idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
507,868 | openssl | d9d838ddc0ed083fb4c26dd067e71aad7c65ad16 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/d9d838ddc0ed083fb4c26dd067e71aad7c65ad16 | Fix a read buffer overrun in X509_aux_print().
The ASN1_STRING_get0_data(3) manual explitely cautions the reader
that the data is not necessarily NUL-terminated, and the function
X509_alias_set1(3) does not sanitize the data passed into it in any
way either, so we must assume the return value from X509_alias_get0(3)
i... | 0 | int X509_aux_print(BIO *out, X509 *x, int indent)
{
char oidstr[80], first;
STACK_OF(ASN1_OBJECT) *trust, *reject;
const unsigned char *alias, *keyid;
int keyidlen;
int i;
if (X509_trusted(x) == 0)
return 1;
trust = X509_get0_trust_objects(x);
reject = X509_get0_reject_objects(x)... | 259,335,861,165,031,600,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2021-3712 | ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a str... | https://nvd.nist.gov/vuln/detail/CVE-2021-3712 |
216,907 | openssl | 3118eb64934499d93db3230748a452351d1d9a65 | https://github.com/openssl/openssl | https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65 | Fix possible infinite loop in BN_mod_sqrt()
The calculation in some cases does not finish for non-prime p.
This fixes CVE-2022-0778.
Based on patch by David Benjamin <davidben@google.com>.
Reviewed-by: Paul Dale <pauli@openssl.org>
Reviewed-by: Matt Caswell <matt@openssl.org> | 1 | BIGNUM *BN_mod_sqrt(BIGNUM *in, const BIGNUM *a, const BIGNUM *p, BN_CTX *ctx)
/*
* Returns 'ret' such that ret^2 == a (mod p), using the Tonelli/Shanks
* algorithm (cf. Henri Cohen, "A Course in Algebraic Computational Number
* Theory", algorithm 1.5.1). 'p' must be prime!
*/
{
BIGNUM *ret = in;
int err = ... | 44,827,292,692,614,650,000,000,000,000,000,000,000 | None | null | [
"CWE-835"
] | CVE-2022-0778 | The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded i... | https://nvd.nist.gov/vuln/detail/CVE-2022-0778 |
509,581 | openssl | 3118eb64934499d93db3230748a452351d1d9a65 | https://github.com/openssl/openssl | https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65 | Fix possible infinite loop in BN_mod_sqrt()
The calculation in some cases does not finish for non-prime p.
This fixes CVE-2022-0778.
Based on patch by David Benjamin <davidben@google.com>.
Reviewed-by: Paul Dale <pauli@openssl.org>
Reviewed-by: Matt Caswell <matt@openssl.org> | 0 | BIGNUM *BN_mod_sqrt(BIGNUM *in, const BIGNUM *a, const BIGNUM *p, BN_CTX *ctx)
/*
* Returns 'ret' such that ret^2 == a (mod p), using the Tonelli/Shanks
* algorithm (cf. Henri Cohen, "A Course in Algebraic Computational Number
* Theory", algorithm 1.5.1). 'p' must be prime, otherwise an error or
* an incorrect "res... | 248,690,382,993,613,740,000,000,000,000,000,000,000 | None | null | [
"CWE-835"
] | CVE-2022-0778 | The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded i... | https://nvd.nist.gov/vuln/detail/CVE-2022-0778 |
216,944 | server | 3c209bfc040ddfc41ece8357d772547432353fd2 | https://github.com/MariaDB/server | https://github.com/MariaDB/server/commit/3c209bfc040ddfc41ece8357d772547432353fd2 | MDEV-25994: Crash with union of my_decimal type in ORDER BY clause
When single-row subquery fails with "Subquery reutrns more than 1 row"
error, it will raise an error and return NULL.
On the other hand, Item_singlerow_subselect sets item->maybe_null=0
for table-less subqueries like "(SELECT not_null_value)" (*)
Th... | 1 | bool Item_singlerow_subselect::fix_length_and_dec()
{
if ((max_columns= engine->cols()) == 1)
{
if (engine->fix_length_and_dec(row= &value))
return TRUE;
}
else
{
if (!(row= (Item_cache**) current_thd->alloc(sizeof(Item_cache*) *
max_columns)) ||
... | 239,302,885,543,348,250,000,000,000,000,000,000,000 | None | null | [
"CWE-89"
] | CVE-2022-27380 | An issue in the component my_decimal::operator= of MariaDB Server v10.6.3 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements. | https://nvd.nist.gov/vuln/detail/CVE-2022-27380 |
511,887 | server | 3c209bfc040ddfc41ece8357d772547432353fd2 | https://github.com/MariaDB/server | https://github.com/MariaDB/server/commit/3c209bfc040ddfc41ece8357d772547432353fd2 | MDEV-25994: Crash with union of my_decimal type in ORDER BY clause
When single-row subquery fails with "Subquery reutrns more than 1 row"
error, it will raise an error and return NULL.
On the other hand, Item_singlerow_subselect sets item->maybe_null=0
for table-less subqueries like "(SELECT not_null_value)" (*)
Th... | 0 | bool Item_singlerow_subselect::fix_length_and_dec()
{
if ((max_columns= engine->cols()) == 1)
{
if (engine->fix_length_and_dec(row= &value))
return TRUE;
}
else
{
if (!(row= (Item_cache**) current_thd->alloc(sizeof(Item_cache*) *
max_columns)) ||
... | 262,929,527,540,289,200,000,000,000,000,000,000,000 | None | null | [
"CWE-89"
] | CVE-2022-27380 | An issue in the component my_decimal::operator= of MariaDB Server v10.6.3 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements. | https://nvd.nist.gov/vuln/detail/CVE-2022-27380 |
216,966 | server | af810407f78b7f792a9bb8c47c8c532eb3b3a758 | https://github.com/MariaDB/server | https://github.com/MariaDB/server/commit/af810407f78b7f792a9bb8c47c8c532eb3b3a758 | MDEV-28098 incorrect key in "dup value" error after long unique
reset errkey after using it, so that it wouldn't affect
the next error message in the next statement | 1 | void handler::print_error(int error, myf errflag)
{
bool fatal_error= 0;
DBUG_ENTER("handler::print_error");
DBUG_PRINT("enter",("error: %d",error));
if (ha_thd()->transaction_rollback_request)
{
/* Ensure this becomes a true error */
errflag&= ~(ME_WARNING | ME_NOTE);
}
int textno= -1; // impos... | 176,899,003,449,109,900,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2022-27457 | MariaDB Server v10.6.3 and below was discovered to contain an use-after-free in the component my_mb_wc_latin1 at /strings/ctype-latin1.c. | https://nvd.nist.gov/vuln/detail/CVE-2022-27457 |
514,535 | server | af810407f78b7f792a9bb8c47c8c532eb3b3a758 | https://github.com/MariaDB/server | https://github.com/MariaDB/server/commit/af810407f78b7f792a9bb8c47c8c532eb3b3a758 | MDEV-28098 incorrect key in "dup value" error after long unique
reset errkey after using it, so that it wouldn't affect
the next error message in the next statement | 0 | void handler::print_error(int error, myf errflag)
{
bool fatal_error= 0;
DBUG_ENTER("handler::print_error");
DBUG_PRINT("enter",("error: %d",error));
if (ha_thd()->transaction_rollback_request)
{
/* Ensure this becomes a true error */
errflag&= ~(ME_WARNING | ME_NOTE);
}
int textno= -1; // impos... | 166,818,593,904,132,840,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2022-27457 | MariaDB Server v10.6.3 and below was discovered to contain an use-after-free in the component my_mb_wc_latin1 at /strings/ctype-latin1.c. | https://nvd.nist.gov/vuln/detail/CVE-2022-27457 |
216,969 | openssl | 2eda98790c5c2741d76d23cc1e74b0dc4f4b391a | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/2eda98790c5c2741d76d23cc1e74b0dc4f4b391a | Fix OCSP_basic_verify signer certificate validation
The function `OCSP_basic_verify` validates the signer certificate on an OCSP
response. The internal function, ocsp_verify_signer, is responsible for this
and is expected to return a 0 value in the event of a failure to verify.
Unfortunately, due to a bug, it actually... | 1 | static int ocsp_verify_signer(X509 *signer, int response,
X509_STORE *st, unsigned long flags,
STACK_OF(X509) *untrusted, STACK_OF(X509) **chain)
{
X509_STORE_CTX *ctx = X509_STORE_CTX_new();
X509_VERIFY_PARAM *vp;
int ret = -1;
if (ctx == NUL... | 135,340,782,496,843,480,000,000,000,000,000,000,000 | None | null | [
"CWE-703"
] | CVE-2022-1343 | The function `OCSP_basic_verify` verifies the signer certificate on an OCSP response. In the case where the (non-default) flag OCSP_NOCHECKS is used then the response will be positive (meaning a successful verification) even in the case where the response signing certificate fails to verify. It is anticipated that most... | https://nvd.nist.gov/vuln/detail/CVE-2022-1343 |
514,677 | openssl | 2eda98790c5c2741d76d23cc1e74b0dc4f4b391a | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/2eda98790c5c2741d76d23cc1e74b0dc4f4b391a | Fix OCSP_basic_verify signer certificate validation
The function `OCSP_basic_verify` validates the signer certificate on an OCSP
response. The internal function, ocsp_verify_signer, is responsible for this
and is expected to return a 0 value in the event of a failure to verify.
Unfortunately, due to a bug, it actually... | 0 | static int ocsp_verify_signer(X509 *signer, int response,
X509_STORE *st, unsigned long flags,
STACK_OF(X509) *untrusted, STACK_OF(X509) **chain)
{
X509_STORE_CTX *ctx = X509_STORE_CTX_new();
X509_VERIFY_PARAM *vp;
int ret = -1;
if (ctx == NUL... | 216,092,094,613,497,180,000,000,000,000,000,000,000 | None | null | [
"CWE-703"
] | CVE-2022-1343 | The function `OCSP_basic_verify` verifies the signer certificate on an OCSP response. In the case where the (non-default) flag OCSP_NOCHECKS is used then the response will be positive (meaning a successful verification) even in the case where the response signing certificate fails to verify. It is anticipated that most... | https://nvd.nist.gov/vuln/detail/CVE-2022-1343 |
216,972 | server | b1351c15946349f9daa7e5297fb2ac6f3139e4a8 | https://github.com/MariaDB/server | https://github.com/MariaDB/server/commit/b1351c15946349f9daa7e5297fb2ac6f3139e4a8 | MDEV-26574 An improper locking bug due to unreleased lock in the ds_xbstream.cc
release lock in all as cases n xbstream_open, also fix the case where malloc would return NULL. | 1 | xbstream_open(ds_ctxt_t *ctxt, const char *path, MY_STAT *mystat)
{
ds_file_t *file;
ds_stream_file_t *stream_file;
ds_stream_ctxt_t *stream_ctxt;
ds_ctxt_t *dest_ctxt;
xb_wstream_t *xbstream;
xb_wstream_file_t *xbstream_file;
xb_ad(ctxt->pipe_ctxt != NULL);
dest_ctxt = ctxt->pipe_ctxt;
stream_ctxt = (ds... | 133,283,141,336,811,140,000,000,000,000,000,000,000 | None | null | [
"CWE-703"
] | CVE-2022-31621 | MariaDB Server before 10.7 is vulnerable to Denial of Service. In extra/mariabackup/ds_xbstream.cc, when an error occurs (stream_ctxt->dest_file == NULL) while executing the method xbstream_open, the held lock is not released correctly, which allows local users to trigger a denial of service due to the deadlock. | https://nvd.nist.gov/vuln/detail/CVE-2022-31621 |
514,715 | server | b1351c15946349f9daa7e5297fb2ac6f3139e4a8 | https://github.com/MariaDB/server | https://github.com/MariaDB/server/commit/b1351c15946349f9daa7e5297fb2ac6f3139e4a8 | MDEV-26574 An improper locking bug due to unreleased lock in the ds_xbstream.cc
release lock in all as cases n xbstream_open, also fix the case where malloc would return NULL. | 0 | xbstream_open(ds_ctxt_t *ctxt, const char *path, MY_STAT *mystat)
{
ds_file_t *file;
ds_stream_file_t *stream_file;
ds_stream_ctxt_t *stream_ctxt;
ds_ctxt_t *dest_ctxt;
xb_wstream_t *xbstream;
xb_wstream_file_t *xbstream_file;
xb_ad(ctxt->pipe_ctxt != NULL);
dest_ctxt = ctxt->pipe_ctxt;
stream_ctxt = (ds... | 109,927,311,295,173,080,000,000,000,000,000,000,000 | None | null | [
"CWE-703"
] | CVE-2022-31621 | MariaDB Server before 10.7 is vulnerable to Denial of Service. In extra/mariabackup/ds_xbstream.cc, when an error occurs (stream_ctxt->dest_file == NULL) while executing the method xbstream_open, the held lock is not released correctly, which allows local users to trigger a denial of service due to the deadlock. | https://nvd.nist.gov/vuln/detail/CVE-2022-31621 |
216,974 | server | 7c30bc38a588b22b01f11130cfe99e7f36accf94 | https://github.com/MariaDB/server | https://github.com/MariaDB/server/commit/7c30bc38a588b22b01f11130cfe99e7f36accf94 | MDEV-26561 mariabackup release locks
The previous threads locked need to be released too.
This occurs if the initialization of any of the non-first
mutex/conditition variables errors occurs. | 1 | create_worker_threads(uint n)
{
comp_thread_ctxt_t *threads;
uint i;
threads = (comp_thread_ctxt_t *)
my_malloc(sizeof(comp_thread_ctxt_t) * n, MYF(MY_FAE));
for (i = 0; i < n; i++) {
comp_thread_ctxt_t *thd = threads + i;
thd->num = i + 1;
thd->started = FALSE;
thd->cancelled = FALSE;
thd->data_a... | 67,434,126,023,970,640,000,000,000,000,000,000,000 | None | null | [
"CWE-703"
] | CVE-2022-31623 | MariaDB Server before 10.7 is vulnerable to Denial of Service. In extra/mariabackup/ds_compress.cc, when an error occurs (i.e., going to the err label) while executing the method create_worker_threads, the held lock thd->ctrl_mutex is not released correctly, which allows local users to trigger a denial of service due t... | https://nvd.nist.gov/vuln/detail/CVE-2022-31623 |
514,724 | server | 7c30bc38a588b22b01f11130cfe99e7f36accf94 | https://github.com/MariaDB/server | https://github.com/MariaDB/server/commit/7c30bc38a588b22b01f11130cfe99e7f36accf94 | MDEV-26561 mariabackup release locks
The previous threads locked need to be released too.
This occurs if the initialization of any of the non-first
mutex/conditition variables errors occurs. | 0 | create_worker_threads(uint n)
{
comp_thread_ctxt_t *threads;
uint i;
threads = (comp_thread_ctxt_t *)
my_malloc(sizeof(comp_thread_ctxt_t) * n, MYF(MY_FAE));
for (i = 0; i < n; i++) {
comp_thread_ctxt_t *thd = threads + i;
thd->num = i + 1;
thd->started = FALSE;
thd->cancelled = FALSE;
thd->data_a... | 40,328,221,301,176,333,000,000,000,000,000,000,000 | None | null | [
"CWE-703"
] | CVE-2022-31623 | MariaDB Server before 10.7 is vulnerable to Denial of Service. In extra/mariabackup/ds_compress.cc, when an error occurs (i.e., going to the err label) while executing the method create_worker_threads, the held lock thd->ctrl_mutex is not released correctly, which allows local users to trigger a denial of service due t... | https://nvd.nist.gov/vuln/detail/CVE-2022-31623 |
216,975 | openssl | 4d8a88c134df634ba610ff8db1eb8478ac5fd345 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/4d8a88c134df634ba610ff8db1eb8478ac5fd345 | rsa: fix bn_reduce_once_in_place call for rsaz_mod_exp_avx512_x2
bn_reduce_once_in_place expects the number of BN_ULONG, but factor_size
is moduli bit size.
Fixes #18625.
Signed-off-by: Xi Ruoyao <xry111@xry111.site>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Paul Dale <pauli@openssl.org>
(Merged from... | 1 | int ossl_rsaz_mod_exp_avx512_x2(BN_ULONG *res1,
const BN_ULONG *base1,
const BN_ULONG *exp1,
const BN_ULONG *m1,
const BN_ULONG *rr1,
BN_ULONG k0_1,
... | 13,768,713,307,638,353,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2022-2274 | The OpenSSL 3.0.4 release introduced a serious bug in the RSA implementation for X86_64 CPUs supporting the AVX512IFMA instructions. This issue makes the RSA implementation with 2048 bit private keys incorrect on such machines and memory corruption will happen during the computation. As a consequence of the memory corr... | https://nvd.nist.gov/vuln/detail/CVE-2022-2274 |
514,727 | openssl | 4d8a88c134df634ba610ff8db1eb8478ac5fd345 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/4d8a88c134df634ba610ff8db1eb8478ac5fd345 | rsa: fix bn_reduce_once_in_place call for rsaz_mod_exp_avx512_x2
bn_reduce_once_in_place expects the number of BN_ULONG, but factor_size
is moduli bit size.
Fixes #18625.
Signed-off-by: Xi Ruoyao <xry111@xry111.site>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Paul Dale <pauli@openssl.org>
(Merged from... | 0 | int ossl_rsaz_mod_exp_avx512_x2(BN_ULONG *res1,
const BN_ULONG *base1,
const BN_ULONG *exp1,
const BN_ULONG *m1,
const BN_ULONG *rr1,
BN_ULONG k0_1,
... | 22,144,793,980,359,746,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2022-2274 | The OpenSSL 3.0.4 release introduced a serious bug in the RSA implementation for X86_64 CPUs supporting the AVX512IFMA instructions. This issue makes the RSA implementation with 2048 bit private keys incorrect on such machines and memory corruption will happen during the computation. As a consequence of the memory corr... | https://nvd.nist.gov/vuln/detail/CVE-2022-2274 |
217,011 | qemu | 3517fb726741c109cae7995f9ea46f0cab6187d6 | https://github.com/bonzini/qemu | https://github.com/qemu/qemu/commit/3517fb726741c109cae7995f9ea46f0cab6187d6 | target/loongarch: Clean up tlb when cpu reset
We should make sure that tlb is clean when cpu reset.
Signed-off-by: Song Gao <gaosong@loongson.cn>
Message-Id: <20220705070950.2364243-1-gaosong@loongson.cn>
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
Signed-off-by: Richard Henderson <richard.henderson... | 1 | static void loongarch_cpu_reset(DeviceState *dev)
{
CPUState *cs = CPU(dev);
LoongArchCPU *cpu = LOONGARCH_CPU(cs);
LoongArchCPUClass *lacc = LOONGARCH_CPU_GET_CLASS(cpu);
CPULoongArchState *env = &cpu->env;
lacc->parent_reset(dev);
env->fcsr0_mask = FCSR0_M1 | FCSR0_M2 | FCSR0_M3;
env->fc... | 189,863,556,959,363,100,000,000,000,000,000,000,000 | None | null | [
"CWE-908"
] | CVE-2022-35414 | softmmu/physmem.c in QEMU through 7.0.0 can perform an uninitialized read on the translate_fail path, leading to an io_readx or io_writex crash. NOTE: a third party states that the Non-virtualization Use Case in the qemu.org reference applies here, i.e., "Bugs affecting the non-virtualization use case are not considere... | https://nvd.nist.gov/vuln/detail/CVE-2022-35414 |
515,809 | qemu | 3517fb726741c109cae7995f9ea46f0cab6187d6 | https://github.com/bonzini/qemu | https://github.com/qemu/qemu/commit/3517fb726741c109cae7995f9ea46f0cab6187d6 | target/loongarch: Clean up tlb when cpu reset
We should make sure that tlb is clean when cpu reset.
Signed-off-by: Song Gao <gaosong@loongson.cn>
Message-Id: <20220705070950.2364243-1-gaosong@loongson.cn>
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
Signed-off-by: Richard Henderson <richard.henderson... | 0 | static void loongarch_cpu_reset(DeviceState *dev)
{
CPUState *cs = CPU(dev);
LoongArchCPU *cpu = LOONGARCH_CPU(cs);
LoongArchCPUClass *lacc = LOONGARCH_CPU_GET_CLASS(cpu);
CPULoongArchState *env = &cpu->env;
lacc->parent_reset(dev);
env->fcsr0_mask = FCSR0_M1 | FCSR0_M2 | FCSR0_M3;
env->fc... | 336,031,391,612,226,240,000,000,000,000,000,000,000 | None | null | [
"CWE-908"
] | CVE-2022-35414 | softmmu/physmem.c in QEMU through 7.0.0 can perform an uninitialized read on the translate_fail path, leading to an io_readx or io_writex crash. NOTE: a third party states that the Non-virtualization Use Case in the qemu.org reference applies here, i.e., "Bugs affecting the non-virtualization use case are not considere... | https://nvd.nist.gov/vuln/detail/CVE-2022-35414 |
217,013 | html-parser | b9aae1e43eb2c8e989510187cff0ba3e996f9a4c | http://github.com/gisle/html-parser | http://github.com/gisle/html-parser/commit/b9aae1e43eb2c8e989510187cff0ba3e996f9a4c | decode_entities confused by trailing incomplete entity
Mark Martinec reported crashed when running SpamAssassin, given a
particular HTML junk mail to parse. The problem was caused by
HTML::Parsers decode_entities function confusing itself when it
encountered strings with incomplete entities at the end of the string. | 1 | decode_entities(pTHX_ SV* sv, HV* entity2char, bool expand_prefix)
{
STRLEN len;
char *s = SvPV_force(sv, len);
char *t = s;
char *end = s + len;
char *ent_start;
char *repl;
STRLEN repl_len;
#ifdef UNICODE_HTML_PARSER
char buf[UTF8_MAXLEN];
int repl_utf8;
int high_surrogate = 0... | 55,873,461,094,162,610,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2009-3627 | The decode_entities function in util.c in HTML-Parser before 3.63 allows context-dependent attackers to cause a denial of service (infinite loop) via an incomplete SGML numeric character reference, which triggers generation of an invalid UTF-8 character. | https://nvd.nist.gov/vuln/detail/CVE-2009-3627 |
515,837 | html-parser | b9aae1e43eb2c8e989510187cff0ba3e996f9a4c | http://github.com/gisle/html-parser | http://github.com/gisle/html-parser/commit/b9aae1e43eb2c8e989510187cff0ba3e996f9a4c | decode_entities confused by trailing incomplete entity
Mark Martinec reported crashed when running SpamAssassin, given a
particular HTML junk mail to parse. The problem was caused by
HTML::Parsers decode_entities function confusing itself when it
encountered strings with incomplete entities at the end of the string. | 0 | decode_entities(pTHX_ SV* sv, HV* entity2char, bool expand_prefix)
{
STRLEN len;
char *s = SvPV_force(sv, len);
char *t = s;
char *end = s + len;
char *ent_start;
char *repl;
STRLEN repl_len;
#ifdef UNICODE_HTML_PARSER
char buf[UTF8_MAXLEN];
int repl_utf8;
int high_surrogate = 0... | 324,129,469,800,921,000,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2009-3627 | The decode_entities function in util.c in HTML-Parser before 3.63 allows context-dependent attackers to cause a denial of service (infinite loop) via an incomplete SGML numeric character reference, which triggers generation of an invalid UTF-8 character. | https://nvd.nist.gov/vuln/detail/CVE-2009-3627 |
217,024 | platform_bionic | 7f5aa4f35e23fd37425b3a5041737cdf58f87385 | https://github.com/android/platform_bionic | https://github.com/android/platform_bionic/commit/7f5aa4f35e23fd37425b3a5041737cdf58f87385 | bionic: fix integer overflows in chk_malloc(), leak_malloc(), and leak_memalign()
The allocation size in chk_malloc(), leak_malloc(), and leak_memalign()
functions may be rounded up to a small value, leading to buffer overflows.
The code only runs in debugging mode.
This patch complements commit 6f04a0f4 (CVE-2009-06... | 1 | void* leak_malloc(size_t bytes)
{
// allocate enough space infront of the allocation to store the pointer for
// the alloc structure. This will making free'ing the structer really fast!
// 1. allocate enough memory and include our header
// 2. set the base pointer to be right after our header
void... | 230,226,643,357,187,370,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-2674 | Multiple integer overflows in the (1) chk_malloc, (2) leak_malloc, and (3) leak_memalign functions in libc/bionic/malloc_debug_leak.c in Bionic (libc) for Android, when libc.debug.malloc is set, make it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a large size va... | https://nvd.nist.gov/vuln/detail/CVE-2012-2674 |
515,997 | platform_bionic | 7f5aa4f35e23fd37425b3a5041737cdf58f87385 | https://github.com/android/platform_bionic | https://github.com/android/platform_bionic/commit/7f5aa4f35e23fd37425b3a5041737cdf58f87385 | bionic: fix integer overflows in chk_malloc(), leak_malloc(), and leak_memalign()
The allocation size in chk_malloc(), leak_malloc(), and leak_memalign()
functions may be rounded up to a small value, leading to buffer overflows.
The code only runs in debugging mode.
This patch complements commit 6f04a0f4 (CVE-2009-06... | 0 | void* leak_malloc(size_t bytes)
{
// allocate enough space infront of the allocation to store the pointer for
// the alloc structure. This will making free'ing the structer really fast!
// 1. allocate enough memory and include our header
// 2. set the base pointer to be right after our header
size... | 331,569,411,028,560,230,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-2674 | Multiple integer overflows in the (1) chk_malloc, (2) leak_malloc, and (3) leak_memalign functions in libc/bionic/malloc_debug_leak.c in Bionic (libc) for Android, when libc.debug.malloc is set, make it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a large size va... | https://nvd.nist.gov/vuln/detail/CVE-2012-2674 |
217,025 | platform_bionic | 7f5aa4f35e23fd37425b3a5041737cdf58f87385 | https://github.com/android/platform_bionic | https://github.com/android/platform_bionic/commit/7f5aa4f35e23fd37425b3a5041737cdf58f87385 | bionic: fix integer overflows in chk_malloc(), leak_malloc(), and leak_memalign()
The allocation size in chk_malloc(), leak_malloc(), and leak_memalign()
functions may be rounded up to a small value, leading to buffer overflows.
The code only runs in debugging mode.
This patch complements commit 6f04a0f4 (CVE-2009-06... | 1 | void* chk_malloc(size_t bytes)
{
char* buffer = (char*)dlmalloc(bytes + CHK_OVERHEAD_SIZE);
if (buffer) {
memset(buffer, CHK_SENTINEL_VALUE, bytes + CHK_OVERHEAD_SIZE);
size_t offset = dlmalloc_usable_size(buffer) - sizeof(size_t);
*(size_t *)(buffer + offset) = bytes;
buffer += ... | 207,891,667,812,877,170,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-2674 | Multiple integer overflows in the (1) chk_malloc, (2) leak_malloc, and (3) leak_memalign functions in libc/bionic/malloc_debug_leak.c in Bionic (libc) for Android, when libc.debug.malloc is set, make it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a large size va... | https://nvd.nist.gov/vuln/detail/CVE-2012-2674 |
515,993 | platform_bionic | 7f5aa4f35e23fd37425b3a5041737cdf58f87385 | https://github.com/android/platform_bionic | https://github.com/android/platform_bionic/commit/7f5aa4f35e23fd37425b3a5041737cdf58f87385 | bionic: fix integer overflows in chk_malloc(), leak_malloc(), and leak_memalign()
The allocation size in chk_malloc(), leak_malloc(), and leak_memalign()
functions may be rounded up to a small value, leading to buffer overflows.
The code only runs in debugging mode.
This patch complements commit 6f04a0f4 (CVE-2009-06... | 0 | void* chk_malloc(size_t bytes)
{
size_t size = bytes + CHK_OVERHEAD_SIZE;
if (size < bytes) { // Overflow.
return NULL;
}
uint8_t* buffer = (uint8_t*) dlmalloc(size);
if (buffer) {
memset(buffer, CHK_SENTINEL_VALUE, bytes + CHK_OVERHEAD_SIZE);
size_t offset = dlmalloc_usable_... | 337,156,802,310,075,100,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-2674 | Multiple integer overflows in the (1) chk_malloc, (2) leak_malloc, and (3) leak_memalign functions in libc/bionic/malloc_debug_leak.c in Bionic (libc) for Android, when libc.debug.malloc is set, make it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a large size va... | https://nvd.nist.gov/vuln/detail/CVE-2012-2674 |
217,026 | platform_bionic | 7f5aa4f35e23fd37425b3a5041737cdf58f87385 | https://github.com/android/platform_bionic | https://github.com/android/platform_bionic/commit/7f5aa4f35e23fd37425b3a5041737cdf58f87385 | bionic: fix integer overflows in chk_malloc(), leak_malloc(), and leak_memalign()
The allocation size in chk_malloc(), leak_malloc(), and leak_memalign()
functions may be rounded up to a small value, leading to buffer overflows.
The code only runs in debugging mode.
This patch complements commit 6f04a0f4 (CVE-2009-06... | 1 | void* leak_memalign(size_t alignment, size_t bytes)
{
// we can just use malloc
if (alignment <= MALLOC_ALIGNMENT)
return leak_malloc(bytes);
// need to make sure it's a power of two
if (alignment & (alignment-1))
alignment = 1L << (31 - __builtin_clz(alignment));
// here, aligment... | 113,652,545,145,346,360,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-2674 | Multiple integer overflows in the (1) chk_malloc, (2) leak_malloc, and (3) leak_memalign functions in libc/bionic/malloc_debug_leak.c in Bionic (libc) for Android, when libc.debug.malloc is set, make it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a large size va... | https://nvd.nist.gov/vuln/detail/CVE-2012-2674 |
516,002 | platform_bionic | 7f5aa4f35e23fd37425b3a5041737cdf58f87385 | https://github.com/android/platform_bionic | https://github.com/android/platform_bionic/commit/7f5aa4f35e23fd37425b3a5041737cdf58f87385 | bionic: fix integer overflows in chk_malloc(), leak_malloc(), and leak_memalign()
The allocation size in chk_malloc(), leak_malloc(), and leak_memalign()
functions may be rounded up to a small value, leading to buffer overflows.
The code only runs in debugging mode.
This patch complements commit 6f04a0f4 (CVE-2009-06... | 0 | void* leak_memalign(size_t alignment, size_t bytes)
{
// we can just use malloc
if (alignment <= MALLOC_ALIGNMENT)
return leak_malloc(bytes);
// need to make sure it's a power of two
if (alignment & (alignment-1))
alignment = 1L << (31 - __builtin_clz(alignment));
// here, aligment... | 146,050,602,257,073,810,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-2674 | Multiple integer overflows in the (1) chk_malloc, (2) leak_malloc, and (3) leak_memalign functions in libc/bionic/malloc_debug_leak.c in Bionic (libc) for Android, when libc.debug.malloc is set, make it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a large size va... | https://nvd.nist.gov/vuln/detail/CVE-2012-2674 |
217,027 | nedmalloc | 2965eca30c408c13473c4146a9d47d547d288db1 | https://github.com/ned14/nedmalloc | https://github.com/ned14/nedmalloc/commit/2965eca30c408c13473c4146a9d47d547d288db1 | Avoid overflowing allocation size in calloc() | 1 | NEDMALLOCNOALIASATTR NEDMALLOCPTRATTR void * nedpcalloc(nedpool *p, size_t no, size_t size) THROWSPEC
{
unsigned flags=NEDMALLOC_FORCERESERVE(p, 0, no*size);
return nedpmalloc2(p, size*no, 0, M2_ZERO_MEMORY|flags);
}
| 276,074,049,330,858,100,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-2675 | Multiple integer overflows in the (1) CallMalloc (malloc) and (2) nedpcalloc (calloc) functions in nedmalloc (nedmalloc.c) before 1.10 beta2 make it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a large size value, which causes less memory to be allocated than exp... | https://nvd.nist.gov/vuln/detail/CVE-2012-2675 |
516,019 | nedmalloc | 2965eca30c408c13473c4146a9d47d547d288db1 | https://github.com/ned14/nedmalloc | https://github.com/ned14/nedmalloc/commit/2965eca30c408c13473c4146a9d47d547d288db1 | Avoid overflowing allocation size in calloc() | 0 | NEDMALLOCNOALIASATTR NEDMALLOCPTRATTR void * nedpmalloc(nedpool *p, size_t size) THROWSPEC
{
unsigned flags=NEDMALLOC_FORCERESERVE(p, 0, size);
return nedpmalloc2(p, size, 0, flags);
}
| 18,285,440,970,008,720,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-2675 | Multiple integer overflows in the (1) CallMalloc (malloc) and (2) nedpcalloc (calloc) functions in nedmalloc (nedmalloc.c) before 1.10 beta2 make it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a large size value, which causes less memory to be allocated than exp... | https://nvd.nist.gov/vuln/detail/CVE-2012-2675 |
217,028 | squidclamav | 80f74451f628264d1d9a1f1c0bbcebc932ba5e00 | https://github.com/darold/squidclamav | https://github.com/darold/squidclamav/commit/80f74451f628264d1d9a1f1c0bbcebc932ba5e00 | Add a workaround for a squidGuard bug that unescape the URL and send it back unescaped. This could conduct in wrong result and ssquidclamav crash especially with URL containing the %0D or %0A character. John Xue | 1 | int squidclamav_check_preview_handler(char *preview_data, int preview_data_len, ci_request_t * req)
{
ci_headers_list_t *req_header;
struct http_info httpinf;
av_req_data_t *data = ci_service_data(req);
char *clientip;
struct hostent *clientname;
unsigned long ip;
char *username;
... | 113,201,592,654,248,630,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2012-3501 | The squidclamav_check_preview_handler function in squidclamav.c in SquidClamav 5.x before 5.8 and 6.x before 6.7 passes an unescaped URL to a system command call, which allows remote attackers to cause a denial of service (daemon crash) via a URL with certain characters, as demonstrated using %0D or %0A. | https://nvd.nist.gov/vuln/detail/CVE-2012-3501 |
516,090 | squidclamav | 80f74451f628264d1d9a1f1c0bbcebc932ba5e00 | https://github.com/darold/squidclamav | https://github.com/darold/squidclamav/commit/80f74451f628264d1d9a1f1c0bbcebc932ba5e00 | Add a workaround for a squidGuard bug that unescape the URL and send it back unescaped. This could conduct in wrong result and ssquidclamav crash especially with URL containing the %0D or %0A character. John Xue | 0 | int squidclamav_check_preview_handler(char *preview_data, int preview_data_len, ci_request_t * req)
{
ci_headers_list_t *req_header;
struct http_info httpinf;
av_req_data_t *data = ci_service_data(req);
char *clientip;
struct hostent *clientname;
unsigned long ip;
char *username;
... | 275,224,704,382,283,940,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2012-3501 | The squidclamav_check_preview_handler function in squidclamav.c in SquidClamav 5.x before 5.8 and 6.x before 6.7 passes an unescaped URL to a system command call, which allows remote attackers to cause a denial of service (daemon crash) via a URL with certain characters, as demonstrated using %0D or %0A. | https://nvd.nist.gov/vuln/detail/CVE-2012-3501 |
217,130 | illumos-gate | 1d276e0b382cf066dae93640746d8b4c54d15452 | https://github.com/illumos/illumos-gate | https://github.com/illumos/illumos-gate/commit/1d276e0b382cf066dae93640746d8b4c54d15452 | 13242 parse_user_name in PAM is sloppy
Reviewed by: Alex Wilson <alex@cooperi.net>
Approved by: Gordon Ross <gordon.w.ross@gmail.com> | 1 | parse_user_name(char *user_input, char **ret_username)
{
register char *ptr;
register int index = 0;
char username[PAM_MAX_RESP_SIZE];
/* Set the default value for *ret_username */
*ret_username = NULL;
/*
* Set the initial value for username - this is a buffer holds
* the user name.
*/
bzero((void *)use... | 91,358,304,056,509,070,000,000,000,000,000,000,000 | None | null | [
"CWE-120"
] | CVE-2020-27678 | An issue was discovered in illumos before 2020-10-22, as used in OmniOS before r151030by, r151032ay, and r151034y and SmartOS before 20201022. There is a buffer overflow in parse_user_name in lib/libpam/pam_framework.c. | https://nvd.nist.gov/vuln/detail/CVE-2020-27678 |
516,902 | illumos-gate | 1d276e0b382cf066dae93640746d8b4c54d15452 | https://github.com/illumos/illumos-gate | https://github.com/illumos/illumos-gate/commit/1d276e0b382cf066dae93640746d8b4c54d15452 | 13242 parse_user_name in PAM is sloppy
Reviewed by: Alex Wilson <alex@cooperi.net>
Approved by: Gordon Ross <gordon.w.ross@gmail.com> | 0 | parse_user_name(char *user_input, char **ret_username)
{
register char *ptr;
register int index = 0;
char username[PAM_MAX_RESP_SIZE];
/* Set the default value for *ret_username */
*ret_username = NULL;
/*
* Set the initial value for username - this is a buffer holds
* the user name.
*/
bzero((void *)use... | 73,177,564,007,800,570,000,000,000,000,000,000,000 | None | null | [
"CWE-120"
] | CVE-2020-27678 | An issue was discovered in illumos before 2020-10-22, as used in OmniOS before r151030by, r151032ay, and r151034y and SmartOS before 20201022. There is a buffer overflow in parse_user_name in lib/libpam/pam_framework.c. | https://nvd.nist.gov/vuln/detail/CVE-2020-27678 |
217,132 | xdelta-devel | ef93ff74203e030073b898c05e8b4860b5d09ef2 | https://github.com/jmacd/xdelta-devel | https://github.com/jmacd/xdelta-devel/commit/ef93ff74203e030073b898c05e8b4860b5d09ef2 | Add appheader tests; fix buffer overflow in main_get_appheader | 1 | main_get_appheader (xd3_stream *stream, main_file *ifile,
main_file *output, main_file *sfile)
{
uint8_t *apphead;
usize_t appheadsz;
int ret;
/* The user may disable the application header. Once the appheader
* is set, this disables setting it again. */
if (! option_use_appheader) { return; }
r... | 281,373,746,731,901,400,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2014-9765 | Buffer overflow in the main_get_appheader function in xdelta3-main.h in xdelta3 before 3.0.9 allows remote attackers to execute arbitrary code via a crafted input file. | https://nvd.nist.gov/vuln/detail/CVE-2014-9765 |
517,037 | xdelta-devel | ef93ff74203e030073b898c05e8b4860b5d09ef2 | https://github.com/jmacd/xdelta-devel | https://github.com/jmacd/xdelta-devel/commit/ef93ff74203e030073b898c05e8b4860b5d09ef2 | Add appheader tests; fix buffer overflow in main_get_appheader | 0 | main_get_appheader (xd3_stream *stream, main_file *ifile,
main_file *output, main_file *sfile)
{
uint8_t *apphead;
usize_t appheadsz;
int ret;
/* The user may disable the application header. Once the appheader
* is set, this disables setting it again. */
if (! option_use_appheader) { return; }
r... | 174,889,360,678,033,000,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2014-9765 | Buffer overflow in the main_get_appheader function in xdelta3-main.h in xdelta3 before 3.0.9 allows remote attackers to execute arbitrary code via a crafted input file. | https://nvd.nist.gov/vuln/detail/CVE-2014-9765 |
217,161 | pam_radius | 01173ec2426627dbb1e0d96c06c3ffa0b14d36d0 | https://github.com/FreeRADIUS/pam_radius | https://github.com/FreeRADIUS/pam_radius/commit/01173ec2426627dbb1e0d96c06c3ffa0b14d36d0 | Use "length", which has been limited in size | 1 | static void add_password(AUTH_HDR *request, unsigned char type, CONST char *password, char *secret)
{
MD5_CTX md5_secret, my_md5;
unsigned char misc[AUTH_VECTOR_LEN];
int i;
int length = strlen(password);
unsigned char hashed[256 + AUTH_PASS_LEN]; /* can't be longer than this */
unsigned char *vector;
attribute_... | 33,288,235,879,950,576,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2015-9542 | add_password in pam_radius_auth.c in pam_radius 1.4.0 does not correctly check the length of the input password, and is vulnerable to a stack-based buffer overflow during memcpy(). An attacker could send a crafted password to an application (loading the pam_radius library) and crash it. Arbitrary code execution might b... | https://nvd.nist.gov/vuln/detail/CVE-2015-9542 |
517,189 | pam_radius | 01173ec2426627dbb1e0d96c06c3ffa0b14d36d0 | https://github.com/FreeRADIUS/pam_radius | https://github.com/FreeRADIUS/pam_radius/commit/01173ec2426627dbb1e0d96c06c3ffa0b14d36d0 | Use "length", which has been limited in size | 0 | static void add_password(AUTH_HDR *request, unsigned char type, CONST char *password, char *secret)
{
MD5_CTX md5_secret, my_md5;
unsigned char misc[AUTH_VECTOR_LEN];
int i;
int length = strlen(password);
unsigned char hashed[256 + AUTH_PASS_LEN]; /* can't be longer than this */
unsigned char *vector;
attribute_... | 53,245,594,408,979,590,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2015-9542 | add_password in pam_radius_auth.c in pam_radius 1.4.0 does not correctly check the length of the input password, and is vulnerable to a stack-based buffer overflow during memcpy(). An attacker could send a crafted password to an application (loading the pam_radius library) and crash it. Arbitrary code execution might b... | https://nvd.nist.gov/vuln/detail/CVE-2015-9542 |
217,162 | neovim | 4fad66fbe637818b6b3d6bc5d21923ba72795040 | https://github.com/neovim/neovim | https://github.com/neovim/neovim/commit/4fad66fbe637818b6b3d6bc5d21923ba72795040 | vim-patch:8.0.0056
Problem: When setting 'filetype' there is no check for a valid name.
Solution: Only allow valid characters in 'filetype', 'syntax' and 'keymap'.
https://github.com/vim/vim/commit/d0b5138ba4bccff8a744c99836041ef6322ed39a | 1 | did_set_string_option (
int opt_idx, /* index in options[] table */
char_u **varp, /* pointer to the option variable */
int new_value_alloced, /* new value was allocated */
char_u *oldval, /* previous value of the option ... | 5,057,343,703,970,560,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2016-1248 | vim before patch 8.0.0056 does not properly validate values for the 'filetype', 'syntax' and 'keymap' options, which may result in the execution of arbitrary code if a file with a specially crafted modeline is opened. | https://nvd.nist.gov/vuln/detail/CVE-2016-1248 |
517,286 | neovim | 4fad66fbe637818b6b3d6bc5d21923ba72795040 | https://github.com/neovim/neovim | https://github.com/neovim/neovim/commit/4fad66fbe637818b6b3d6bc5d21923ba72795040 | vim-patch:8.0.0056
Problem: When setting 'filetype' there is no check for a valid name.
Solution: Only allow valid characters in 'filetype', 'syntax' and 'keymap'.
https://github.com/vim/vim/commit/d0b5138ba4bccff8a744c99836041ef6322ed39a | 0 | did_set_string_option (
int opt_idx, /* index in options[] table */
char_u **varp, /* pointer to the option variable */
int new_value_alloced, /* new value was allocated */
char_u *oldval, /* previous value of the option ... | 209,905,660,793,532,500,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2016-1248 | vim before patch 8.0.0056 does not properly validate values for the 'filetype', 'syntax' and 'keymap' options, which may result in the execution of arbitrary code if a file with a specially crafted modeline is opened. | https://nvd.nist.gov/vuln/detail/CVE-2016-1248 |
217,177 | monit | f12d0cdb42d4e74dffe1525d4062c815c48ac57a | https://bitbucket.org/tildeslash/monit | https://bitbucket.org/tildeslash/monit/commits/f12d0cdb42d4e74dffe1525d4062c815c48ac57a | Fixed: Buffer overrun vulnerability in URL decoding. Thanks to Zack Flack for report. | 1 | static char x2c(char *hex) {
register char digit;
digit = ((hex[0] >= 'A') ? ((hex[0] & 0xdf) - 'A')+10 : (hex[0] - '0'));
digit *= 16;
digit += (hex[1] >= 'A' ? ((hex[1] & 0xdf) - 'A')+10 : (hex[1] - '0'));
return(digit);
} | 156,938,523,355,548,540,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2019-11455 | A buffer over-read in Util_urlDecode in util.c in Tildeslash Monit before 5.25.3 allows a remote authenticated attacker to retrieve the contents of adjacent memory via manipulation of GET or POST parameters. The attacker can also cause a denial of service (application outage). | https://nvd.nist.gov/vuln/detail/CVE-2019-11455 |
517,462 | monit | f12d0cdb42d4e74dffe1525d4062c815c48ac57a | https://bitbucket.org/tildeslash/monit | https://bitbucket.org/tildeslash/monit/commits/f12d0cdb42d4e74dffe1525d4062c815c48ac57a | Fixed: Buffer overrun vulnerability in URL decoding. Thanks to Zack Flack for report. | 0 | static char _x2c(char *hex) {
register char digit;
digit = ((hex[0] >= 'A') ? ((hex[0] & 0xdf) - 'A')+10 : (hex[0] - '0'));
digit *= 16;
digit += (hex[1] >= 'A' ? ((hex[1] & 0xdf) - 'A')+10 : (hex[1] - '0'));
return(digit);
} | 204,361,104,051,965,230,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2019-11455 | A buffer over-read in Util_urlDecode in util.c in Tildeslash Monit before 5.25.3 allows a remote authenticated attacker to retrieve the contents of adjacent memory via manipulation of GET or POST parameters. The attacker can also cause a denial of service (application outage). | https://nvd.nist.gov/vuln/detail/CVE-2019-11455 |
217,178 | ChakraCore | 402f3d967c0a905ec5b9ca9c240783d3f2c15724 | https://github.com/Microsoft/ChakraCore | https://github.com/Microsoft/ChakraCore/commit/402f3d967c0a905ec5b9ca9c240783d3f2c15724 | [CVE-2017-0028] Fix binding of 'async' identifier in the presence of async arrow function. | 1 | ParseNodePtr Parser::ParseTerm(BOOL fAllowCall,
LPCOLESTR pNameHint,
uint32 *pHintLength,
uint32 *pShortNameOffset,
_Inout_opt_ IdentToken* pToken /*= nullptr*/,
bool fUnaryOrParen /*= false*/,
_Out_opt_ BOOL* pfCanAssign /*= nullptr*/,
_Inout_opt_ BOOL* pfLikelyPattern /*= nullptr*/,
_O... | 274,209,213,099,014,600,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2017-0028 | A remote code execution vulnerability exists when Microsoft scripting engine improperly accesses objects in memory. The vulnerability could corrupt memory in a way that enables an attacker to execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain t... | https://nvd.nist.gov/vuln/detail/CVE-2017-0028 |
517,605 | ChakraCore | 402f3d967c0a905ec5b9ca9c240783d3f2c15724 | https://github.com/Microsoft/ChakraCore | https://github.com/Microsoft/ChakraCore/commit/402f3d967c0a905ec5b9ca9c240783d3f2c15724 | [CVE-2017-0028] Fix binding of 'async' identifier in the presence of async arrow function. | 0 | ParseNodePtr Parser::ParseTerm(BOOL fAllowCall,
LPCOLESTR pNameHint,
uint32 *pHintLength,
uint32 *pShortNameOffset,
_Inout_opt_ IdentToken* pToken /*= nullptr*/,
bool fUnaryOrParen /*= false*/,
_Out_opt_ BOOL* pfCanAssign /*= nullptr*/,
_Inout_opt_ BOOL* pfLikelyPattern /*= nullptr*/,
_O... | 313,369,564,772,743,500,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2017-0028 | A remote code execution vulnerability exists when Microsoft scripting engine improperly accesses objects in memory. The vulnerability could corrupt memory in a way that enables an attacker to execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain t... | https://nvd.nist.gov/vuln/detail/CVE-2017-0028 |
217,184 | JPEGsnoop | b4e458612d4294e0cfe01dbf1c0b09a07a8133a4 | https://github.com/ImpulseAdventure/JPEGsnoop | https://github.com/ImpulseAdventure/JPEGsnoop/commit/b4e458612d4294e0cfe01dbf1c0b09a07a8133a4#diff-cf9182aecc9d630e8db2e0e35f1eec65 | Fixed div0 vulnerability in SampFact | 1 | unsigned CjfifDecode::DecodeMarker()
{
TCHAR acIdentifier[MAX_IDENTIFIER];
CString strTmp;
CString strFull; // Used for concatenation
unsigned nLength; // General purpose
unsigned nTmpVal;
unsigned nCode;
unsigned long nPosEnd;
unsigned long nPosSaved; // General-purpose saved positio... | 209,975,869,287,019,700,000,000,000,000,000,000,000 | None | null | [
"CWE-369"
] | CVE-2017-1000414 | ImpulseAdventure JPEGsnoop version 1.7.5 is vulnerable to a division by zero in the JFIF decode handling resulting denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2017-1000414 |
518,319 | JPEGsnoop | b4e458612d4294e0cfe01dbf1c0b09a07a8133a4 | https://github.com/ImpulseAdventure/JPEGsnoop | https://github.com/ImpulseAdventure/JPEGsnoop/commit/b4e458612d4294e0cfe01dbf1c0b09a07a8133a4#diff-cf9182aecc9d630e8db2e0e35f1eec65 | Fixed div0 vulnerability in SampFact | 0 | unsigned CjfifDecode::DecodeMarker()
{
TCHAR acIdentifier[MAX_IDENTIFIER];
CString strTmp;
CString strFull; // Used for concatenation
unsigned nLength; // General purpose
unsigned nTmpVal;
unsigned nCode;
unsigned long nPosEnd;
unsigned long nPosSaved; // General-purpose saved positio... | 124,451,953,334,289,280,000,000,000,000,000,000,000 | None | null | [
"CWE-369"
] | CVE-2017-1000414 | ImpulseAdventure JPEGsnoop version 1.7.5 is vulnerable to a division by zero in the JFIF decode handling resulting denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2017-1000414 |
217,206 | libofx | a70934eea95c76a7737b83773bffe8738935082d | https://github.com/libofx/libofx | https://github.com/libofx/libofx/commit/a70934eea95c76a7737b83773bffe8738935082d | Fix a buffer overflow.
This is only the minimum workaround to prevent buffer overflow:
Stop iterating once the (fixed!) size of the output buffers is
reached. In response to
https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0317
However, this code is a huge mess anyway and is in no way
anything like ... | 1 | string sanitize_proprietary_tags(string input_string)
{
unsigned int i;
size_t input_string_size;
bool strip = false;
bool tag_open = false;
int tag_open_idx = 0; //Are we within < > ?
bool closing_tag_open = false; //Are we within </ > ?
int orig_tag_open_idx = 0;
bool proprietary_tag = false; //Are we... | 170,627,852,305,112,900,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2017-2920 | An memory corruption vulnerability exists in the .SVG parsing functionality of Computerinsel Photoline 20.02. A specially crafted .SVG file can cause a vulnerability resulting in memory corruption, which can potentially lead to arbitrary code execution. An attacker can send a specific .SVG file to trigger this vulnerab... | https://nvd.nist.gov/vuln/detail/CVE-2017-2920 |
518,533 | libofx | a70934eea95c76a7737b83773bffe8738935082d | https://github.com/libofx/libofx | https://github.com/libofx/libofx/commit/a70934eea95c76a7737b83773bffe8738935082d | Fix a buffer overflow.
This is only the minimum workaround to prevent buffer overflow:
Stop iterating once the (fixed!) size of the output buffers is
reached. In response to
https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0317
However, this code is a huge mess anyway and is in no way
anything like ... | 0 | string sanitize_proprietary_tags(string input_string)
{
unsigned int i;
bool strip = false;
bool tag_open = false;
int tag_open_idx = 0; //Are we within < > ?
bool closing_tag_open = false; //Are we within </ > ?
int orig_tag_open_idx = 0;
bool proprietary_tag = false; //Are we within a proprietary elemen... | 296,383,376,717,599,540,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2017-2920 | An memory corruption vulnerability exists in the .SVG parsing functionality of Computerinsel Photoline 20.02. A specially crafted .SVG file can cause a vulnerability resulting in memory corruption, which can potentially lead to arbitrary code execution. An attacker can send a specific .SVG file to trigger this vulnerab... | https://nvd.nist.gov/vuln/detail/CVE-2017-2920 |
217,217 | iortcw | 11a83410153756ae350a82ed41b08d128ff7f998 | https://github.com/iortcw/iortcw | https://github.com/iortcw/iortcw/commit/11a83410153756ae350a82ed41b08d128ff7f998 | All: Merge some file writing extension checks | 1 | void Con_Dump_f( void ) {
int l, x, i;
short *line;
fileHandle_t f;
int bufferlen;
char *buffer;
char filename[MAX_QPATH];
if ( Cmd_Argc() != 2 ) {
Com_Printf( "usage: condump <filename>\n" );
return;
}
Q_strncpyz( filename, Cmd_Argv( 1 ), sizeof( filename ) );
COM_DefaultExtension( filename, sizeof(... | 128,730,628,186,736,880,000,000,000,000,000,000,000 | None | null | [
"CWE-269"
] | CVE-2017-6903 | In ioquake3 before 2017-03-14, the auto-downloading feature has insufficient content restrictions. This also affects Quake III Arena, OpenArena, OpenJK, iortcw, and other id Tech 3 (aka Quake 3 engine) forks. A malicious auto-downloaded file can trigger loading of crafted auto-downloaded files as native code DLLs. A ma... | https://nvd.nist.gov/vuln/detail/CVE-2017-6903 |
519,025 | iortcw | 11a83410153756ae350a82ed41b08d128ff7f998 | https://github.com/iortcw/iortcw | https://github.com/iortcw/iortcw/commit/11a83410153756ae350a82ed41b08d128ff7f998 | All: Merge some file writing extension checks | 0 | void Con_Dump_f( void ) {
int l, x, i;
short *line;
fileHandle_t f;
int bufferlen;
char *buffer;
char filename[MAX_QPATH];
if ( Cmd_Argc() != 2 ) {
Com_Printf( "usage: condump <filename>\n" );
return;
}
Q_strncpyz( filename, Cmd_Argv( 1 ), sizeof( filename ) );
COM_DefaultExtension( filename, sizeof(... | 160,930,453,638,616,710,000,000,000,000,000,000,000 | None | null | [
"CWE-269"
] | CVE-2017-6903 | In ioquake3 before 2017-03-14, the auto-downloading feature has insufficient content restrictions. This also affects Quake III Arena, OpenArena, OpenJK, iortcw, and other id Tech 3 (aka Quake 3 engine) forks. A malicious auto-downloaded file can trigger loading of crafted auto-downloaded files as native code DLLs. A ma... | https://nvd.nist.gov/vuln/detail/CVE-2017-6903 |
217,218 | ps-lite | 4be817e8b03e7e92517e91f2dfcc50865e91c6ea | https://github.com/dmlc/ps-lite | https://github.com/dmlc/ps-lite/commit/4be817e8b03e7e92517e91f2dfcc50865e91c6ea | Avoid listening on all interfaces by default | 1 | int Bind(const Node& node, int max_retry) override {
receiver_ = zmq_socket(context_, ZMQ_ROUTER);
CHECK(receiver_ != NULL)
<< "create receiver socket failed: " << zmq_strerror(errno);
int local = GetEnv("DMLC_LOCAL", 0);
std::string addr = local ? "ipc:///tmp/" : "tcp://*:";
int port = no... | 27,773,348,298,973,745,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-1281 | The clustered setup of Apache MXNet allows users to specify which IP address and port the scheduler will listen on via the DMLC_PS_ROOT_URI and DMLC_PS_ROOT_PORT env variables. In versions older than 1.0.0, however, the MXNet framework will listen on 0.0.0.0 rather than user specified DMLC_PS_ROOT_URI once a scheduler ... | https://nvd.nist.gov/vuln/detail/CVE-2018-1281 |
519,035 | ps-lite | 4be817e8b03e7e92517e91f2dfcc50865e91c6ea | https://github.com/dmlc/ps-lite | https://github.com/dmlc/ps-lite/commit/4be817e8b03e7e92517e91f2dfcc50865e91c6ea | Avoid listening on all interfaces by default | 0 | int Bind(const Node& node, int max_retry) override {
receiver_ = zmq_socket(context_, ZMQ_ROUTER);
CHECK(receiver_ != NULL)
<< "create receiver socket failed: " << zmq_strerror(errno);
int local = GetEnv("DMLC_LOCAL", 0);
std::string hostname = node.hostname.empty() ? "*" : node.hostname;
... | 287,329,875,877,248,700,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-1281 | The clustered setup of Apache MXNet allows users to specify which IP address and port the scheduler will listen on via the DMLC_PS_ROOT_URI and DMLC_PS_ROOT_PORT env variables. In versions older than 1.0.0, however, the MXNet framework will listen on 0.0.0.0 rather than user specified DMLC_PS_ROOT_URI once a scheduler ... | https://nvd.nist.gov/vuln/detail/CVE-2018-1281 |
217,219 | WAVM | 2de6cf70c5ef31e22ed119a25ac2daeefd3d18a1 | https://github.com/WAVM/WAVM | https://github.com/WAVM/WAVM/commit/2de6cf70c5ef31e22ed119a25ac2daeefd3d18a1 | Fix out-of-bounds array access when passing a <4 byte input file to wavm or wavm-compile | 1 | inline bool loadModule(const char* filename, IR::Module& outModule)
{
// Read the specified file into an array.
std::vector<U8> fileBytes;
if(!loadFile(filename, fileBytes)) { return false; }
// If the file starts with the WASM binary magic number, load it as a binary irModule.
if(*(U32*)fileBytes.data() == 0x6d7... | 247,635,764,926,562,080,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2018-17292 | An issue was discovered in WAVM before 2018-09-16. The loadModule function in Include/Inline/CLI.h lacks checking of the file length before a file magic comparison, allowing attackers to cause a Denial of Service (application crash caused by out-of-bounds read) by crafting a file that has fewer than 4 bytes. | https://nvd.nist.gov/vuln/detail/CVE-2018-17292 |
519,044 | WAVM | 2de6cf70c5ef31e22ed119a25ac2daeefd3d18a1 | https://github.com/WAVM/WAVM | https://github.com/WAVM/WAVM/commit/2de6cf70c5ef31e22ed119a25ac2daeefd3d18a1 | Fix out-of-bounds array access when passing a <4 byte input file to wavm or wavm-compile | 0 | inline bool loadModule(const char* filename, IR::Module& outModule)
{
// Read the specified file into an array.
std::vector<U8> fileBytes;
if(!loadFile(filename, fileBytes)) { return false; }
// If the file starts with the WASM binary magic number, load it as a binary irModule.
if(fileBytes.size() >= 4 && *(U32*)... | 226,446,143,927,897,680,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2018-17292 | An issue was discovered in WAVM before 2018-09-16. The loadModule function in Include/Inline/CLI.h lacks checking of the file length before a file magic comparison, allowing attackers to cause a Denial of Service (application crash caused by out-of-bounds read) by crafting a file that has fewer than 4 bytes. | https://nvd.nist.gov/vuln/detail/CVE-2018-17292 |
217,220 | WAVM | 31d670b6489e6d708c3b04b911cdf14ac43d846d | https://github.com/WAVM/WAVM | https://github.com/WAVM/WAVM/commit/31d670b6489e6d708c3b04b911cdf14ac43d846d | Fix dereferencing null pointer when running wavm with WebAssembly main function that takes command-line arguments but no Emscripten memory to write them to | 1 | static int run(const CommandLineOptions& options)
{
IR::Module irModule;
// Load the module.
if(!loadModule(options.filename, irModule)) { return EXIT_FAILURE; }
if(options.onlyCheck) { return EXIT_SUCCESS; }
// Compile the module.
Runtime::Module* module = nullptr;
if(!options.precompiled) { module = Runtime:... | 232,153,025,347,729,260,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2018-17293 | An issue was discovered in WAVM before 2018-09-16. The run function in Programs/wavm/wavm.cpp does not check whether there is Emscripten memory to store the command-line arguments passed by the input WebAssembly file's main function, which allows attackers to cause a denial of service (application crash by NULL pointer... | https://nvd.nist.gov/vuln/detail/CVE-2018-17293 |
519,050 | WAVM | 31d670b6489e6d708c3b04b911cdf14ac43d846d | https://github.com/WAVM/WAVM | https://github.com/WAVM/WAVM/commit/31d670b6489e6d708c3b04b911cdf14ac43d846d | Fix dereferencing null pointer when running wavm with WebAssembly main function that takes command-line arguments but no Emscripten memory to write them to | 0 | static int run(const CommandLineOptions& options)
{
IR::Module irModule;
// Load the module.
if(!loadModule(options.filename, irModule)) { return EXIT_FAILURE; }
if(options.onlyCheck) { return EXIT_SUCCESS; }
// Compile the module.
Runtime::Module* module = nullptr;
if(!options.precompiled) { module = Runtime:... | 71,582,623,173,496,280,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2018-17293 | An issue was discovered in WAVM before 2018-09-16. The run function in Programs/wavm/wavm.cpp does not check whether there is Emscripten memory to store the command-line arguments passed by the input WebAssembly file's main function, which allows attackers to cause a denial of service (application crash by NULL pointer... | https://nvd.nist.gov/vuln/detail/CVE-2018-17293 |
217,235 | abuild | 4f90ce92778d0ee302e288def75591b96a397c8b | https://github.com/sroracle/abuild | https://github.com/sroracle/abuild/commit/4f90ce92778d0ee302e288def75591b96a397c8b | abuild-sudo: don't allow --keys-dir
Not allowing --allow-untrusted is obviously a good idea, but it can be
trivially bypassed if --keys-dir is allowed:
$ abuild-apk add foo-1-r0.apk
ERROR: foo-1-r0.apk: UNTRUSTED signature
$ abuild-apk --allow-untrusted add foo-1-r0.apk
abuild-apk: --allow-untrusted: not allowed opti... | 1 | int main(int argc, const char *argv[])
{
struct group *grent;
const char *cmd;
const char *path;
int i;
struct passwd *pw;
grent = getgrnam(ABUILD_GROUP);
if (grent == NULL)
errx(1, "%s: Group not found", ABUILD_GROUP);
char *name = NULL;
pw = getpwuid(getuid());
if (pw)
name = pw->pw_name;
if (!is_in... | 246,817,719,144,674,770,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2019-12875 | Alpine Linux abuild through 3.4.0 allows an unprivileged member of the abuild group to add an untrusted package via a --keys-dir option that causes acceptance of an untrusted signing key. | https://nvd.nist.gov/vuln/detail/CVE-2019-12875 |
519,115 | abuild | 4f90ce92778d0ee302e288def75591b96a397c8b | https://github.com/sroracle/abuild | https://github.com/sroracle/abuild/commit/4f90ce92778d0ee302e288def75591b96a397c8b | abuild-sudo: don't allow --keys-dir
Not allowing --allow-untrusted is obviously a good idea, but it can be
trivially bypassed if --keys-dir is allowed:
$ abuild-apk add foo-1-r0.apk
ERROR: foo-1-r0.apk: UNTRUSTED signature
$ abuild-apk --allow-untrusted add foo-1-r0.apk
abuild-apk: --allow-untrusted: not allowed opti... | 0 | int main(int argc, const char *argv[])
{
struct group *grent;
const char *cmd;
const char *path;
int i;
struct passwd *pw;
grent = getgrnam(ABUILD_GROUP);
if (grent == NULL)
errx(1, "%s: Group not found", ABUILD_GROUP);
char *name = NULL;
pw = getpwuid(getuid());
if (pw)
name = pw->pw_name;
if (!is_in... | 293,885,072,328,865,660,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2019-12875 | Alpine Linux abuild through 3.4.0 allows an unprivileged member of the abuild group to add an untrusted package via a --keys-dir option that causes acceptance of an untrusted signing key. | https://nvd.nist.gov/vuln/detail/CVE-2019-12875 |
217,243 | elog | 993bed4923c88593cc6b1186e0d1b9564994a25a | https://bitbucket.org/ritt/elog | https://bitbucket.org/ritt/elog/commits/993bed4923c88593cc6b1186e0d1b9564994a25a | Serve SVG files as attachments only to avoid XSS vulnerabilities | 1 | void send_file_direct(char *file_name) {
int fh, i, length, delta;
char str[MAX_PATH_LENGTH], dir[MAX_PATH_LENGTH], charset[80];
getcwd(dir, sizeof(dir));
fh = open(file_name, O_RDONLY | O_BINARY);
if (fh > 0) {
lseek(fh, 0, SEEK_END);
length = TELL(fh);
lseek(fh, 0, SEEK_SET);
... | 336,698,074,074,745,940,000,000,000,000,000,000,000 | None | null | [
"CWE-79"
] | CVE-2019-20376 | A cross-site scripting (XSS) vulnerability in Electronic Logbook (ELOG) 3.1.4 allows remote attackers to inject arbitrary web script or HTML via a crafted SVG document to elogd.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-20376 |
519,320 | elog | 993bed4923c88593cc6b1186e0d1b9564994a25a | https://bitbucket.org/ritt/elog | https://bitbucket.org/ritt/elog/commits/993bed4923c88593cc6b1186e0d1b9564994a25a | Serve SVG files as attachments only to avoid XSS vulnerabilities | 0 | void send_file_direct(char *file_name) {
int fh, i, length, delta;
char str[MAX_PATH_LENGTH], dir[MAX_PATH_LENGTH], charset[80];
getcwd(dir, sizeof(dir));
fh = open(file_name, O_RDONLY | O_BINARY);
if (fh > 0) {
lseek(fh, 0, SEEK_END);
length = TELL(fh);
lseek(fh, 0, SEEK_SET);
... | 325,071,300,405,512,530,000,000,000,000,000,000,000 | None | null | [
"CWE-79"
] | CVE-2019-20376 | A cross-site scripting (XSS) vulnerability in Electronic Logbook (ELOG) 3.1.4 allows remote attackers to inject arbitrary web script or HTML via a crafted SVG document to elogd.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-20376 |
217,247 | naviserver | a5c3079f1d8996d5f34c9384a440acf3519ca3bb | https://bitbucket.org/naviserver/naviserver | https://bitbucket.org/naviserver/naviserver/commits/a5c3079f1d8996d5f34c9384a440acf3519ca3bb | fix for bug https://sourceforge.net/p/naviserver/bugs/89/
A negative value provided as chunk encoding length led to a potential crash.
A test case for this case was added to the regression test. | 1 | ChunkedDecode(Request *reqPtr, bool update)
{
const Tcl_DString *bufPtr;
const char *end, *chunkStart;
bool success = NS_TRUE;
NS_NONNULL_ASSERT(reqPtr != NULL);
bufPtr = &reqPtr->buffer;
end = bufPtr->string + bufPtr->length;
chunkStart = bufPtr->string + reqPtr->chunk... | 210,559,204,718,292,940,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2020-13111 | NaviServer 4.99.4 to 4.99.19 allows denial of service due to the nsd/driver.c ChunkedDecode function not properly validating the length of a chunk. A remote attacker can craft a chunked-transfer request that will result in a negative value being passed to memmove via the size parameter, causing the process to crash. | https://nvd.nist.gov/vuln/detail/CVE-2020-13111 |
519,503 | naviserver | a5c3079f1d8996d5f34c9384a440acf3519ca3bb | https://bitbucket.org/naviserver/naviserver | https://bitbucket.org/naviserver/naviserver/commits/a5c3079f1d8996d5f34c9384a440acf3519ca3bb | fix for bug https://sourceforge.net/p/naviserver/bugs/89/
A negative value provided as chunk encoding length led to a potential crash.
A test case for this case was added to the regression test. | 0 | ChunkedDecode(Request *reqPtr, bool update)
{
const Tcl_DString *bufPtr;
const char *end, *chunkStart;
SockState result = SOCK_READY;
NS_NONNULL_ASSERT(reqPtr != NULL);
bufPtr = &reqPtr->buffer;
end = bufPtr->string + bufPtr->length;
chunkStart = bufPtr->string + reqPtr->chu... | 52,143,067,939,071,995,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2020-13111 | NaviServer 4.99.4 to 4.99.19 allows denial of service due to the nsd/driver.c ChunkedDecode function not properly validating the length of a chunk. A remote attacker can craft a chunked-transfer request that will result in a negative value being passed to memmove via the size parameter, causing the process to crash. | https://nvd.nist.gov/vuln/detail/CVE-2020-13111 |
217,250 | cbang | 1c1dba62bd3e6fa9d0d0c0aa21926043b75382c7 | https://github.com/CauldronDevelopmentLLC/cbang | https://github.com/CauldronDevelopmentLLC/cbang/commit/1c1dba62bd3e6fa9d0d0c0aa21926043b75382c7 | Don't allow extraction of tar files outside of the target directory, added tar tests | 1 | std::string TarFileReader::extract(const string &_path) {
if (_path.empty()) THROW("path cannot be empty");
if (!hasMore()) THROW("No more tar files");
string path = _path;
if (SystemUtilities::isDirectory(path)) path += "/" + getFilename();
LOG_DEBUG(5, "Extracting: " << path);
return extract(*SystemUti... | 230,347,907,451,407,680,000,000,000,000,000,000,000 | None | null | [
"CWE-22"
] | CVE-2020-15908 | tar/TarFileReader.cpp in Cauldron cbang (aka C-Bang or C!) before 1.6.0 allows Directory Traversal during extraction from a TAR archive. | https://nvd.nist.gov/vuln/detail/CVE-2020-15908 |
519,599 | cbang | 1c1dba62bd3e6fa9d0d0c0aa21926043b75382c7 | https://github.com/CauldronDevelopmentLLC/cbang | https://github.com/CauldronDevelopmentLLC/cbang/commit/1c1dba62bd3e6fa9d0d0c0aa21926043b75382c7 | Don't allow extraction of tar files outside of the target directory, added tar tests | 0 | std::string TarFileReader::extract(const string &_path) {
if (_path.empty()) THROW("path cannot be empty");
if (!hasMore()) THROW("No more tar files");
string path = _path;
if (SystemUtilities::isDirectory(path)) {
path += "/" + getFilename();
// Check that path is under the target directory
strin... | 313,067,532,887,911,780,000,000,000,000,000,000,000 | None | null | [
"CWE-22"
] | CVE-2020-15908 | tar/TarFileReader.cpp in Cauldron cbang (aka C-Bang or C!) before 1.6.0 allows Directory Traversal during extraction from a TAR archive. | https://nvd.nist.gov/vuln/detail/CVE-2020-15908 |
217,251 | pdf2json | 80bf71f16c804108fd933e267fe31692aaa509b4 | https://github.com/flexpaper/pdf2json | https://github.com/flexpaper/pdf2json/commit/80bf71f16c804108fd933e267fe31692aaa509b4 | Fix for heap vulnerability | 1 | void CharCodeToUnicode::addMapping(CharCode code, char *uStr, int n,
int offset) {
CharCode oldLen, i;
Unicode u;
char uHex[5];
int j;
if (code >= mapLen) {
oldLen = mapLen;
mapLen = (code + 256) & ~255;
map = (Unicode *)greallocn(map, mapLen, sizeof(Unicode));
for (i = oldLen; i < map... | 19,626,458,378,996,310,000,000,000,000,000,000,000 | None | null | [
"CWE-120"
] | CVE-2020-18750 | Buffer overflow in pdf2json 0.69 allows local users to execute arbitrary code by converting a crafted PDF file. | https://nvd.nist.gov/vuln/detail/CVE-2020-18750 |
519,625 | pdf2json | 80bf71f16c804108fd933e267fe31692aaa509b4 | https://github.com/flexpaper/pdf2json | https://github.com/flexpaper/pdf2json/commit/80bf71f16c804108fd933e267fe31692aaa509b4 | Fix for heap vulnerability | 0 | void CharCodeToUnicode::addMapping(CharCode code, char *uStr, int n,
int offset) {
CharCode oldLen, i;
Unicode u;
char uHex[5];
int j;
if (code >= mapLen) {
oldLen = mapLen;
mapLen = (code + 256) & ~255;
if (unlikely(code >= mapLen)) {
error(-1, "Illegal code value in CharCodeToUnico... | 86,424,053,612,770,930,000,000,000,000,000,000,000 | None | null | [
"CWE-120"
] | CVE-2020-18750 | Buffer overflow in pdf2json 0.69 allows local users to execute arbitrary code by converting a crafted PDF file. | https://nvd.nist.gov/vuln/detail/CVE-2020-18750 |
217,252 | Platinum | 9a4ceaccb1585ec35c45fd8e2585538fff6a865e | https://github.com/plutinosoft/Platinum | https://github.com/plutinosoft/Platinum/commit/9a4ceaccb1585ec35c45fd8e2585538fff6a865e | Fix vulnerability around urls crafter as http://host/../secret.foo (#24) | 1 | PLT_HttpServer::ServeFile(const NPT_HttpRequest& request,
const NPT_HttpRequestContext& context,
NPT_HttpResponse& response,
NPT_String file_path)
{
NPT_InputStreamReference stream;
NPT_File ... | 80,959,503,616,478,400,000,000,000,000,000,000,000 | None | null | [
"CWE-22"
] | CVE-2020-19858 | Platinum Upnp SDK through 1.2.0 has a directory traversal vulnerability. The attack could remote attack victim by sending http://ip:port/../privacy.avi URL to compromise a victim's privacy. | https://nvd.nist.gov/vuln/detail/CVE-2020-19858 |
519,628 | Platinum | 9a4ceaccb1585ec35c45fd8e2585538fff6a865e | https://github.com/plutinosoft/Platinum | https://github.com/plutinosoft/Platinum/commit/9a4ceaccb1585ec35c45fd8e2585538fff6a865e | Fix vulnerability around urls crafter as http://host/../secret.foo (#24) | 0 | PLT_HttpServer::ServeFile(const NPT_HttpRequest& request,
const NPT_HttpRequestContext& context,
NPT_HttpResponse& response,
NPT_String file_path)
{
NPT_InputStreamReference stream;
NPT_File ... | 202,319,851,150,031,300,000,000,000,000,000,000,000 | None | null | [
"CWE-22"
] | CVE-2020-19858 | Platinum Upnp SDK through 1.2.0 has a directory traversal vulnerability. The attack could remote attack victim by sending http://ip:port/../privacy.avi URL to compromise a victim's privacy. | https://nvd.nist.gov/vuln/detail/CVE-2020-19858 |
217,285 | jsish | 430ea27accd4d4ffddc946c9402e7c9064835a18 | https://github.com/pcmacdon/jsish | https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18 | Release "3.0.7": Fix toPrecision bug "stack overflow #4".
FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de | 1 | static Jsi_RC NumberToPrecisionCmd(Jsi_Interp *interp, Jsi_Value *args, Jsi_Value *_this,
Jsi_Value **ret, Jsi_Func *funcPtr)
{
char buf[100];
int prec = 0, skip = 0;
Jsi_Number num;
Jsi_Value *v;
ChkStringN(_this, funcPtr, v);
if (Jsi_GetIntFromValue(interp, Jsi_ValueArrayIndex(interp, args... | 25,461,200,118,267,773,000,000,000,000,000,000,000 | None | null | [
"CWE-120"
] | CVE-2020-22873 | Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2020-22873 |
520,296 | jsish | 430ea27accd4d4ffddc946c9402e7c9064835a18 | https://github.com/pcmacdon/jsish | https://github.com/pcmacdon/jsish/commit/430ea27accd4d4ffddc946c9402e7c9064835a18 | Release "3.0.7": Fix toPrecision bug "stack overflow #4".
FossilOrigin-Name: 6c7f0c37027d7f890b57cb38f776af39b8f81f03e60ceeb0a231a1d21e24b5de | 0 | static Jsi_RC NumberToPrecisionCmd(Jsi_Interp *interp, Jsi_Value *args, Jsi_Value *_this,
Jsi_Value **ret, Jsi_Func *funcPtr)
{
char buf[JSI_MAX_NUMBER_STRING*2];
int prec = 0, skip = 0;
Jsi_Number num;
Jsi_Value *v;
ChkStringN(_this, funcPtr, v);
if (Jsi_GetIntFromValue(interp, Jsi_ValueArr... | 176,441,123,893,071,800,000,000,000,000,000,000,000 | None | null | [
"CWE-120"
] | CVE-2020-22873 | Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2020-22873 |
217,327 | retdec | 517298bafaaff0a8e3dd60dd055a67c41b545807 | https://github.com/avast/retdec | https://github.com/avast/retdec/commit/517298bafaaff0a8e3dd60dd055a67c41b545807 | Try to fix issue #637
Reference: https://github.com/avast/retdec/issues/637 | 1 | bool Decoder::canSplitFunctionOn(
utils::Address addr,
llvm::BasicBlock* splitBb,
std::set<llvm::BasicBlock*>& newFncStarts)
{
newFncStarts.insert(splitBb);
auto* f = splitBb->getParent();
auto fAddr = getFunctionAddress(f);
auto fSzIt = _fnc2sz.find(f);
if (fSzIt != _fnc2sz.end())
{
if (fAddr <= addr &... | 251,333,548,688,546,380,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2020-23907 | An issue was discovered in retdec v3.3. In function canSplitFunctionOn() of ir_modifications.cpp, there is a possible out of bounds read due to a heap buffer overflow. The impact is: Deny of Service, Memory Disclosure, and Possible Code Execution. | https://nvd.nist.gov/vuln/detail/CVE-2020-23907 |
520,976 | retdec | 517298bafaaff0a8e3dd60dd055a67c41b545807 | https://github.com/avast/retdec | https://github.com/avast/retdec/commit/517298bafaaff0a8e3dd60dd055a67c41b545807 | Try to fix issue #637
Reference: https://github.com/avast/retdec/issues/637 | 0 | bool Decoder::canSplitFunctionOn(
utils::Address addr,
llvm::BasicBlock* splitBb,
std::set<llvm::BasicBlock*>& newFncStarts)
{
newFncStarts.insert(splitBb);
auto* f = splitBb->getParent();
auto fAddr = getFunctionAddress(f);
auto fSzIt = _fnc2sz.find(f);
if (fSzIt != _fnc2sz.end())
{
if (fAddr <= addr &... | 52,757,457,497,306,000,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2020-23907 | An issue was discovered in retdec v3.3. In function canSplitFunctionOn() of ir_modifications.cpp, there is a possible out of bounds read due to a heap buffer overflow. The impact is: Deny of Service, Memory Disclosure, and Possible Code Execution. | https://nvd.nist.gov/vuln/detail/CVE-2020-23907 |
217,328 | oocborrt | 539851c66778f68a244633985f6f8d0df94ea3b3 | https://github.com/objsys/oocborrt | https://github.com/objsys/oocborrt/commit/539851c66778f68a244633985f6f8d0df94ea3b3 | fixed missing return status test error | 1 | static int cbor2json (OSCTXT* pCborCtxt, OSCTXT* pJsonCtxt)
{
int ret = 0;
OSOCTET tag, ub;
/* Read byte from stream */
ret = rtxReadBytes (pCborCtxt, &ub, 1);
if (0 != ret) return LOG_RTERR (pCborCtxt, ret);
tag = ub >> 5;
/* Switch on tag value */
switch (tag) {
case OSRTCBOR_... | 127,504,669,515,341,630,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2020-24753 | A memory corruption vulnerability in Objective Open CBOR Run-time (oocborrt) in versions before 2020-08-12 could allow an attacker to execute code via crafted Concise Binary Object Representation (CBOR) input to the cbor2json decoder. An uncaught error while decoding CBOR Major Type 3 text strings leads to the use of a... | https://nvd.nist.gov/vuln/detail/CVE-2020-24753 |
520,982 | oocborrt | 539851c66778f68a244633985f6f8d0df94ea3b3 | https://github.com/objsys/oocborrt | https://github.com/objsys/oocborrt/commit/539851c66778f68a244633985f6f8d0df94ea3b3 | fixed missing return status test error | 0 | static int cbor2json (OSCTXT* pCborCtxt, OSCTXT* pJsonCtxt)
{
int ret = 0;
OSOCTET tag, ub;
/* Read byte from stream */
ret = rtxReadBytes (pCborCtxt, &ub, 1);
if (0 != ret) return LOG_RTERR (pCborCtxt, ret);
tag = ub >> 5;
/* Switch on tag value */
switch (tag) {
case OSRTCBOR_... | 182,192,642,033,756,700,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2020-24753 | A memory corruption vulnerability in Objective Open CBOR Run-time (oocborrt) in versions before 2020-08-12 could allow an attacker to execute code via crafted Concise Binary Object Representation (CBOR) input to the cbor2json decoder. An uncaught error while decoding CBOR Major Type 3 text strings leads to the use of a... | https://nvd.nist.gov/vuln/detail/CVE-2020-24753 |
217,461 | sqlcipher | cb71f53e8cea4802509f182fa5bead0ac6ab0e7f | https://github.com/sqlcipher/sqlcipher | https://github.com/sqlcipher/sqlcipher/commit/cb71f53e8cea4802509f182fa5bead0ac6ab0e7f | fix sqlcipher_export handling of NULL parameters | 1 | void sqlcipher_exportFunc(sqlite3_context *context, int argc, sqlite3_value **argv) {
sqlite3 *db = sqlite3_context_db_handle(context);
const char* targetDb, *sourceDb;
int targetDb_idx = 0;
u64 saved_flags = db->flags; /* Saved value of the db->flags */
u32 saved_mDbFlags = db->mDbFlags; /* Sa... | 76,223,646,707,037,760,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2021-3119 | Zetetic SQLCipher 4.x before 4.4.3 has a NULL pointer dereferencing issue related to sqlcipher_export in crypto.c and sqlite3StrICmp in sqlite3.c. This may allow an attacker to perform a remote denial of service attack. For example, an SQL injection can be used to execute the crafted SQL command sequence, which causes ... | https://nvd.nist.gov/vuln/detail/CVE-2021-3119 |
521,506 | sqlcipher | cb71f53e8cea4802509f182fa5bead0ac6ab0e7f | https://github.com/sqlcipher/sqlcipher | https://github.com/sqlcipher/sqlcipher/commit/cb71f53e8cea4802509f182fa5bead0ac6ab0e7f | fix sqlcipher_export handling of NULL parameters | 0 | void sqlcipher_exportFunc(sqlite3_context *context, int argc, sqlite3_value **argv) {
sqlite3 *db = sqlite3_context_db_handle(context);
const char* targetDb, *sourceDb;
int targetDb_idx = 0;
u64 saved_flags = db->flags; /* Saved value of the db->flags */
u32 saved_mDbFlags = db->mDbFlags; /* Sa... | 291,673,322,331,677,800,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2021-3119 | Zetetic SQLCipher 4.x before 4.4.3 has a NULL pointer dereferencing issue related to sqlcipher_export in crypto.c and sqlite3StrICmp in sqlite3.c. This may allow an attacker to perform a remote denial of service attack. For example, an SQL injection can be used to execute the crafted SQL command sequence, which causes ... | https://nvd.nist.gov/vuln/detail/CVE-2021-3119 |
217,552 | maddy | 7ee6a39c6a1939b376545f030a5efd6f90913583 | https://github.com/foxcpp/maddy | https://github.com/foxcpp/maddy/commit/7ee6a39c6a1939b376545f030a5efd6f90913583 | auth/pam: Check for account/password expiry
See GHSA-6cp7-g972-w9m9. Thanks Youssef Rebahi-Gilbert (ysf) for
reporting the issue. | 1 | struct error_obj run_pam_auth(const char *username, char *password) {
// PAM frees pam_response for us.
struct pam_response *reply = malloc(sizeof(struct pam_response));
if (reply == NULL) {
struct error_obj ret_val;
ret_val.status = 2;
ret_val.func_name = "malloc";
ret_val.e... | 65,001,628,105,258,760,000,000,000,000,000,000,000 | None | null | [
"CWE-613"
] | CVE-2022-24732 | Maddy Mail Server is an open source SMTP compatible email server. Versions of maddy prior to 0.5.4 do not implement password expiry or account expiry checking when authenticating using PAM. Users are advised to upgrade. Users unable to upgrade should manually remove expired accounts via existing filtering mechanisms. | https://nvd.nist.gov/vuln/detail/CVE-2022-24732 |
522,443 | maddy | 7ee6a39c6a1939b376545f030a5efd6f90913583 | https://github.com/foxcpp/maddy | https://github.com/foxcpp/maddy/commit/7ee6a39c6a1939b376545f030a5efd6f90913583 | auth/pam: Check for account/password expiry
See GHSA-6cp7-g972-w9m9. Thanks Youssef Rebahi-Gilbert (ysf) for
reporting the issue. | 0 | struct error_obj run_pam_auth(const char *username, char *password) {
// PAM frees pam_response for us.
struct pam_response *reply = malloc(sizeof(struct pam_response));
if (reply == NULL) {
struct error_obj ret_val;
ret_val.status = 2;
ret_val.func_name = "malloc";
ret_val.e... | 311,322,554,352,065,030,000,000,000,000,000,000,000 | None | null | [
"CWE-613"
] | CVE-2022-24732 | Maddy Mail Server is an open source SMTP compatible email server. Versions of maddy prior to 0.5.4 do not implement password expiry or account expiry checking when authenticating using PAM. Users are advised to upgrade. Users unable to upgrade should manually remove expired accounts via existing filtering mechanisms. | https://nvd.nist.gov/vuln/detail/CVE-2022-24732 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.