idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
507,868
openssl
d9d838ddc0ed083fb4c26dd067e71aad7c65ad16
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/d9d838ddc0ed083fb4c26dd067e71aad7c65ad16
Fix a read buffer overrun in X509_aux_print(). The ASN1_STRING_get0_data(3) manual explitely cautions the reader that the data is not necessarily NUL-terminated, and the function X509_alias_set1(3) does not sanitize the data passed into it in any way either, so we must assume the return value from X509_alias_get0(3) i...
0
int X509_aux_print(BIO *out, X509 *x, int indent) { char oidstr[80], first; STACK_OF(ASN1_OBJECT) *trust, *reject; const unsigned char *alias, *keyid; int keyidlen; int i; if (X509_trusted(x) == 0) return 1; trust = X509_get0_trust_objects(x); reject = X509_get0_reject_objects(x)...
259,335,861,165,031,600,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2021-3712
ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a str...
https://nvd.nist.gov/vuln/detail/CVE-2021-3712
216,907
openssl
3118eb64934499d93db3230748a452351d1d9a65
https://github.com/openssl/openssl
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65
Fix possible infinite loop in BN_mod_sqrt() The calculation in some cases does not finish for non-prime p. This fixes CVE-2022-0778. Based on patch by David Benjamin <davidben@google.com>. Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org>
1
BIGNUM *BN_mod_sqrt(BIGNUM *in, const BIGNUM *a, const BIGNUM *p, BN_CTX *ctx) /* * Returns 'ret' such that ret^2 == a (mod p), using the Tonelli/Shanks * algorithm (cf. Henri Cohen, "A Course in Algebraic Computational Number * Theory", algorithm 1.5.1). 'p' must be prime! */ { BIGNUM *ret = in; int err = ...
44,827,292,692,614,650,000,000,000,000,000,000,000
None
null
[ "CWE-835" ]
CVE-2022-0778
The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded i...
https://nvd.nist.gov/vuln/detail/CVE-2022-0778
509,581
openssl
3118eb64934499d93db3230748a452351d1d9a65
https://github.com/openssl/openssl
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65
Fix possible infinite loop in BN_mod_sqrt() The calculation in some cases does not finish for non-prime p. This fixes CVE-2022-0778. Based on patch by David Benjamin <davidben@google.com>. Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org>
0
BIGNUM *BN_mod_sqrt(BIGNUM *in, const BIGNUM *a, const BIGNUM *p, BN_CTX *ctx) /* * Returns 'ret' such that ret^2 == a (mod p), using the Tonelli/Shanks * algorithm (cf. Henri Cohen, "A Course in Algebraic Computational Number * Theory", algorithm 1.5.1). 'p' must be prime, otherwise an error or * an incorrect "res...
248,690,382,993,613,740,000,000,000,000,000,000,000
None
null
[ "CWE-835" ]
CVE-2022-0778
The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded i...
https://nvd.nist.gov/vuln/detail/CVE-2022-0778
216,944
server
3c209bfc040ddfc41ece8357d772547432353fd2
https://github.com/MariaDB/server
https://github.com/MariaDB/server/commit/3c209bfc040ddfc41ece8357d772547432353fd2
MDEV-25994: Crash with union of my_decimal type in ORDER BY clause When single-row subquery fails with "Subquery reutrns more than 1 row" error, it will raise an error and return NULL. On the other hand, Item_singlerow_subselect sets item->maybe_null=0 for table-less subqueries like "(SELECT not_null_value)" (*) Th...
1
bool Item_singlerow_subselect::fix_length_and_dec() { if ((max_columns= engine->cols()) == 1) { if (engine->fix_length_and_dec(row= &value)) return TRUE; } else { if (!(row= (Item_cache**) current_thd->alloc(sizeof(Item_cache*) * max_columns)) || ...
239,302,885,543,348,250,000,000,000,000,000,000,000
None
null
[ "CWE-89" ]
CVE-2022-27380
An issue in the component my_decimal::operator= of MariaDB Server v10.6.3 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.
https://nvd.nist.gov/vuln/detail/CVE-2022-27380
511,887
server
3c209bfc040ddfc41ece8357d772547432353fd2
https://github.com/MariaDB/server
https://github.com/MariaDB/server/commit/3c209bfc040ddfc41ece8357d772547432353fd2
MDEV-25994: Crash with union of my_decimal type in ORDER BY clause When single-row subquery fails with "Subquery reutrns more than 1 row" error, it will raise an error and return NULL. On the other hand, Item_singlerow_subselect sets item->maybe_null=0 for table-less subqueries like "(SELECT not_null_value)" (*) Th...
0
bool Item_singlerow_subselect::fix_length_and_dec() { if ((max_columns= engine->cols()) == 1) { if (engine->fix_length_and_dec(row= &value)) return TRUE; } else { if (!(row= (Item_cache**) current_thd->alloc(sizeof(Item_cache*) * max_columns)) || ...
262,929,527,540,289,200,000,000,000,000,000,000,000
None
null
[ "CWE-89" ]
CVE-2022-27380
An issue in the component my_decimal::operator= of MariaDB Server v10.6.3 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.
https://nvd.nist.gov/vuln/detail/CVE-2022-27380
216,966
server
af810407f78b7f792a9bb8c47c8c532eb3b3a758
https://github.com/MariaDB/server
https://github.com/MariaDB/server/commit/af810407f78b7f792a9bb8c47c8c532eb3b3a758
MDEV-28098 incorrect key in "dup value" error after long unique reset errkey after using it, so that it wouldn't affect the next error message in the next statement
1
void handler::print_error(int error, myf errflag) { bool fatal_error= 0; DBUG_ENTER("handler::print_error"); DBUG_PRINT("enter",("error: %d",error)); if (ha_thd()->transaction_rollback_request) { /* Ensure this becomes a true error */ errflag&= ~(ME_WARNING | ME_NOTE); } int textno= -1; // impos...
176,899,003,449,109,900,000,000,000,000,000,000,000
None
null
[ "CWE-416" ]
CVE-2022-27457
MariaDB Server v10.6.3 and below was discovered to contain an use-after-free in the component my_mb_wc_latin1 at /strings/ctype-latin1.c.
https://nvd.nist.gov/vuln/detail/CVE-2022-27457
514,535
server
af810407f78b7f792a9bb8c47c8c532eb3b3a758
https://github.com/MariaDB/server
https://github.com/MariaDB/server/commit/af810407f78b7f792a9bb8c47c8c532eb3b3a758
MDEV-28098 incorrect key in "dup value" error after long unique reset errkey after using it, so that it wouldn't affect the next error message in the next statement
0
void handler::print_error(int error, myf errflag) { bool fatal_error= 0; DBUG_ENTER("handler::print_error"); DBUG_PRINT("enter",("error: %d",error)); if (ha_thd()->transaction_rollback_request) { /* Ensure this becomes a true error */ errflag&= ~(ME_WARNING | ME_NOTE); } int textno= -1; // impos...
166,818,593,904,132,840,000,000,000,000,000,000,000
None
null
[ "CWE-416" ]
CVE-2022-27457
MariaDB Server v10.6.3 and below was discovered to contain an use-after-free in the component my_mb_wc_latin1 at /strings/ctype-latin1.c.
https://nvd.nist.gov/vuln/detail/CVE-2022-27457
216,969
openssl
2eda98790c5c2741d76d23cc1e74b0dc4f4b391a
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/2eda98790c5c2741d76d23cc1e74b0dc4f4b391a
Fix OCSP_basic_verify signer certificate validation The function `OCSP_basic_verify` validates the signer certificate on an OCSP response. The internal function, ocsp_verify_signer, is responsible for this and is expected to return a 0 value in the event of a failure to verify. Unfortunately, due to a bug, it actually...
1
static int ocsp_verify_signer(X509 *signer, int response, X509_STORE *st, unsigned long flags, STACK_OF(X509) *untrusted, STACK_OF(X509) **chain) { X509_STORE_CTX *ctx = X509_STORE_CTX_new(); X509_VERIFY_PARAM *vp; int ret = -1; if (ctx == NUL...
135,340,782,496,843,480,000,000,000,000,000,000,000
None
null
[ "CWE-703" ]
CVE-2022-1343
The function `OCSP_basic_verify` verifies the signer certificate on an OCSP response. In the case where the (non-default) flag OCSP_NOCHECKS is used then the response will be positive (meaning a successful verification) even in the case where the response signing certificate fails to verify. It is anticipated that most...
https://nvd.nist.gov/vuln/detail/CVE-2022-1343
514,677
openssl
2eda98790c5c2741d76d23cc1e74b0dc4f4b391a
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/2eda98790c5c2741d76d23cc1e74b0dc4f4b391a
Fix OCSP_basic_verify signer certificate validation The function `OCSP_basic_verify` validates the signer certificate on an OCSP response. The internal function, ocsp_verify_signer, is responsible for this and is expected to return a 0 value in the event of a failure to verify. Unfortunately, due to a bug, it actually...
0
static int ocsp_verify_signer(X509 *signer, int response, X509_STORE *st, unsigned long flags, STACK_OF(X509) *untrusted, STACK_OF(X509) **chain) { X509_STORE_CTX *ctx = X509_STORE_CTX_new(); X509_VERIFY_PARAM *vp; int ret = -1; if (ctx == NUL...
216,092,094,613,497,180,000,000,000,000,000,000,000
None
null
[ "CWE-703" ]
CVE-2022-1343
The function `OCSP_basic_verify` verifies the signer certificate on an OCSP response. In the case where the (non-default) flag OCSP_NOCHECKS is used then the response will be positive (meaning a successful verification) even in the case where the response signing certificate fails to verify. It is anticipated that most...
https://nvd.nist.gov/vuln/detail/CVE-2022-1343
216,972
server
b1351c15946349f9daa7e5297fb2ac6f3139e4a8
https://github.com/MariaDB/server
https://github.com/MariaDB/server/commit/b1351c15946349f9daa7e5297fb2ac6f3139e4a8
MDEV-26574 An improper locking bug due to unreleased lock in the ds_xbstream.cc release lock in all as cases n xbstream_open, also fix the case where malloc would return NULL.
1
xbstream_open(ds_ctxt_t *ctxt, const char *path, MY_STAT *mystat) { ds_file_t *file; ds_stream_file_t *stream_file; ds_stream_ctxt_t *stream_ctxt; ds_ctxt_t *dest_ctxt; xb_wstream_t *xbstream; xb_wstream_file_t *xbstream_file; xb_ad(ctxt->pipe_ctxt != NULL); dest_ctxt = ctxt->pipe_ctxt; stream_ctxt = (ds...
133,283,141,336,811,140,000,000,000,000,000,000,000
None
null
[ "CWE-703" ]
CVE-2022-31621
MariaDB Server before 10.7 is vulnerable to Denial of Service. In extra/mariabackup/ds_xbstream.cc, when an error occurs (stream_ctxt->dest_file == NULL) while executing the method xbstream_open, the held lock is not released correctly, which allows local users to trigger a denial of service due to the deadlock.
https://nvd.nist.gov/vuln/detail/CVE-2022-31621
514,715
server
b1351c15946349f9daa7e5297fb2ac6f3139e4a8
https://github.com/MariaDB/server
https://github.com/MariaDB/server/commit/b1351c15946349f9daa7e5297fb2ac6f3139e4a8
MDEV-26574 An improper locking bug due to unreleased lock in the ds_xbstream.cc release lock in all as cases n xbstream_open, also fix the case where malloc would return NULL.
0
xbstream_open(ds_ctxt_t *ctxt, const char *path, MY_STAT *mystat) { ds_file_t *file; ds_stream_file_t *stream_file; ds_stream_ctxt_t *stream_ctxt; ds_ctxt_t *dest_ctxt; xb_wstream_t *xbstream; xb_wstream_file_t *xbstream_file; xb_ad(ctxt->pipe_ctxt != NULL); dest_ctxt = ctxt->pipe_ctxt; stream_ctxt = (ds...
109,927,311,295,173,080,000,000,000,000,000,000,000
None
null
[ "CWE-703" ]
CVE-2022-31621
MariaDB Server before 10.7 is vulnerable to Denial of Service. In extra/mariabackup/ds_xbstream.cc, when an error occurs (stream_ctxt->dest_file == NULL) while executing the method xbstream_open, the held lock is not released correctly, which allows local users to trigger a denial of service due to the deadlock.
https://nvd.nist.gov/vuln/detail/CVE-2022-31621
216,974
server
7c30bc38a588b22b01f11130cfe99e7f36accf94
https://github.com/MariaDB/server
https://github.com/MariaDB/server/commit/7c30bc38a588b22b01f11130cfe99e7f36accf94
MDEV-26561 mariabackup release locks The previous threads locked need to be released too. This occurs if the initialization of any of the non-first mutex/conditition variables errors occurs.
1
create_worker_threads(uint n) { comp_thread_ctxt_t *threads; uint i; threads = (comp_thread_ctxt_t *) my_malloc(sizeof(comp_thread_ctxt_t) * n, MYF(MY_FAE)); for (i = 0; i < n; i++) { comp_thread_ctxt_t *thd = threads + i; thd->num = i + 1; thd->started = FALSE; thd->cancelled = FALSE; thd->data_a...
67,434,126,023,970,640,000,000,000,000,000,000,000
None
null
[ "CWE-703" ]
CVE-2022-31623
MariaDB Server before 10.7 is vulnerable to Denial of Service. In extra/mariabackup/ds_compress.cc, when an error occurs (i.e., going to the err label) while executing the method create_worker_threads, the held lock thd->ctrl_mutex is not released correctly, which allows local users to trigger a denial of service due t...
https://nvd.nist.gov/vuln/detail/CVE-2022-31623
514,724
server
7c30bc38a588b22b01f11130cfe99e7f36accf94
https://github.com/MariaDB/server
https://github.com/MariaDB/server/commit/7c30bc38a588b22b01f11130cfe99e7f36accf94
MDEV-26561 mariabackup release locks The previous threads locked need to be released too. This occurs if the initialization of any of the non-first mutex/conditition variables errors occurs.
0
create_worker_threads(uint n) { comp_thread_ctxt_t *threads; uint i; threads = (comp_thread_ctxt_t *) my_malloc(sizeof(comp_thread_ctxt_t) * n, MYF(MY_FAE)); for (i = 0; i < n; i++) { comp_thread_ctxt_t *thd = threads + i; thd->num = i + 1; thd->started = FALSE; thd->cancelled = FALSE; thd->data_a...
40,328,221,301,176,333,000,000,000,000,000,000,000
None
null
[ "CWE-703" ]
CVE-2022-31623
MariaDB Server before 10.7 is vulnerable to Denial of Service. In extra/mariabackup/ds_compress.cc, when an error occurs (i.e., going to the err label) while executing the method create_worker_threads, the held lock thd->ctrl_mutex is not released correctly, which allows local users to trigger a denial of service due t...
https://nvd.nist.gov/vuln/detail/CVE-2022-31623
216,975
openssl
4d8a88c134df634ba610ff8db1eb8478ac5fd345
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/4d8a88c134df634ba610ff8db1eb8478ac5fd345
rsa: fix bn_reduce_once_in_place call for rsaz_mod_exp_avx512_x2 bn_reduce_once_in_place expects the number of BN_ULONG, but factor_size is moduli bit size. Fixes #18625. Signed-off-by: Xi Ruoyao <xry111@xry111.site> Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from...
1
int ossl_rsaz_mod_exp_avx512_x2(BN_ULONG *res1, const BN_ULONG *base1, const BN_ULONG *exp1, const BN_ULONG *m1, const BN_ULONG *rr1, BN_ULONG k0_1, ...
13,768,713,307,638,353,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2022-2274
The OpenSSL 3.0.4 release introduced a serious bug in the RSA implementation for X86_64 CPUs supporting the AVX512IFMA instructions. This issue makes the RSA implementation with 2048 bit private keys incorrect on such machines and memory corruption will happen during the computation. As a consequence of the memory corr...
https://nvd.nist.gov/vuln/detail/CVE-2022-2274
514,727
openssl
4d8a88c134df634ba610ff8db1eb8478ac5fd345
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/4d8a88c134df634ba610ff8db1eb8478ac5fd345
rsa: fix bn_reduce_once_in_place call for rsaz_mod_exp_avx512_x2 bn_reduce_once_in_place expects the number of BN_ULONG, but factor_size is moduli bit size. Fixes #18625. Signed-off-by: Xi Ruoyao <xry111@xry111.site> Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from...
0
int ossl_rsaz_mod_exp_avx512_x2(BN_ULONG *res1, const BN_ULONG *base1, const BN_ULONG *exp1, const BN_ULONG *m1, const BN_ULONG *rr1, BN_ULONG k0_1, ...
22,144,793,980,359,746,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2022-2274
The OpenSSL 3.0.4 release introduced a serious bug in the RSA implementation for X86_64 CPUs supporting the AVX512IFMA instructions. This issue makes the RSA implementation with 2048 bit private keys incorrect on such machines and memory corruption will happen during the computation. As a consequence of the memory corr...
https://nvd.nist.gov/vuln/detail/CVE-2022-2274
217,011
qemu
3517fb726741c109cae7995f9ea46f0cab6187d6
https://github.com/bonzini/qemu
https://github.com/qemu/qemu/commit/3517fb726741c109cae7995f9ea46f0cab6187d6
target/loongarch: Clean up tlb when cpu reset We should make sure that tlb is clean when cpu reset. Signed-off-by: Song Gao <gaosong@loongson.cn> Message-Id: <20220705070950.2364243-1-gaosong@loongson.cn> Reviewed-by: Richard Henderson <richard.henderson@linaro.org> Signed-off-by: Richard Henderson <richard.henderson...
1
static void loongarch_cpu_reset(DeviceState *dev) { CPUState *cs = CPU(dev); LoongArchCPU *cpu = LOONGARCH_CPU(cs); LoongArchCPUClass *lacc = LOONGARCH_CPU_GET_CLASS(cpu); CPULoongArchState *env = &cpu->env; lacc->parent_reset(dev); env->fcsr0_mask = FCSR0_M1 | FCSR0_M2 | FCSR0_M3; env->fc...
189,863,556,959,363,100,000,000,000,000,000,000,000
None
null
[ "CWE-908" ]
CVE-2022-35414
softmmu/physmem.c in QEMU through 7.0.0 can perform an uninitialized read on the translate_fail path, leading to an io_readx or io_writex crash. NOTE: a third party states that the Non-virtualization Use Case in the qemu.org reference applies here, i.e., "Bugs affecting the non-virtualization use case are not considere...
https://nvd.nist.gov/vuln/detail/CVE-2022-35414
515,809
qemu
3517fb726741c109cae7995f9ea46f0cab6187d6
https://github.com/bonzini/qemu
https://github.com/qemu/qemu/commit/3517fb726741c109cae7995f9ea46f0cab6187d6
target/loongarch: Clean up tlb when cpu reset We should make sure that tlb is clean when cpu reset. Signed-off-by: Song Gao <gaosong@loongson.cn> Message-Id: <20220705070950.2364243-1-gaosong@loongson.cn> Reviewed-by: Richard Henderson <richard.henderson@linaro.org> Signed-off-by: Richard Henderson <richard.henderson...
0
static void loongarch_cpu_reset(DeviceState *dev) { CPUState *cs = CPU(dev); LoongArchCPU *cpu = LOONGARCH_CPU(cs); LoongArchCPUClass *lacc = LOONGARCH_CPU_GET_CLASS(cpu); CPULoongArchState *env = &cpu->env; lacc->parent_reset(dev); env->fcsr0_mask = FCSR0_M1 | FCSR0_M2 | FCSR0_M3; env->fc...
336,031,391,612,226,240,000,000,000,000,000,000,000
None
null
[ "CWE-908" ]
CVE-2022-35414
softmmu/physmem.c in QEMU through 7.0.0 can perform an uninitialized read on the translate_fail path, leading to an io_readx or io_writex crash. NOTE: a third party states that the Non-virtualization Use Case in the qemu.org reference applies here, i.e., "Bugs affecting the non-virtualization use case are not considere...
https://nvd.nist.gov/vuln/detail/CVE-2022-35414
217,013
html-parser
b9aae1e43eb2c8e989510187cff0ba3e996f9a4c
http://github.com/gisle/html-parser
http://github.com/gisle/html-parser/commit/b9aae1e43eb2c8e989510187cff0ba3e996f9a4c
decode_entities confused by trailing incomplete entity Mark Martinec reported crashed when running SpamAssassin, given a particular HTML junk mail to parse. The problem was caused by HTML::Parsers decode_entities function confusing itself when it encountered strings with incomplete entities at the end of the string.
1
decode_entities(pTHX_ SV* sv, HV* entity2char, bool expand_prefix) { STRLEN len; char *s = SvPV_force(sv, len); char *t = s; char *end = s + len; char *ent_start; char *repl; STRLEN repl_len; #ifdef UNICODE_HTML_PARSER char buf[UTF8_MAXLEN]; int repl_utf8; int high_surrogate = 0...
55,873,461,094,162,610,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2009-3627
The decode_entities function in util.c in HTML-Parser before 3.63 allows context-dependent attackers to cause a denial of service (infinite loop) via an incomplete SGML numeric character reference, which triggers generation of an invalid UTF-8 character.
https://nvd.nist.gov/vuln/detail/CVE-2009-3627
515,837
html-parser
b9aae1e43eb2c8e989510187cff0ba3e996f9a4c
http://github.com/gisle/html-parser
http://github.com/gisle/html-parser/commit/b9aae1e43eb2c8e989510187cff0ba3e996f9a4c
decode_entities confused by trailing incomplete entity Mark Martinec reported crashed when running SpamAssassin, given a particular HTML junk mail to parse. The problem was caused by HTML::Parsers decode_entities function confusing itself when it encountered strings with incomplete entities at the end of the string.
0
decode_entities(pTHX_ SV* sv, HV* entity2char, bool expand_prefix) { STRLEN len; char *s = SvPV_force(sv, len); char *t = s; char *end = s + len; char *ent_start; char *repl; STRLEN repl_len; #ifdef UNICODE_HTML_PARSER char buf[UTF8_MAXLEN]; int repl_utf8; int high_surrogate = 0...
324,129,469,800,921,000,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2009-3627
The decode_entities function in util.c in HTML-Parser before 3.63 allows context-dependent attackers to cause a denial of service (infinite loop) via an incomplete SGML numeric character reference, which triggers generation of an invalid UTF-8 character.
https://nvd.nist.gov/vuln/detail/CVE-2009-3627
217,024
platform_bionic
7f5aa4f35e23fd37425b3a5041737cdf58f87385
https://github.com/android/platform_bionic
https://github.com/android/platform_bionic/commit/7f5aa4f35e23fd37425b3a5041737cdf58f87385
bionic: fix integer overflows in chk_malloc(), leak_malloc(), and leak_memalign() The allocation size in chk_malloc(), leak_malloc(), and leak_memalign() functions may be rounded up to a small value, leading to buffer overflows. The code only runs in debugging mode. This patch complements commit 6f04a0f4 (CVE-2009-06...
1
void* leak_malloc(size_t bytes) { // allocate enough space infront of the allocation to store the pointer for // the alloc structure. This will making free'ing the structer really fast! // 1. allocate enough memory and include our header // 2. set the base pointer to be right after our header void...
230,226,643,357,187,370,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2012-2674
Multiple integer overflows in the (1) chk_malloc, (2) leak_malloc, and (3) leak_memalign functions in libc/bionic/malloc_debug_leak.c in Bionic (libc) for Android, when libc.debug.malloc is set, make it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a large size va...
https://nvd.nist.gov/vuln/detail/CVE-2012-2674
515,997
platform_bionic
7f5aa4f35e23fd37425b3a5041737cdf58f87385
https://github.com/android/platform_bionic
https://github.com/android/platform_bionic/commit/7f5aa4f35e23fd37425b3a5041737cdf58f87385
bionic: fix integer overflows in chk_malloc(), leak_malloc(), and leak_memalign() The allocation size in chk_malloc(), leak_malloc(), and leak_memalign() functions may be rounded up to a small value, leading to buffer overflows. The code only runs in debugging mode. This patch complements commit 6f04a0f4 (CVE-2009-06...
0
void* leak_malloc(size_t bytes) { // allocate enough space infront of the allocation to store the pointer for // the alloc structure. This will making free'ing the structer really fast! // 1. allocate enough memory and include our header // 2. set the base pointer to be right after our header size...
331,569,411,028,560,230,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2012-2674
Multiple integer overflows in the (1) chk_malloc, (2) leak_malloc, and (3) leak_memalign functions in libc/bionic/malloc_debug_leak.c in Bionic (libc) for Android, when libc.debug.malloc is set, make it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a large size va...
https://nvd.nist.gov/vuln/detail/CVE-2012-2674
217,025
platform_bionic
7f5aa4f35e23fd37425b3a5041737cdf58f87385
https://github.com/android/platform_bionic
https://github.com/android/platform_bionic/commit/7f5aa4f35e23fd37425b3a5041737cdf58f87385
bionic: fix integer overflows in chk_malloc(), leak_malloc(), and leak_memalign() The allocation size in chk_malloc(), leak_malloc(), and leak_memalign() functions may be rounded up to a small value, leading to buffer overflows. The code only runs in debugging mode. This patch complements commit 6f04a0f4 (CVE-2009-06...
1
void* chk_malloc(size_t bytes) { char* buffer = (char*)dlmalloc(bytes + CHK_OVERHEAD_SIZE); if (buffer) { memset(buffer, CHK_SENTINEL_VALUE, bytes + CHK_OVERHEAD_SIZE); size_t offset = dlmalloc_usable_size(buffer) - sizeof(size_t); *(size_t *)(buffer + offset) = bytes; buffer += ...
207,891,667,812,877,170,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2012-2674
Multiple integer overflows in the (1) chk_malloc, (2) leak_malloc, and (3) leak_memalign functions in libc/bionic/malloc_debug_leak.c in Bionic (libc) for Android, when libc.debug.malloc is set, make it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a large size va...
https://nvd.nist.gov/vuln/detail/CVE-2012-2674
515,993
platform_bionic
7f5aa4f35e23fd37425b3a5041737cdf58f87385
https://github.com/android/platform_bionic
https://github.com/android/platform_bionic/commit/7f5aa4f35e23fd37425b3a5041737cdf58f87385
bionic: fix integer overflows in chk_malloc(), leak_malloc(), and leak_memalign() The allocation size in chk_malloc(), leak_malloc(), and leak_memalign() functions may be rounded up to a small value, leading to buffer overflows. The code only runs in debugging mode. This patch complements commit 6f04a0f4 (CVE-2009-06...
0
void* chk_malloc(size_t bytes) { size_t size = bytes + CHK_OVERHEAD_SIZE; if (size < bytes) { // Overflow. return NULL; } uint8_t* buffer = (uint8_t*) dlmalloc(size); if (buffer) { memset(buffer, CHK_SENTINEL_VALUE, bytes + CHK_OVERHEAD_SIZE); size_t offset = dlmalloc_usable_...
337,156,802,310,075,100,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2012-2674
Multiple integer overflows in the (1) chk_malloc, (2) leak_malloc, and (3) leak_memalign functions in libc/bionic/malloc_debug_leak.c in Bionic (libc) for Android, when libc.debug.malloc is set, make it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a large size va...
https://nvd.nist.gov/vuln/detail/CVE-2012-2674
217,026
platform_bionic
7f5aa4f35e23fd37425b3a5041737cdf58f87385
https://github.com/android/platform_bionic
https://github.com/android/platform_bionic/commit/7f5aa4f35e23fd37425b3a5041737cdf58f87385
bionic: fix integer overflows in chk_malloc(), leak_malloc(), and leak_memalign() The allocation size in chk_malloc(), leak_malloc(), and leak_memalign() functions may be rounded up to a small value, leading to buffer overflows. The code only runs in debugging mode. This patch complements commit 6f04a0f4 (CVE-2009-06...
1
void* leak_memalign(size_t alignment, size_t bytes) { // we can just use malloc if (alignment <= MALLOC_ALIGNMENT) return leak_malloc(bytes); // need to make sure it's a power of two if (alignment & (alignment-1)) alignment = 1L << (31 - __builtin_clz(alignment)); // here, aligment...
113,652,545,145,346,360,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2012-2674
Multiple integer overflows in the (1) chk_malloc, (2) leak_malloc, and (3) leak_memalign functions in libc/bionic/malloc_debug_leak.c in Bionic (libc) for Android, when libc.debug.malloc is set, make it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a large size va...
https://nvd.nist.gov/vuln/detail/CVE-2012-2674
516,002
platform_bionic
7f5aa4f35e23fd37425b3a5041737cdf58f87385
https://github.com/android/platform_bionic
https://github.com/android/platform_bionic/commit/7f5aa4f35e23fd37425b3a5041737cdf58f87385
bionic: fix integer overflows in chk_malloc(), leak_malloc(), and leak_memalign() The allocation size in chk_malloc(), leak_malloc(), and leak_memalign() functions may be rounded up to a small value, leading to buffer overflows. The code only runs in debugging mode. This patch complements commit 6f04a0f4 (CVE-2009-06...
0
void* leak_memalign(size_t alignment, size_t bytes) { // we can just use malloc if (alignment <= MALLOC_ALIGNMENT) return leak_malloc(bytes); // need to make sure it's a power of two if (alignment & (alignment-1)) alignment = 1L << (31 - __builtin_clz(alignment)); // here, aligment...
146,050,602,257,073,810,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2012-2674
Multiple integer overflows in the (1) chk_malloc, (2) leak_malloc, and (3) leak_memalign functions in libc/bionic/malloc_debug_leak.c in Bionic (libc) for Android, when libc.debug.malloc is set, make it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a large size va...
https://nvd.nist.gov/vuln/detail/CVE-2012-2674
217,027
nedmalloc
2965eca30c408c13473c4146a9d47d547d288db1
https://github.com/ned14/nedmalloc
https://github.com/ned14/nedmalloc/commit/2965eca30c408c13473c4146a9d47d547d288db1
Avoid overflowing allocation size in calloc()
1
NEDMALLOCNOALIASATTR NEDMALLOCPTRATTR void * nedpcalloc(nedpool *p, size_t no, size_t size) THROWSPEC { unsigned flags=NEDMALLOC_FORCERESERVE(p, 0, no*size); return nedpmalloc2(p, size*no, 0, M2_ZERO_MEMORY|flags); }
276,074,049,330,858,100,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2012-2675
Multiple integer overflows in the (1) CallMalloc (malloc) and (2) nedpcalloc (calloc) functions in nedmalloc (nedmalloc.c) before 1.10 beta2 make it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a large size value, which causes less memory to be allocated than exp...
https://nvd.nist.gov/vuln/detail/CVE-2012-2675
516,019
nedmalloc
2965eca30c408c13473c4146a9d47d547d288db1
https://github.com/ned14/nedmalloc
https://github.com/ned14/nedmalloc/commit/2965eca30c408c13473c4146a9d47d547d288db1
Avoid overflowing allocation size in calloc()
0
NEDMALLOCNOALIASATTR NEDMALLOCPTRATTR void * nedpmalloc(nedpool *p, size_t size) THROWSPEC { unsigned flags=NEDMALLOC_FORCERESERVE(p, 0, size); return nedpmalloc2(p, size, 0, flags); }
18,285,440,970,008,720,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2012-2675
Multiple integer overflows in the (1) CallMalloc (malloc) and (2) nedpcalloc (calloc) functions in nedmalloc (nedmalloc.c) before 1.10 beta2 make it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a large size value, which causes less memory to be allocated than exp...
https://nvd.nist.gov/vuln/detail/CVE-2012-2675
217,028
squidclamav
80f74451f628264d1d9a1f1c0bbcebc932ba5e00
https://github.com/darold/squidclamav
https://github.com/darold/squidclamav/commit/80f74451f628264d1d9a1f1c0bbcebc932ba5e00
Add a workaround for a squidGuard bug that unescape the URL and send it back unescaped. This could conduct in wrong result and ssquidclamav crash especially with URL containing the %0D or %0A character. John Xue
1
int squidclamav_check_preview_handler(char *preview_data, int preview_data_len, ci_request_t * req) { ci_headers_list_t *req_header; struct http_info httpinf; av_req_data_t *data = ci_service_data(req); char *clientip; struct hostent *clientname; unsigned long ip; char *username; ...
113,201,592,654,248,630,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2012-3501
The squidclamav_check_preview_handler function in squidclamav.c in SquidClamav 5.x before 5.8 and 6.x before 6.7 passes an unescaped URL to a system command call, which allows remote attackers to cause a denial of service (daemon crash) via a URL with certain characters, as demonstrated using %0D or %0A.
https://nvd.nist.gov/vuln/detail/CVE-2012-3501
516,090
squidclamav
80f74451f628264d1d9a1f1c0bbcebc932ba5e00
https://github.com/darold/squidclamav
https://github.com/darold/squidclamav/commit/80f74451f628264d1d9a1f1c0bbcebc932ba5e00
Add a workaround for a squidGuard bug that unescape the URL and send it back unescaped. This could conduct in wrong result and ssquidclamav crash especially with URL containing the %0D or %0A character. John Xue
0
int squidclamav_check_preview_handler(char *preview_data, int preview_data_len, ci_request_t * req) { ci_headers_list_t *req_header; struct http_info httpinf; av_req_data_t *data = ci_service_data(req); char *clientip; struct hostent *clientname; unsigned long ip; char *username; ...
275,224,704,382,283,940,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2012-3501
The squidclamav_check_preview_handler function in squidclamav.c in SquidClamav 5.x before 5.8 and 6.x before 6.7 passes an unescaped URL to a system command call, which allows remote attackers to cause a denial of service (daemon crash) via a URL with certain characters, as demonstrated using %0D or %0A.
https://nvd.nist.gov/vuln/detail/CVE-2012-3501
217,130
illumos-gate
1d276e0b382cf066dae93640746d8b4c54d15452
https://github.com/illumos/illumos-gate
https://github.com/illumos/illumos-gate/commit/1d276e0b382cf066dae93640746d8b4c54d15452
13242 parse_user_name in PAM is sloppy Reviewed by: Alex Wilson <alex@cooperi.net> Approved by: Gordon Ross <gordon.w.ross@gmail.com>
1
parse_user_name(char *user_input, char **ret_username) { register char *ptr; register int index = 0; char username[PAM_MAX_RESP_SIZE]; /* Set the default value for *ret_username */ *ret_username = NULL; /* * Set the initial value for username - this is a buffer holds * the user name. */ bzero((void *)use...
91,358,304,056,509,070,000,000,000,000,000,000,000
None
null
[ "CWE-120" ]
CVE-2020-27678
An issue was discovered in illumos before 2020-10-22, as used in OmniOS before r151030by, r151032ay, and r151034y and SmartOS before 20201022. There is a buffer overflow in parse_user_name in lib/libpam/pam_framework.c.
https://nvd.nist.gov/vuln/detail/CVE-2020-27678
516,902
illumos-gate
1d276e0b382cf066dae93640746d8b4c54d15452
https://github.com/illumos/illumos-gate
https://github.com/illumos/illumos-gate/commit/1d276e0b382cf066dae93640746d8b4c54d15452
13242 parse_user_name in PAM is sloppy Reviewed by: Alex Wilson <alex@cooperi.net> Approved by: Gordon Ross <gordon.w.ross@gmail.com>
0
parse_user_name(char *user_input, char **ret_username) { register char *ptr; register int index = 0; char username[PAM_MAX_RESP_SIZE]; /* Set the default value for *ret_username */ *ret_username = NULL; /* * Set the initial value for username - this is a buffer holds * the user name. */ bzero((void *)use...
73,177,564,007,800,570,000,000,000,000,000,000,000
None
null
[ "CWE-120" ]
CVE-2020-27678
An issue was discovered in illumos before 2020-10-22, as used in OmniOS before r151030by, r151032ay, and r151034y and SmartOS before 20201022. There is a buffer overflow in parse_user_name in lib/libpam/pam_framework.c.
https://nvd.nist.gov/vuln/detail/CVE-2020-27678
217,132
xdelta-devel
ef93ff74203e030073b898c05e8b4860b5d09ef2
https://github.com/jmacd/xdelta-devel
https://github.com/jmacd/xdelta-devel/commit/ef93ff74203e030073b898c05e8b4860b5d09ef2
Add appheader tests; fix buffer overflow in main_get_appheader
1
main_get_appheader (xd3_stream *stream, main_file *ifile, main_file *output, main_file *sfile) { uint8_t *apphead; usize_t appheadsz; int ret; /* The user may disable the application header. Once the appheader * is set, this disables setting it again. */ if (! option_use_appheader) { return; } r...
281,373,746,731,901,400,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2014-9765
Buffer overflow in the main_get_appheader function in xdelta3-main.h in xdelta3 before 3.0.9 allows remote attackers to execute arbitrary code via a crafted input file.
https://nvd.nist.gov/vuln/detail/CVE-2014-9765
517,037
xdelta-devel
ef93ff74203e030073b898c05e8b4860b5d09ef2
https://github.com/jmacd/xdelta-devel
https://github.com/jmacd/xdelta-devel/commit/ef93ff74203e030073b898c05e8b4860b5d09ef2
Add appheader tests; fix buffer overflow in main_get_appheader
0
main_get_appheader (xd3_stream *stream, main_file *ifile, main_file *output, main_file *sfile) { uint8_t *apphead; usize_t appheadsz; int ret; /* The user may disable the application header. Once the appheader * is set, this disables setting it again. */ if (! option_use_appheader) { return; } r...
174,889,360,678,033,000,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2014-9765
Buffer overflow in the main_get_appheader function in xdelta3-main.h in xdelta3 before 3.0.9 allows remote attackers to execute arbitrary code via a crafted input file.
https://nvd.nist.gov/vuln/detail/CVE-2014-9765
217,161
pam_radius
01173ec2426627dbb1e0d96c06c3ffa0b14d36d0
https://github.com/FreeRADIUS/pam_radius
https://github.com/FreeRADIUS/pam_radius/commit/01173ec2426627dbb1e0d96c06c3ffa0b14d36d0
Use "length", which has been limited in size
1
static void add_password(AUTH_HDR *request, unsigned char type, CONST char *password, char *secret) { MD5_CTX md5_secret, my_md5; unsigned char misc[AUTH_VECTOR_LEN]; int i; int length = strlen(password); unsigned char hashed[256 + AUTH_PASS_LEN]; /* can't be longer than this */ unsigned char *vector; attribute_...
33,288,235,879,950,576,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2015-9542
add_password in pam_radius_auth.c in pam_radius 1.4.0 does not correctly check the length of the input password, and is vulnerable to a stack-based buffer overflow during memcpy(). An attacker could send a crafted password to an application (loading the pam_radius library) and crash it. Arbitrary code execution might b...
https://nvd.nist.gov/vuln/detail/CVE-2015-9542
517,189
pam_radius
01173ec2426627dbb1e0d96c06c3ffa0b14d36d0
https://github.com/FreeRADIUS/pam_radius
https://github.com/FreeRADIUS/pam_radius/commit/01173ec2426627dbb1e0d96c06c3ffa0b14d36d0
Use "length", which has been limited in size
0
static void add_password(AUTH_HDR *request, unsigned char type, CONST char *password, char *secret) { MD5_CTX md5_secret, my_md5; unsigned char misc[AUTH_VECTOR_LEN]; int i; int length = strlen(password); unsigned char hashed[256 + AUTH_PASS_LEN]; /* can't be longer than this */ unsigned char *vector; attribute_...
53,245,594,408,979,590,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2015-9542
add_password in pam_radius_auth.c in pam_radius 1.4.0 does not correctly check the length of the input password, and is vulnerable to a stack-based buffer overflow during memcpy(). An attacker could send a crafted password to an application (loading the pam_radius library) and crash it. Arbitrary code execution might b...
https://nvd.nist.gov/vuln/detail/CVE-2015-9542
217,162
neovim
4fad66fbe637818b6b3d6bc5d21923ba72795040
https://github.com/neovim/neovim
https://github.com/neovim/neovim/commit/4fad66fbe637818b6b3d6bc5d21923ba72795040
vim-patch:8.0.0056 Problem: When setting 'filetype' there is no check for a valid name. Solution: Only allow valid characters in 'filetype', 'syntax' and 'keymap'. https://github.com/vim/vim/commit/d0b5138ba4bccff8a744c99836041ef6322ed39a
1
did_set_string_option ( int opt_idx, /* index in options[] table */ char_u **varp, /* pointer to the option variable */ int new_value_alloced, /* new value was allocated */ char_u *oldval, /* previous value of the option ...
5,057,343,703,970,560,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2016-1248
vim before patch 8.0.0056 does not properly validate values for the 'filetype', 'syntax' and 'keymap' options, which may result in the execution of arbitrary code if a file with a specially crafted modeline is opened.
https://nvd.nist.gov/vuln/detail/CVE-2016-1248
517,286
neovim
4fad66fbe637818b6b3d6bc5d21923ba72795040
https://github.com/neovim/neovim
https://github.com/neovim/neovim/commit/4fad66fbe637818b6b3d6bc5d21923ba72795040
vim-patch:8.0.0056 Problem: When setting 'filetype' there is no check for a valid name. Solution: Only allow valid characters in 'filetype', 'syntax' and 'keymap'. https://github.com/vim/vim/commit/d0b5138ba4bccff8a744c99836041ef6322ed39a
0
did_set_string_option ( int opt_idx, /* index in options[] table */ char_u **varp, /* pointer to the option variable */ int new_value_alloced, /* new value was allocated */ char_u *oldval, /* previous value of the option ...
209,905,660,793,532,500,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2016-1248
vim before patch 8.0.0056 does not properly validate values for the 'filetype', 'syntax' and 'keymap' options, which may result in the execution of arbitrary code if a file with a specially crafted modeline is opened.
https://nvd.nist.gov/vuln/detail/CVE-2016-1248
217,177
monit
f12d0cdb42d4e74dffe1525d4062c815c48ac57a
https://bitbucket.org/tildeslash/monit
https://bitbucket.org/tildeslash/monit/commits/f12d0cdb42d4e74dffe1525d4062c815c48ac57a
Fixed: Buffer overrun vulnerability in URL decoding. Thanks to Zack Flack for report.
1
static char x2c(char *hex) { register char digit; digit = ((hex[0] >= 'A') ? ((hex[0] & 0xdf) - 'A')+10 : (hex[0] - '0')); digit *= 16; digit += (hex[1] >= 'A' ? ((hex[1] & 0xdf) - 'A')+10 : (hex[1] - '0')); return(digit); }
156,938,523,355,548,540,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2019-11455
A buffer over-read in Util_urlDecode in util.c in Tildeslash Monit before 5.25.3 allows a remote authenticated attacker to retrieve the contents of adjacent memory via manipulation of GET or POST parameters. The attacker can also cause a denial of service (application outage).
https://nvd.nist.gov/vuln/detail/CVE-2019-11455
517,462
monit
f12d0cdb42d4e74dffe1525d4062c815c48ac57a
https://bitbucket.org/tildeslash/monit
https://bitbucket.org/tildeslash/monit/commits/f12d0cdb42d4e74dffe1525d4062c815c48ac57a
Fixed: Buffer overrun vulnerability in URL decoding. Thanks to Zack Flack for report.
0
static char _x2c(char *hex) { register char digit; digit = ((hex[0] >= 'A') ? ((hex[0] & 0xdf) - 'A')+10 : (hex[0] - '0')); digit *= 16; digit += (hex[1] >= 'A' ? ((hex[1] & 0xdf) - 'A')+10 : (hex[1] - '0')); return(digit); }
204,361,104,051,965,230,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2019-11455
A buffer over-read in Util_urlDecode in util.c in Tildeslash Monit before 5.25.3 allows a remote authenticated attacker to retrieve the contents of adjacent memory via manipulation of GET or POST parameters. The attacker can also cause a denial of service (application outage).
https://nvd.nist.gov/vuln/detail/CVE-2019-11455
217,178
ChakraCore
402f3d967c0a905ec5b9ca9c240783d3f2c15724
https://github.com/Microsoft/ChakraCore
https://github.com/Microsoft/ChakraCore/commit/402f3d967c0a905ec5b9ca9c240783d3f2c15724
[CVE-2017-0028] Fix binding of 'async' identifier in the presence of async arrow function.
1
ParseNodePtr Parser::ParseTerm(BOOL fAllowCall, LPCOLESTR pNameHint, uint32 *pHintLength, uint32 *pShortNameOffset, _Inout_opt_ IdentToken* pToken /*= nullptr*/, bool fUnaryOrParen /*= false*/, _Out_opt_ BOOL* pfCanAssign /*= nullptr*/, _Inout_opt_ BOOL* pfLikelyPattern /*= nullptr*/, _O...
274,209,213,099,014,600,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-0028
A remote code execution vulnerability exists when Microsoft scripting engine improperly accesses objects in memory. The vulnerability could corrupt memory in a way that enables an attacker to execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain t...
https://nvd.nist.gov/vuln/detail/CVE-2017-0028
517,605
ChakraCore
402f3d967c0a905ec5b9ca9c240783d3f2c15724
https://github.com/Microsoft/ChakraCore
https://github.com/Microsoft/ChakraCore/commit/402f3d967c0a905ec5b9ca9c240783d3f2c15724
[CVE-2017-0028] Fix binding of 'async' identifier in the presence of async arrow function.
0
ParseNodePtr Parser::ParseTerm(BOOL fAllowCall, LPCOLESTR pNameHint, uint32 *pHintLength, uint32 *pShortNameOffset, _Inout_opt_ IdentToken* pToken /*= nullptr*/, bool fUnaryOrParen /*= false*/, _Out_opt_ BOOL* pfCanAssign /*= nullptr*/, _Inout_opt_ BOOL* pfLikelyPattern /*= nullptr*/, _O...
313,369,564,772,743,500,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-0028
A remote code execution vulnerability exists when Microsoft scripting engine improperly accesses objects in memory. The vulnerability could corrupt memory in a way that enables an attacker to execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain t...
https://nvd.nist.gov/vuln/detail/CVE-2017-0028
217,184
JPEGsnoop
b4e458612d4294e0cfe01dbf1c0b09a07a8133a4
https://github.com/ImpulseAdventure/JPEGsnoop
https://github.com/ImpulseAdventure/JPEGsnoop/commit/b4e458612d4294e0cfe01dbf1c0b09a07a8133a4#diff-cf9182aecc9d630e8db2e0e35f1eec65
Fixed div0 vulnerability in SampFact
1
unsigned CjfifDecode::DecodeMarker() { TCHAR acIdentifier[MAX_IDENTIFIER]; CString strTmp; CString strFull; // Used for concatenation unsigned nLength; // General purpose unsigned nTmpVal; unsigned nCode; unsigned long nPosEnd; unsigned long nPosSaved; // General-purpose saved positio...
209,975,869,287,019,700,000,000,000,000,000,000,000
None
null
[ "CWE-369" ]
CVE-2017-1000414
ImpulseAdventure JPEGsnoop version 1.7.5 is vulnerable to a division by zero in the JFIF decode handling resulting denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2017-1000414
518,319
JPEGsnoop
b4e458612d4294e0cfe01dbf1c0b09a07a8133a4
https://github.com/ImpulseAdventure/JPEGsnoop
https://github.com/ImpulseAdventure/JPEGsnoop/commit/b4e458612d4294e0cfe01dbf1c0b09a07a8133a4#diff-cf9182aecc9d630e8db2e0e35f1eec65
Fixed div0 vulnerability in SampFact
0
unsigned CjfifDecode::DecodeMarker() { TCHAR acIdentifier[MAX_IDENTIFIER]; CString strTmp; CString strFull; // Used for concatenation unsigned nLength; // General purpose unsigned nTmpVal; unsigned nCode; unsigned long nPosEnd; unsigned long nPosSaved; // General-purpose saved positio...
124,451,953,334,289,280,000,000,000,000,000,000,000
None
null
[ "CWE-369" ]
CVE-2017-1000414
ImpulseAdventure JPEGsnoop version 1.7.5 is vulnerable to a division by zero in the JFIF decode handling resulting denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2017-1000414
217,206
libofx
a70934eea95c76a7737b83773bffe8738935082d
https://github.com/libofx/libofx
https://github.com/libofx/libofx/commit/a70934eea95c76a7737b83773bffe8738935082d
Fix a buffer overflow. This is only the minimum workaround to prevent buffer overflow: Stop iterating once the (fixed!) size of the output buffers is reached. In response to https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0317 However, this code is a huge mess anyway and is in no way anything like ...
1
string sanitize_proprietary_tags(string input_string) { unsigned int i; size_t input_string_size; bool strip = false; bool tag_open = false; int tag_open_idx = 0; //Are we within < > ? bool closing_tag_open = false; //Are we within </ > ? int orig_tag_open_idx = 0; bool proprietary_tag = false; //Are we...
170,627,852,305,112,900,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-2920
An memory corruption vulnerability exists in the .SVG parsing functionality of Computerinsel Photoline 20.02. A specially crafted .SVG file can cause a vulnerability resulting in memory corruption, which can potentially lead to arbitrary code execution. An attacker can send a specific .SVG file to trigger this vulnerab...
https://nvd.nist.gov/vuln/detail/CVE-2017-2920
518,533
libofx
a70934eea95c76a7737b83773bffe8738935082d
https://github.com/libofx/libofx
https://github.com/libofx/libofx/commit/a70934eea95c76a7737b83773bffe8738935082d
Fix a buffer overflow. This is only the minimum workaround to prevent buffer overflow: Stop iterating once the (fixed!) size of the output buffers is reached. In response to https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0317 However, this code is a huge mess anyway and is in no way anything like ...
0
string sanitize_proprietary_tags(string input_string) { unsigned int i; bool strip = false; bool tag_open = false; int tag_open_idx = 0; //Are we within < > ? bool closing_tag_open = false; //Are we within </ > ? int orig_tag_open_idx = 0; bool proprietary_tag = false; //Are we within a proprietary elemen...
296,383,376,717,599,540,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-2920
An memory corruption vulnerability exists in the .SVG parsing functionality of Computerinsel Photoline 20.02. A specially crafted .SVG file can cause a vulnerability resulting in memory corruption, which can potentially lead to arbitrary code execution. An attacker can send a specific .SVG file to trigger this vulnerab...
https://nvd.nist.gov/vuln/detail/CVE-2017-2920
217,217
iortcw
11a83410153756ae350a82ed41b08d128ff7f998
https://github.com/iortcw/iortcw
https://github.com/iortcw/iortcw/commit/11a83410153756ae350a82ed41b08d128ff7f998
All: Merge some file writing extension checks
1
void Con_Dump_f( void ) { int l, x, i; short *line; fileHandle_t f; int bufferlen; char *buffer; char filename[MAX_QPATH]; if ( Cmd_Argc() != 2 ) { Com_Printf( "usage: condump <filename>\n" ); return; } Q_strncpyz( filename, Cmd_Argv( 1 ), sizeof( filename ) ); COM_DefaultExtension( filename, sizeof(...
128,730,628,186,736,880,000,000,000,000,000,000,000
None
null
[ "CWE-269" ]
CVE-2017-6903
In ioquake3 before 2017-03-14, the auto-downloading feature has insufficient content restrictions. This also affects Quake III Arena, OpenArena, OpenJK, iortcw, and other id Tech 3 (aka Quake 3 engine) forks. A malicious auto-downloaded file can trigger loading of crafted auto-downloaded files as native code DLLs. A ma...
https://nvd.nist.gov/vuln/detail/CVE-2017-6903
519,025
iortcw
11a83410153756ae350a82ed41b08d128ff7f998
https://github.com/iortcw/iortcw
https://github.com/iortcw/iortcw/commit/11a83410153756ae350a82ed41b08d128ff7f998
All: Merge some file writing extension checks
0
void Con_Dump_f( void ) { int l, x, i; short *line; fileHandle_t f; int bufferlen; char *buffer; char filename[MAX_QPATH]; if ( Cmd_Argc() != 2 ) { Com_Printf( "usage: condump <filename>\n" ); return; } Q_strncpyz( filename, Cmd_Argv( 1 ), sizeof( filename ) ); COM_DefaultExtension( filename, sizeof(...
160,930,453,638,616,710,000,000,000,000,000,000,000
None
null
[ "CWE-269" ]
CVE-2017-6903
In ioquake3 before 2017-03-14, the auto-downloading feature has insufficient content restrictions. This also affects Quake III Arena, OpenArena, OpenJK, iortcw, and other id Tech 3 (aka Quake 3 engine) forks. A malicious auto-downloaded file can trigger loading of crafted auto-downloaded files as native code DLLs. A ma...
https://nvd.nist.gov/vuln/detail/CVE-2017-6903
217,218
ps-lite
4be817e8b03e7e92517e91f2dfcc50865e91c6ea
https://github.com/dmlc/ps-lite
https://github.com/dmlc/ps-lite/commit/4be817e8b03e7e92517e91f2dfcc50865e91c6ea
Avoid listening on all interfaces by default
1
int Bind(const Node& node, int max_retry) override { receiver_ = zmq_socket(context_, ZMQ_ROUTER); CHECK(receiver_ != NULL) << "create receiver socket failed: " << zmq_strerror(errno); int local = GetEnv("DMLC_LOCAL", 0); std::string addr = local ? "ipc:///tmp/" : "tcp://*:"; int port = no...
27,773,348,298,973,745,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2018-1281
The clustered setup of Apache MXNet allows users to specify which IP address and port the scheduler will listen on via the DMLC_PS_ROOT_URI and DMLC_PS_ROOT_PORT env variables. In versions older than 1.0.0, however, the MXNet framework will listen on 0.0.0.0 rather than user specified DMLC_PS_ROOT_URI once a scheduler ...
https://nvd.nist.gov/vuln/detail/CVE-2018-1281
519,035
ps-lite
4be817e8b03e7e92517e91f2dfcc50865e91c6ea
https://github.com/dmlc/ps-lite
https://github.com/dmlc/ps-lite/commit/4be817e8b03e7e92517e91f2dfcc50865e91c6ea
Avoid listening on all interfaces by default
0
int Bind(const Node& node, int max_retry) override { receiver_ = zmq_socket(context_, ZMQ_ROUTER); CHECK(receiver_ != NULL) << "create receiver socket failed: " << zmq_strerror(errno); int local = GetEnv("DMLC_LOCAL", 0); std::string hostname = node.hostname.empty() ? "*" : node.hostname; ...
287,329,875,877,248,700,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2018-1281
The clustered setup of Apache MXNet allows users to specify which IP address and port the scheduler will listen on via the DMLC_PS_ROOT_URI and DMLC_PS_ROOT_PORT env variables. In versions older than 1.0.0, however, the MXNet framework will listen on 0.0.0.0 rather than user specified DMLC_PS_ROOT_URI once a scheduler ...
https://nvd.nist.gov/vuln/detail/CVE-2018-1281
217,219
WAVM
2de6cf70c5ef31e22ed119a25ac2daeefd3d18a1
https://github.com/WAVM/WAVM
https://github.com/WAVM/WAVM/commit/2de6cf70c5ef31e22ed119a25ac2daeefd3d18a1
Fix out-of-bounds array access when passing a <4 byte input file to wavm or wavm-compile
1
inline bool loadModule(const char* filename, IR::Module& outModule) { // Read the specified file into an array. std::vector<U8> fileBytes; if(!loadFile(filename, fileBytes)) { return false; } // If the file starts with the WASM binary magic number, load it as a binary irModule. if(*(U32*)fileBytes.data() == 0x6d7...
247,635,764,926,562,080,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2018-17292
An issue was discovered in WAVM before 2018-09-16. The loadModule function in Include/Inline/CLI.h lacks checking of the file length before a file magic comparison, allowing attackers to cause a Denial of Service (application crash caused by out-of-bounds read) by crafting a file that has fewer than 4 bytes.
https://nvd.nist.gov/vuln/detail/CVE-2018-17292
519,044
WAVM
2de6cf70c5ef31e22ed119a25ac2daeefd3d18a1
https://github.com/WAVM/WAVM
https://github.com/WAVM/WAVM/commit/2de6cf70c5ef31e22ed119a25ac2daeefd3d18a1
Fix out-of-bounds array access when passing a <4 byte input file to wavm or wavm-compile
0
inline bool loadModule(const char* filename, IR::Module& outModule) { // Read the specified file into an array. std::vector<U8> fileBytes; if(!loadFile(filename, fileBytes)) { return false; } // If the file starts with the WASM binary magic number, load it as a binary irModule. if(fileBytes.size() >= 4 && *(U32*)...
226,446,143,927,897,680,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2018-17292
An issue was discovered in WAVM before 2018-09-16. The loadModule function in Include/Inline/CLI.h lacks checking of the file length before a file magic comparison, allowing attackers to cause a Denial of Service (application crash caused by out-of-bounds read) by crafting a file that has fewer than 4 bytes.
https://nvd.nist.gov/vuln/detail/CVE-2018-17292
217,220
WAVM
31d670b6489e6d708c3b04b911cdf14ac43d846d
https://github.com/WAVM/WAVM
https://github.com/WAVM/WAVM/commit/31d670b6489e6d708c3b04b911cdf14ac43d846d
Fix dereferencing null pointer when running wavm with WebAssembly main function that takes command-line arguments but no Emscripten memory to write them to
1
static int run(const CommandLineOptions& options) { IR::Module irModule; // Load the module. if(!loadModule(options.filename, irModule)) { return EXIT_FAILURE; } if(options.onlyCheck) { return EXIT_SUCCESS; } // Compile the module. Runtime::Module* module = nullptr; if(!options.precompiled) { module = Runtime:...
232,153,025,347,729,260,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2018-17293
An issue was discovered in WAVM before 2018-09-16. The run function in Programs/wavm/wavm.cpp does not check whether there is Emscripten memory to store the command-line arguments passed by the input WebAssembly file's main function, which allows attackers to cause a denial of service (application crash by NULL pointer...
https://nvd.nist.gov/vuln/detail/CVE-2018-17293
519,050
WAVM
31d670b6489e6d708c3b04b911cdf14ac43d846d
https://github.com/WAVM/WAVM
https://github.com/WAVM/WAVM/commit/31d670b6489e6d708c3b04b911cdf14ac43d846d
Fix dereferencing null pointer when running wavm with WebAssembly main function that takes command-line arguments but no Emscripten memory to write them to
0
static int run(const CommandLineOptions& options) { IR::Module irModule; // Load the module. if(!loadModule(options.filename, irModule)) { return EXIT_FAILURE; } if(options.onlyCheck) { return EXIT_SUCCESS; } // Compile the module. Runtime::Module* module = nullptr; if(!options.precompiled) { module = Runtime:...
71,582,623,173,496,280,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2018-17293
An issue was discovered in WAVM before 2018-09-16. The run function in Programs/wavm/wavm.cpp does not check whether there is Emscripten memory to store the command-line arguments passed by the input WebAssembly file's main function, which allows attackers to cause a denial of service (application crash by NULL pointer...
https://nvd.nist.gov/vuln/detail/CVE-2018-17293
217,235
abuild
4f90ce92778d0ee302e288def75591b96a397c8b
https://github.com/sroracle/abuild
https://github.com/sroracle/abuild/commit/4f90ce92778d0ee302e288def75591b96a397c8b
abuild-sudo: don't allow --keys-dir Not allowing --allow-untrusted is obviously a good idea, but it can be trivially bypassed if --keys-dir is allowed: $ abuild-apk add foo-1-r0.apk ERROR: foo-1-r0.apk: UNTRUSTED signature $ abuild-apk --allow-untrusted add foo-1-r0.apk abuild-apk: --allow-untrusted: not allowed opti...
1
int main(int argc, const char *argv[]) { struct group *grent; const char *cmd; const char *path; int i; struct passwd *pw; grent = getgrnam(ABUILD_GROUP); if (grent == NULL) errx(1, "%s: Group not found", ABUILD_GROUP); char *name = NULL; pw = getpwuid(getuid()); if (pw) name = pw->pw_name; if (!is_in...
246,817,719,144,674,770,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2019-12875
Alpine Linux abuild through 3.4.0 allows an unprivileged member of the abuild group to add an untrusted package via a --keys-dir option that causes acceptance of an untrusted signing key.
https://nvd.nist.gov/vuln/detail/CVE-2019-12875
519,115
abuild
4f90ce92778d0ee302e288def75591b96a397c8b
https://github.com/sroracle/abuild
https://github.com/sroracle/abuild/commit/4f90ce92778d0ee302e288def75591b96a397c8b
abuild-sudo: don't allow --keys-dir Not allowing --allow-untrusted is obviously a good idea, but it can be trivially bypassed if --keys-dir is allowed: $ abuild-apk add foo-1-r0.apk ERROR: foo-1-r0.apk: UNTRUSTED signature $ abuild-apk --allow-untrusted add foo-1-r0.apk abuild-apk: --allow-untrusted: not allowed opti...
0
int main(int argc, const char *argv[]) { struct group *grent; const char *cmd; const char *path; int i; struct passwd *pw; grent = getgrnam(ABUILD_GROUP); if (grent == NULL) errx(1, "%s: Group not found", ABUILD_GROUP); char *name = NULL; pw = getpwuid(getuid()); if (pw) name = pw->pw_name; if (!is_in...
293,885,072,328,865,660,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2019-12875
Alpine Linux abuild through 3.4.0 allows an unprivileged member of the abuild group to add an untrusted package via a --keys-dir option that causes acceptance of an untrusted signing key.
https://nvd.nist.gov/vuln/detail/CVE-2019-12875
217,243
elog
993bed4923c88593cc6b1186e0d1b9564994a25a
https://bitbucket.org/ritt/elog
https://bitbucket.org/ritt/elog/commits/993bed4923c88593cc6b1186e0d1b9564994a25a
Serve SVG files as attachments only to avoid XSS vulnerabilities
1
void send_file_direct(char *file_name) { int fh, i, length, delta; char str[MAX_PATH_LENGTH], dir[MAX_PATH_LENGTH], charset[80]; getcwd(dir, sizeof(dir)); fh = open(file_name, O_RDONLY | O_BINARY); if (fh > 0) { lseek(fh, 0, SEEK_END); length = TELL(fh); lseek(fh, 0, SEEK_SET); ...
336,698,074,074,745,940,000,000,000,000,000,000,000
None
null
[ "CWE-79" ]
CVE-2019-20376
A cross-site scripting (XSS) vulnerability in Electronic Logbook (ELOG) 3.1.4 allows remote attackers to inject arbitrary web script or HTML via a crafted SVG document to elogd.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-20376
519,320
elog
993bed4923c88593cc6b1186e0d1b9564994a25a
https://bitbucket.org/ritt/elog
https://bitbucket.org/ritt/elog/commits/993bed4923c88593cc6b1186e0d1b9564994a25a
Serve SVG files as attachments only to avoid XSS vulnerabilities
0
void send_file_direct(char *file_name) { int fh, i, length, delta; char str[MAX_PATH_LENGTH], dir[MAX_PATH_LENGTH], charset[80]; getcwd(dir, sizeof(dir)); fh = open(file_name, O_RDONLY | O_BINARY); if (fh > 0) { lseek(fh, 0, SEEK_END); length = TELL(fh); lseek(fh, 0, SEEK_SET); ...
325,071,300,405,512,530,000,000,000,000,000,000,000
None
null
[ "CWE-79" ]
CVE-2019-20376
A cross-site scripting (XSS) vulnerability in Electronic Logbook (ELOG) 3.1.4 allows remote attackers to inject arbitrary web script or HTML via a crafted SVG document to elogd.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-20376
217,247
naviserver
a5c3079f1d8996d5f34c9384a440acf3519ca3bb
https://bitbucket.org/naviserver/naviserver
https://bitbucket.org/naviserver/naviserver/commits/a5c3079f1d8996d5f34c9384a440acf3519ca3bb
fix for bug https://sourceforge.net/p/naviserver/bugs/89/ A negative value provided as chunk encoding length led to a potential crash. A test case for this case was added to the regression test.
1
ChunkedDecode(Request *reqPtr, bool update) { const Tcl_DString *bufPtr; const char *end, *chunkStart; bool success = NS_TRUE; NS_NONNULL_ASSERT(reqPtr != NULL); bufPtr = &reqPtr->buffer; end = bufPtr->string + bufPtr->length; chunkStart = bufPtr->string + reqPtr->chunk...
210,559,204,718,292,940,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2020-13111
NaviServer 4.99.4 to 4.99.19 allows denial of service due to the nsd/driver.c ChunkedDecode function not properly validating the length of a chunk. A remote attacker can craft a chunked-transfer request that will result in a negative value being passed to memmove via the size parameter, causing the process to crash.
https://nvd.nist.gov/vuln/detail/CVE-2020-13111
519,503
naviserver
a5c3079f1d8996d5f34c9384a440acf3519ca3bb
https://bitbucket.org/naviserver/naviserver
https://bitbucket.org/naviserver/naviserver/commits/a5c3079f1d8996d5f34c9384a440acf3519ca3bb
fix for bug https://sourceforge.net/p/naviserver/bugs/89/ A negative value provided as chunk encoding length led to a potential crash. A test case for this case was added to the regression test.
0
ChunkedDecode(Request *reqPtr, bool update) { const Tcl_DString *bufPtr; const char *end, *chunkStart; SockState result = SOCK_READY; NS_NONNULL_ASSERT(reqPtr != NULL); bufPtr = &reqPtr->buffer; end = bufPtr->string + bufPtr->length; chunkStart = bufPtr->string + reqPtr->chu...
52,143,067,939,071,995,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2020-13111
NaviServer 4.99.4 to 4.99.19 allows denial of service due to the nsd/driver.c ChunkedDecode function not properly validating the length of a chunk. A remote attacker can craft a chunked-transfer request that will result in a negative value being passed to memmove via the size parameter, causing the process to crash.
https://nvd.nist.gov/vuln/detail/CVE-2020-13111
217,250
cbang
1c1dba62bd3e6fa9d0d0c0aa21926043b75382c7
https://github.com/CauldronDevelopmentLLC/cbang
https://github.com/CauldronDevelopmentLLC/cbang/commit/1c1dba62bd3e6fa9d0d0c0aa21926043b75382c7
Don't allow extraction of tar files outside of the target directory, added tar tests
1
std::string TarFileReader::extract(const string &_path) { if (_path.empty()) THROW("path cannot be empty"); if (!hasMore()) THROW("No more tar files"); string path = _path; if (SystemUtilities::isDirectory(path)) path += "/" + getFilename(); LOG_DEBUG(5, "Extracting: " << path); return extract(*SystemUti...
230,347,907,451,407,680,000,000,000,000,000,000,000
None
null
[ "CWE-22" ]
CVE-2020-15908
tar/TarFileReader.cpp in Cauldron cbang (aka C-Bang or C!) before 1.6.0 allows Directory Traversal during extraction from a TAR archive.
https://nvd.nist.gov/vuln/detail/CVE-2020-15908
519,599
cbang
1c1dba62bd3e6fa9d0d0c0aa21926043b75382c7
https://github.com/CauldronDevelopmentLLC/cbang
https://github.com/CauldronDevelopmentLLC/cbang/commit/1c1dba62bd3e6fa9d0d0c0aa21926043b75382c7
Don't allow extraction of tar files outside of the target directory, added tar tests
0
std::string TarFileReader::extract(const string &_path) { if (_path.empty()) THROW("path cannot be empty"); if (!hasMore()) THROW("No more tar files"); string path = _path; if (SystemUtilities::isDirectory(path)) { path += "/" + getFilename(); // Check that path is under the target directory strin...
313,067,532,887,911,780,000,000,000,000,000,000,000
None
null
[ "CWE-22" ]
CVE-2020-15908
tar/TarFileReader.cpp in Cauldron cbang (aka C-Bang or C!) before 1.6.0 allows Directory Traversal during extraction from a TAR archive.
https://nvd.nist.gov/vuln/detail/CVE-2020-15908
217,251
pdf2json
80bf71f16c804108fd933e267fe31692aaa509b4
https://github.com/flexpaper/pdf2json
https://github.com/flexpaper/pdf2json/commit/80bf71f16c804108fd933e267fe31692aaa509b4
Fix for heap vulnerability
1
void CharCodeToUnicode::addMapping(CharCode code, char *uStr, int n, int offset) { CharCode oldLen, i; Unicode u; char uHex[5]; int j; if (code >= mapLen) { oldLen = mapLen; mapLen = (code + 256) & ~255; map = (Unicode *)greallocn(map, mapLen, sizeof(Unicode)); for (i = oldLen; i < map...
19,626,458,378,996,310,000,000,000,000,000,000,000
None
null
[ "CWE-120" ]
CVE-2020-18750
Buffer overflow in pdf2json 0.69 allows local users to execute arbitrary code by converting a crafted PDF file.
https://nvd.nist.gov/vuln/detail/CVE-2020-18750
519,625
pdf2json
80bf71f16c804108fd933e267fe31692aaa509b4
https://github.com/flexpaper/pdf2json
https://github.com/flexpaper/pdf2json/commit/80bf71f16c804108fd933e267fe31692aaa509b4
Fix for heap vulnerability
0
void CharCodeToUnicode::addMapping(CharCode code, char *uStr, int n, int offset) { CharCode oldLen, i; Unicode u; char uHex[5]; int j; if (code >= mapLen) { oldLen = mapLen; mapLen = (code + 256) & ~255; if (unlikely(code >= mapLen)) { error(-1, "Illegal code value in CharCodeToUnico...
86,424,053,612,770,930,000,000,000,000,000,000,000
None
null
[ "CWE-120" ]
CVE-2020-18750
Buffer overflow in pdf2json 0.69 allows local users to execute arbitrary code by converting a crafted PDF file.
https://nvd.nist.gov/vuln/detail/CVE-2020-18750
217,252
Platinum
9a4ceaccb1585ec35c45fd8e2585538fff6a865e
https://github.com/plutinosoft/Platinum
https://github.com/plutinosoft/Platinum/commit/9a4ceaccb1585ec35c45fd8e2585538fff6a865e
Fix vulnerability around urls crafter as http://host/../secret.foo (#24)
1
PLT_HttpServer::ServeFile(const NPT_HttpRequest& request, const NPT_HttpRequestContext& context, NPT_HttpResponse& response, NPT_String file_path) { NPT_InputStreamReference stream; NPT_File ...
80,959,503,616,478,400,000,000,000,000,000,000,000
None
null
[ "CWE-22" ]
CVE-2020-19858
Platinum Upnp SDK through 1.2.0 has a directory traversal vulnerability. The attack could remote attack victim by sending http://ip:port/../privacy.avi URL to compromise a victim's privacy.
https://nvd.nist.gov/vuln/detail/CVE-2020-19858
519,628
Platinum
9a4ceaccb1585ec35c45fd8e2585538fff6a865e
https://github.com/plutinosoft/Platinum
https://github.com/plutinosoft/Platinum/commit/9a4ceaccb1585ec35c45fd8e2585538fff6a865e
Fix vulnerability around urls crafter as http://host/../secret.foo (#24)
0
PLT_HttpServer::ServeFile(const NPT_HttpRequest& request, const NPT_HttpRequestContext& context, NPT_HttpResponse& response, NPT_String file_path) { NPT_InputStreamReference stream; NPT_File ...
202,319,851,150,031,300,000,000,000,000,000,000,000
None
null
[ "CWE-22" ]
CVE-2020-19858
Platinum Upnp SDK through 1.2.0 has a directory traversal vulnerability. The attack could remote attack victim by sending http://ip:port/../privacy.avi URL to compromise a victim's privacy.
https://nvd.nist.gov/vuln/detail/CVE-2020-19858
217,285
jsish
430ea27accd4d4ffddc946c9402e7c9064835a18
https://github.com/pcmacdon/jsish
https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18
Release "3.0.7": Fix toPrecision bug "stack overflow #4". FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de
1
static Jsi_RC NumberToPrecisionCmd(Jsi_Interp *interp, Jsi_Value *args, Jsi_Value *_this, Jsi_Value **ret, Jsi_Func *funcPtr) { char buf[100]; int prec = 0, skip = 0; Jsi_Number num; Jsi_Value *v; ChkStringN(_this, funcPtr, v); if (Jsi_GetIntFromValue(interp, Jsi_ValueArrayIndex(interp, args...
25,461,200,118,267,773,000,000,000,000,000,000,000
None
null
[ "CWE-120" ]
CVE-2020-22873
Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2020-22873
520,296
jsish
430ea27accd4d4ffddc946c9402e7c9064835a18
https://github.com/pcmacdon/jsish
https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18
Release "3.0.7": Fix toPrecision bug "stack overflow #4". FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de
0
static Jsi_RC NumberToPrecisionCmd(Jsi_Interp *interp, Jsi_Value *args, Jsi_Value *_this, Jsi_Value **ret, Jsi_Func *funcPtr) { char buf[JSI_MAX_NUMBER_STRING*2]; int prec = 0, skip = 0; Jsi_Number num; Jsi_Value *v; ChkStringN(_this, funcPtr, v); if (Jsi_GetIntFromValue(interp, Jsi_ValueArr...
176,441,123,893,071,800,000,000,000,000,000,000,000
None
null
[ "CWE-120" ]
CVE-2020-22873
Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2020-22873
217,327
retdec
517298bafaaff0a8e3dd60dd055a67c41b545807
https://github.com/avast/retdec
https://github.com/avast/retdec/commit/517298bafaaff0a8e3dd60dd055a67c41b545807
Try to fix issue #637 Reference: https://github.com/avast/retdec/issues/637
1
bool Decoder::canSplitFunctionOn( utils::Address addr, llvm::BasicBlock* splitBb, std::set<llvm::BasicBlock*>& newFncStarts) { newFncStarts.insert(splitBb); auto* f = splitBb->getParent(); auto fAddr = getFunctionAddress(f); auto fSzIt = _fnc2sz.find(f); if (fSzIt != _fnc2sz.end()) { if (fAddr <= addr &...
251,333,548,688,546,380,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2020-23907
An issue was discovered in retdec v3.3. In function canSplitFunctionOn() of ir_modifications.cpp, there is a possible out of bounds read due to a heap buffer overflow. The impact is: Deny of Service, Memory Disclosure, and Possible Code Execution.
https://nvd.nist.gov/vuln/detail/CVE-2020-23907
520,976
retdec
517298bafaaff0a8e3dd60dd055a67c41b545807
https://github.com/avast/retdec
https://github.com/avast/retdec/commit/517298bafaaff0a8e3dd60dd055a67c41b545807
Try to fix issue #637 Reference: https://github.com/avast/retdec/issues/637
0
bool Decoder::canSplitFunctionOn( utils::Address addr, llvm::BasicBlock* splitBb, std::set<llvm::BasicBlock*>& newFncStarts) { newFncStarts.insert(splitBb); auto* f = splitBb->getParent(); auto fAddr = getFunctionAddress(f); auto fSzIt = _fnc2sz.find(f); if (fSzIt != _fnc2sz.end()) { if (fAddr <= addr &...
52,757,457,497,306,000,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2020-23907
An issue was discovered in retdec v3.3. In function canSplitFunctionOn() of ir_modifications.cpp, there is a possible out of bounds read due to a heap buffer overflow. The impact is: Deny of Service, Memory Disclosure, and Possible Code Execution.
https://nvd.nist.gov/vuln/detail/CVE-2020-23907
217,328
oocborrt
539851c66778f68a244633985f6f8d0df94ea3b3
https://github.com/objsys/oocborrt
https://github.com/objsys/oocborrt/commit/539851c66778f68a244633985f6f8d0df94ea3b3
fixed missing return status test error
1
static int cbor2json (OSCTXT* pCborCtxt, OSCTXT* pJsonCtxt) { int ret = 0; OSOCTET tag, ub; /* Read byte from stream */ ret = rtxReadBytes (pCborCtxt, &ub, 1); if (0 != ret) return LOG_RTERR (pCborCtxt, ret); tag = ub >> 5; /* Switch on tag value */ switch (tag) { case OSRTCBOR_...
127,504,669,515,341,630,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2020-24753
A memory corruption vulnerability in Objective Open CBOR Run-time (oocborrt) in versions before 2020-08-12 could allow an attacker to execute code via crafted Concise Binary Object Representation (CBOR) input to the cbor2json decoder. An uncaught error while decoding CBOR Major Type 3 text strings leads to the use of a...
https://nvd.nist.gov/vuln/detail/CVE-2020-24753
520,982
oocborrt
539851c66778f68a244633985f6f8d0df94ea3b3
https://github.com/objsys/oocborrt
https://github.com/objsys/oocborrt/commit/539851c66778f68a244633985f6f8d0df94ea3b3
fixed missing return status test error
0
static int cbor2json (OSCTXT* pCborCtxt, OSCTXT* pJsonCtxt) { int ret = 0; OSOCTET tag, ub; /* Read byte from stream */ ret = rtxReadBytes (pCborCtxt, &ub, 1); if (0 != ret) return LOG_RTERR (pCborCtxt, ret); tag = ub >> 5; /* Switch on tag value */ switch (tag) { case OSRTCBOR_...
182,192,642,033,756,700,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2020-24753
A memory corruption vulnerability in Objective Open CBOR Run-time (oocborrt) in versions before 2020-08-12 could allow an attacker to execute code via crafted Concise Binary Object Representation (CBOR) input to the cbor2json decoder. An uncaught error while decoding CBOR Major Type 3 text strings leads to the use of a...
https://nvd.nist.gov/vuln/detail/CVE-2020-24753
217,461
sqlcipher
cb71f53e8cea4802509f182fa5bead0ac6ab0e7f
https://github.com/sqlcipher/sqlcipher
https://github.com/sqlcipher/sqlcipher/commit/cb71f53e8cea4802509f182fa5bead0ac6ab0e7f
fix sqlcipher_export handling of NULL parameters
1
void sqlcipher_exportFunc(sqlite3_context *context, int argc, sqlite3_value **argv) { sqlite3 *db = sqlite3_context_db_handle(context); const char* targetDb, *sourceDb; int targetDb_idx = 0; u64 saved_flags = db->flags; /* Saved value of the db->flags */ u32 saved_mDbFlags = db->mDbFlags; /* Sa...
76,223,646,707,037,760,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2021-3119
Zetetic SQLCipher 4.x before 4.4.3 has a NULL pointer dereferencing issue related to sqlcipher_export in crypto.c and sqlite3StrICmp in sqlite3.c. This may allow an attacker to perform a remote denial of service attack. For example, an SQL injection can be used to execute the crafted SQL command sequence, which causes ...
https://nvd.nist.gov/vuln/detail/CVE-2021-3119
521,506
sqlcipher
cb71f53e8cea4802509f182fa5bead0ac6ab0e7f
https://github.com/sqlcipher/sqlcipher
https://github.com/sqlcipher/sqlcipher/commit/cb71f53e8cea4802509f182fa5bead0ac6ab0e7f
fix sqlcipher_export handling of NULL parameters
0
void sqlcipher_exportFunc(sqlite3_context *context, int argc, sqlite3_value **argv) { sqlite3 *db = sqlite3_context_db_handle(context); const char* targetDb, *sourceDb; int targetDb_idx = 0; u64 saved_flags = db->flags; /* Saved value of the db->flags */ u32 saved_mDbFlags = db->mDbFlags; /* Sa...
291,673,322,331,677,800,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2021-3119
Zetetic SQLCipher 4.x before 4.4.3 has a NULL pointer dereferencing issue related to sqlcipher_export in crypto.c and sqlite3StrICmp in sqlite3.c. This may allow an attacker to perform a remote denial of service attack. For example, an SQL injection can be used to execute the crafted SQL command sequence, which causes ...
https://nvd.nist.gov/vuln/detail/CVE-2021-3119
217,552
maddy
7ee6a39c6a1939b376545f030a5efd6f90913583
https://github.com/foxcpp/maddy
https://github.com/foxcpp/maddy/commit/7ee6a39c6a1939b376545f030a5efd6f90913583
auth/pam: Check for account/password expiry See GHSA-6cp7-g972-w9m9. Thanks Youssef Rebahi-Gilbert (ysf) for reporting the issue.
1
struct error_obj run_pam_auth(const char *username, char *password) { // PAM frees pam_response for us. struct pam_response *reply = malloc(sizeof(struct pam_response)); if (reply == NULL) { struct error_obj ret_val; ret_val.status = 2; ret_val.func_name = "malloc"; ret_val.e...
65,001,628,105,258,760,000,000,000,000,000,000,000
None
null
[ "CWE-613" ]
CVE-2022-24732
Maddy Mail Server is an open source SMTP compatible email server. Versions of maddy prior to 0.5.4 do not implement password expiry or account expiry checking when authenticating using PAM. Users are advised to upgrade. Users unable to upgrade should manually remove expired accounts via existing filtering mechanisms.
https://nvd.nist.gov/vuln/detail/CVE-2022-24732
522,443
maddy
7ee6a39c6a1939b376545f030a5efd6f90913583
https://github.com/foxcpp/maddy
https://github.com/foxcpp/maddy/commit/7ee6a39c6a1939b376545f030a5efd6f90913583
auth/pam: Check for account/password expiry See GHSA-6cp7-g972-w9m9. Thanks Youssef Rebahi-Gilbert (ysf) for reporting the issue.
0
struct error_obj run_pam_auth(const char *username, char *password) { // PAM frees pam_response for us. struct pam_response *reply = malloc(sizeof(struct pam_response)); if (reply == NULL) { struct error_obj ret_val; ret_val.status = 2; ret_val.func_name = "malloc"; ret_val.e...
311,322,554,352,065,030,000,000,000,000,000,000,000
None
null
[ "CWE-613" ]
CVE-2022-24732
Maddy Mail Server is an open source SMTP compatible email server. Versions of maddy prior to 0.5.4 do not implement password expiry or account expiry checking when authenticating using PAM. Users are advised to upgrade. Users unable to upgrade should manually remove expired accounts via existing filtering mechanisms.
https://nvd.nist.gov/vuln/detail/CVE-2022-24732