameHash = Jsi_HashNew(interp, JSI_KEYS_STRING, NULL); Jsi_HashSet(hPtr, (void*)"blob", (void*)JSI_OPTION_STRBUF); Jsi_HashSet(hPtr, (void*)"string", (void*)JSI_OPTION_STRING); Jsi_HashSet(hPtr, (void*...
168,891,833,501,740,860,000,000,000,000,000,000,000
None
null
[ "CWE-120" ]
CVE-2020-22873
Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2020-22873
520,851
jsish
430ea27accd4d4ffddc946c9402e7c9064835a18
https://github.com/pcmacdon/jsish
https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18
Release "3.0.7": Fix toPrecision bug "stack overflow #4". FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de
0
static int jsi_FSWriteProc(Jsi_Channel chan, const char *buf, int size) { return fwrite(buf, 1, size, _JSI_GETFP(chan,0)); }
37,911,761,756,014,330,000,000,000,000,000,000,000
None
null
[ "CWE-120" ]
CVE-2020-22873
Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2020-22873
520,852
jsish
430ea27accd4d4ffddc946c9402e7c9064835a18
https://github.com/pcmacdon/jsish
https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18
Release "3.0.7": Fix toPrecision bug "stack overflow #4". FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de
0
static Jsi_OpCodes *code_unref() { JSI_NEW_CODES(0,OP_UNREF, 0); }
278,720,852,800,359,400,000,000,000,000,000,000,000
None
null
[ "CWE-120" ]
CVE-2020-22873
Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2020-22873
520,853
jsish
430ea27accd4d4ffddc946c9402e7c9064835a18
https://github.com/pcmacdon/jsish
https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18
Release "3.0.7": Fix toPrecision bug "stack overflow #4". FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de
0
static Jsi_RC FilesysWriteCmd(Jsi_Interp *interp, Jsi_Value *args, Jsi_Value *_this, Jsi_Value **ret, Jsi_Func *funcPtr) { int sum = 0, n, m; UdfGet(udf, _this, funcPtr); char *buf = Jsi_ValueArrayIndexToStr(interp, args, 0, &m); if (!udf->filename) { goto bail; } while (m > 0 && s...
210,108,322,658,213,640,000,000,000,000,000,000,000
None
null
[ "CWE-120" ]
CVE-2020-22873
Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2020-22873
520,854
jsish
430ea27accd4d4ffddc946c9402e7c9064835a18
https://github.com/pcmacdon/jsish
https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18
Release "3.0.7": Fix toPrecision bug "stack overflow #4". FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de
0
static jsi_JmpPopInfo *jpinfo_new(int off, int topop) { jsi_JmpPopInfo *r = (jsi_JmpPopInfo *)Jsi_Calloc(1, sizeof(*r)); r->off = off; r->topop = topop; return r; }
163,845,800,481,626,500,000,000,000,000,000,000,000
None
null
[ "CWE-120" ]
CVE-2020-22873
Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2020-22873
520,966
retdec
517298bafaaff0a8e3dd60dd055a67c41b545807
https://github.com/avast/retdec
https://github.com/avast/retdec/commit/517298bafaaff0a8e3dd60dd055a67c41b545807
Try to fix issue #637 Reference: https://github.com/avast/retdec/issues/637
0
llvm::SwitchInst* Decoder::transformToSwitch( llvm::CallInst* pseudo, llvm::Value* val, llvm::BasicBlock* defaultBb, const std::vector<llvm::BasicBlock*>& cases) { unsigned numCases = 0; for (auto* c : cases) { if (c != defaultBb) { ++numCases; } } // If we do not do this, this can happen: // "I...
339,697,549,952,328,130,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2020-23907
An issue was discovered in retdec v3.3. In function canSplitFunctionOn() of ir_modifications.cpp, there is a possible out of bounds read due to a heap buffer overflow. The impact is: Deny of Service, Memory Disclosure, and Possible Code Execution.
https://nvd.nist.gov/vuln/detail/CVE-2020-23907
520,967
retdec
517298bafaaff0a8e3dd60dd055a67c41b545807
https://github.com/avast/retdec
https://github.com/avast/retdec/commit/517298bafaaff0a8e3dd60dd055a67c41b545807
Try to fix issue #637 Reference: https://github.com/avast/retdec/issues/637
0
bool Decoder::canSplitFunctionOn(llvm::BasicBlock* bb) { for (auto* u : bb->users()) { // All users must be unconditional branch instructions. // auto* br = dyn_cast<BranchInst>(u); if (br == nullptr || br->isConditional()) { LOG << "\t\t\t\t\t\t" << "!CAN : user not uncond for " << llvmObjToString(...
172,558,044,285,921,060,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2020-23907
An issue was discovered in retdec v3.3. In function canSplitFunctionOn() of ir_modifications.cpp, there is a possible out of bounds read due to a heap buffer overflow. The impact is: Deny of Service, Memory Disclosure, and Possible Code Execution.
https://nvd.nist.gov/vuln/detail/CVE-2020-23907
520,968
retdec
517298bafaaff0a8e3dd60dd055a67c41b545807
https://github.com/avast/retdec
https://github.com/avast/retdec/commit/517298bafaaff0a8e3dd60dd055a67c41b545807
Try to fix issue #637 Reference: https://github.com/avast/retdec/issues/637
0
llvm::Function* Decoder::splitFunctionOn( utils::Address addr, llvm::BasicBlock* splitOnBb) { LOG << "\t\t\t\t" << "S: splitFunctionOn @ " << addr << " on " << splitOnBb->getName().str() << std::endl; if (splitOnBb->getPrevNode() == nullptr) { LOG << "\t\t\t\t" << "S: BB first @ " << addr << std::endl; r...
337,843,546,095,104,400,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2020-23907
An issue was discovered in retdec v3.3. In function canSplitFunctionOn() of ir_modifications.cpp, there is a possible out of bounds read due to a heap buffer overflow. The impact is: Deny of Service, Memory Disclosure, and Possible Code Execution.
https://nvd.nist.gov/vuln/detail/CVE-2020-23907
520,969
retdec
517298bafaaff0a8e3dd60dd055a67c41b545807
https://github.com/avast/retdec
https://github.com/avast/retdec/commit/517298bafaaff0a8e3dd60dd055a67c41b545807
Try to fix issue #637 Reference: https://github.com/avast/retdec/issues/637
0
llvm::CallInst* Decoder::transformToCondCall( llvm::CallInst* pseudo, llvm::Value* cond, llvm::Function* callee, llvm::BasicBlock* falseBb) { auto* oldBb = pseudo->getParent(); auto* newBb = oldBb->splitBasicBlock(pseudo); // We do NOT want to name or give address to this block. auto* oldTerm = oldBb->getT...
163,582,491,722,408,650,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2020-23907
An issue was discovered in retdec v3.3. In function canSplitFunctionOn() of ir_modifications.cpp, there is a possible out of bounds read due to a heap buffer overflow. The impact is: Deny of Service, Memory Disclosure, and Possible Code Execution.
https://nvd.nist.gov/vuln/detail/CVE-2020-23907
520,970
retdec
517298bafaaff0a8e3dd60dd055a67c41b545807
https://github.com/avast/retdec
https://github.com/avast/retdec/commit/517298bafaaff0a8e3dd60dd055a67c41b545807
Try to fix issue #637 Reference: https://github.com/avast/retdec/issues/637
0
llvm::Function* Decoder::splitFunctionOn(utils::Address addr) { if (auto* bb = getBasicBlockAtAddress(addr)) { LOG << "\t\t\t\t" << "S: splitFunctionOn @ " << addr << std::endl; return bb->getPrevNode() ? splitFunctionOn(addr, bb) : bb->getParent(); } // There is an instruction at address, but not BB ->...
234,169,634,988,335,030,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2020-23907
An issue was discovered in retdec v3.3. In function canSplitFunctionOn() of ir_modifications.cpp, there is a possible out of bounds read due to a heap buffer overflow. The impact is: Deny of Service, Memory Disclosure, and Possible Code Execution.
https://nvd.nist.gov/vuln/detail/CVE-2020-23907
520,971
retdec
517298bafaaff0a8e3dd60dd055a67c41b545807
https://github.com/avast/retdec
https://github.com/avast/retdec/commit/517298bafaaff0a8e3dd60dd055a67c41b545807
Try to fix issue #637 Reference: https://github.com/avast/retdec/issues/637
0
llvm::GlobalVariable* Decoder::getCallReturnObject() { if (_config->getConfig().architecture.isX86_32()) { return _abi->getRegister(X86_REG_EAX); } else if (_config->getConfig().architecture.isX86_64()) { return _abi->getRegister(X86_REG_RAX); } else if (_config->getConfig().architecture.isMipsOrPic32()) { ...
179,506,904,574,203,230,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2020-23907
An issue was discovered in retdec v3.3. In function canSplitFunctionOn() of ir_modifications.cpp, there is a possible out of bounds read due to a heap buffer overflow. The impact is: Deny of Service, Memory Disclosure, and Possible Code Execution.
https://nvd.nist.gov/vuln/detail/CVE-2020-23907
520,972
retdec
517298bafaaff0a8e3dd60dd055a67c41b545807
https://github.com/avast/retdec
https://github.com/avast/retdec/commit/517298bafaaff0a8e3dd60dd055a67c41b545807
Try to fix issue #637 Reference: https://github.com/avast/retdec/issues/637
0
void Decoder::getOrCreateCallTarget( utils::Address addr, llvm::Function*& tFnc, llvm::BasicBlock*& tBb) { tBb = nullptr; tFnc = nullptr; if (auto* f = getFunctionAtAddress(addr)) { tFnc = f; tBb = tFnc->empty() ? nullptr : &tFnc->front(); LOG << "\t\t\t\t" << "F: getFunctionAtAddress() @ " << addr << ...
248,275,155,997,215,700,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2020-23907
An issue was discovered in retdec v3.3. In function canSplitFunctionOn() of ir_modifications.cpp, there is a possible out of bounds read due to a heap buffer overflow. The impact is: Deny of Service, Memory Disclosure, and Possible Code Execution.
https://nvd.nist.gov/vuln/detail/CVE-2020-23907
520,973
retdec
517298bafaaff0a8e3dd60dd055a67c41b545807
https://github.com/avast/retdec
https://github.com/avast/retdec/commit/517298bafaaff0a8e3dd60dd055a67c41b545807
Try to fix issue #637 Reference: https://github.com/avast/retdec/issues/637
0
llvm::ReturnInst* Decoder::transformToReturn(llvm::CallInst* pseudo) { auto* term = pseudo->getParent()->getTerminator(); assert(pseudo->getNextNode() == term); auto* r = ReturnInst::Create( pseudo->getModule()->getContext(), UndefValue::get(pseudo->getFunction()->getReturnType()), term); term->eraseFromPa...
246,227,948,483,677,530,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2020-23907
An issue was discovered in retdec v3.3. In function canSplitFunctionOn() of ir_modifications.cpp, there is a possible out of bounds read due to a heap buffer overflow. The impact is: Deny of Service, Memory Disclosure, and Possible Code Execution.
https://nvd.nist.gov/vuln/detail/CVE-2020-23907
520,974
retdec
517298bafaaff0a8e3dd60dd055a67c41b545807
https://github.com/avast/retdec
https://github.com/avast/retdec/commit/517298bafaaff0a8e3dd60dd055a67c41b545807
Try to fix issue #637 Reference: https://github.com/avast/retdec/issues/637
0
llvm::BranchInst* Decoder::transformToBranch( llvm::CallInst* pseudo, llvm::BasicBlock* branchee) { auto* term = pseudo->getParent()->getTerminator(); assert(pseudo->getNextNode() == term); auto* br = BranchInst::Create(branchee, term); term->eraseFromParent(); return br; }
10,461,997,993,435,795,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2020-23907
An issue was discovered in retdec v3.3. In function canSplitFunctionOn() of ir_modifications.cpp, there is a possible out of bounds read due to a heap buffer overflow. The impact is: Deny of Service, Memory Disclosure, and Possible Code Execution.
https://nvd.nist.gov/vuln/detail/CVE-2020-23907
520,975
retdec
517298bafaaff0a8e3dd60dd055a67c41b545807
https://github.com/avast/retdec
https://github.com/avast/retdec/commit/517298bafaaff0a8e3dd60dd055a67c41b545807
Try to fix issue #637 Reference: https://github.com/avast/retdec/issues/637
0
llvm::CallInst* Decoder::transformToCall( llvm::CallInst* pseudo, llvm::Function* callee) { auto* c = CallInst::Create(callee); c->insertAfter(pseudo); if (auto* retObj = getCallReturnObject()) { auto* cc = cast<Instruction>( IrModifier::convertValueToTypeAfter(c, retObj->getValueType(), c)); auto* s =...
206,281,456,132,457,940,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2020-23907
An issue was discovered in retdec v3.3. In function canSplitFunctionOn() of ir_modifications.cpp, there is a possible out of bounds read due to a heap buffer overflow. The impact is: Deny of Service, Memory Disclosure, and Possible Code Execution.
https://nvd.nist.gov/vuln/detail/CVE-2020-23907
520,976
retdec
517298bafaaff0a8e3dd60dd055a67c41b545807
https://github.com/avast/retdec
https://github.com/avast/retdec/commit/517298bafaaff0a8e3dd60dd055a67c41b545807
Try to fix issue #637 Reference: https://github.com/avast/retdec/issues/637
0
bool Decoder::canSplitFunctionOn( utils::Address addr, llvm::BasicBlock* splitBb, std::set<llvm::BasicBlock*>& newFncStarts) { newFncStarts.insert(splitBb); auto* f = splitBb->getParent(); auto fAddr = getFunctionAddress(f); auto fSzIt = _fnc2sz.find(f); if (fSzIt != _fnc2sz.end()) { if (fAddr <= addr &...
52,757,457,497,306,000,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2020-23907
An issue was discovered in retdec v3.3. In function canSplitFunctionOn() of ir_modifications.cpp, there is a possible out of bounds read due to a heap buffer overflow. The impact is: Deny of Service, Memory Disclosure, and Possible Code Execution.
https://nvd.nist.gov/vuln/detail/CVE-2020-23907
520,977
retdec
517298bafaaff0a8e3dd60dd055a67c41b545807
https://github.com/avast/retdec
https://github.com/avast/retdec/commit/517298bafaaff0a8e3dd60dd055a67c41b545807
Try to fix issue #637 Reference: https://github.com/avast/retdec/issues/637
0
void Decoder::getOrCreateBranchTarget( utils::Address addr, llvm::BasicBlock*& tBb, llvm::Function*& tFnc, llvm::Instruction* from) { tBb = nullptr; tFnc = nullptr; auto* fromFnc = from->getFunction(); if (auto* bb = getBasicBlockAtAddress(addr)) { tBb = bb; LOG << "\t\t\t\t" << "B: getBasicBlockAtAd...
160,056,055,851,785,500,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2020-23907
An issue was discovered in retdec v3.3. In function canSplitFunctionOn() of ir_modifications.cpp, there is a possible out of bounds read due to a heap buffer overflow. The impact is: Deny of Service, Memory Disclosure, and Possible Code Execution.
https://nvd.nist.gov/vuln/detail/CVE-2020-23907
520,978
retdec
517298bafaaff0a8e3dd60dd055a67c41b545807
https://github.com/avast/retdec
https://github.com/avast/retdec/commit/517298bafaaff0a8e3dd60dd055a67c41b545807
Try to fix issue #637 Reference: https://github.com/avast/retdec/issues/637
0
llvm::BranchInst* Decoder::transformToCondBranch( llvm::CallInst* pseudo, llvm::Value* cond, llvm::BasicBlock* trueBb, llvm::BasicBlock* falseBb) { auto* term = pseudo->getParent()->getTerminator(); assert(pseudo->getNextNode() == term); auto* br = BranchInst::Create(trueBb, falseBb, cond, term); term->eras...
38,531,308,295,983,030,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2020-23907
An issue was discovered in retdec v3.3. In function canSplitFunctionOn() of ir_modifications.cpp, there is a possible out of bounds read due to a heap buffer overflow. The impact is: Deny of Service, Memory Disclosure, and Possible Code Execution.
https://nvd.nist.gov/vuln/detail/CVE-2020-23907
520,979
oocborrt
539851c66778f68a244633985f6f8d0df94ea3b3
https://github.com/objsys/oocborrt
https://github.com/objsys/oocborrt/commit/539851c66778f68a244633985f6f8d0df94ea3b3
fixed missing return status test error
0
static int cborTagNotSupp (OSCTXT* pctxt, OSOCTET tag) { char numbuf[10]; char errtext[80]; rtxUIntToCharStr (tag, numbuf, sizeof(numbuf), 0); rtxStrJoin (errtext, sizeof(errtext), "CBOR tag ", numbuf, 0, 0, 0); rtxErrAddStrParm (pctxt, errtext); return RTERR_NOTSUPP; }
91,433,931,882,296,370,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2020-24753
A memory corruption vulnerability in Objective Open CBOR Run-time (oocborrt) in versions before 2020-08-12 could allow an attacker to execute code via crafted Concise Binary Object Representation (CBOR) input to the cbor2json decoder. An uncaught error while decoding CBOR Major Type 3 text strings leads to the use of a...
https://nvd.nist.gov/vuln/detail/CVE-2020-24753
520,980
oocborrt
539851c66778f68a244633985f6f8d0df94ea3b3
https://github.com/objsys/oocborrt
https://github.com/objsys/oocborrt/commit/539851c66778f68a244633985f6f8d0df94ea3b3
fixed missing return status test error
0
static int cborElemNameToJson (OSCTXT* pCborCtxt, OSCTXT* pJsonCtxt) { char* pElemName = 0; OSOCTET ub; int ret; /* Read byte from stream */ ret = rtxReadBytes (pCborCtxt, &ub, 1); if (0 != ret) return LOG_RTERR (pCborCtxt, ret); /* Decode element name (note: only string type is current...
309,262,024,382,791,750,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2020-24753
A memory corruption vulnerability in Objective Open CBOR Run-time (oocborrt) in versions before 2020-08-12 could allow an attacker to execute code via crafted Concise Binary Object Representation (CBOR) input to the cbor2json decoder. An uncaught error while decoding CBOR Major Type 3 text strings leads to the use of a...
https://nvd.nist.gov/vuln/detail/CVE-2020-24753
520,981
oocborrt
539851c66778f68a244633985f6f8d0df94ea3b3
https://github.com/objsys/oocborrt
https://github.com/objsys/oocborrt/commit/539851c66778f68a244633985f6f8d0df94ea3b3
fixed missing return status test error
0
int main (int argc, char** argv) { OSCTXT jsonCtxt, cborCtxt; OSOCTET* pMsgBuf = 0; size_t msglen; OSBOOL verbose = FALSE; const char* filename = "message.cbor"; const char* outfname = "message.json"; int ret; /* Process command line arguments */ if (argc...
94,464,297,602,423,210,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2020-24753
A memory corruption vulnerability in Objective Open CBOR Run-time (oocborrt) in versions before 2020-08-12 could allow an attacker to execute code via crafted Concise Binary Object Representation (CBOR) input to the cbor2json decoder. An uncaught error while decoding CBOR Major Type 3 text strings leads to the use of a...
https://nvd.nist.gov/vuln/detail/CVE-2020-24753
520,982
oocborrt
539851c66778f68a244633985f6f8d0df94ea3b3
https://github.com/objsys/oocborrt
https://github.com/objsys/oocborrt/commit/539851c66778f68a244633985f6f8d0df94ea3b3
fixed missing return status test error
0
static int cbor2json (OSCTXT* pCborCtxt, OSCTXT* pJsonCtxt) { int ret = 0; OSOCTET tag, ub; /* Read byte from stream */ ret = rtxReadBytes (pCborCtxt, &ub, 1); if (0 != ret) return LOG_RTERR (pCborCtxt, ret); tag = ub >> 5; /* Switch on tag value */ switch (tag) { case OSRTCBOR_...
182,192,642,033,756,700,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2020-24753
A memory corruption vulnerability in Objective Open CBOR Run-time (oocborrt) in versions before 2020-08-12 could allow an attacker to execute code via crafted Concise Binary Object Representation (CBOR) input to the cbor2json decoder. An uncaught error while decoding CBOR Major Type 3 text strings leads to the use of a...
https://nvd.nist.gov/vuln/detail/CVE-2020-24753
521,499
sqlcipher
cb71f53e8cea4802509f182fa5bead0ac6ab0e7f
https://github.com/sqlcipher/sqlcipher
https://github.com/sqlcipher/sqlcipher/commit/cb71f53e8cea4802509f182fa5bead0ac6ab0e7f
fix sqlcipher_export handling of NULL parameters
0
int sqlcipher_codec_pragma(sqlite3* db, int iDb, Parse *pParse, const char *zLeft, const char *zRight) { struct Db *pDb = &db->aDb[iDb]; codec_ctx *ctx = NULL; int rc; if(pDb->pBt) { ctx = (codec_ctx*) sqlite3PagerGetCodec(pDb->pBt->pBt->pPager); } CODEC_TRACE("sqlcipher_codec_pragma: entered db=%p iD...
210,718,390,088,926,000,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2021-3119
Zetetic SQLCipher 4.x before 4.4.3 has a NULL pointer dereferencing issue related to sqlcipher_export in crypto.c and sqlite3StrICmp in sqlite3.c. This may allow an attacker to perform a remote denial of service attack. For example, an SQL injection can be used to execute the crafted SQL command sequence, which causes ...
https://nvd.nist.gov/vuln/detail/CVE-2021-3119
521,500
sqlcipher
cb71f53e8cea4802509f182fa5bead0ac6ab0e7f
https://github.com/sqlcipher/sqlcipher
https://github.com/sqlcipher/sqlcipher/commit/cb71f53e8cea4802509f182fa5bead0ac6ab0e7f
fix sqlcipher_export handling of NULL parameters
0
void sqlite3_activate_see(const char* in) { /* do nothing, security enhancements are always active */ }
240,603,999,562,817,100,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2021-3119
Zetetic SQLCipher 4.x before 4.4.3 has a NULL pointer dereferencing issue related to sqlcipher_export in crypto.c and sqlite3StrICmp in sqlite3.c. This may allow an attacker to perform a remote denial of service attack. For example, an SQL injection can be used to execute the crafted SQL command sequence, which causes ...
https://nvd.nist.gov/vuln/detail/CVE-2021-3119
521,501
sqlcipher
cb71f53e8cea4802509f182fa5bead0ac6ab0e7f
https://github.com/sqlcipher/sqlcipher
https://github.com/sqlcipher/sqlcipher/commit/cb71f53e8cea4802509f182fa5bead0ac6ab0e7f
fix sqlcipher_export handling of NULL parameters
0
int sqlite3CodecAttach(sqlite3* db, int nDb, const void *zKey, int nKey) { struct Db *pDb = &db->aDb[nDb]; CODEC_TRACE("sqlite3CodecAttach: entered db=%p, nDb=%d zKey=%s, nKey=%d\n", db, nDb, (char *)zKey, nKey); if(nKey && zKey && pDb->pBt) { int rc; Pager *pPager = pDb->pBt->pBt->pPager; sqlite3_...
86,282,026,045,468,520,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2021-3119
Zetetic SQLCipher 4.x before 4.4.3 has a NULL pointer dereferencing issue related to sqlcipher_export in crypto.c and sqlite3StrICmp in sqlite3.c. This may allow an attacker to perform a remote denial of service attack. For example, an SQL injection can be used to execute the crafted SQL command sequence, which causes ...
https://nvd.nist.gov/vuln/detail/CVE-2021-3119
521,502
sqlcipher
cb71f53e8cea4802509f182fa5bead0ac6ab0e7f
https://github.com/sqlcipher/sqlcipher
https://github.com/sqlcipher/sqlcipher/commit/cb71f53e8cea4802509f182fa5bead0ac6ab0e7f
fix sqlcipher_export handling of NULL parameters
0
static int sqlcipher_finalize(sqlite3 *db, sqlite3_stmt *pStmt, char **pzErrMsg){ int rc; rc = sqlite3VdbeFinalize((Vdbe*)pStmt); if( rc ){ sqlite3SetString(pzErrMsg, db, sqlite3_errmsg(db)); } return rc; }
150,989,832,449,633,320,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2021-3119
Zetetic SQLCipher 4.x before 4.4.3 has a NULL pointer dereferencing issue related to sqlcipher_export in crypto.c and sqlite3StrICmp in sqlite3.c. This may allow an attacker to perform a remote denial of service attack. For example, an SQL injection can be used to execute the crafted SQL command sequence, which causes ...
https://nvd.nist.gov/vuln/detail/CVE-2021-3119
521,503
sqlcipher
cb71f53e8cea4802509f182fa5bead0ac6ab0e7f
https://github.com/sqlcipher/sqlcipher
https://github.com/sqlcipher/sqlcipher/commit/cb71f53e8cea4802509f182fa5bead0ac6ab0e7f
fix sqlcipher_export handling of NULL parameters
0
static int codec_set_pass_key(sqlite3* db, int nDb, const void *zKey, int nKey, int for_ctx) { struct Db *pDb = &db->aDb[nDb]; CODEC_TRACE("codec_set_pass_key: entered db=%p nDb=%d zKey=%s nKey=%d for_ctx=%d\n", db, nDb, (char *)zKey, nKey, for_ctx); if(pDb->pBt) { codec_ctx *ctx = (codec_ctx*) sqlite3PagerGe...
113,965,764,517,113,100,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2021-3119
Zetetic SQLCipher 4.x before 4.4.3 has a NULL pointer dereferencing issue related to sqlcipher_export in crypto.c and sqlite3StrICmp in sqlite3.c. This may allow an attacker to perform a remote denial of service attack. For example, an SQL injection can be used to execute the crafted SQL command sequence, which causes ...
https://nvd.nist.gov/vuln/detail/CVE-2021-3119
521,504
sqlcipher
cb71f53e8cea4802509f182fa5bead0ac6ab0e7f
https://github.com/sqlcipher/sqlcipher
https://github.com/sqlcipher/sqlcipher/commit/cb71f53e8cea4802509f182fa5bead0ac6ab0e7f
fix sqlcipher_export handling of NULL parameters
0
static int sqlcipher_execExecSql(sqlite3 *db, char **pzErrMsg, const char *zSql){ sqlite3_stmt *pStmt; int rc; rc = sqlite3_prepare(db, zSql, -1, &pStmt, 0); if( rc!=SQLITE_OK ) return rc; while( SQLITE_ROW==sqlite3_step(pStmt) ){ rc = sqlcipher_execSql(db, pzErrMsg, (char*)sqlite3_column_text(pStmt, 0)...
73,930,657,758,115,480,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2021-3119
Zetetic SQLCipher 4.x before 4.4.3 has a NULL pointer dereferencing issue related to sqlcipher_export in crypto.c and sqlite3StrICmp in sqlite3.c. This may allow an attacker to perform a remote denial of service attack. For example, an SQL injection can be used to execute the crafted SQL command sequence, which causes ...
https://nvd.nist.gov/vuln/detail/CVE-2021-3119
521,505
sqlcipher
cb71f53e8cea4802509f182fa5bead0ac6ab0e7f
https://github.com/sqlcipher/sqlcipher
https://github.com/sqlcipher/sqlcipher/commit/cb71f53e8cea4802509f182fa5bead0ac6ab0e7f
fix sqlcipher_export handling of NULL parameters
0
static void codec_vdbe_return_string(Parse *pParse, const char *zLabel, const char *value, int value_type){ Vdbe *v = sqlite3GetVdbe(pParse); sqlite3VdbeSetNumCols(v, 1); sqlite3VdbeSetColName(v, 0, COLNAME_NAME, zLabel, SQLITE_STATIC); sqlite3VdbeAddOp4(v, OP_String8, 0, 1, 0, value, value_type); sqlite3Vdbe...
17,568,490,585,757,700,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2021-3119
Zetetic SQLCipher 4.x before 4.4.3 has a NULL pointer dereferencing issue related to sqlcipher_export in crypto.c and sqlite3StrICmp in sqlite3.c. This may allow an attacker to perform a remote denial of service attack. For example, an SQL injection can be used to execute the crafted SQL command sequence, which causes ...
https://nvd.nist.gov/vuln/detail/CVE-2021-3119
521,506
sqlcipher
cb71f53e8cea4802509f182fa5bead0ac6ab0e7f
https://github.com/sqlcipher/sqlcipher
https://github.com/sqlcipher/sqlcipher/commit/cb71f53e8cea4802509f182fa5bead0ac6ab0e7f
fix sqlcipher_export handling of NULL parameters
0
void sqlcipher_exportFunc(sqlite3_context *context, int argc, sqlite3_value **argv) { sqlite3 *db = sqlite3_context_db_handle(context); const char* targetDb, *sourceDb; int targetDb_idx = 0; u64 saved_flags = db->flags; /* Saved value of the db->flags */ u32 saved_mDbFlags = db->mDbFlags; /* Sa...
291,673,322,331,677,800,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2021-3119
Zetetic SQLCipher 4.x before 4.4.3 has a NULL pointer dereferencing issue related to sqlcipher_export in crypto.c and sqlite3StrICmp in sqlite3.c. This may allow an attacker to perform a remote denial of service attack. For example, an SQL injection can be used to execute the crafted SQL command sequence, which causes ...
https://nvd.nist.gov/vuln/detail/CVE-2021-3119
521,507
sqlcipher
cb71f53e8cea4802509f182fa5bead0ac6ab0e7f
https://github.com/sqlcipher/sqlcipher
https://github.com/sqlcipher/sqlcipher/commit/cb71f53e8cea4802509f182fa5bead0ac6ab0e7f
fix sqlcipher_export handling of NULL parameters
0
int sqlite3_key(sqlite3 *db, const void *pKey, int nKey) { CODEC_TRACE("sqlite3_key entered: db=%p pKey=%s nKey=%d\n", db, (char *)pKey, nKey); return sqlite3_key_v2(db, "main", pKey, nKey); }
55,890,209,071,705,450,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2021-3119
Zetetic SQLCipher 4.x before 4.4.3 has a NULL pointer dereferencing issue related to sqlcipher_export in crypto.c and sqlite3StrICmp in sqlite3.c. This may allow an attacker to perform a remote denial of service attack. For example, an SQL injection can be used to execute the crafted SQL command sequence, which causes ...
https://nvd.nist.gov/vuln/detail/CVE-2021-3119
521,508
sqlcipher
cb71f53e8cea4802509f182fa5bead0ac6ab0e7f
https://github.com/sqlcipher/sqlcipher
https://github.com/sqlcipher/sqlcipher/commit/cb71f53e8cea4802509f182fa5bead0ac6ab0e7f
fix sqlcipher_export handling of NULL parameters
0
static int codec_set_btree_to_codec_pagesize(sqlite3 *db, Db *pDb, codec_ctx *ctx) { int rc, page_sz, reserve_sz; page_sz = sqlcipher_codec_ctx_get_pagesize(ctx); reserve_sz = sqlcipher_codec_ctx_get_reservesize(ctx); CODEC_TRACE("codec_set_btree_to_codec_pagesize: sqlite3BtreeSetPageSize() size=%d reserve=%...
231,366,181,439,557,500,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2021-3119
Zetetic SQLCipher 4.x before 4.4.3 has a NULL pointer dereferencing issue related to sqlcipher_export in crypto.c and sqlite3StrICmp in sqlite3.c. This may allow an attacker to perform a remote denial of service attack. For example, an SQL injection can be used to execute the crafted SQL command sequence, which causes ...
https://nvd.nist.gov/vuln/detail/CVE-2021-3119
521,509
sqlcipher
cb71f53e8cea4802509f182fa5bead0ac6ab0e7f
https://github.com/sqlcipher/sqlcipher
https://github.com/sqlcipher/sqlcipher/commit/cb71f53e8cea4802509f182fa5bead0ac6ab0e7f
fix sqlcipher_export handling of NULL parameters
0
static void* sqlite3Codec(void *iCtx, void *data, Pgno pgno, int mode) { codec_ctx *ctx = (codec_ctx *) iCtx; int offset = 0, rc = 0; int page_sz = sqlcipher_codec_ctx_get_pagesize(ctx); unsigned char *pData = (unsigned char *) data; void *buffer = sqlcipher_codec_ctx_get_data(ctx); int plaintext_header_sz...
120,525,436,105,512,950,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2021-3119
Zetetic SQLCipher 4.x before 4.4.3 has a NULL pointer dereferencing issue related to sqlcipher_export in crypto.c and sqlite3StrICmp in sqlite3.c. This may allow an attacker to perform a remote denial of service attack. For example, an SQL injection can be used to execute the crafted SQL command sequence, which causes ...
https://nvd.nist.gov/vuln/detail/CVE-2021-3119
521,510
sqlcipher
cb71f53e8cea4802509f182fa5bead0ac6ab0e7f
https://github.com/sqlcipher/sqlcipher
https://github.com/sqlcipher/sqlcipher/commit/cb71f53e8cea4802509f182fa5bead0ac6ab0e7f
fix sqlcipher_export handling of NULL parameters
0
int sqlite3_rekey_v2(sqlite3 *db, const char *zDb, const void *pKey, int nKey) { CODEC_TRACE("sqlite3_rekey_v2: entered db=%p zDb=%s pKey=%s, nKey=%d\n", db, zDb, (char *)pKey, nKey); if(db && pKey && nKey) { int db_index = sqlcipher_find_db_index(db, zDb); struct Db *pDb = &db->aDb[db_index]; CODEC_TRA...
54,074,107,687,568,530,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2021-3119
Zetetic SQLCipher 4.x before 4.4.3 has a NULL pointer dereferencing issue related to sqlcipher_export in crypto.c and sqlite3StrICmp in sqlite3.c. This may allow an attacker to perform a remote denial of service attack. For example, an SQL injection can be used to execute the crafted SQL command sequence, which causes ...
https://nvd.nist.gov/vuln/detail/CVE-2021-3119
521,511
sqlcipher
cb71f53e8cea4802509f182fa5bead0ac6ab0e7f
https://github.com/sqlcipher/sqlcipher
https://github.com/sqlcipher/sqlcipher/commit/cb71f53e8cea4802509f182fa5bead0ac6ab0e7f
fix sqlcipher_export handling of NULL parameters
0
static void sqlite3FreeCodecArg(void *pCodecArg) { codec_ctx *ctx = (codec_ctx *) pCodecArg; if(pCodecArg == NULL) return; sqlcipher_codec_ctx_free(&ctx); /* wipe and free allocated memory for the context */ sqlcipher_deactivate(); /* cleanup related structures, OpenSSL etc, when codec is detatched */ }
193,060,164,115,461,920,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2021-3119
Zetetic SQLCipher 4.x before 4.4.3 has a NULL pointer dereferencing issue related to sqlcipher_export in crypto.c and sqlite3StrICmp in sqlite3.c. This may allow an attacker to perform a remote denial of service attack. For example, an SQL injection can be used to execute the crafted SQL command sequence, which causes ...
https://nvd.nist.gov/vuln/detail/CVE-2021-3119
521,512
sqlcipher
cb71f53e8cea4802509f182fa5bead0ac6ab0e7f
https://github.com/sqlcipher/sqlcipher
https://github.com/sqlcipher/sqlcipher/commit/cb71f53e8cea4802509f182fa5bead0ac6ab0e7f
fix sqlcipher_export handling of NULL parameters
0
static int sqlcipher_execSql(sqlite3 *db, char **pzErrMsg, const char *zSql){ sqlite3_stmt *pStmt; VVA_ONLY( int rc; ) if( !zSql ){ return SQLITE_NOMEM; } if( SQLITE_OK!=sqlite3_prepare(db, zSql, -1, &pStmt, 0) ){ sqlite3SetString(pzErrMsg, db, sqlite3_errmsg(db)); return sqlite3_errcode(db); } ...
160,233,460,793,917,870,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2021-3119
Zetetic SQLCipher 4.x before 4.4.3 has a NULL pointer dereferencing issue related to sqlcipher_export in crypto.c and sqlite3StrICmp in sqlite3.c. This may allow an attacker to perform a remote denial of service attack. For example, an SQL injection can be used to execute the crafted SQL command sequence, which causes ...
https://nvd.nist.gov/vuln/detail/CVE-2021-3119
521,513
sqlcipher
cb71f53e8cea4802509f182fa5bead0ac6ab0e7f
https://github.com/sqlcipher/sqlcipher
https://github.com/sqlcipher/sqlcipher/commit/cb71f53e8cea4802509f182fa5bead0ac6ab0e7f
fix sqlcipher_export handling of NULL parameters
0
int sqlite3_rekey(sqlite3 *db, const void *pKey, int nKey) { CODEC_TRACE("sqlite3_rekey entered: db=%p pKey=%s nKey=%d\n", db, (char *)pKey, nKey); return sqlite3_rekey_v2(db, "main", pKey, nKey); }
191,606,247,726,643,400,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2021-3119
Zetetic SQLCipher 4.x before 4.4.3 has a NULL pointer dereferencing issue related to sqlcipher_export in crypto.c and sqlite3StrICmp in sqlite3.c. This may allow an attacker to perform a remote denial of service attack. For example, an SQL injection can be used to execute the crafted SQL command sequence, which causes ...
https://nvd.nist.gov/vuln/detail/CVE-2021-3119
521,514
sqlcipher
cb71f53e8cea4802509f182fa5bead0ac6ab0e7f
https://github.com/sqlcipher/sqlcipher
https://github.com/sqlcipher/sqlcipher/commit/cb71f53e8cea4802509f182fa5bead0ac6ab0e7f
fix sqlcipher_export handling of NULL parameters
0
int sqlite3_key_v2(sqlite3 *db, const char *zDb, const void *pKey, int nKey) { CODEC_TRACE("sqlite3_key_v2: entered db=%p zDb=%s pKey=%s nKey=%d\n", db, zDb, (char *)pKey, nKey); /* attach key if db and pKey are not null and nKey is > 0 */ if(db && pKey && nKey) { int db_index = sqlcipher_find_db_index(db, zD...
263,859,736,813,268,150,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2021-3119
Zetetic SQLCipher 4.x before 4.4.3 has a NULL pointer dereferencing issue related to sqlcipher_export in crypto.c and sqlite3StrICmp in sqlite3.c. This may allow an attacker to perform a remote denial of service attack. For example, an SQL injection can be used to execute the crafted SQL command sequence, which causes ...
https://nvd.nist.gov/vuln/detail/CVE-2021-3119
521,515
sqlcipher
cb71f53e8cea4802509f182fa5bead0ac6ab0e7f
https://github.com/sqlcipher/sqlcipher
https://github.com/sqlcipher/sqlcipher/commit/cb71f53e8cea4802509f182fa5bead0ac6ab0e7f
fix sqlcipher_export handling of NULL parameters
0
int sqlcipher_find_db_index(sqlite3 *db, const char *zDb) { int db_index; if(zDb == NULL){ return 0; } for(db_index = 0; db_index < db->nDb; db_index++) { struct Db *pDb = &db->aDb[db_index]; if(strcmp(pDb->zDbSName, zDb) == 0) { return db_index; } } return 0; }
321,382,141,115,475,200,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2021-3119
Zetetic SQLCipher 4.x before 4.4.3 has a NULL pointer dereferencing issue related to sqlcipher_export in crypto.c and sqlite3StrICmp in sqlite3.c. This may allow an attacker to perform a remote denial of service attack. For example, an SQL injection can be used to execute the crafted SQL command sequence, which causes ...
https://nvd.nist.gov/vuln/detail/CVE-2021-3119
521,516
sqlcipher
cb71f53e8cea4802509f182fa5bead0ac6ab0e7f
https://github.com/sqlcipher/sqlcipher
https://github.com/sqlcipher/sqlcipher/commit/cb71f53e8cea4802509f182fa5bead0ac6ab0e7f
fix sqlcipher_export handling of NULL parameters
0
void sqlite3CodecGetKey(sqlite3* db, int nDb, void **zKey, int *nKey) { struct Db *pDb = &db->aDb[nDb]; CODEC_TRACE("sqlite3CodecGetKey: entered db=%p, nDb=%d\n", db, nDb); if( pDb->pBt ) { codec_ctx *ctx = (codec_ctx*) sqlite3PagerGetCodec(pDb->pBt->pBt->pPager); if(ctx) { /* pass back the key...
79,918,361,212,436,000,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2021-3119
Zetetic SQLCipher 4.x before 4.4.3 has a NULL pointer dereferencing issue related to sqlcipher_export in crypto.c and sqlite3StrICmp in sqlite3.c. This may allow an attacker to perform a remote denial of service attack. For example, an SQL injection can be used to execute the crafted SQL command sequence, which causes ...
https://nvd.nist.gov/vuln/detail/CVE-2021-3119
522,366
node-lmdb
97760104c0fd311206b88aecd91fa1f59fe2b85a
https://github.com/Venemo/node-lmdb
https://github.com/Venemo/node-lmdb/commit/97760104c0fd311206b88aecd91fa1f59fe2b85a
Perform argument check for putString
0
NAN_METHOD(TxnWrap::reset) { Nan::HandleScope scope; TxnWrap *tw = Nan::ObjectWrap::Unwrap<TxnWrap>(info.This()); if (!tw->txn) { return Nan::ThrowError("The transaction is already closed."); } mdb_txn_reset(tw->txn); }
60,457,954,544,277,010,000,000,000,000,000,000,000
None
null
[ "NVD-CWE-noinfo" ]
CVE-2022-21164
The package node-lmdb before 0.9.7 are vulnerable to Denial of Service (DoS) when defining a non-invokable ToString value, which will cause a crash during type check.
https://nvd.nist.gov/vuln/detail/CVE-2022-21164
522,367
node-lmdb
97760104c0fd311206b88aecd91fa1f59fe2b85a
https://github.com/Venemo/node-lmdb
https://github.com/Venemo/node-lmdb/commit/97760104c0fd311206b88aecd91fa1f59fe2b85a
Perform argument check for putString
0
NAN_METHOD(TxnWrap::getStringUnsafe) { return getCommon(info, valToStringUnsafe); }
236,338,861,112,838,170,000,000,000,000,000,000,000
None
null
[ "NVD-CWE-noinfo" ]
CVE-2022-21164
The package node-lmdb before 0.9.7 are vulnerable to Denial of Service (DoS) when defining a non-invokable ToString value, which will cause a crash during type check.
https://nvd.nist.gov/vuln/detail/CVE-2022-21164
522,368
node-lmdb
97760104c0fd311206b88aecd91fa1f59fe2b85a
https://github.com/Venemo/node-lmdb
https://github.com/Venemo/node-lmdb/commit/97760104c0fd311206b88aecd91fa1f59fe2b85a
Perform argument check for putString
0
TxnWrap::~TxnWrap() { // Close if not closed already if (this->txn) { mdb_txn_abort(txn); this->removeFromEnvWrap(); } }
123,930,430,147,199,690,000,000,000,000,000,000,000
None
null
[ "NVD-CWE-noinfo" ]
CVE-2022-21164
The package node-lmdb before 0.9.7 are vulnerable to Denial of Service (DoS) when defining a non-invokable ToString value, which will cause a crash during type check.
https://nvd.nist.gov/vuln/detail/CVE-2022-21164
522,369
node-lmdb
97760104c0fd311206b88aecd91fa1f59fe2b85a
https://github.com/Venemo/node-lmdb
https://github.com/Venemo/node-lmdb/commit/97760104c0fd311206b88aecd91fa1f59fe2b85a
Perform argument check for putString
0
NAN_METHOD(TxnWrap::renew) { Nan::HandleScope scope; TxnWrap *tw = Nan::ObjectWrap::Unwrap<TxnWrap>(info.This()); if (!tw->txn) { return Nan::ThrowError("The transaction is already closed."); } int rc = mdb_txn_renew(tw->txn); if (rc != 0) { return throwLmdbError(rc); } }
34,879,962,823,629,910,000,000,000,000,000,000,000
None
null
[ "NVD-CWE-noinfo" ]
CVE-2022-21164
The package node-lmdb before 0.9.7 are vulnerable to Denial of Service (DoS) when defining a non-invokable ToString value, which will cause a crash during type check.
https://nvd.nist.gov/vuln/detail/CVE-2022-21164
522,370
node-lmdb
97760104c0fd311206b88aecd91fa1f59fe2b85a
https://github.com/Venemo/node-lmdb
https://github.com/Venemo/node-lmdb/commit/97760104c0fd311206b88aecd91fa1f59fe2b85a
Perform argument check for putString
0
NAN_METHOD(TxnWrap::getBinaryUnsafe) { return getCommon(info, valToBinaryUnsafe); }
124,596,560,158,399,750,000,000,000,000,000,000,000
None
null
[ "NVD-CWE-noinfo" ]
CVE-2022-21164
The package node-lmdb before 0.9.7 are vulnerable to Denial of Service (DoS) when defining a non-invokable ToString value, which will cause a crash during type check.
https://nvd.nist.gov/vuln/detail/CVE-2022-21164
522,371
node-lmdb
97760104c0fd311206b88aecd91fa1f59fe2b85a
https://github.com/Venemo/node-lmdb
https://github.com/Venemo/node-lmdb/commit/97760104c0fd311206b88aecd91fa1f59fe2b85a
Perform argument check for putString
0
TxnWrap::TxnWrap(MDB_env *env, MDB_txn *txn) { this->env = env; this->txn = txn; this->flags = 0; }
3,318,558,263,858,188,000,000,000,000,000,000,000
None
null
[ "NVD-CWE-noinfo" ]
CVE-2022-21164
The package node-lmdb before 0.9.7 are vulnerable to Denial of Service (DoS) when defining a non-invokable ToString value, which will cause a crash during type check.
https://nvd.nist.gov/vuln/detail/CVE-2022-21164
522,372
node-lmdb
97760104c0fd311206b88aecd91fa1f59fe2b85a
https://github.com/Venemo/node-lmdb
https://github.com/Venemo/node-lmdb/commit/97760104c0fd311206b88aecd91fa1f59fe2b85a
Perform argument check for putString
0
NAN_METHOD(TxnWrap::putString) { if (!info[2]->IsString()) return Nan::ThrowError("Value must be a string."); return putCommon(info, [](Nan::NAN_METHOD_ARGS_TYPE info, MDB_val &data) -> void { CustomExternalStringResource::writeTo(Local<String>::Cast(info[2]), &data); }, [](MDB_val &data) ->...
74,502,503,904,513,100,000,000,000,000,000,000,000
None
null
[ "NVD-CWE-noinfo" ]
CVE-2022-21164
The package node-lmdb before 0.9.7 are vulnerable to Denial of Service (DoS) when defining a non-invokable ToString value, which will cause a crash during type check.
https://nvd.nist.gov/vuln/detail/CVE-2022-21164
522,373
node-lmdb
97760104c0fd311206b88aecd91fa1f59fe2b85a
https://github.com/Venemo/node-lmdb
https://github.com/Venemo/node-lmdb/commit/97760104c0fd311206b88aecd91fa1f59fe2b85a
Perform argument check for putString
0
NAN_METHOD(TxnWrap::putNumber) { return putCommon(info, [](Nan::NAN_METHOD_ARGS_TYPE info, MDB_val &data) -> void { auto numberLocal = Nan::To<v8::Number>(info[2]).ToLocalChecked(); numberToPut = numberLocal->Value(); data.mv_size = sizeof(double); data.mv_data = &numberToPut; }...
161,110,328,495,980,290,000,000,000,000,000,000,000
None
null
[ "NVD-CWE-noinfo" ]
CVE-2022-21164
The package node-lmdb before 0.9.7 are vulnerable to Denial of Service (DoS) when defining a non-invokable ToString value, which will cause a crash during type check.
https://nvd.nist.gov/vuln/detail/CVE-2022-21164
522,374
node-lmdb
97760104c0fd311206b88aecd91fa1f59fe2b85a
https://github.com/Venemo/node-lmdb
https://github.com/Venemo/node-lmdb/commit/97760104c0fd311206b88aecd91fa1f59fe2b85a
Perform argument check for putString
0
NAN_METHOD(TxnWrap::del) { Nan::HandleScope scope; // Check argument count auto argCount = info.Length(); if (argCount < 2 || argCount > 4) { return Nan::ThrowError("Invalid number of arguments to cursor.del, should be: (a) <dbi>, <key> (b) <dbi>, <key>, <options> (c) <dbi>, <key>, <data> (...
167,750,490,431,939,200,000,000,000,000,000,000,000
None
null
[ "NVD-CWE-noinfo" ]
CVE-2022-21164
The package node-lmdb before 0.9.7 are vulnerable to Denial of Service (DoS) when defining a non-invokable ToString value, which will cause a crash during type check.
https://nvd.nist.gov/vuln/detail/CVE-2022-21164
522,375
node-lmdb
97760104c0fd311206b88aecd91fa1f59fe2b85a
https://github.com/Venemo/node-lmdb
https://github.com/Venemo/node-lmdb/commit/97760104c0fd311206b88aecd91fa1f59fe2b85a
Perform argument check for putString
0
NAN_METHOD(TxnWrap::abort) { Nan::HandleScope scope; TxnWrap *tw = Nan::ObjectWrap::Unwrap<TxnWrap>(info.This()); if (!tw->txn) { return Nan::ThrowError("The transaction is already closed."); } mdb_txn_abort(tw->txn); tw->removeFromEnvWrap(); tw->txn = nullptr; }
299,871,228,575,706,400,000,000,000,000,000,000,000
None
null
[ "NVD-CWE-noinfo" ]
CVE-2022-21164
The package node-lmdb before 0.9.7 are vulnerable to Denial of Service (DoS) when defining a non-invokable ToString value, which will cause a crash during type check.
https://nvd.nist.gov/vuln/detail/CVE-2022-21164
522,376
node-lmdb
97760104c0fd311206b88aecd91fa1f59fe2b85a
https://github.com/Venemo/node-lmdb
https://github.com/Venemo/node-lmdb/commit/97760104c0fd311206b88aecd91fa1f59fe2b85a
Perform argument check for putString
0
NAN_METHOD(TxnWrap::ctor) { Nan::HandleScope scope; EnvWrap *ew = Nan::ObjectWrap::Unwrap<EnvWrap>(Local<Object>::Cast(info[0])); int flags = 0; if (info[1]->IsObject()) { Local<Object> options = Local<Object>::Cast(info[1]); // Get flags from options setFlagFromValue(&flags,...
182,791,328,426,997,030,000,000,000,000,000,000,000
None
null
[ "NVD-CWE-noinfo" ]
CVE-2022-21164
The package node-lmdb before 0.9.7 are vulnerable to Denial of Service (DoS) when defining a non-invokable ToString value, which will cause a crash during type check.
https://nvd.nist.gov/vuln/detail/CVE-2022-21164
522,377
node-lmdb
97760104c0fd311206b88aecd91fa1f59fe2b85a
https://github.com/Venemo/node-lmdb
https://github.com/Venemo/node-lmdb/commit/97760104c0fd311206b88aecd91fa1f59fe2b85a
Perform argument check for putString
0
NAN_METHOD(TxnWrap::getBoolean) { return getCommon(info, valToBoolean); }
223,508,738,397,270,870,000,000,000,000,000,000,000
None
null
[ "NVD-CWE-noinfo" ]
CVE-2022-21164
The package node-lmdb before 0.9.7 are vulnerable to Denial of Service (DoS) when defining a non-invokable ToString value, which will cause a crash during type check.
https://nvd.nist.gov/vuln/detail/CVE-2022-21164
522,378
node-lmdb
97760104c0fd311206b88aecd91fa1f59fe2b85a
https://github.com/Venemo/node-lmdb
https://github.com/Venemo/node-lmdb/commit/97760104c0fd311206b88aecd91fa1f59fe2b85a
Perform argument check for putString
0
NAN_METHOD(TxnWrap::getBinary) { return getCommon(info, valToBinary); }
204,473,871,683,747,200,000,000,000,000,000,000,000
None
null
[ "NVD-CWE-noinfo" ]
CVE-2022-21164
The package node-lmdb before 0.9.7 are vulnerable to Denial of Service (DoS) when defining a non-invokable ToString value, which will cause a crash during type check.
https://nvd.nist.gov/vuln/detail/CVE-2022-21164
522,379
node-lmdb
97760104c0fd311206b88aecd91fa1f59fe2b85a
https://github.com/Venemo/node-lmdb
https://github.com/Venemo/node-lmdb/commit/97760104c0fd311206b88aecd91fa1f59fe2b85a
Perform argument check for putString
0
NAN_METHOD(TxnWrap::commit) { Nan::HandleScope scope; TxnWrap *tw = Nan::ObjectWrap::Unwrap<TxnWrap>(info.This()); if (!tw->txn) { return Nan::ThrowError("The transaction is already closed."); } int rc = mdb_txn_commit(tw->txn); tw->removeFromEnvWrap(); tw->txn = nullptr; if ...
87,809,197,599,161,280,000,000,000,000,000,000,000
None
null
[ "NVD-CWE-noinfo" ]
CVE-2022-21164
The package node-lmdb before 0.9.7 are vulnerable to Denial of Service (DoS) when defining a non-invokable ToString value, which will cause a crash during type check.
https://nvd.nist.gov/vuln/detail/CVE-2022-21164
522,380
node-lmdb
97760104c0fd311206b88aecd91fa1f59fe2b85a
https://github.com/Venemo/node-lmdb
https://github.com/Venemo/node-lmdb/commit/97760104c0fd311206b88aecd91fa1f59fe2b85a
Perform argument check for putString
0
void TxnWrap::removeFromEnvWrap() { if (this->ew) { if (this->ew->currentWriteTxn == this) { this->ew->currentWriteTxn = nullptr; } else { auto it = std::find(ew->readTxns.begin(), ew->readTxns.end(), this); if (it != ew->readTxns.end()) { ...
99,122,763,629,656,950,000,000,000,000,000,000,000
None
null
[ "NVD-CWE-noinfo" ]
CVE-2022-21164
The package node-lmdb before 0.9.7 are vulnerable to Denial of Service (DoS) when defining a non-invokable ToString value, which will cause a crash during type check.
https://nvd.nist.gov/vuln/detail/CVE-2022-21164
522,381
node-lmdb
97760104c0fd311206b88aecd91fa1f59fe2b85a
https://github.com/Venemo/node-lmdb
https://github.com/Venemo/node-lmdb/commit/97760104c0fd311206b88aecd91fa1f59fe2b85a
Perform argument check for putString
0
Nan::NAN_METHOD_RETURN_TYPE TxnWrap::getCommon(Nan::NAN_METHOD_ARGS_TYPE info, Local<Value> (*successFunc)(MDB_val&)) { Nan::HandleScope scope; if (info.Length() != 2 && info.Length() != 3) { return Nan::ThrowError("Invalid number of arguments to cursor.get"); } TxnWrap *tw = Nan::ObjectWr...
231,543,547,489,732,560,000,000,000,000,000,000,000
None
null
[ "NVD-CWE-noinfo" ]
CVE-2022-21164
The package node-lmdb before 0.9.7 are vulnerable to Denial of Service (DoS) when defining a non-invokable ToString value, which will cause a crash during type check.
https://nvd.nist.gov/vuln/detail/CVE-2022-21164
522,382
node-lmdb
97760104c0fd311206b88aecd91fa1f59fe2b85a
https://github.com/Venemo/node-lmdb
https://github.com/Venemo/node-lmdb/commit/97760104c0fd311206b88aecd91fa1f59fe2b85a
Perform argument check for putString
0
NAN_METHOD(TxnWrap::getNumber) { return getCommon(info, valToNumber); }
76,876,237,783,665,510,000,000,000,000,000,000,000
None
null
[ "NVD-CWE-noinfo" ]
CVE-2022-21164
The package node-lmdb before 0.9.7 are vulnerable to Denial of Service (DoS) when defining a non-invokable ToString value, which will cause a crash during type check.
https://nvd.nist.gov/vuln/detail/CVE-2022-21164
522,383
node-lmdb
97760104c0fd311206b88aecd91fa1f59fe2b85a
https://github.com/Venemo/node-lmdb
https://github.com/Venemo/node-lmdb/commit/97760104c0fd311206b88aecd91fa1f59fe2b85a
Perform argument check for putString
0
Nan::NAN_METHOD_RETURN_TYPE TxnWrap::putCommon(Nan::NAN_METHOD_ARGS_TYPE info, void (*fillFunc)(Nan::NAN_METHOD_ARGS_TYPE info, MDB_val&), void (*freeData)(MDB_val&)) { Nan::HandleScope scope; if (info.Length() != 3 && info.Length() != 4) { return Nan::ThrowError("Invalid number of arguments to txn...
80,758,908,337,401,980,000,000,000,000,000,000,000
None
null
[ "NVD-CWE-noinfo" ]
CVE-2022-21164
The package node-lmdb before 0.9.7 are vulnerable to Denial of Service (DoS) when defining a non-invokable ToString value, which will cause a crash during type check.
https://nvd.nist.gov/vuln/detail/CVE-2022-21164
522,384
node-lmdb
97760104c0fd311206b88aecd91fa1f59fe2b85a
https://github.com/Venemo/node-lmdb
https://github.com/Venemo/node-lmdb/commit/97760104c0fd311206b88aecd91fa1f59fe2b85a
Perform argument check for putString
0
NAN_METHOD(TxnWrap::putBinary) { return putCommon(info, [](Nan::NAN_METHOD_ARGS_TYPE info, MDB_val &data) -> void { data.mv_size = node::Buffer::Length(info[2]); data.mv_data = node::Buffer::Data(info[2]); }, [](MDB_val &) -> void { // The data is owned by the node::Buffer so we don't ne...
31,124,891,366,588,017,000,000,000,000,000,000,000
None
null
[ "NVD-CWE-noinfo" ]
CVE-2022-21164
The package node-lmdb before 0.9.7 are vulnerable to Denial of Service (DoS) when defining a non-invokable ToString value, which will cause a crash during type check.
https://nvd.nist.gov/vuln/detail/CVE-2022-21164
522,385
node-lmdb
97760104c0fd311206b88aecd91fa1f59fe2b85a
https://github.com/Venemo/node-lmdb
https://github.com/Venemo/node-lmdb/commit/97760104c0fd311206b88aecd91fa1f59fe2b85a
Perform argument check for putString
0
NAN_METHOD(TxnWrap::getString) { return getCommon(info, valToString); }
225,893,783,809,469,350,000,000,000,000,000,000,000
None
null
[ "NVD-CWE-noinfo" ]
CVE-2022-21164
The package node-lmdb before 0.9.7 are vulnerable to Denial of Service (DoS) when defining a non-invokable ToString value, which will cause a crash during type check.
https://nvd.nist.gov/vuln/detail/CVE-2022-21164
522,386
node-lmdb
97760104c0fd311206b88aecd91fa1f59fe2b85a
https://github.com/Venemo/node-lmdb
https://github.com/Venemo/node-lmdb/commit/97760104c0fd311206b88aecd91fa1f59fe2b85a
Perform argument check for putString
0
NAN_METHOD(TxnWrap::putBoolean) { return putCommon(info, [](Nan::NAN_METHOD_ARGS_TYPE info, MDB_val &data) -> void { auto booleanLocal = Nan::To<v8::Boolean>(info[2]).ToLocalChecked(); booleanToPut = booleanLocal->Value(); data.mv_size = sizeof(bool); data.mv_data = &booleanToPut; ...
249,464,519,442,557,060,000,000,000,000,000,000,000
None
null
[ "NVD-CWE-noinfo" ]
CVE-2022-21164
The package node-lmdb before 0.9.7 are vulnerable to Denial of Service (DoS) when defining a non-invokable ToString value, which will cause a crash during type check.
https://nvd.nist.gov/vuln/detail/CVE-2022-21164
522,442
maddy
7ee6a39c6a1939b376545f030a5efd6f90913583
https://github.com/foxcpp/maddy
https://github.com/foxcpp/maddy/commit/7ee6a39c6a1939b376545f030a5efd6f90913583
auth/pam: Check for account/password expiry See GHSA-6cp7-g972-w9m9. Thanks Youssef Rebahi-Gilbert (ysf) for reporting the issue.
0
static int conv_func(int num_msg, const struct pam_message **msg, struct pam_response **resp, void *appdata_ptr) { *resp = (struct pam_response*)appdata_ptr; return PAM_SUCCESS; }
223,400,127,245,454,900,000,000,000,000,000,000,000
None
null
[ "CWE-613" ]
CVE-2022-24732
Maddy Mail Server is an open source SMTP compatible email server. Versions of maddy prior to 0.5.4 do not implement password expiry or account expiry checking when authenticating using PAM. Users are advised to upgrade. Users unable to upgrade should manually remove expired accounts via existing filtering mechanisms.
https://nvd.nist.gov/vuln/detail/CVE-2022-24732
522,443
maddy
7ee6a39c6a1939b376545f030a5efd6f90913583
https://github.com/foxcpp/maddy
https://github.com/foxcpp/maddy/commit/7ee6a39c6a1939b376545f030a5efd6f90913583
auth/pam: Check for account/password expiry See GHSA-6cp7-g972-w9m9. Thanks Youssef Rebahi-Gilbert (ysf) for reporting the issue.
0
struct error_obj run_pam_auth(const char *username, char *password) { // PAM frees pam_response for us. struct pam_response *reply = malloc(sizeof(struct pam_response)); if (reply == NULL) { struct error_obj ret_val; ret_val.status = 2; ret_val.func_name = "malloc"; ret_val.e...
311,322,554,352,065,030,000,000,000,000,000,000,000
None
null
[ "CWE-613" ]
CVE-2022-24732
Maddy Mail Server is an open source SMTP compatible email server. Versions of maddy prior to 0.5.4 do not implement password expiry or account expiry checking when authenticating using PAM. Users are advised to upgrade. Users unable to upgrade should manually remove expired accounts via existing filtering mechanisms.
https://nvd.nist.gov/vuln/detail/CVE-2022-24732