Datasets:

is_vulnerable
bool
2 classes
func
stringlengths
28
484k
cwe
listlengths
1
2
project
stringclasses
592 values
commit_id
stringlengths
7
44
hash
stringlengths
34
39
big_vul_idx
int64
4.09k
189k
idx
int64
0
522k
cwe_description
stringclasses
81 values
false
int test_mod_exp(BIO *bp, BN_CTX *ctx) { BIGNUM *a, *b, *c, *d, *e; int i; a = BN_new(); b = BN_new(); c = BN_new(); d = BN_new(); e = BN_new(); BN_one(a); BN_one(b); BN_zero(c); if (BN_mod_exp(d, a, b, c, ctx)) { fprintf(stderr, "BN_mod_exp with zero modulus succee...
[ "CWE-200" ]
openssl
d73cc256c8e256c32ed959456101b73ba9842f72
187209592842827111487919300940629712064
177,893
111
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
true
int test_mod_exp(BIO *bp, BN_CTX *ctx) { BIGNUM *a, *b, *c, *d, *e; int i; a = BN_new(); b = BN_new(); c = BN_new(); d = BN_new(); e = BN_new(); BN_one(a); BN_one(b); BN_zero(c); if (BN_mod_exp(d, a, b, c, ctx)) { fprintf(stderr, "BN_mod_exp with zero modulus succee...
[ "CWE-200" ]
openssl
d73cc256c8e256c32ed959456101b73ba9842f72
98925735800817484879753523596172311629
177,893
157,969
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
false
void Splash::blitMask(SplashBitmap *src, int xDest, int yDest, SplashClipResult clipRes) { SplashPipe pipe; Guchar *p; int w, h, x, y; w = src->getWidth(); h = src->getHeight(); if (vectorAntialias && clipRes != splashClipAllInside) { pipeInit(&pipe, xDest, yDest, state->fillPattern, NULL,...
[ "Other" ]
poppler
a9b8ab4657dec65b8b86c225d12c533ad7e984e2
177353594761141217586604236761349137273
177,904
113
Unknown
true
void Splash::blitMask(SplashBitmap *src, int xDest, int yDest, SplashClipResult clipRes) { SplashPipe pipe; Guchar *p; int w, h, x, y; w = src->getWidth(); h = src->getHeight(); p = src->getDataPtr(); if (p == NULL) { error(errInternal, -1, "src->getDataPtr() is NULL in Splash::blitMask");...
[ "Other" ]
poppler
a9b8ab4657dec65b8b86c225d12c533ad7e984e2
273734718462154790310690694325824417535
177,904
157,973
Unknown
false
void Splash::arbitraryTransformMask(SplashImageMaskSource src, void *srcData, int srcWidth, int srcHeight, SplashCoord *mat, GBool glyphMode) { SplashBitmap *scaledMask; SplashClipResult clipRes, clipRes2; SplashPipe pipe; int scaledWidth, scaledHeight, t0, t1; SplashCoord r00, r01, r10, r11, ...
[ "Other" ]
poppler
a9b8ab4657dec65b8b86c225d12c533ad7e984e2
335865570448652228832556287433161700430
177,903
9,120
Unknown
true
SplashError Splash::arbitraryTransformImage(SplashImageSource src, void *srcData, SplashColorMode srcMode, int nComps, GBool srcAlpha, int srcWidth, int srcHeight, SplashCoord *mat, GBool interpolate, GBool tilingPattern) { SplashBitmap *scaledImg; SplashClipResult c...
[ "Other" ]
poppler
a9b8ab4657dec65b8b86c225d12c533ad7e984e2
40143756312744208339092311012124041863
4,087
13,935
Unknown
false
void Splash::arbitraryTransformMask(SplashImageMaskSource src, void *srcData, int srcWidth, int srcHeight, SplashCoord *mat, GBool glyphMode) { SplashBitmap *scaledMask; SplashClipResult clipRes, clipRes2; SplashPipe pipe; int scaledWidth, scaledHeight, t0, t1; SplashCoord r00, r01, r10, r11, ...
[ "Other" ]
poppler
a205e71a2dbe0c8d4f4905a76a3f79ec522eacec
21833262199574906453642874701778817418
177,905
114
Unknown
true
void Splash::arbitraryTransformMask(SplashImageMaskSource src, void *srcData, int srcWidth, int srcHeight, SplashCoord *mat, GBool glyphMode) { SplashBitmap *scaledMask; SplashClipResult clipRes, clipRes2; SplashPipe pipe; int scaledWidth, scaledHeight, t0, t1; SplashCoord r00, r01, r10, r11, ...
[ "Other" ]
poppler
a205e71a2dbe0c8d4f4905a76a3f79ec522eacec
163588603633760542389163811981031046563
177,905
157,974
Unknown
false
token_continue(i_ctx_t *i_ctx_p, scanner_state * pstate, bool save) { os_ptr op = osp; int code; ref token; /* Note that gs_scan_token may change osp! */ pop(1); /* remove the file or scanner state */ again: gs_scanner_error_object(i_ctx_p, pstate, &i_ctx_p->er...
[ "CWE-125" ]
ghostscript
671fd59eb657743aa86fbc1895cb15872a317caa
15644102026731532816747781452593039582
177,910
117
The product reads data past the end, or before the beginning, of the intended buffer.
true
token_continue(i_ctx_t *i_ctx_p, scanner_state * pstate, bool save) { os_ptr op = osp; int code; ref token; /* Since we might free pstate below, and we're dealing with * gc memory referenced by the stack, we need to explicitly * remove the reference to pstate from the stack, otherwise ...
[ "CWE-125" ]
ghostscript
671fd59eb657743aa86fbc1895cb15872a317caa
20980588326678235890071977166118796220
177,910
157,979
The product reads data past the end, or before the beginning, of the intended buffer.
false
ft_smooth_render_generic( FT_Renderer render, FT_GlyphSlot slot, FT_Render_Mode mode, const FT_Vector* origin, FT_Render_Mode required_mode ) { FT_Error error; FT_Outline* o...
[ "CWE-189" ]
savannah
79972af4f0485a11dcb19551356c45245749fc5b
24717888926496377392853611670854702544
177,914
121
This weakness involves numeric computation errors, such as integer overflows, underflows, or precision losses, which can lead to miscalculations and exploitable behaviors in software.
true
ft_smooth_render_generic( FT_Renderer render, FT_GlyphSlot slot, FT_Render_Mode mode, const FT_Vector* origin, FT_Render_Mode required_mode ) { FT_Error error; FT_Outline* o...
[ "CWE-189" ]
savannah
79972af4f0485a11dcb19551356c45245749fc5b
121084197922462569728293725733145369116
177,914
157,983
This weakness involves numeric computation errors, such as integer overflows, underflows, or precision losses, which can lead to miscalculations and exploitable behaviors in software.
false
cff_charset_load( CFF_Charset charset, FT_UInt num_glyphs, FT_Stream stream, FT_ULong base_offset, FT_ULong offset, FT_Bool invert ) { FT_Memory memory = stream->memory; FT_Error erro...
[ "CWE-189" ]
savannah
0545ec1ca36b27cb928128870a83e5f668980bc5
322437368215015751310197159603838280292
177,915
122
This weakness involves numeric computation errors, such as integer overflows, underflows, or precision losses, which can lead to miscalculations and exploitable behaviors in software.
true
cff_charset_load( CFF_Charset charset, FT_UInt num_glyphs, FT_Stream stream, FT_ULong base_offset, FT_ULong offset, FT_Bool invert ) { FT_Memory memory = stream->memory; FT_Error erro...
[ "CWE-189" ]
savannah
0545ec1ca36b27cb928128870a83e5f668980bc5
274463663087246387196979578674863690828
177,915
157,984
This weakness involves numeric computation errors, such as integer overflows, underflows, or precision losses, which can lead to miscalculations and exploitable behaviors in software.
false
void add_param_to_argv(char *parsestart, int line) { int quote_open = 0, escaped = 0, param_len = 0; char param_buffer[1024], *curchar; /* After fighting with strtok enough, here's now * a 'real' parser. According to Rusty I'm now no } else { param_buffer[param_len++] = *curchar; for (curchar = pars...
[ "CWE-119" ]
netfilter
2ae1099a42e6a0f06de305ca13a842ac83d4683e
204920135878748692275786929565292679269
177,922
123
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
true
void add_param_to_argv(char *parsestart, int line) { int quote_open = 0, escaped = 0; struct xt_param_buf param = {}; char *curchar; /* After fighting with strtok enough, here's now * a 'real' parser. According to Rusty I'm now no } else { param_buffer[param_len++] = *curchar; for (curchar = parses...
[ "CWE-119" ]
netfilter
2ae1099a42e6a0f06de305ca13a842ac83d4683e
82639535107168519393189431221613615364
177,922
157,985
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
false
user_change_icon_file_authorized_cb (Daemon *daemon, User *user, GDBusMethodInvocation *context, gpointer data) { g_autofree gchar *filename = NULL; ...
[ "CWE-22" ]
accountsservice
f9abd359f71a5bce421b9ae23432f539a067847a
310825199754671934664587377706693460973
177,931
124
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the...
true
user_change_icon_file_authorized_cb (Daemon *daemon, User *user, GDBusMethodInvocation *context, gpointer data) { g_autofree gchar *filename = NULL; ...
[ "CWE-22" ]
accountsservice
f9abd359f71a5bce421b9ae23432f539a067847a
172529280077131825840160709607931426927
177,931
157,986
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the...
false
ProcSendEvent(ClientPtr client) { WindowPtr pWin; WindowPtr effectiveFocus = NullWindow; /* only set if dest==InputFocus */ DeviceIntPtr dev = PickPointer(client); DeviceIntPtr keybd = GetMaster(dev, MASTER_KEYBOARD); SpritePtr pSprite = dev->spriteInfo->sprite; REQUEST(xSendEventReq); ...
[ "CWE-119" ]
xserver
215f894965df5fb0bb45b107d84524e700d2073c
36683317052216501366087070681901031177
177,936
128
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
true
ProcSendEvent(ClientPtr client) { WindowPtr pWin; WindowPtr effectiveFocus = NullWindow; /* only set if dest==InputFocus */ DeviceIntPtr dev = PickPointer(client); DeviceIntPtr keybd = GetMaster(dev, MASTER_KEYBOARD); SpritePtr pSprite = dev->spriteInfo->sprite; REQUEST(xSendEventReq); ...
[ "CWE-119" ]
xserver
215f894965df5fb0bb45b107d84524e700d2073c
107904058737663543656332226040399053348
177,936
157,990
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
false
ProcXSendExtensionEvent(ClientPtr client) { int ret; DeviceIntPtr dev; xEvent *first; XEventClass *list; struct tmask tmp[EMASKSIZE]; REQUEST(xSendExtensionEventReq); REQUEST_AT_LEAST_SIZE(xSendExtensionEventReq); if (stuff->length != bytes_to_int32(sizeof(xSendExtensionEv...
[ "CWE-119" ]
xserver
8caed4df36b1f802b4992edcfd282cbeeec35d9d
288772859654498582457761658216356600870
177,937
129
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
true
ProcXSendExtensionEvent(ClientPtr client) { int ret, i; DeviceIntPtr dev; xEvent *first; XEventClass *list; struct tmask tmp[EMASKSIZE]; REQUEST(xSendExtensionEventReq); REQUEST_AT_LEAST_SIZE(xSendExtensionEventReq); if (stuff->length != bytes_to_int32(sizeof(xSendExtensio...
[ "CWE-119" ]
xserver
8caed4df36b1f802b4992edcfd282cbeeec35d9d
7864871216394926527164481647583599943
177,937
157,991
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
false
int X509_verify_cert(X509_STORE_CTX *ctx) { X509 *x, *xtmp, *xtmp2, *chain_ss = NULL; int bad_chain = 0; X509_VERIFY_PARAM *param = ctx->param; int depth, i, ok = 0; int num, j, retry; int (*cb) (int xok, X509_STORE_CTX *xctx); STACK_OF(X509) *sktmp = NULL; if (ctx->cert == NULL) { ...
[ "CWE-254" ]
openssl
9a0db453ba017ebcaccbee933ee6511a9ae4d1c8
115002758247549560072417551006349173395
177,939
130
This label identifies security gaps where expected security features are missing or only partially implemented, reducing protection against unauthorized access or manipulation.
true
int X509_verify_cert(X509_STORE_CTX *ctx) { X509 *x, *xtmp, *xtmp2, *chain_ss = NULL; int bad_chain = 0; X509_VERIFY_PARAM *param = ctx->param; int depth, i, ok = 0; int num, j, retry; int (*cb) (int xok, X509_STORE_CTX *xctx); STACK_OF(X509) *sktmp = NULL; if (ctx->cert == NULL) { ...
[ "CWE-254" ]
openssl
9a0db453ba017ebcaccbee933ee6511a9ae4d1c8
142295385280397706056550098012779904584
177,939
157,992
This label identifies security gaps where expected security features are missing or only partially implemented, reducing protection against unauthorized access or manipulation.
false
pax_decode_header (struct tar_sparse_file *file) { if (file->stat_info->sparse_major > 0) { uintmax_t u; char nbuf[UINTMAX_STRSIZE_BOUND]; union block *blk; char *p; size_t i; off_t start; #define COPY_BUF(b,buf,src) do \ { ...
[ "CWE-476" ]
savannah
cb07844454d8cc9fb21f53ace75975f91185a120
138433573634940218648935622617839152489
177,948
132
The product dereferences a pointer that it expects to be valid but is NULL.
true
pax_decode_header (struct tar_sparse_file *file) { if (file->stat_info->sparse_major > 0) { uintmax_t u; char nbuf[UINTMAX_STRSIZE_BOUND]; union block *blk; char *p; size_t i; off_t start; #define COPY_BUF(b,buf,src) do \ { ...
[ "CWE-476" ]
savannah
cb07844454d8cc9fb21f53ace75975f91185a120
143151925619516221388066178344614236926
177,948
157,994
The product dereferences a pointer that it expects to be valid but is NULL.
false
xps_encode_font_char_imp(xps_font_t *font, int code) { byte *table; /* no cmap selected: return identity */ if (font->cmapsubtable <= 0) return code; table = font->data + font->cmapsubtable; switch (u16(table)) { case 0: /* Apple standard 1-to-1 mapping. */ return table[co...
[ "CWE-125" ]
ghostscript
961b10cdd71403072fb99401a45f3bef6ce53626
76117521649677870757890949935460891471
177,949
133
The product reads data past the end, or before the beginning, of the intended buffer.
true
xps_encode_font_char_imp(xps_font_t *font, int code) { byte *table; /* no cmap selected: return identity */ if (font->cmapsubtable <= 0) return code; table = font->data + font->cmapsubtable; switch (u16(table)) { case 0: /* Apple standard 1-to-1 mapping. */ return table[co...
[ "CWE-125" ]
ghostscript
961b10cdd71403072fb99401a45f3bef6ce53626
127631464692449464016647490182266795745
177,949
157,995
The product reads data past the end, or before the beginning, of the intended buffer.
false
static void gx_ttfReader__Read(ttfReader *self, void *p, int n) { gx_ttfReader *r = (gx_ttfReader *)self; const byte *q; if (!r->error) { if (r->extra_glyph_index != -1) { q = r->glyph_data.bits.data + r->pos; r->error = (r->glyph_data.bits.size - r->pos < n ? ...
[ "CWE-125" ]
ghostscript
937ccd17ac65935633b2ebc06cb7089b91e17e6b
68672817859874024460253201984431332219
177,951
134
The product reads data past the end, or before the beginning, of the intended buffer.
true
static void gx_ttfReader__Read(ttfReader *self, void *p, int n) { gx_ttfReader *r = (gx_ttfReader *)self; const byte *q; if (!r->error) { if (r->extra_glyph_index != -1) { q = r->glyph_data.bits.data + r->pos; r->error = ((r->pos >= r->glyph_data.bits.size || ...
[ "CWE-125" ]
ghostscript
937ccd17ac65935633b2ebc06cb7089b91e17e6b
292644363497676868271809371915373401264
177,951
157,996
The product reads data past the end, or before the beginning, of the intended buffer.
false
static void Ins_MDRP( INS_ARG ) { Int point; TT_F26Dot6 distance, org_dist; point = (Int)args[0]; if ( BOUNDS( args[0], CUR.zp1.n_points ) ) { /* Current version of FreeType silently ignores this out of bounds error * and drops the instruction, ...
[ "CWE-125" ]
ghostscript
7755e67116e8973ee0e3b22d653df026a84fa01b
29186964022494243055154783334172444823
177,952
135
The product reads data past the end, or before the beginning, of the intended buffer.
true
static void Ins_MDRP( INS_ARG ) { Int point; TT_F26Dot6 distance, org_dist; point = (Int)args[0]; if ( BOUNDS( args[0], CUR.zp1.n_points ) || BOUNDS( CUR.GS.rp0, CUR.zp0.n_points) ) { /* Current version of FreeType silently ignores this out of bo...
[ "CWE-125" ]
ghostscript
7755e67116e8973ee0e3b22d653df026a84fa01b
168161902406212546127097708445953437941
177,952
157,997
The product reads data past the end, or before the beginning, of the intended buffer.
false
dbus_g_proxy_manager_filter (DBusConnection *connection, DBusMessage *message, void *user_data) { DBusGProxyManager *manager; if (dbus_message_get_type (message) != DBUS_MESSAGE_TYPE_SIGNAL) return DBUS_HANDLER_RESULT_NOT_YET_HAN...
[ "CWE-20" ]
dbus
166978a09cf5edff4028e670b6074215a4c75eca
115276448693599864140234533276342928360
177,953
136
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
true
dbus_g_proxy_manager_filter (DBusConnection *connection, DBusMessage *message, void *user_data) { DBusGProxyManager *manager; if (dbus_message_get_type (message) != DBUS_MESSAGE_TYPE_SIGNAL) return DBUS_HANDLER_RESULT_NOT_YET_HAN...
[ "CWE-20" ]
dbus
166978a09cf5edff4028e670b6074215a4c75eca
242242174897063399898222063131911346969
177,953
157,998
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
false
xps_true_callback_glyph_name(gs_font *pfont, gs_glyph glyph, gs_const_string *pstr) { /* This function is copied verbatim from plfont.c */ int table_length; int table_offset; ulong format; uint numGlyphs; uint glyph_name_index; const byte *postp; /* post table pointer */ /* gue...
[ "CWE-119" ]
ghostscript
c53183d4e7103e87368b7cfa15367a47d559e323
83736377691001723428427436308560857107
177,956
139
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
true
xps_true_callback_glyph_name(gs_font *pfont, gs_glyph glyph, gs_const_string *pstr) { /* This function is copied verbatim from plfont.c */ int table_length; int table_offset; ulong format; int numGlyphs; uint glyph_name_index; const byte *postp; /* post table pointer */ if (glyp...
[ "CWE-119" ]
ghostscript
c53183d4e7103e87368b7cfa15367a47d559e323
61931341795887404678779836705866374570
177,956
158,000
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
false
xps_load_sfnt_name(xps_font_t *font, char *namep) { byte *namedata; int offset, length; /*int format;*/ int count, stringoffset; int found; int i, k; found = 0; strcpy(namep, "Unknown"); offset = xps_find_sfnt_table(font, "name", &length); if (offset < 0 || length < 6) {...
[ "CWE-119" ]
ghostscript
3c2aebbedd37fab054e80f2e315de07d7e9b5bdb
112369513254285676016910036571983121831
177,957
140
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
true
xps_load_sfnt_name(xps_font_t *font, char *namep) xps_load_sfnt_name(xps_font_t *font, char *namep, const int buflen) { byte *namedata; int offset, length; /*int format;*/ int count, stringoffset; int found; int i, k; found = 0; strcpy(namep, "Unknown"); offset = xps_find_sfnt_t...
[ "CWE-119" ]
ghostscript
3c2aebbedd37fab054e80f2e315de07d7e9b5bdb
35053491490394057768170760061098710155
177,957
158,001
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
false
check_acl(pam_handle_t *pamh, const char *sense, const char *this_user, const char *other_user, int noent_code, int debug) { char path[PATH_MAX]; struct passwd *pwd; { char path[PATH_MAX]; struct passwd *pwd; FILE *fp; int i, save_errno; uid_t fsuid; /* Check this ...
[ "CWE-399" ]
altlinux
ffe7058c70253d574b1963c7c93002bd410fddc9
41551411147695369979843022209854699094
177,960
141
This vulnerability category highlights issues in resource management where failures to properly release memory, file handles, or other resources can degrade system performance or enable denial-of-service conditions.
true
check_acl(pam_handle_t *pamh, const char *sense, const char *this_user, const char *other_user, int noent_code, int debug) { char path[PATH_MAX]; struct passwd *pwd; { char path[PATH_MAX]; struct passwd *pwd; FILE *fp = NULL; int i, fd = -1, save_errno; uid_t fsuid; ...
[ "CWE-399" ]
altlinux
ffe7058c70253d574b1963c7c93002bd410fddc9
299701102454126325367123002385728455579
177,960
158,002
This vulnerability category highlights issues in resource management where failures to properly release memory, file handles, or other resources can degrade system performance or enable denial-of-service conditions.
false
pam_sm_close_session (pam_handle_t *pamh, int flags UNUSED, int argc, const char **argv) { void *cookiefile; int i, debug = 0; const char* user; struct passwd *tpwd = NULL; uid_t unlinkuid, fsuid; if (pam_get_user(pamh, &user, NULL) != PAM_SUCCESS) ...
[ "Other" ]
altlinux
05dafc06cd3dfeb7c4b24942e4e1ae33ff75a123
73058116370865376251359869621052738742
177,961
142
Unknown
true
pam_sm_close_session (pam_handle_t *pamh, int flags UNUSED, int argc, const char **argv) { int i, debug = 0; const char *user; const void *data; const char *cookiefile; struct passwd *tpwd; uid_t fsuid; /* Try to retrieve the name of a file we ...
[ "Other" ]
altlinux
05dafc06cd3dfeb7c4b24942e4e1ae33ff75a123
319217779824251581628028682692735069597
177,961
158,003
Unknown
false
int ASN1_item_verify(const ASN1_ITEM *it, X509_ALGOR *a, ASN1_BIT_STRING *signature, void *asn, EVP_PKEY *pkey) { EVP_MD_CTX ctx; unsigned char *buf_in=NULL; int ret= -1,inl; int mdnid, pknid; EVP_MD_CTX_init(&ctx); /* Convert signature OID into digest and public key OIDs */ { if...
[ "CWE-310" ]
openssl
62e4506a7d4cec1c8e1ff687f6b220f6a62a57c7
269188142815144649597760452518735983353
177,963
144
This weakness pertains to the use of cryptographic functions that are weak, misconfigured, or outdated, which undermines the intended protection of encrypted data and communications.
true
int ASN1_item_verify(const ASN1_ITEM *it, X509_ALGOR *a, ASN1_BIT_STRING *signature, void *asn, EVP_PKEY *pkey) { EVP_MD_CTX ctx; unsigned char *buf_in=NULL; int ret= -1,inl; int mdnid, pknid; if (!pkey) { ASN1err(ASN1_F_ASN1_ITEM_VERIFY, ERR_R_PASSED_NULL_PARAMETE...
[ "CWE-310" ]
openssl
62e4506a7d4cec1c8e1ff687f6b220f6a62a57c7
283580637719099969560774200070145174903
177,963
158,005
This weakness pertains to the use of cryptographic functions that are weak, misconfigured, or outdated, which undermines the intended protection of encrypted data and communications.
false
int ASN1_item_verify(const ASN1_ITEM *it, X509_ALGOR *a, ASN1_BIT_STRING *signature, void *asn, EVP_PKEY *pkey) { EVP_MD_CTX ctx; const EVP_MD *type; unsigned char *buf_in=NULL; int ret= -1,i,inl; EVP_MD_CTX_init(&ctx); i=OBJ_obj2nid(a->algorithm); type=EVP_get_digestb...
[ "CWE-310" ]
openssl
66e8211c0b1347970096e04b18aa52567c325200
107114806548745275102067080029582687172
177,964
145
This weakness pertains to the use of cryptographic functions that are weak, misconfigured, or outdated, which undermines the intended protection of encrypted data and communications.
true
int ASN1_item_verify(const ASN1_ITEM *it, X509_ALGOR *a, ASN1_BIT_STRING *signature, void *asn, EVP_PKEY *pkey) { EVP_MD_CTX ctx; const EVP_MD *type; unsigned char *buf_in=NULL; int ret= -1,i,inl; if (!pkey) { ASN1err(ASN1_F_ASN1_ITEM_VERIFY, ERR_R_PASSED_...
[ "CWE-310" ]
openssl
66e8211c0b1347970096e04b18aa52567c325200
40999153640730434907087196937231236729
177,964
158,006
This weakness pertains to the use of cryptographic functions that are weak, misconfigured, or outdated, which undermines the intended protection of encrypted data and communications.
false
int ASN1_item_verify(const ASN1_ITEM *it, X509_ALGOR *a, ASN1_BIT_STRING *signature, void *asn, EVP_PKEY *pkey) { EVP_MD_CTX ctx; const EVP_MD *type = NULL; unsigned char *buf_in=NULL; int ret= -1,inl; int mdnid, pknid; EVP_MD_CTX_init(&ctx); /* Convert signature OID into digest...
[ "CWE-310" ]
openssl
ebc71865f0506a293242bd4aec97cdc7a8ef24b0
292171545981096532430963237536493213672
177,965
146
This weakness pertains to the use of cryptographic functions that are weak, misconfigured, or outdated, which undermines the intended protection of encrypted data and communications.
true
int ASN1_item_verify(const ASN1_ITEM *it, X509_ALGOR *a, ASN1_BIT_STRING *signature, void *asn, EVP_PKEY *pkey) { EVP_MD_CTX ctx; const EVP_MD *type = NULL; unsigned char *buf_in=NULL; int ret= -1,inl; int mdnid, pknid; if (!pkey) { ASN1err(ASN1_F_ASN1_ITEM_VE...
[ "CWE-310" ]
openssl
ebc71865f0506a293242bd4aec97cdc7a8ef24b0
188744818829646400279494577898764111698
177,965
158,007
This weakness pertains to the use of cryptographic functions that are weak, misconfigured, or outdated, which undermines the intended protection of encrypted data and communications.
false
static NTSTATUS fd_open_atomic(struct connection_struct *conn, files_struct *fsp, int flags, mode_t mode, bool *file_created) { NTSTATUS status = NT_STATUS_UNSUCCESSFUL; bool file_existed = VALID_STAT(fsp->fsp_name->st); *file_created = false; * We're not...
[ "CWE-835" ]
samba
10c3e3923022485c720f322ca4f0aca5d7501310
161881144216406607325428562477641633507
177,966
147
The product contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop.
true
static NTSTATUS fd_open_atomic(struct connection_struct *conn, files_struct *fsp, int flags, mode_t mode, bool *file_created) { NTSTATUS status = NT_STATUS_UNSUCCESSFUL; NTSTATUS retry_status; bool file_existed = VALID_STAT(fsp->fsp_name->st); int curr_fla...
[ "CWE-835" ]
samba
10c3e3923022485c720f322ca4f0aca5d7501310
263754377429576171788923901818406764578
177,966
158,008
The product contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop.
false
int EVP_DecodeUpdate(EVP_ENCODE_CTX *ctx, unsigned char *out, int *outl, const unsigned char *in, int inl) { int seof= -1,eof=0,rv= -1,ret=0,i,v,tmp,n,ln,exp_nl; unsigned char *d; n=ctx->num; d=ctx->enc_data; ln=ctx->line_num; exp_nl=ctx->expect_nl; /* last line of input. */ if ((inl == 0) || ((n == 0)...
[ "CWE-119" ]
openssl
d0666f289ac013094bbbf547bfbcd616199b7d2d
314448950255259267086706912584575387344
177,975
150
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
true
int EVP_DecodeUpdate(EVP_ENCODE_CTX *ctx, unsigned char *out, int *outl, const unsigned char *in, int inl) { int seof= -1,eof=0,rv= -1,ret=0,i,v,tmp,n,ln,exp_nl; unsigned char *d; n=ctx->num; d=ctx->enc_data; ln=ctx->line_num; exp_nl=ctx->expect_nl; /* last line of input. */ if ((inl == 0) || ((n == 0)...
[ "CWE-119" ]
openssl
d0666f289ac013094bbbf547bfbcd616199b7d2d
290784375241955931137206791690548785053
177,975
158,011
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
false
int ssl3_write_bytes(SSL *s, int type, const void *buf_, int len) { const unsigned char *buf = buf_; int tot; unsigned int n, nw; #if !defined(OPENSSL_NO_MULTIBLOCK) && EVP_CIPH_FLAG_TLS1_1_MULTIBLOCK unsigned int max_send_fragment; #endif SSL3_BUFFER *wb = &(s->s3->wbuf); int i; s->rwstate...
[ "CWE-17" ]
openssl
77c77f0a1b9f15b869ca3342186dfbedd1119d0e
275384842882046980981080513884860956591
177,978
151
Originally addressing errors in controlling program flow through indirect calls or jumps, this CWE has been deprecated and its concerns merged into more precise modern classifications.
true
int ssl3_write_bytes(SSL *s, int type, const void *buf_, int len) { const unsigned char *buf = buf_; int tot; unsigned int n, nw; #if !defined(OPENSSL_NO_MULTIBLOCK) && EVP_CIPH_FLAG_TLS1_1_MULTIBLOCK unsigned int max_send_fragment; #endif SSL3_BUFFER *wb = &(s->s3->wbuf); int i; s->rwstate...
[ "CWE-17" ]
openssl
77c77f0a1b9f15b869ca3342186dfbedd1119d0e
174321787959227950244428389433155298913
177,978
158,012
Originally addressing errors in controlling program flow through indirect calls or jumps, this CWE has been deprecated and its concerns merged into more precise modern classifications.
false
X509_REQ *X509_to_X509_REQ(X509 *x, EVP_PKEY *pkey, const EVP_MD *md) { X509_REQ *ret; X509_REQ_INFO *ri; int i; EVP_PKEY *pktmp; ret = X509_REQ_new(); if (ret == NULL) { X509err(X509_F_X509_TO_X509_REQ, ERR_R_MALLOC_FAILURE); goto err; } ri = ret->req_info; ri->ve...
[ "Other" ]
openssl
28a00bcd8e318da18031b2ac8778c64147cd54f9
65961291460303063310058993287193914232
177,981
153
Unknown
true
X509_REQ *X509_to_X509_REQ(X509 *x, EVP_PKEY *pkey, const EVP_MD *md) { X509_REQ *ret; X509_REQ_INFO *ri; int i; EVP_PKEY *pktmp; ret = X509_REQ_new(); if (ret == NULL) { X509err(X509_F_X509_TO_X509_REQ, ERR_R_MALLOC_FAILURE); goto err; } ri = ret->req_info; ri->ve...
[ "Other" ]
openssl
28a00bcd8e318da18031b2ac8778c64147cd54f9
205283502618834293376438940394805322961
177,981
158,014
Unknown
false
int ASN1_item_ex_d2i(ASN1_VALUE **pval, const unsigned char **in, long len, const ASN1_ITEM *it, int tag, int aclass, char opt, ASN1_TLC *ctx) { const ASN1_TEMPLATE *tt, *errtt = NULL; const ASN1_COMPAT_FUNCS *cf; const ASN1_EXTERN_FUNCS *ef; const ASN1_AUX *aux...
[ "CWE-17" ]
openssl
b717b083073b6cacc0a5e2397b661678aff7ae7f
71024901693981678702406865621946417956
177,982
154
Originally addressing errors in controlling program flow through indirect calls or jumps, this CWE has been deprecated and its concerns merged into more precise modern classifications.
true
int ASN1_item_ex_d2i(ASN1_VALUE **pval, const unsigned char **in, long len, const ASN1_ITEM *it, int tag, int aclass, char opt, ASN1_TLC *ctx) { const ASN1_TEMPLATE *tt, *errtt = NULL; const ASN1_COMPAT_FUNCS *cf; const ASN1_EXTERN_FUNCS *ef; const ASN1_AUX *aux...
[ "CWE-17" ]
openssl
b717b083073b6cacc0a5e2397b661678aff7ae7f
111330312829224186635209593630647983706
177,982
158,015
Originally addressing errors in controlling program flow through indirect calls or jumps, this CWE has been deprecated and its concerns merged into more precise modern classifications.
false
int ASN1_TYPE_cmp(const ASN1_TYPE *a, const ASN1_TYPE *b) { int result = -1; if (!a || !b || a->type != b->type) return -1; switch (a->type) { case V_ASN1_OBJECT: result = OBJ_cmp(a->value.object, b->value.object); break; case V_ASN1_NULL: result = 0; ...
[ "CWE-17" ]
openssl
c3c7fb07dc975dc3c9de0eddb7d8fd79fc9c67c1
210178361702841664613263558093095710758
177,983
155
Originally addressing errors in controlling program flow through indirect calls or jumps, this CWE has been deprecated and its concerns merged into more precise modern classifications.
true
int ASN1_TYPE_cmp(const ASN1_TYPE *a, const ASN1_TYPE *b) { int result = -1; if (!a || !b || a->type != b->type) return -1; switch (a->type) { case V_ASN1_OBJECT: result = OBJ_cmp(a->value.object, b->value.object); break; case V_ASN1_BOOLEAN: result = a->value.bo...
[ "CWE-17" ]
openssl
c3c7fb07dc975dc3c9de0eddb7d8fd79fc9c67c1
6676789780199442349934246229458680210
177,983
158,016
Originally addressing errors in controlling program flow through indirect calls or jumps, this CWE has been deprecated and its concerns merged into more precise modern classifications.
false
int ssl3_client_hello(SSL *s) { unsigned char *buf; unsigned char *p, *d; int i; unsigned long l; int al = 0; #ifndef OPENSSL_NO_COMP int j; SSL_COMP *comp; #endif buf = (unsigned char *)s->init_buf->data; if (s->state == SSL3_ST_CW_CLNT_HELLO_A) { SSL_SESSION *sess = s->ses...
[ "CWE-310" ]
openssl
e1b568dd2462f7cacf98f3d117936c34e2849a6b
56759383063747973773032597308927437186
177,984
156
This weakness pertains to the use of cryptographic functions that are weak, misconfigured, or outdated, which undermines the intended protection of encrypted data and communications.
true
int ssl3_client_hello(SSL *s) { unsigned char *buf; unsigned char *p, *d; int i; unsigned long l; int al = 0; #ifndef OPENSSL_NO_COMP int j; SSL_COMP *comp; #endif buf = (unsigned char *)s->init_buf->data; if (s->state == SSL3_ST_CW_CLNT_HELLO_A) { SSL_SESSION *sess = s->ses...
[ "CWE-310" ]
openssl
e1b568dd2462f7cacf98f3d117936c34e2849a6b
214124849989913112425172994945395163869
177,984
158,017
This weakness pertains to the use of cryptographic functions that are weak, misconfigured, or outdated, which undermines the intended protection of encrypted data and communications.
false
static void get_socket_name(SingleInstData* data, char* buf, int len) { const char* dpy = g_getenv("DISPLAY"); char* host = NULL; int dpynum; if(dpy) { const char* p = strrchr(dpy, ':'); host = g_strndup(dpy, (p - dpy)); dpynum = atoi(p + 1); } else dpynum ...
[ "CWE-20" ]
lxde
bc8c3d871e9ecc67c47ff002b68cf049793faf08
106918102879333302695314745785733140248
177,988
159
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
true
static void get_socket_name(SingleInstData* data, char* buf, int len) { const char* dpy = g_getenv("DISPLAY"); char* host = NULL; int dpynum; if(dpy) { const char* p = strrchr(dpy, ':'); host = g_strndup(dpy, (p - dpy)); dpynum = atoi(p + 1); } else dpynum ...
[ "CWE-20" ]
lxde
bc8c3d871e9ecc67c47ff002b68cf049793faf08
331737708862764431243967339168212646672
177,988
158,020
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
false
check_acl(pam_handle_t *pamh, const char *sense, const char *this_user, const char *other_user, int noent_code, int debug) { struct passwd *pwd; FILE *fp = NULL; int i, fd = -1, save_errno; uid_t fsuid; struct stat st; /* Check this user's <sense> file. */ pw...
[ "Other" ]
altlinux
843807a3a90f52e7538be756616510730a24739a
129171371405937766299357996317134593545
177,990
161
Unknown
true
check_acl(pam_handle_t *pamh, const char *sense, const char *this_user, const char *other_user, int noent_code, int debug) { struct passwd *pwd; FILE *fp = NULL; int i, fd = -1, save_errno; struct stat st; PAM_MODUTIL_DEF_PRIVS(privs); /* Check this user's <sense> f...
[ "Other" ]
altlinux
843807a3a90f52e7538be756616510730a24739a
328920815324562966193237341578176859343
177,990
158,022
Unknown
false
EC_KEY *d2i_ECPrivateKey(EC_KEY **a, const unsigned char **in, long len) { int ok = 0; EC_KEY *ret = NULL; EC_PRIVATEKEY *priv_key = NULL; if ((priv_key = EC_PRIVATEKEY_new()) == NULL) { ECerr(EC_F_D2I_ECPRIVATEKEY, ERR_R_MALLOC_FAILURE); return NULL; } if ((priv_key = d2i_EC_P...
[ "Other" ]
openssl
1b4a8df38fc9ab3c089ca5765075ee53ec5bd66a
277511298376014988680994809256525705829
177,991
162
Unknown
true
EC_KEY *d2i_ECPrivateKey(EC_KEY **a, const unsigned char **in, long len) { int ok = 0; EC_KEY *ret = NULL; EC_PRIVATEKEY *priv_key = NULL; if ((priv_key = EC_PRIVATEKEY_new()) == NULL) { ECerr(EC_F_D2I_ECPRIVATEKEY, ERR_R_MALLOC_FAILURE); return NULL; } if ((priv_key = d2i_EC_P...
[ "Other" ]
openssl
1b4a8df38fc9ab3c089ca5765075ee53ec5bd66a
283888329779941625504217373057883334685
177,991
158,023
Unknown
false
int dtls1_listen(SSL *s, struct sockaddr *client) { int ret; SSL_set_options(s, SSL_OP_COOKIE_EXCHANGE); s->d1->listen = 1; (void)BIO_dgram_get_peer(SSL_get_rbio(s), client); return 1; }
[ "Other" ]
openssl
819418110b6fff4a7b96f01a5d68f71df3e3b736
147821170503061866239142160957380206825
177,993
164
Unknown
true
int dtls1_listen(SSL *s, struct sockaddr *client) { int ret; /* Ensure there is no state left over from a previous invocation */ SSL_clear(s); SSL_set_options(s, SSL_OP_COOKIE_EXCHANGE); s->d1->listen = 1; (void)BIO_dgram_get_peer(SSL_get_rbio(s), client); return 1; }
[ "Other" ]
openssl
819418110b6fff4a7b96f01a5d68f71df3e3b736
86565129563588171334671182094004024523
177,993
158,024
Unknown
false
_bdf_parse_glyphs( char* line, unsigned long linelen, unsigned long lineno, void* call_data, void* client_data ) { int c, mask_index; char* s; unsigned char* b...
[ "CWE-119" ]
savannah
7f2e4f4f553f6836be7683f66226afac3fa979b8
241612252320932154235102760135232983991
177,994
165
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
true
_bdf_parse_glyphs( char* line, unsigned long linelen, unsigned long lineno, void* call_data, void* client_data ) { int c, mask_index; char* s; unsigned char* b...
[ "CWE-119" ]
savannah
7f2e4f4f553f6836be7683f66226afac3fa979b8
284263663179865322266403542444429355517
177,994
158,025
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
false
_bdf_parse_glyphs( char* line, unsigned long linelen, unsigned long lineno, void* call_data, void* client_data ) { int c, mask_index; char* s; unsigned char* b...
[ "CWE-119" ]
savannah
07bdb6e289c7954e2a533039dc93c1c136099d2d
339135483814426971995983985697178320662
177,995
166
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
true
_bdf_parse_glyphs( char* line, unsigned long linelen, unsigned long lineno, void* call_data, void* client_data ) { int c, mask_index; char* s; unsigned char* b...
[ "CWE-119" ]
savannah
07bdb6e289c7954e2a533039dc93c1c136099d2d
112133374329751410214358441913282019949
177,995
158,026
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
false
context_length_arg (char const *str, int *out) { uintmax_t value; if (! (xstrtoumax (str, 0, 10, &value, "") == LONGINT_OK && 0 <= (*out = value) && *out == value)) { error (EXIT_TROUBLE, 0, "%s: %s", str, _("invalid context length argument")); } page size, unles...
[ "CWE-189" ]
savannah
8fcf61523644df42e1905c81bed26838e0b04f91
325237609142015740156610191050140922642
177,996
167
This weakness involves numeric computation errors, such as integer overflows, underflows, or precision losses, which can lead to miscalculations and exploitable behaviors in software.
true
context_length_arg (char const *str, int *out) context_length_arg (char const *str, intmax_t *out) { switch (xstrtoimax (str, 0, 10, out, "")) { case LONGINT_OK: case LONGINT_OVERFLOW: if (0 <= *out) break; /* Fall through. */ default: error (EXIT_TROUBLE, 0, "%s: %s", st...
[ "CWE-189" ]
savannah
8fcf61523644df42e1905c81bed26838e0b04f91
46085918764084639984457622752978355870
177,996
158,027
This weakness involves numeric computation errors, such as integer overflows, underflows, or precision losses, which can lead to miscalculations and exploitable behaviors in software.
false
ActionReply Smb4KMountHelper::mount(const QVariantMap &args) { ActionReply reply; QMapIterator<QString, QVariant> it(args); proc.setOutputChannelMode(KProcess::SeparateChannels); proc.setProcessEnvironment(QProcessEnvironment::systemEnvironment()); #if defined(Q_OS_LINUX) proc.setEnv("PASSWD", e...
[ "CWE-20" ]
kde
a90289b0962663bc1d247bbbd31b9e65b2ca000e
171260334698845358353677836209008845727
177,999
169
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
true
ActionReply Smb4KMountHelper::mount(const QVariantMap &args) { // // The action reply // ActionReply reply; // Get the mount executable // const QString mount = findMountExecutable(); // QMapIterator<QString, QVariant> it(args); proc.setOutputChannelMode(KProcess::SeparateChannels); ...
[ "CWE-20" ]
kde
a90289b0962663bc1d247bbbd31b9e65b2ca000e
200905717068882123159866802477998586348
177,999
158,029
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
false
parse_encoding( T1_Face face, T1_Loader loader ) { T1_Parser parser = &loader->parser; FT_Byte* cur; FT_Byte* limit = parser->root.limit; PSAux_Service psaux = (PSAux_Service)face->psaux; T1_Skip_Spaces( parser ); cur = parser->root.cursor; if ( cur >= lim...
[ "CWE-399" ]
savannah
df14e6c0b9592cbb24d5381dfc6106b14f915e75
272856134003844809072499589562648977382
178,009
177
This vulnerability category highlights issues in resource management where failures to properly release memory, file handles, or other resources can degrade system performance or enable denial-of-service conditions.
true
parse_encoding( T1_Face face, T1_Loader loader ) { T1_Parser parser = &loader->parser; FT_Byte* cur; FT_Byte* limit = parser->root.limit; PSAux_Service psaux = (PSAux_Service)face->psaux; T1_Skip_Spaces( parser ); cur = parser->root.cursor; if ( cur >= lim...
[ "CWE-399" ]
savannah
df14e6c0b9592cbb24d5381dfc6106b14f915e75
311321372754373610005207092043672470173
178,009
158,037
This vulnerability category highlights issues in resource management where failures to properly release memory, file handles, or other resources can degrade system performance or enable denial-of-service conditions.
false
void check_request_for_cacheability(struct stream *s, struct channel *chn) { struct http_txn *txn = s->txn; char *p1, *p2; char *cur_ptr, *cur_end, *cur_next; int pragma_found; int cc_found; int cur_idx; if ((txn->flags & (TX_CACHEABLE|TX_CACHE_IGNORE)) == TX_CACHE_IGNORE) return; /* nothing more to do here *...
[ "CWE-200" ]
haproxy
17514045e5d934dede62116216c1b016fe23dd06
324327278202769570327385397929081223567
178,013
178
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
true
void check_request_for_cacheability(struct stream *s, struct channel *chn) { struct http_txn *txn = s->txn; char *p1, *p2; char *cur_ptr, *cur_end, *cur_next; int pragma_found; int cc_found; int cur_idx; if ((txn->flags & (TX_CACHEABLE|TX_CACHE_IGNORE)) == TX_CACHE_IGNORE) return; /* nothing more to do here *...
[ "CWE-200" ]
haproxy
17514045e5d934dede62116216c1b016fe23dd06
134270212007884860327924935026417896618
178,013
158,038
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
false
parse_fond( char* fond_data, short* have_sfnt, ResID* sfnt_id, Str255 lwfn_file_name, short face_index ) { AsscEntry* assoc; AsscEntry* base_assoc; FamRec* fond; *sfnt_id = 0; *have_sfnt = 0; lwfn_file_nam...
[ "CWE-119" ]
savannah
18a8f0d9943369449bc4de92d411c78fb08d616c
233045259701863811358636688341910118112
178,014
179
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
true
parse_fond( char* fond_data, short* have_sfnt, ResID* sfnt_id, Str255 lwfn_file_name, short face_index ) { AsscEntry* assoc; AsscEntry* base_assoc; FamRec* fond; *sfnt_id = 0; *have_sfnt = 0; lwfn_file_nam...
[ "CWE-119" ]
savannah
18a8f0d9943369449bc4de92d411c78fb08d616c
183885571031352663780341239821456219872
178,014
158,039
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
false
pcf_read_TOC( FT_Stream stream, PCF_Face face ) { FT_Error error; PCF_Toc toc = &face->toc; PCF_Table tables; FT_Memory memory = FT_FACE( face )->memory; FT_UInt n; if ( FT_STREAM_SEEK ( 0 ) || FT_STREAM_READ_FIELDS ( pcf_toc_...
[ "Other" ]
savannah
0e2f5d518c60e2978f26400d110eff178fa7e3c3
99642060190973035507344569907798525276
178,015
180
Unknown
true
pcf_read_TOC( FT_Stream stream, PCF_Face face ) { FT_Error error; PCF_Toc toc = &face->toc; PCF_Table tables; FT_Memory memory = FT_FACE( face )->memory; FT_UInt n; if ( FT_STREAM_SEEK ( 0 ) || FT_STREAM_READ_FIELDS ( pcf_toc_...
[ "Other" ]
savannah
0e2f5d518c60e2978f26400d110eff178fa7e3c3
120181984767274459897673942388200420729
178,015
158,040
Unknown
false
pcf_get_encodings( FT_Stream stream, PCF_Face face ) { FT_Error error; FT_Memory memory = FT_FACE( face )->memory; FT_ULong format, size; int firstCol, lastCol; int firstRow, lastRow; int nencoding, encodingOffset; int ...
[ "CWE-189" ]
savannah
ef1eba75187adfac750f326b563fe543dd5ff4e6
176043909406430594682157391299639166951
178,016
181
This weakness involves numeric computation errors, such as integer overflows, underflows, or precision losses, which can lead to miscalculations and exploitable behaviors in software.
true
pcf_get_encodings( FT_Stream stream, PCF_Face face ) { FT_Error error; FT_Memory memory = FT_FACE( face )->memory; FT_ULong format, size; int firstCol, lastCol; int firstRow, lastRow; int nencoding, encodingOffset; int ...
[ "CWE-189" ]
savannah
ef1eba75187adfac750f326b563fe543dd5ff4e6
65067616049209972384721953510505056376
178,016
158,041
This weakness involves numeric computation errors, such as integer overflows, underflows, or precision losses, which can lead to miscalculations and exploitable behaviors in software.
false
tt_cmap8_validate( FT_Byte* table, FT_Validator valid ) { FT_Byte* p = table + 4; FT_Byte* is32; FT_UInt32 length; FT_UInt32 num_groups; if ( table + 16 + 8192 > valid->limit ) FT_INVALID_TOO_SHORT; length = TT_NEXT_ULONG( p ); if ( length > (FT_...
[ "CWE-125" ]
savannah
602040b1112c9f94d68e200be59ea7ac3d104565
66140172033877381862359087550042336117
178,017
182
The product reads data past the end, or before the beginning, of the intended buffer.
true
tt_cmap8_validate( FT_Byte* table, FT_Validator valid ) { FT_Byte* p = table + 4; FT_Byte* is32; FT_UInt32 length; FT_UInt32 num_groups; if ( table + 16 + 8192 > valid->limit ) FT_INVALID_TOO_SHORT; length = TT_NEXT_ULONG( p ); if ( length > (FT_...
[ "CWE-125" ]
savannah
602040b1112c9f94d68e200be59ea7ac3d104565
38750717614291197402358423374039633408
178,017
158,042
The product reads data past the end, or before the beginning, of the intended buffer.
false
tt_sbit_decoder_init( TT_SBitDecoder decoder, TT_Face face, FT_ULong strike_index, TT_SBit_MetricsRec* metrics ) { FT_Error error; FT_Stream stream = face->root.stream; FT_ULong ebdt_size; ...
[ "CWE-189" ]
savannah
257c270bd25e15890190a28a1456e7623bba4439
275985852182915999395742860178488690228
178,018
183
This weakness involves numeric computation errors, such as integer overflows, underflows, or precision losses, which can lead to miscalculations and exploitable behaviors in software.
true
tt_sbit_decoder_init( TT_SBitDecoder decoder, TT_Face face, FT_ULong strike_index, TT_SBit_MetricsRec* metrics ) { FT_Error error; FT_Stream stream = face->root.stream; FT_ULong ebdt_size; ...
[ "CWE-189" ]
savannah
257c270bd25e15890190a28a1456e7623bba4439
318862796718235578447679874450835905734
178,018
158,043
This weakness involves numeric computation errors, such as integer overflows, underflows, or precision losses, which can lead to miscalculations and exploitable behaviors in software.
false
T42_Face_Init( FT_Stream stream, FT_Face t42face, /* T42_Face */ FT_Int face_index, FT_Int num_params, FT_Parameter* params ) { T42_Face face = (T42_Face)t42face; FT_Error error; ...
[ "Other" ]
savannah
42fcd6693ec7bd6ffc65ddc63e74287a65dda669
284802888516693989399704178152042676324
178,032
194
Unknown
true
T42_Face_Init( FT_Stream stream, FT_Face t42face, /* T42_Face */ FT_Int face_index, FT_Int num_params, FT_Parameter* params ) { T42_Face face = (T42_Face)t42face; FT_Error error; ...
[ "Other" ]
savannah
42fcd6693ec7bd6ffc65ddc63e74287a65dda669
100505017364303463134091394368659811948
178,032
158,054
Unknown
false
tt_face_load_kern( TT_Face face, FT_Stream stream ) { FT_Error error; FT_ULong table_size; FT_Byte* p; FT_Byte* p_limit; FT_UInt nn, num_tables; FT_UInt32 avail = 0, ordered = 0; /* the kern table is optional; exit silently if it is missing */ e...
[ "CWE-125" ]
savannah
f70d9342e65cd2cb44e9f26b6d7edeedf191fc6c
223904594839516096150742880543791775725
178,037
199
The product reads data past the end, or before the beginning, of the intended buffer.
true
tt_face_load_kern( TT_Face face, FT_Stream stream ) { FT_Error error; FT_ULong table_size; FT_Byte* p; FT_Byte* p_limit; FT_UInt nn, num_tables; FT_UInt32 avail = 0, ordered = 0; /* the kern table is optional; exit silently if it is missing */ e...
[ "CWE-125" ]
savannah
f70d9342e65cd2cb44e9f26b6d7edeedf191fc6c
110539480089627090699040662431508464321
178,037
158,059
The product reads data past the end, or before the beginning, of the intended buffer.
false
tt_sbit_decoder_load_image( TT_SBitDecoder decoder, FT_UInt glyph_index, FT_Int x_pos, FT_Int y_pos ) { /* * First, we find the correct strike range that applies to this * glyph index...
[ "CWE-119" ]
savannah
f0292bb9920aa1dbfed5f53861e7c7a89b35833a
28994602925432626900683012190657933065
178,038
200
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
true
tt_sbit_decoder_load_image( TT_SBitDecoder decoder, FT_UInt glyph_index, FT_Int x_pos, FT_Int y_pos ) { /* * First, we find the correct strike range that applies to this * glyph index...
[ "CWE-119" ]
savannah
f0292bb9920aa1dbfed5f53861e7c7a89b35833a
174846873576513811633114180196953003240
178,038
158,060
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
false
ps_parser_to_token( PS_Parser parser, T1_Token token ) { FT_Byte* cur; FT_Byte* limit; FT_Int embed; token->type = T1_TOKEN_TYPE_NONE; token->start = NULL; token->limit = NULL; /* first of all, skip leading whitespace */ ps_parser_skip_spaces( parser...
[ "CWE-119" ]
savannah
3774fc08b502c3e685afca098b6e8a195aded6a0
328688916561979850895211877372718866822
178,047
204
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
true
ps_parser_to_token( PS_Parser parser, T1_Token token ) { FT_Byte* cur; FT_Byte* limit; FT_Int embed; token->type = T1_TOKEN_TYPE_NONE; token->start = NULL; token->limit = NULL; /* first of all, skip leading whitespace */ ps_parser_skip_spaces( parser...
[ "CWE-119" ]
savannah
3774fc08b502c3e685afca098b6e8a195aded6a0
271086143539799141627769963035955134012
178,047
158,064
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.