is_vulnerable bool 2
classes | func stringlengths 28 484k | cwe listlengths 1 2 | project stringclasses 592
values | commit_id stringlengths 7 44 | hash stringlengths 34 39 | big_vul_idx int64 4.09k 189k ⌀ | idx int64 0 522k | cwe_description stringclasses 81
values |
|---|---|---|---|---|---|---|---|---|
false | int test_mod_exp(BIO *bp, BN_CTX *ctx)
{
BIGNUM *a, *b, *c, *d, *e;
int i;
a = BN_new();
b = BN_new();
c = BN_new();
d = BN_new();
e = BN_new();
BN_one(a);
BN_one(b);
BN_zero(c);
if (BN_mod_exp(d, a, b, c, ctx)) {
fprintf(stderr, "BN_mod_exp with zero modulus succee... | [
"CWE-200"
] | openssl | d73cc256c8e256c32ed959456101b73ba9842f72 | 187209592842827111487919300940629712064 | 177,893 | 111 | The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. |
true | int test_mod_exp(BIO *bp, BN_CTX *ctx)
{
BIGNUM *a, *b, *c, *d, *e;
int i;
a = BN_new();
b = BN_new();
c = BN_new();
d = BN_new();
e = BN_new();
BN_one(a);
BN_one(b);
BN_zero(c);
if (BN_mod_exp(d, a, b, c, ctx)) {
fprintf(stderr, "BN_mod_exp with zero modulus succee... | [
"CWE-200"
] | openssl | d73cc256c8e256c32ed959456101b73ba9842f72 | 98925735800817484879753523596172311629 | 177,893 | 157,969 | The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. |
false | void Splash::blitMask(SplashBitmap *src, int xDest, int yDest,
SplashClipResult clipRes) {
SplashPipe pipe;
Guchar *p;
int w, h, x, y;
w = src->getWidth();
h = src->getHeight();
if (vectorAntialias && clipRes != splashClipAllInside) {
pipeInit(&pipe, xDest, yDest, state->fillPattern, NULL,... | [
"Other"
] | poppler | a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | 177353594761141217586604236761349137273 | 177,904 | 113 | Unknown |
true | void Splash::blitMask(SplashBitmap *src, int xDest, int yDest,
SplashClipResult clipRes) {
SplashPipe pipe;
Guchar *p;
int w, h, x, y;
w = src->getWidth();
h = src->getHeight();
p = src->getDataPtr();
if (p == NULL) {
error(errInternal, -1, "src->getDataPtr() is NULL in Splash::blitMask");... | [
"Other"
] | poppler | a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | 273734718462154790310690694325824417535 | 177,904 | 157,973 | Unknown |
false | void Splash::arbitraryTransformMask(SplashImageMaskSource src, void *srcData,
int srcWidth, int srcHeight,
SplashCoord *mat, GBool glyphMode) {
SplashBitmap *scaledMask;
SplashClipResult clipRes, clipRes2;
SplashPipe pipe;
int scaledWidth, scaledHeight, t0, t1;
SplashCoord r00, r01, r10, r11, ... | [
"Other"
] | poppler | a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | 335865570448652228832556287433161700430 | 177,903 | 9,120 | Unknown |
true | SplashError Splash::arbitraryTransformImage(SplashImageSource src, void *srcData,
SplashColorMode srcMode, int nComps,
GBool srcAlpha,
int srcWidth, int srcHeight,
SplashCoord *mat, GBool interpolate,
GBool tilingPattern) {
SplashBitmap *scaledImg;
SplashClipResult c... | [
"Other"
] | poppler | a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | 40143756312744208339092311012124041863 | 4,087 | 13,935 | Unknown |
false | void Splash::arbitraryTransformMask(SplashImageMaskSource src, void *srcData,
int srcWidth, int srcHeight,
SplashCoord *mat, GBool glyphMode) {
SplashBitmap *scaledMask;
SplashClipResult clipRes, clipRes2;
SplashPipe pipe;
int scaledWidth, scaledHeight, t0, t1;
SplashCoord r00, r01, r10, r11, ... | [
"Other"
] | poppler | a205e71a2dbe0c8d4f4905a76a3f79ec522eacec | 21833262199574906453642874701778817418 | 177,905 | 114 | Unknown |
true | void Splash::arbitraryTransformMask(SplashImageMaskSource src, void *srcData,
int srcWidth, int srcHeight,
SplashCoord *mat, GBool glyphMode) {
SplashBitmap *scaledMask;
SplashClipResult clipRes, clipRes2;
SplashPipe pipe;
int scaledWidth, scaledHeight, t0, t1;
SplashCoord r00, r01, r10, r11, ... | [
"Other"
] | poppler | a205e71a2dbe0c8d4f4905a76a3f79ec522eacec | 163588603633760542389163811981031046563 | 177,905 | 157,974 | Unknown |
false | token_continue(i_ctx_t *i_ctx_p, scanner_state * pstate, bool save)
{
os_ptr op = osp;
int code;
ref token;
/* Note that gs_scan_token may change osp! */
pop(1); /* remove the file or scanner state */
again:
gs_scanner_error_object(i_ctx_p, pstate, &i_ctx_p->er... | [
"CWE-125"
] | ghostscript | 671fd59eb657743aa86fbc1895cb15872a317caa | 15644102026731532816747781452593039582 | 177,910 | 117 | The product reads data past the end, or before the beginning, of the intended buffer. |
true | token_continue(i_ctx_t *i_ctx_p, scanner_state * pstate, bool save)
{
os_ptr op = osp;
int code;
ref token;
/* Since we might free pstate below, and we're dealing with
* gc memory referenced by the stack, we need to explicitly
* remove the reference to pstate from the stack, otherwise
... | [
"CWE-125"
] | ghostscript | 671fd59eb657743aa86fbc1895cb15872a317caa | 20980588326678235890071977166118796220 | 177,910 | 157,979 | The product reads data past the end, or before the beginning, of the intended buffer. |
false | ft_smooth_render_generic( FT_Renderer render,
FT_GlyphSlot slot,
FT_Render_Mode mode,
const FT_Vector* origin,
FT_Render_Mode required_mode )
{
FT_Error error;
FT_Outline* o... | [
"CWE-189"
] | savannah | 79972af4f0485a11dcb19551356c45245749fc5b | 24717888926496377392853611670854702544 | 177,914 | 121 | This weakness involves numeric computation errors, such as integer overflows, underflows, or precision losses, which can lead to miscalculations and exploitable behaviors in software. |
true | ft_smooth_render_generic( FT_Renderer render,
FT_GlyphSlot slot,
FT_Render_Mode mode,
const FT_Vector* origin,
FT_Render_Mode required_mode )
{
FT_Error error;
FT_Outline* o... | [
"CWE-189"
] | savannah | 79972af4f0485a11dcb19551356c45245749fc5b | 121084197922462569728293725733145369116 | 177,914 | 157,983 | This weakness involves numeric computation errors, such as integer overflows, underflows, or precision losses, which can lead to miscalculations and exploitable behaviors in software. |
false | cff_charset_load( CFF_Charset charset,
FT_UInt num_glyphs,
FT_Stream stream,
FT_ULong base_offset,
FT_ULong offset,
FT_Bool invert )
{
FT_Memory memory = stream->memory;
FT_Error erro... | [
"CWE-189"
] | savannah | 0545ec1ca36b27cb928128870a83e5f668980bc5 | 322437368215015751310197159603838280292 | 177,915 | 122 | This weakness involves numeric computation errors, such as integer overflows, underflows, or precision losses, which can lead to miscalculations and exploitable behaviors in software. |
true | cff_charset_load( CFF_Charset charset,
FT_UInt num_glyphs,
FT_Stream stream,
FT_ULong base_offset,
FT_ULong offset,
FT_Bool invert )
{
FT_Memory memory = stream->memory;
FT_Error erro... | [
"CWE-189"
] | savannah | 0545ec1ca36b27cb928128870a83e5f668980bc5 | 274463663087246387196979578674863690828 | 177,915 | 157,984 | This weakness involves numeric computation errors, such as integer overflows, underflows, or precision losses, which can lead to miscalculations and exploitable behaviors in software. |
false | void add_param_to_argv(char *parsestart, int line)
{
int quote_open = 0, escaped = 0, param_len = 0;
char param_buffer[1024], *curchar;
/* After fighting with strtok enough, here's now
* a 'real' parser. According to Rusty I'm now no
} else {
param_buffer[param_len++] = *curchar;
for (curchar = pars... | [
"CWE-119"
] | netfilter | 2ae1099a42e6a0f06de305ca13a842ac83d4683e | 204920135878748692275786929565292679269 | 177,922 | 123 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
true | void add_param_to_argv(char *parsestart, int line)
{
int quote_open = 0, escaped = 0;
struct xt_param_buf param = {};
char *curchar;
/* After fighting with strtok enough, here's now
* a 'real' parser. According to Rusty I'm now no
} else {
param_buffer[param_len++] = *curchar;
for (curchar = parses... | [
"CWE-119"
] | netfilter | 2ae1099a42e6a0f06de305ca13a842ac83d4683e | 82639535107168519393189431221613615364 | 177,922 | 157,985 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
false | user_change_icon_file_authorized_cb (Daemon *daemon,
User *user,
GDBusMethodInvocation *context,
gpointer data)
{
g_autofree gchar *filename = NULL;
... | [
"CWE-22"
] | accountsservice | f9abd359f71a5bce421b9ae23432f539a067847a | 310825199754671934664587377706693460973 | 177,931 | 124 | The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the... |
true | user_change_icon_file_authorized_cb (Daemon *daemon,
User *user,
GDBusMethodInvocation *context,
gpointer data)
{
g_autofree gchar *filename = NULL;
... | [
"CWE-22"
] | accountsservice | f9abd359f71a5bce421b9ae23432f539a067847a | 172529280077131825840160709607931426927 | 177,931 | 157,986 | The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the... |
false | ProcSendEvent(ClientPtr client)
{
WindowPtr pWin;
WindowPtr effectiveFocus = NullWindow; /* only set if dest==InputFocus */
DeviceIntPtr dev = PickPointer(client);
DeviceIntPtr keybd = GetMaster(dev, MASTER_KEYBOARD);
SpritePtr pSprite = dev->spriteInfo->sprite;
REQUEST(xSendEventReq);
... | [
"CWE-119"
] | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | 36683317052216501366087070681901031177 | 177,936 | 128 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
true | ProcSendEvent(ClientPtr client)
{
WindowPtr pWin;
WindowPtr effectiveFocus = NullWindow; /* only set if dest==InputFocus */
DeviceIntPtr dev = PickPointer(client);
DeviceIntPtr keybd = GetMaster(dev, MASTER_KEYBOARD);
SpritePtr pSprite = dev->spriteInfo->sprite;
REQUEST(xSendEventReq);
... | [
"CWE-119"
] | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | 107904058737663543656332226040399053348 | 177,936 | 157,990 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
false | ProcXSendExtensionEvent(ClientPtr client)
{
int ret;
DeviceIntPtr dev;
xEvent *first;
XEventClass *list;
struct tmask tmp[EMASKSIZE];
REQUEST(xSendExtensionEventReq);
REQUEST_AT_LEAST_SIZE(xSendExtensionEventReq);
if (stuff->length !=
bytes_to_int32(sizeof(xSendExtensionEv... | [
"CWE-119"
] | xserver | 8caed4df36b1f802b4992edcfd282cbeeec35d9d | 288772859654498582457761658216356600870 | 177,937 | 129 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
true | ProcXSendExtensionEvent(ClientPtr client)
{
int ret, i;
DeviceIntPtr dev;
xEvent *first;
XEventClass *list;
struct tmask tmp[EMASKSIZE];
REQUEST(xSendExtensionEventReq);
REQUEST_AT_LEAST_SIZE(xSendExtensionEventReq);
if (stuff->length !=
bytes_to_int32(sizeof(xSendExtensio... | [
"CWE-119"
] | xserver | 8caed4df36b1f802b4992edcfd282cbeeec35d9d | 7864871216394926527164481647583599943 | 177,937 | 157,991 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
false | int X509_verify_cert(X509_STORE_CTX *ctx)
{
X509 *x, *xtmp, *xtmp2, *chain_ss = NULL;
int bad_chain = 0;
X509_VERIFY_PARAM *param = ctx->param;
int depth, i, ok = 0;
int num, j, retry;
int (*cb) (int xok, X509_STORE_CTX *xctx);
STACK_OF(X509) *sktmp = NULL;
if (ctx->cert == NULL) {
... | [
"CWE-254"
] | openssl | 9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | 115002758247549560072417551006349173395 | 177,939 | 130 | This label identifies security gaps where expected security features are missing or only partially implemented, reducing protection against unauthorized access or manipulation. |
true | int X509_verify_cert(X509_STORE_CTX *ctx)
{
X509 *x, *xtmp, *xtmp2, *chain_ss = NULL;
int bad_chain = 0;
X509_VERIFY_PARAM *param = ctx->param;
int depth, i, ok = 0;
int num, j, retry;
int (*cb) (int xok, X509_STORE_CTX *xctx);
STACK_OF(X509) *sktmp = NULL;
if (ctx->cert == NULL) {
... | [
"CWE-254"
] | openssl | 9a0db453ba017ebcaccbee933ee6511a9ae4d1c8 | 142295385280397706056550098012779904584 | 177,939 | 157,992 | This label identifies security gaps where expected security features are missing or only partially implemented, reducing protection against unauthorized access or manipulation. |
false | pax_decode_header (struct tar_sparse_file *file)
{
if (file->stat_info->sparse_major > 0)
{
uintmax_t u;
char nbuf[UINTMAX_STRSIZE_BOUND];
union block *blk;
char *p;
size_t i;
off_t start;
#define COPY_BUF(b,buf,src) do \
{ ... | [
"CWE-476"
] | savannah | cb07844454d8cc9fb21f53ace75975f91185a120 | 138433573634940218648935622617839152489 | 177,948 | 132 | The product dereferences a pointer that it expects to be valid but is NULL. |
true | pax_decode_header (struct tar_sparse_file *file)
{
if (file->stat_info->sparse_major > 0)
{
uintmax_t u;
char nbuf[UINTMAX_STRSIZE_BOUND];
union block *blk;
char *p;
size_t i;
off_t start;
#define COPY_BUF(b,buf,src) do \
{ ... | [
"CWE-476"
] | savannah | cb07844454d8cc9fb21f53ace75975f91185a120 | 143151925619516221388066178344614236926 | 177,948 | 157,994 | The product dereferences a pointer that it expects to be valid but is NULL. |
false | xps_encode_font_char_imp(xps_font_t *font, int code)
{
byte *table;
/* no cmap selected: return identity */
if (font->cmapsubtable <= 0)
return code;
table = font->data + font->cmapsubtable;
switch (u16(table))
{
case 0: /* Apple standard 1-to-1 mapping. */
return table[co... | [
"CWE-125"
] | ghostscript | 961b10cdd71403072fb99401a45f3bef6ce53626 | 76117521649677870757890949935460891471 | 177,949 | 133 | The product reads data past the end, or before the beginning, of the intended buffer. |
true | xps_encode_font_char_imp(xps_font_t *font, int code)
{
byte *table;
/* no cmap selected: return identity */
if (font->cmapsubtable <= 0)
return code;
table = font->data + font->cmapsubtable;
switch (u16(table))
{
case 0: /* Apple standard 1-to-1 mapping. */
return table[co... | [
"CWE-125"
] | ghostscript | 961b10cdd71403072fb99401a45f3bef6ce53626 | 127631464692449464016647490182266795745 | 177,949 | 157,995 | The product reads data past the end, or before the beginning, of the intended buffer. |
false | static void gx_ttfReader__Read(ttfReader *self, void *p, int n)
{
gx_ttfReader *r = (gx_ttfReader *)self;
const byte *q;
if (!r->error) {
if (r->extra_glyph_index != -1) {
q = r->glyph_data.bits.data + r->pos;
r->error = (r->glyph_data.bits.size - r->pos < n ?
... | [
"CWE-125"
] | ghostscript | 937ccd17ac65935633b2ebc06cb7089b91e17e6b | 68672817859874024460253201984431332219 | 177,951 | 134 | The product reads data past the end, or before the beginning, of the intended buffer. |
true | static void gx_ttfReader__Read(ttfReader *self, void *p, int n)
{
gx_ttfReader *r = (gx_ttfReader *)self;
const byte *q;
if (!r->error) {
if (r->extra_glyph_index != -1) {
q = r->glyph_data.bits.data + r->pos;
r->error = ((r->pos >= r->glyph_data.bits.size ||
... | [
"CWE-125"
] | ghostscript | 937ccd17ac65935633b2ebc06cb7089b91e17e6b | 292644363497676868271809371915373401264 | 177,951 | 157,996 | The product reads data past the end, or before the beginning, of the intended buffer. |
false | static void Ins_MDRP( INS_ARG )
{
Int point;
TT_F26Dot6 distance,
org_dist;
point = (Int)args[0];
if ( BOUNDS( args[0], CUR.zp1.n_points ) )
{
/* Current version of FreeType silently ignores this out of bounds error
* and drops the instruction, ... | [
"CWE-125"
] | ghostscript | 7755e67116e8973ee0e3b22d653df026a84fa01b | 29186964022494243055154783334172444823 | 177,952 | 135 | The product reads data past the end, or before the beginning, of the intended buffer. |
true | static void Ins_MDRP( INS_ARG )
{
Int point;
TT_F26Dot6 distance,
org_dist;
point = (Int)args[0];
if ( BOUNDS( args[0], CUR.zp1.n_points ) ||
BOUNDS( CUR.GS.rp0, CUR.zp0.n_points) )
{
/* Current version of FreeType silently ignores this out of bo... | [
"CWE-125"
] | ghostscript | 7755e67116e8973ee0e3b22d653df026a84fa01b | 168161902406212546127097708445953437941 | 177,952 | 157,997 | The product reads data past the end, or before the beginning, of the intended buffer. |
false | dbus_g_proxy_manager_filter (DBusConnection *connection,
DBusMessage *message,
void *user_data)
{
DBusGProxyManager *manager;
if (dbus_message_get_type (message) != DBUS_MESSAGE_TYPE_SIGNAL)
return DBUS_HANDLER_RESULT_NOT_YET_HAN... | [
"CWE-20"
] | dbus | 166978a09cf5edff4028e670b6074215a4c75eca | 115276448693599864140234533276342928360 | 177,953 | 136 | The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly. |
true | dbus_g_proxy_manager_filter (DBusConnection *connection,
DBusMessage *message,
void *user_data)
{
DBusGProxyManager *manager;
if (dbus_message_get_type (message) != DBUS_MESSAGE_TYPE_SIGNAL)
return DBUS_HANDLER_RESULT_NOT_YET_HAN... | [
"CWE-20"
] | dbus | 166978a09cf5edff4028e670b6074215a4c75eca | 242242174897063399898222063131911346969 | 177,953 | 157,998 | The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly. |
false | xps_true_callback_glyph_name(gs_font *pfont, gs_glyph glyph, gs_const_string *pstr)
{
/* This function is copied verbatim from plfont.c */
int table_length;
int table_offset;
ulong format;
uint numGlyphs;
uint glyph_name_index;
const byte *postp; /* post table pointer */
/* gue... | [
"CWE-119"
] | ghostscript | c53183d4e7103e87368b7cfa15367a47d559e323 | 83736377691001723428427436308560857107 | 177,956 | 139 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
true | xps_true_callback_glyph_name(gs_font *pfont, gs_glyph glyph, gs_const_string *pstr)
{
/* This function is copied verbatim from plfont.c */
int table_length;
int table_offset;
ulong format;
int numGlyphs;
uint glyph_name_index;
const byte *postp; /* post table pointer */
if (glyp... | [
"CWE-119"
] | ghostscript | c53183d4e7103e87368b7cfa15367a47d559e323 | 61931341795887404678779836705866374570 | 177,956 | 158,000 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
false | xps_load_sfnt_name(xps_font_t *font, char *namep)
{
byte *namedata;
int offset, length;
/*int format;*/
int count, stringoffset;
int found;
int i, k;
found = 0;
strcpy(namep, "Unknown");
offset = xps_find_sfnt_table(font, "name", &length);
if (offset < 0 || length < 6)
{... | [
"CWE-119"
] | ghostscript | 3c2aebbedd37fab054e80f2e315de07d7e9b5bdb | 112369513254285676016910036571983121831 | 177,957 | 140 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
true | xps_load_sfnt_name(xps_font_t *font, char *namep)
xps_load_sfnt_name(xps_font_t *font, char *namep, const int buflen)
{
byte *namedata;
int offset, length;
/*int format;*/
int count, stringoffset;
int found;
int i, k;
found = 0;
strcpy(namep, "Unknown");
offset = xps_find_sfnt_t... | [
"CWE-119"
] | ghostscript | 3c2aebbedd37fab054e80f2e315de07d7e9b5bdb | 35053491490394057768170760061098710155 | 177,957 | 158,001 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
false | check_acl(pam_handle_t *pamh,
const char *sense, const char *this_user, const char *other_user,
int noent_code, int debug)
{
char path[PATH_MAX];
struct passwd *pwd;
{
char path[PATH_MAX];
struct passwd *pwd;
FILE *fp;
int i, save_errno;
uid_t fsuid;
/* Check this ... | [
"CWE-399"
] | altlinux | ffe7058c70253d574b1963c7c93002bd410fddc9 | 41551411147695369979843022209854699094 | 177,960 | 141 | This vulnerability category highlights issues in resource management where failures to properly release memory, file handles, or other resources can degrade system performance or enable denial-of-service conditions. |
true | check_acl(pam_handle_t *pamh,
const char *sense, const char *this_user, const char *other_user,
int noent_code, int debug)
{
char path[PATH_MAX];
struct passwd *pwd;
{
char path[PATH_MAX];
struct passwd *pwd;
FILE *fp = NULL;
int i, fd = -1, save_errno;
uid_t fsuid;
... | [
"CWE-399"
] | altlinux | ffe7058c70253d574b1963c7c93002bd410fddc9 | 299701102454126325367123002385728455579 | 177,960 | 158,002 | This vulnerability category highlights issues in resource management where failures to properly release memory, file handles, or other resources can degrade system performance or enable denial-of-service conditions. |
false | pam_sm_close_session (pam_handle_t *pamh, int flags UNUSED,
int argc, const char **argv)
{
void *cookiefile;
int i, debug = 0;
const char* user;
struct passwd *tpwd = NULL;
uid_t unlinkuid, fsuid;
if (pam_get_user(pamh, &user, NULL) != PAM_SUCCESS)
... | [
"Other"
] | altlinux | 05dafc06cd3dfeb7c4b24942e4e1ae33ff75a123 | 73058116370865376251359869621052738742 | 177,961 | 142 | Unknown |
true | pam_sm_close_session (pam_handle_t *pamh, int flags UNUSED,
int argc, const char **argv)
{
int i, debug = 0;
const char *user;
const void *data;
const char *cookiefile;
struct passwd *tpwd;
uid_t fsuid;
/* Try to retrieve the name of a file we ... | [
"Other"
] | altlinux | 05dafc06cd3dfeb7c4b24942e4e1ae33ff75a123 | 319217779824251581628028682692735069597 | 177,961 | 158,003 | Unknown |
false | int ASN1_item_verify(const ASN1_ITEM *it, X509_ALGOR *a,
ASN1_BIT_STRING *signature, void *asn, EVP_PKEY *pkey)
{
EVP_MD_CTX ctx;
unsigned char *buf_in=NULL;
int ret= -1,inl;
int mdnid, pknid;
EVP_MD_CTX_init(&ctx);
/* Convert signature OID into digest and public key OIDs */
{
if... | [
"CWE-310"
] | openssl | 62e4506a7d4cec1c8e1ff687f6b220f6a62a57c7 | 269188142815144649597760452518735983353 | 177,963 | 144 | This weakness pertains to the use of cryptographic functions that are weak, misconfigured, or outdated, which undermines the intended protection of encrypted data and communications. |
true | int ASN1_item_verify(const ASN1_ITEM *it, X509_ALGOR *a,
ASN1_BIT_STRING *signature, void *asn, EVP_PKEY *pkey)
{
EVP_MD_CTX ctx;
unsigned char *buf_in=NULL;
int ret= -1,inl;
int mdnid, pknid;
if (!pkey)
{
ASN1err(ASN1_F_ASN1_ITEM_VERIFY, ERR_R_PASSED_NULL_PARAMETE... | [
"CWE-310"
] | openssl | 62e4506a7d4cec1c8e1ff687f6b220f6a62a57c7 | 283580637719099969560774200070145174903 | 177,963 | 158,005 | This weakness pertains to the use of cryptographic functions that are weak, misconfigured, or outdated, which undermines the intended protection of encrypted data and communications. |
false | int ASN1_item_verify(const ASN1_ITEM *it, X509_ALGOR *a, ASN1_BIT_STRING *signature,
void *asn, EVP_PKEY *pkey)
{
EVP_MD_CTX ctx;
const EVP_MD *type;
unsigned char *buf_in=NULL;
int ret= -1,i,inl;
EVP_MD_CTX_init(&ctx);
i=OBJ_obj2nid(a->algorithm);
type=EVP_get_digestb... | [
"CWE-310"
] | openssl | 66e8211c0b1347970096e04b18aa52567c325200 | 107114806548745275102067080029582687172 | 177,964 | 145 | This weakness pertains to the use of cryptographic functions that are weak, misconfigured, or outdated, which undermines the intended protection of encrypted data and communications. |
true | int ASN1_item_verify(const ASN1_ITEM *it, X509_ALGOR *a, ASN1_BIT_STRING *signature,
void *asn, EVP_PKEY *pkey)
{
EVP_MD_CTX ctx;
const EVP_MD *type;
unsigned char *buf_in=NULL;
int ret= -1,i,inl;
if (!pkey)
{
ASN1err(ASN1_F_ASN1_ITEM_VERIFY, ERR_R_PASSED_... | [
"CWE-310"
] | openssl | 66e8211c0b1347970096e04b18aa52567c325200 | 40999153640730434907087196937231236729 | 177,964 | 158,006 | This weakness pertains to the use of cryptographic functions that are weak, misconfigured, or outdated, which undermines the intended protection of encrypted data and communications. |
false | int ASN1_item_verify(const ASN1_ITEM *it, X509_ALGOR *a, ASN1_BIT_STRING *signature,
void *asn, EVP_PKEY *pkey)
{
EVP_MD_CTX ctx;
const EVP_MD *type = NULL;
unsigned char *buf_in=NULL;
int ret= -1,inl;
int mdnid, pknid;
EVP_MD_CTX_init(&ctx);
/* Convert signature OID into digest... | [
"CWE-310"
] | openssl | ebc71865f0506a293242bd4aec97cdc7a8ef24b0 | 292171545981096532430963237536493213672 | 177,965 | 146 | This weakness pertains to the use of cryptographic functions that are weak, misconfigured, or outdated, which undermines the intended protection of encrypted data and communications. |
true | int ASN1_item_verify(const ASN1_ITEM *it, X509_ALGOR *a, ASN1_BIT_STRING *signature,
void *asn, EVP_PKEY *pkey)
{
EVP_MD_CTX ctx;
const EVP_MD *type = NULL;
unsigned char *buf_in=NULL;
int ret= -1,inl;
int mdnid, pknid;
if (!pkey)
{
ASN1err(ASN1_F_ASN1_ITEM_VE... | [
"CWE-310"
] | openssl | ebc71865f0506a293242bd4aec97cdc7a8ef24b0 | 188744818829646400279494577898764111698 | 177,965 | 158,007 | This weakness pertains to the use of cryptographic functions that are weak, misconfigured, or outdated, which undermines the intended protection of encrypted data and communications. |
false | static NTSTATUS fd_open_atomic(struct connection_struct *conn,
files_struct *fsp,
int flags,
mode_t mode,
bool *file_created)
{
NTSTATUS status = NT_STATUS_UNSUCCESSFUL;
bool file_existed = VALID_STAT(fsp->fsp_name->st);
*file_created = false;
* We're not... | [
"CWE-835"
] | samba | 10c3e3923022485c720f322ca4f0aca5d7501310 | 161881144216406607325428562477641633507 | 177,966 | 147 | The product contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop. |
true | static NTSTATUS fd_open_atomic(struct connection_struct *conn,
files_struct *fsp,
int flags,
mode_t mode,
bool *file_created)
{
NTSTATUS status = NT_STATUS_UNSUCCESSFUL;
NTSTATUS retry_status;
bool file_existed = VALID_STAT(fsp->fsp_name->st);
int curr_fla... | [
"CWE-835"
] | samba | 10c3e3923022485c720f322ca4f0aca5d7501310 | 263754377429576171788923901818406764578 | 177,966 | 158,008 | The product contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop. |
false | int EVP_DecodeUpdate(EVP_ENCODE_CTX *ctx, unsigned char *out, int *outl,
const unsigned char *in, int inl)
{
int seof= -1,eof=0,rv= -1,ret=0,i,v,tmp,n,ln,exp_nl;
unsigned char *d;
n=ctx->num;
d=ctx->enc_data;
ln=ctx->line_num;
exp_nl=ctx->expect_nl;
/* last line of input. */
if ((inl == 0) || ((n == 0)... | [
"CWE-119"
] | openssl | d0666f289ac013094bbbf547bfbcd616199b7d2d | 314448950255259267086706912584575387344 | 177,975 | 150 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
true | int EVP_DecodeUpdate(EVP_ENCODE_CTX *ctx, unsigned char *out, int *outl,
const unsigned char *in, int inl)
{
int seof= -1,eof=0,rv= -1,ret=0,i,v,tmp,n,ln,exp_nl;
unsigned char *d;
n=ctx->num;
d=ctx->enc_data;
ln=ctx->line_num;
exp_nl=ctx->expect_nl;
/* last line of input. */
if ((inl == 0) || ((n == 0)... | [
"CWE-119"
] | openssl | d0666f289ac013094bbbf547bfbcd616199b7d2d | 290784375241955931137206791690548785053 | 177,975 | 158,011 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
false | int ssl3_write_bytes(SSL *s, int type, const void *buf_, int len)
{
const unsigned char *buf = buf_;
int tot;
unsigned int n, nw;
#if !defined(OPENSSL_NO_MULTIBLOCK) && EVP_CIPH_FLAG_TLS1_1_MULTIBLOCK
unsigned int max_send_fragment;
#endif
SSL3_BUFFER *wb = &(s->s3->wbuf);
int i;
s->rwstate... | [
"CWE-17"
] | openssl | 77c77f0a1b9f15b869ca3342186dfbedd1119d0e | 275384842882046980981080513884860956591 | 177,978 | 151 | Originally addressing errors in controlling program flow through indirect calls or jumps, this CWE has been deprecated and its concerns merged into more precise modern classifications. |
true | int ssl3_write_bytes(SSL *s, int type, const void *buf_, int len)
{
const unsigned char *buf = buf_;
int tot;
unsigned int n, nw;
#if !defined(OPENSSL_NO_MULTIBLOCK) && EVP_CIPH_FLAG_TLS1_1_MULTIBLOCK
unsigned int max_send_fragment;
#endif
SSL3_BUFFER *wb = &(s->s3->wbuf);
int i;
s->rwstate... | [
"CWE-17"
] | openssl | 77c77f0a1b9f15b869ca3342186dfbedd1119d0e | 174321787959227950244428389433155298913 | 177,978 | 158,012 | Originally addressing errors in controlling program flow through indirect calls or jumps, this CWE has been deprecated and its concerns merged into more precise modern classifications. |
false | X509_REQ *X509_to_X509_REQ(X509 *x, EVP_PKEY *pkey, const EVP_MD *md)
{
X509_REQ *ret;
X509_REQ_INFO *ri;
int i;
EVP_PKEY *pktmp;
ret = X509_REQ_new();
if (ret == NULL) {
X509err(X509_F_X509_TO_X509_REQ, ERR_R_MALLOC_FAILURE);
goto err;
}
ri = ret->req_info;
ri->ve... | [
"Other"
] | openssl | 28a00bcd8e318da18031b2ac8778c64147cd54f9 | 65961291460303063310058993287193914232 | 177,981 | 153 | Unknown |
true | X509_REQ *X509_to_X509_REQ(X509 *x, EVP_PKEY *pkey, const EVP_MD *md)
{
X509_REQ *ret;
X509_REQ_INFO *ri;
int i;
EVP_PKEY *pktmp;
ret = X509_REQ_new();
if (ret == NULL) {
X509err(X509_F_X509_TO_X509_REQ, ERR_R_MALLOC_FAILURE);
goto err;
}
ri = ret->req_info;
ri->ve... | [
"Other"
] | openssl | 28a00bcd8e318da18031b2ac8778c64147cd54f9 | 205283502618834293376438940394805322961 | 177,981 | 158,014 | Unknown |
false | int ASN1_item_ex_d2i(ASN1_VALUE **pval, const unsigned char **in, long len,
const ASN1_ITEM *it,
int tag, int aclass, char opt, ASN1_TLC *ctx)
{
const ASN1_TEMPLATE *tt, *errtt = NULL;
const ASN1_COMPAT_FUNCS *cf;
const ASN1_EXTERN_FUNCS *ef;
const ASN1_AUX *aux... | [
"CWE-17"
] | openssl | b717b083073b6cacc0a5e2397b661678aff7ae7f | 71024901693981678702406865621946417956 | 177,982 | 154 | Originally addressing errors in controlling program flow through indirect calls or jumps, this CWE has been deprecated and its concerns merged into more precise modern classifications. |
true | int ASN1_item_ex_d2i(ASN1_VALUE **pval, const unsigned char **in, long len,
const ASN1_ITEM *it,
int tag, int aclass, char opt, ASN1_TLC *ctx)
{
const ASN1_TEMPLATE *tt, *errtt = NULL;
const ASN1_COMPAT_FUNCS *cf;
const ASN1_EXTERN_FUNCS *ef;
const ASN1_AUX *aux... | [
"CWE-17"
] | openssl | b717b083073b6cacc0a5e2397b661678aff7ae7f | 111330312829224186635209593630647983706 | 177,982 | 158,015 | Originally addressing errors in controlling program flow through indirect calls or jumps, this CWE has been deprecated and its concerns merged into more precise modern classifications. |
false | int ASN1_TYPE_cmp(const ASN1_TYPE *a, const ASN1_TYPE *b)
{
int result = -1;
if (!a || !b || a->type != b->type)
return -1;
switch (a->type) {
case V_ASN1_OBJECT:
result = OBJ_cmp(a->value.object, b->value.object);
break;
case V_ASN1_NULL:
result = 0; ... | [
"CWE-17"
] | openssl | c3c7fb07dc975dc3c9de0eddb7d8fd79fc9c67c1 | 210178361702841664613263558093095710758 | 177,983 | 155 | Originally addressing errors in controlling program flow through indirect calls or jumps, this CWE has been deprecated and its concerns merged into more precise modern classifications. |
true | int ASN1_TYPE_cmp(const ASN1_TYPE *a, const ASN1_TYPE *b)
{
int result = -1;
if (!a || !b || a->type != b->type)
return -1;
switch (a->type) {
case V_ASN1_OBJECT:
result = OBJ_cmp(a->value.object, b->value.object);
break;
case V_ASN1_BOOLEAN:
result = a->value.bo... | [
"CWE-17"
] | openssl | c3c7fb07dc975dc3c9de0eddb7d8fd79fc9c67c1 | 6676789780199442349934246229458680210 | 177,983 | 158,016 | Originally addressing errors in controlling program flow through indirect calls or jumps, this CWE has been deprecated and its concerns merged into more precise modern classifications. |
false | int ssl3_client_hello(SSL *s)
{
unsigned char *buf;
unsigned char *p, *d;
int i;
unsigned long l;
int al = 0;
#ifndef OPENSSL_NO_COMP
int j;
SSL_COMP *comp;
#endif
buf = (unsigned char *)s->init_buf->data;
if (s->state == SSL3_ST_CW_CLNT_HELLO_A) {
SSL_SESSION *sess = s->ses... | [
"CWE-310"
] | openssl | e1b568dd2462f7cacf98f3d117936c34e2849a6b | 56759383063747973773032597308927437186 | 177,984 | 156 | This weakness pertains to the use of cryptographic functions that are weak, misconfigured, or outdated, which undermines the intended protection of encrypted data and communications. |
true | int ssl3_client_hello(SSL *s)
{
unsigned char *buf;
unsigned char *p, *d;
int i;
unsigned long l;
int al = 0;
#ifndef OPENSSL_NO_COMP
int j;
SSL_COMP *comp;
#endif
buf = (unsigned char *)s->init_buf->data;
if (s->state == SSL3_ST_CW_CLNT_HELLO_A) {
SSL_SESSION *sess = s->ses... | [
"CWE-310"
] | openssl | e1b568dd2462f7cacf98f3d117936c34e2849a6b | 214124849989913112425172994945395163869 | 177,984 | 158,017 | This weakness pertains to the use of cryptographic functions that are weak, misconfigured, or outdated, which undermines the intended protection of encrypted data and communications. |
false | static void get_socket_name(SingleInstData* data, char* buf, int len)
{
const char* dpy = g_getenv("DISPLAY");
char* host = NULL;
int dpynum;
if(dpy)
{
const char* p = strrchr(dpy, ':');
host = g_strndup(dpy, (p - dpy));
dpynum = atoi(p + 1);
}
else
dpynum ... | [
"CWE-20"
] | lxde | bc8c3d871e9ecc67c47ff002b68cf049793faf08 | 106918102879333302695314745785733140248 | 177,988 | 159 | The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly. |
true | static void get_socket_name(SingleInstData* data, char* buf, int len)
{
const char* dpy = g_getenv("DISPLAY");
char* host = NULL;
int dpynum;
if(dpy)
{
const char* p = strrchr(dpy, ':');
host = g_strndup(dpy, (p - dpy));
dpynum = atoi(p + 1);
}
else
dpynum ... | [
"CWE-20"
] | lxde | bc8c3d871e9ecc67c47ff002b68cf049793faf08 | 331737708862764431243967339168212646672 | 177,988 | 158,020 | The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly. |
false | check_acl(pam_handle_t *pamh,
const char *sense, const char *this_user, const char *other_user,
int noent_code, int debug)
{
struct passwd *pwd;
FILE *fp = NULL;
int i, fd = -1, save_errno;
uid_t fsuid;
struct stat st;
/* Check this user's <sense> file. */
pw... | [
"Other"
] | altlinux | 843807a3a90f52e7538be756616510730a24739a | 129171371405937766299357996317134593545 | 177,990 | 161 | Unknown |
true | check_acl(pam_handle_t *pamh,
const char *sense, const char *this_user, const char *other_user,
int noent_code, int debug)
{
struct passwd *pwd;
FILE *fp = NULL;
int i, fd = -1, save_errno;
struct stat st;
PAM_MODUTIL_DEF_PRIVS(privs);
/* Check this user's <sense> f... | [
"Other"
] | altlinux | 843807a3a90f52e7538be756616510730a24739a | 328920815324562966193237341578176859343 | 177,990 | 158,022 | Unknown |
false | EC_KEY *d2i_ECPrivateKey(EC_KEY **a, const unsigned char **in, long len)
{
int ok = 0;
EC_KEY *ret = NULL;
EC_PRIVATEKEY *priv_key = NULL;
if ((priv_key = EC_PRIVATEKEY_new()) == NULL) {
ECerr(EC_F_D2I_ECPRIVATEKEY, ERR_R_MALLOC_FAILURE);
return NULL;
}
if ((priv_key = d2i_EC_P... | [
"Other"
] | openssl | 1b4a8df38fc9ab3c089ca5765075ee53ec5bd66a | 277511298376014988680994809256525705829 | 177,991 | 162 | Unknown |
true | EC_KEY *d2i_ECPrivateKey(EC_KEY **a, const unsigned char **in, long len)
{
int ok = 0;
EC_KEY *ret = NULL;
EC_PRIVATEKEY *priv_key = NULL;
if ((priv_key = EC_PRIVATEKEY_new()) == NULL) {
ECerr(EC_F_D2I_ECPRIVATEKEY, ERR_R_MALLOC_FAILURE);
return NULL;
}
if ((priv_key = d2i_EC_P... | [
"Other"
] | openssl | 1b4a8df38fc9ab3c089ca5765075ee53ec5bd66a | 283888329779941625504217373057883334685 | 177,991 | 158,023 | Unknown |
false | int dtls1_listen(SSL *s, struct sockaddr *client)
{
int ret;
SSL_set_options(s, SSL_OP_COOKIE_EXCHANGE);
s->d1->listen = 1;
(void)BIO_dgram_get_peer(SSL_get_rbio(s), client);
return 1;
}
| [
"Other"
] | openssl | 819418110b6fff4a7b96f01a5d68f71df3e3b736 | 147821170503061866239142160957380206825 | 177,993 | 164 | Unknown |
true | int dtls1_listen(SSL *s, struct sockaddr *client)
{
int ret;
/* Ensure there is no state left over from a previous invocation */
SSL_clear(s);
SSL_set_options(s, SSL_OP_COOKIE_EXCHANGE);
s->d1->listen = 1;
(void)BIO_dgram_get_peer(SSL_get_rbio(s), client);
return 1;
}
| [
"Other"
] | openssl | 819418110b6fff4a7b96f01a5d68f71df3e3b736 | 86565129563588171334671182094004024523 | 177,993 | 158,024 | Unknown |
false | _bdf_parse_glyphs( char* line,
unsigned long linelen,
unsigned long lineno,
void* call_data,
void* client_data )
{
int c, mask_index;
char* s;
unsigned char* b... | [
"CWE-119"
] | savannah | 7f2e4f4f553f6836be7683f66226afac3fa979b8 | 241612252320932154235102760135232983991 | 177,994 | 165 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
true | _bdf_parse_glyphs( char* line,
unsigned long linelen,
unsigned long lineno,
void* call_data,
void* client_data )
{
int c, mask_index;
char* s;
unsigned char* b... | [
"CWE-119"
] | savannah | 7f2e4f4f553f6836be7683f66226afac3fa979b8 | 284263663179865322266403542444429355517 | 177,994 | 158,025 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
false | _bdf_parse_glyphs( char* line,
unsigned long linelen,
unsigned long lineno,
void* call_data,
void* client_data )
{
int c, mask_index;
char* s;
unsigned char* b... | [
"CWE-119"
] | savannah | 07bdb6e289c7954e2a533039dc93c1c136099d2d | 339135483814426971995983985697178320662 | 177,995 | 166 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
true | _bdf_parse_glyphs( char* line,
unsigned long linelen,
unsigned long lineno,
void* call_data,
void* client_data )
{
int c, mask_index;
char* s;
unsigned char* b... | [
"CWE-119"
] | savannah | 07bdb6e289c7954e2a533039dc93c1c136099d2d | 112133374329751410214358441913282019949 | 177,995 | 158,026 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
false | context_length_arg (char const *str, int *out)
{
uintmax_t value;
if (! (xstrtoumax (str, 0, 10, &value, "") == LONGINT_OK
&& 0 <= (*out = value)
&& *out == value))
{
error (EXIT_TROUBLE, 0, "%s: %s", str,
_("invalid context length argument"));
}
page size, unles... | [
"CWE-189"
] | savannah | 8fcf61523644df42e1905c81bed26838e0b04f91 | 325237609142015740156610191050140922642 | 177,996 | 167 | This weakness involves numeric computation errors, such as integer overflows, underflows, or precision losses, which can lead to miscalculations and exploitable behaviors in software. |
true | context_length_arg (char const *str, int *out)
context_length_arg (char const *str, intmax_t *out)
{
switch (xstrtoimax (str, 0, 10, out, ""))
{
case LONGINT_OK:
case LONGINT_OVERFLOW:
if (0 <= *out)
break;
/* Fall through. */
default:
error (EXIT_TROUBLE, 0, "%s: %s", st... | [
"CWE-189"
] | savannah | 8fcf61523644df42e1905c81bed26838e0b04f91 | 46085918764084639984457622752978355870 | 177,996 | 158,027 | This weakness involves numeric computation errors, such as integer overflows, underflows, or precision losses, which can lead to miscalculations and exploitable behaviors in software. |
false | ActionReply Smb4KMountHelper::mount(const QVariantMap &args)
{
ActionReply reply;
QMapIterator<QString, QVariant> it(args);
proc.setOutputChannelMode(KProcess::SeparateChannels);
proc.setProcessEnvironment(QProcessEnvironment::systemEnvironment());
#if defined(Q_OS_LINUX)
proc.setEnv("PASSWD", e... | [
"CWE-20"
] | kde | a90289b0962663bc1d247bbbd31b9e65b2ca000e | 171260334698845358353677836209008845727 | 177,999 | 169 | The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly. |
true | ActionReply Smb4KMountHelper::mount(const QVariantMap &args)
{
//
// The action reply
//
ActionReply reply;
// Get the mount executable
//
const QString mount = findMountExecutable();
//
QMapIterator<QString, QVariant> it(args);
proc.setOutputChannelMode(KProcess::SeparateChannels);
... | [
"CWE-20"
] | kde | a90289b0962663bc1d247bbbd31b9e65b2ca000e | 200905717068882123159866802477998586348 | 177,999 | 158,029 | The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly. |
false | parse_encoding( T1_Face face,
T1_Loader loader )
{
T1_Parser parser = &loader->parser;
FT_Byte* cur;
FT_Byte* limit = parser->root.limit;
PSAux_Service psaux = (PSAux_Service)face->psaux;
T1_Skip_Spaces( parser );
cur = parser->root.cursor;
if ( cur >= lim... | [
"CWE-399"
] | savannah | df14e6c0b9592cbb24d5381dfc6106b14f915e75 | 272856134003844809072499589562648977382 | 178,009 | 177 | This vulnerability category highlights issues in resource management where failures to properly release memory, file handles, or other resources can degrade system performance or enable denial-of-service conditions. |
true | parse_encoding( T1_Face face,
T1_Loader loader )
{
T1_Parser parser = &loader->parser;
FT_Byte* cur;
FT_Byte* limit = parser->root.limit;
PSAux_Service psaux = (PSAux_Service)face->psaux;
T1_Skip_Spaces( parser );
cur = parser->root.cursor;
if ( cur >= lim... | [
"CWE-399"
] | savannah | df14e6c0b9592cbb24d5381dfc6106b14f915e75 | 311321372754373610005207092043672470173 | 178,009 | 158,037 | This vulnerability category highlights issues in resource management where failures to properly release memory, file handles, or other resources can degrade system performance or enable denial-of-service conditions. |
false | void check_request_for_cacheability(struct stream *s, struct channel *chn)
{
struct http_txn *txn = s->txn;
char *p1, *p2;
char *cur_ptr, *cur_end, *cur_next;
int pragma_found;
int cc_found;
int cur_idx;
if ((txn->flags & (TX_CACHEABLE|TX_CACHE_IGNORE)) == TX_CACHE_IGNORE)
return; /* nothing more to do here *... | [
"CWE-200"
] | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | 324327278202769570327385397929081223567 | 178,013 | 178 | The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. |
true | void check_request_for_cacheability(struct stream *s, struct channel *chn)
{
struct http_txn *txn = s->txn;
char *p1, *p2;
char *cur_ptr, *cur_end, *cur_next;
int pragma_found;
int cc_found;
int cur_idx;
if ((txn->flags & (TX_CACHEABLE|TX_CACHE_IGNORE)) == TX_CACHE_IGNORE)
return; /* nothing more to do here *... | [
"CWE-200"
] | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | 134270212007884860327924935026417896618 | 178,013 | 158,038 | The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. |
false | parse_fond( char* fond_data,
short* have_sfnt,
ResID* sfnt_id,
Str255 lwfn_file_name,
short face_index )
{
AsscEntry* assoc;
AsscEntry* base_assoc;
FamRec* fond;
*sfnt_id = 0;
*have_sfnt = 0;
lwfn_file_nam... | [
"CWE-119"
] | savannah | 18a8f0d9943369449bc4de92d411c78fb08d616c | 233045259701863811358636688341910118112 | 178,014 | 179 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
true | parse_fond( char* fond_data,
short* have_sfnt,
ResID* sfnt_id,
Str255 lwfn_file_name,
short face_index )
{
AsscEntry* assoc;
AsscEntry* base_assoc;
FamRec* fond;
*sfnt_id = 0;
*have_sfnt = 0;
lwfn_file_nam... | [
"CWE-119"
] | savannah | 18a8f0d9943369449bc4de92d411c78fb08d616c | 183885571031352663780341239821456219872 | 178,014 | 158,039 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
false | pcf_read_TOC( FT_Stream stream,
PCF_Face face )
{
FT_Error error;
PCF_Toc toc = &face->toc;
PCF_Table tables;
FT_Memory memory = FT_FACE( face )->memory;
FT_UInt n;
if ( FT_STREAM_SEEK ( 0 ) ||
FT_STREAM_READ_FIELDS ( pcf_toc_... | [
"Other"
] | savannah | 0e2f5d518c60e2978f26400d110eff178fa7e3c3 | 99642060190973035507344569907798525276 | 178,015 | 180 | Unknown |
true | pcf_read_TOC( FT_Stream stream,
PCF_Face face )
{
FT_Error error;
PCF_Toc toc = &face->toc;
PCF_Table tables;
FT_Memory memory = FT_FACE( face )->memory;
FT_UInt n;
if ( FT_STREAM_SEEK ( 0 ) ||
FT_STREAM_READ_FIELDS ( pcf_toc_... | [
"Other"
] | savannah | 0e2f5d518c60e2978f26400d110eff178fa7e3c3 | 120181984767274459897673942388200420729 | 178,015 | 158,040 | Unknown |
false | pcf_get_encodings( FT_Stream stream,
PCF_Face face )
{
FT_Error error;
FT_Memory memory = FT_FACE( face )->memory;
FT_ULong format, size;
int firstCol, lastCol;
int firstRow, lastRow;
int nencoding, encodingOffset;
int ... | [
"CWE-189"
] | savannah | ef1eba75187adfac750f326b563fe543dd5ff4e6 | 176043909406430594682157391299639166951 | 178,016 | 181 | This weakness involves numeric computation errors, such as integer overflows, underflows, or precision losses, which can lead to miscalculations and exploitable behaviors in software. |
true | pcf_get_encodings( FT_Stream stream,
PCF_Face face )
{
FT_Error error;
FT_Memory memory = FT_FACE( face )->memory;
FT_ULong format, size;
int firstCol, lastCol;
int firstRow, lastRow;
int nencoding, encodingOffset;
int ... | [
"CWE-189"
] | savannah | ef1eba75187adfac750f326b563fe543dd5ff4e6 | 65067616049209972384721953510505056376 | 178,016 | 158,041 | This weakness involves numeric computation errors, such as integer overflows, underflows, or precision losses, which can lead to miscalculations and exploitable behaviors in software. |
false | tt_cmap8_validate( FT_Byte* table,
FT_Validator valid )
{
FT_Byte* p = table + 4;
FT_Byte* is32;
FT_UInt32 length;
FT_UInt32 num_groups;
if ( table + 16 + 8192 > valid->limit )
FT_INVALID_TOO_SHORT;
length = TT_NEXT_ULONG( p );
if ( length > (FT_... | [
"CWE-125"
] | savannah | 602040b1112c9f94d68e200be59ea7ac3d104565 | 66140172033877381862359087550042336117 | 178,017 | 182 | The product reads data past the end, or before the beginning, of the intended buffer. |
true | tt_cmap8_validate( FT_Byte* table,
FT_Validator valid )
{
FT_Byte* p = table + 4;
FT_Byte* is32;
FT_UInt32 length;
FT_UInt32 num_groups;
if ( table + 16 + 8192 > valid->limit )
FT_INVALID_TOO_SHORT;
length = TT_NEXT_ULONG( p );
if ( length > (FT_... | [
"CWE-125"
] | savannah | 602040b1112c9f94d68e200be59ea7ac3d104565 | 38750717614291197402358423374039633408 | 178,017 | 158,042 | The product reads data past the end, or before the beginning, of the intended buffer. |
false | tt_sbit_decoder_init( TT_SBitDecoder decoder,
TT_Face face,
FT_ULong strike_index,
TT_SBit_MetricsRec* metrics )
{
FT_Error error;
FT_Stream stream = face->root.stream;
FT_ULong ebdt_size;
... | [
"CWE-189"
] | savannah | 257c270bd25e15890190a28a1456e7623bba4439 | 275985852182915999395742860178488690228 | 178,018 | 183 | This weakness involves numeric computation errors, such as integer overflows, underflows, or precision losses, which can lead to miscalculations and exploitable behaviors in software. |
true | tt_sbit_decoder_init( TT_SBitDecoder decoder,
TT_Face face,
FT_ULong strike_index,
TT_SBit_MetricsRec* metrics )
{
FT_Error error;
FT_Stream stream = face->root.stream;
FT_ULong ebdt_size;
... | [
"CWE-189"
] | savannah | 257c270bd25e15890190a28a1456e7623bba4439 | 318862796718235578447679874450835905734 | 178,018 | 158,043 | This weakness involves numeric computation errors, such as integer overflows, underflows, or precision losses, which can lead to miscalculations and exploitable behaviors in software. |
false | T42_Face_Init( FT_Stream stream,
FT_Face t42face, /* T42_Face */
FT_Int face_index,
FT_Int num_params,
FT_Parameter* params )
{
T42_Face face = (T42_Face)t42face;
FT_Error error;
... | [
"Other"
] | savannah | 42fcd6693ec7bd6ffc65ddc63e74287a65dda669 | 284802888516693989399704178152042676324 | 178,032 | 194 | Unknown |
true | T42_Face_Init( FT_Stream stream,
FT_Face t42face, /* T42_Face */
FT_Int face_index,
FT_Int num_params,
FT_Parameter* params )
{
T42_Face face = (T42_Face)t42face;
FT_Error error;
... | [
"Other"
] | savannah | 42fcd6693ec7bd6ffc65ddc63e74287a65dda669 | 100505017364303463134091394368659811948 | 178,032 | 158,054 | Unknown |
false | tt_face_load_kern( TT_Face face,
FT_Stream stream )
{
FT_Error error;
FT_ULong table_size;
FT_Byte* p;
FT_Byte* p_limit;
FT_UInt nn, num_tables;
FT_UInt32 avail = 0, ordered = 0;
/* the kern table is optional; exit silently if it is missing */
e... | [
"CWE-125"
] | savannah | f70d9342e65cd2cb44e9f26b6d7edeedf191fc6c | 223904594839516096150742880543791775725 | 178,037 | 199 | The product reads data past the end, or before the beginning, of the intended buffer. |
true | tt_face_load_kern( TT_Face face,
FT_Stream stream )
{
FT_Error error;
FT_ULong table_size;
FT_Byte* p;
FT_Byte* p_limit;
FT_UInt nn, num_tables;
FT_UInt32 avail = 0, ordered = 0;
/* the kern table is optional; exit silently if it is missing */
e... | [
"CWE-125"
] | savannah | f70d9342e65cd2cb44e9f26b6d7edeedf191fc6c | 110539480089627090699040662431508464321 | 178,037 | 158,059 | The product reads data past the end, or before the beginning, of the intended buffer. |
false | tt_sbit_decoder_load_image( TT_SBitDecoder decoder,
FT_UInt glyph_index,
FT_Int x_pos,
FT_Int y_pos )
{
/*
* First, we find the correct strike range that applies to this
* glyph index... | [
"CWE-119"
] | savannah | f0292bb9920aa1dbfed5f53861e7c7a89b35833a | 28994602925432626900683012190657933065 | 178,038 | 200 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
true | tt_sbit_decoder_load_image( TT_SBitDecoder decoder,
FT_UInt glyph_index,
FT_Int x_pos,
FT_Int y_pos )
{
/*
* First, we find the correct strike range that applies to this
* glyph index... | [
"CWE-119"
] | savannah | f0292bb9920aa1dbfed5f53861e7c7a89b35833a | 174846873576513811633114180196953003240 | 178,038 | 158,060 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
false | ps_parser_to_token( PS_Parser parser,
T1_Token token )
{
FT_Byte* cur;
FT_Byte* limit;
FT_Int embed;
token->type = T1_TOKEN_TYPE_NONE;
token->start = NULL;
token->limit = NULL;
/* first of all, skip leading whitespace */
ps_parser_skip_spaces( parser... | [
"CWE-119"
] | savannah | 3774fc08b502c3e685afca098b6e8a195aded6a0 | 328688916561979850895211877372718866822 | 178,047 | 204 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
true | ps_parser_to_token( PS_Parser parser,
T1_Token token )
{
FT_Byte* cur;
FT_Byte* limit;
FT_Int embed;
token->type = T1_TOKEN_TYPE_NONE;
token->start = NULL;
token->limit = NULL;
/* first of all, skip leading whitespace */
ps_parser_skip_spaces( parser... | [
"CWE-119"
] | savannah | 3774fc08b502c3e685afca098b6e8a195aded6a0 | 271086143539799141627769963035955134012 | 178,047 | 158,064 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.