is_vulnerable bool 2
classes | func stringlengths 28 484k | cwe sequencelengths 1 2 | project stringclasses 592
values | commit_id stringlengths 7 44 | hash stringlengths 34 39 | big_vul_idx int64 4.09k 189k ⌀ | idx int64 0 522k | cwe_description stringclasses 81
values |
|---|---|---|---|---|---|---|---|---|
false | long ssl_get_algorithm2(SSL *s)
{
long alg2 = s->s3->tmp.new_cipher->algorithm2;
if (TLS1_get_version(s) >= TLS1_2_VERSION &&
alg2 == (SSL_HANDSHAKE_MAC_DEFAULT|TLS1_PRF))
return SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256;
return alg2;
}
| [
"CWE-310"
] | openssl | ca989269a2876bae79393bd54c3e72d49975fc75 | 255087747659226932756944884868284698117 | 177,739 | 0 | This weakness pertains to the use of cryptographic functions that are weak, misconfigured, or outdated, which undermines the intended protection of encrypted data and communications. |
true | long ssl_get_algorithm2(SSL *s)
{
long alg2 = s->s3->tmp.new_cipher->algorithm2;
if (s->method->version == TLS1_2_VERSION &&
alg2 == (SSL_HANDSHAKE_MAC_DEFAULT|TLS1_PRF))
return SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256;
return alg2;
}
| [
"CWE-310"
] | openssl | ca989269a2876bae79393bd54c3e72d49975fc75 | 185448168336389579295943711163093638128 | 177,739 | 157,856 | This weakness pertains to the use of cryptographic functions that are weak, misconfigured, or outdated, which undermines the intended protection of encrypted data and communications. |
false | gnutls_session_get_data (gnutls_session_t session,
void *session_data, size_t * session_data_size)
{
gnutls_datum_t psession;
int ret;
if (session->internals.resumable == RESUME_FALSE)
return GNUTLS_E_INVALID_SESSION;
psession.data = session_data;
ret = _gnutls_session_pack (s... | [
"CWE-119"
] | savannah | 190cef6eed37d0e73a73c1e205eb31d45ab60a3c | 266005388725654386397960628110885023158 | 177,741 | 1 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
true | gnutls_session_get_data (gnutls_session_t session,
void *session_data, size_t * session_data_size)
{
gnutls_datum_t psession;
int ret;
if (session->internals.resumable == RESUME_FALSE)
return GNUTLS_E_INVALID_SESSION;
psession.data = session_data;
ret = _gnutls_session_pack (s... | [
"CWE-119"
] | savannah | 190cef6eed37d0e73a73c1e205eb31d45ab60a3c | 217937088037221829579003352102231694649 | 177,741 | 157,857 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
false | gnutls_session_get_data (gnutls_session_t session,
void *session_data, size_t * session_data_size)
{
gnutls_datum_t psession;
int ret;
if (session->internals.resumable == RESUME_FALSE)
return GNUTLS_E_INVALID_SESSION;
psession.data = session_data;
ret = _gnutls_session_pack (s... | [
"CWE-119"
] | savannah | e82ef4545e9e98cbcb032f55d7c750b81e3a0450 | 162619476999663411812822607346255778028 | 177,742 | 2 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
true | gnutls_session_get_data (gnutls_session_t session,
void *session_data, size_t * session_data_size)
{
gnutls_datum_t psession;
int ret;
if (session->internals.resumable == RESUME_FALSE)
return GNUTLS_E_INVALID_SESSION;
psession.data = session_data;
ret = _gnutls_session_pack (s... | [
"CWE-119"
] | savannah | e82ef4545e9e98cbcb032f55d7c750b81e3a0450 | 282098968981021847575763555214602715866 | 177,742 | 157,858 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
false | getftp (struct url *u, wgint passed_expected_bytes, wgint *qtyread,
wgint restval, ccon *con, int count, wgint *last_expected_bytes,
FILE *warc_tmp)
{
int csock, dtsock, local_sock, res;
uerr_t err = RETROK; /* appease the compiler */
FILE *fp;
char *respline, *tms;
const char *user... | [
"CWE-200"
] | savannah | 075d7556964f5a871a73c22ac4b69f5361295099 | 114753069609161113628525870463495041364 | 177,746 | 3 | The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. |
true | getftp (struct url *u, wgint passed_expected_bytes, wgint *qtyread,
wgint restval, ccon *con, int count, wgint *last_expected_bytes,
FILE *warc_tmp)
{
int csock, dtsock, local_sock, res;
uerr_t err = RETROK; /* appease the compiler */
FILE *fp;
char *respline, *tms;
const char *user... | [
"CWE-200"
] | savannah | 075d7556964f5a871a73c22ac4b69f5361295099 | 230484519226133503077096905290707768008 | 177,746 | 157,859 | The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. |
false | add_range(fz_context *ctx, pdf_cmap *cmap, unsigned int low, unsigned int high, unsigned int out, int check_for_overlap, int many)
{
int current;
cmap_splay *tree;
if (low > high)
{
fz_warn(ctx, "range limits out of range in cmap %s", cmap->cmap_name);
return;
}
tree = cmap->tree;
if (cmap->tlen)
{
uns... | [
"CWE-416"
] | ghostscript | f597300439e62f5e921f0d7b1e880b5c1a1f1607 | 73361849657881456808355395187124534685 | 177,749 | 6 | The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory... |
true | add_range(fz_context *ctx, pdf_cmap *cmap, unsigned int low, unsigned int high, unsigned int out, int check_for_overlap, int many)
{
int current;
cmap_splay *tree;
if (low > high)
{
fz_warn(ctx, "range limits out of range in cmap %s", cmap->cmap_name);
return;
}
tree = cmap->tree;
if (cmap->tlen)
{
uns... | [
"CWE-416"
] | ghostscript | f597300439e62f5e921f0d7b1e880b5c1a1f1607 | 124485393887214475174443050553758560429 | 177,749 | 157,862 | The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory... |
false | add_range(fz_context *ctx, pdf_cmap *cmap, unsigned int low, unsigned int high, unsigned int out, int check_for_overlap, int many)
{
int current;
cmap_splay *tree;
if (low > high)
{
fz_warn(ctx, "range limits out of range in cmap %s", cmap->cmap_name);
return;
}
tree = cmap->tree;
if (cmap->tlen)
{
uns... | [
"CWE-416"
] | ghostscript | 71ceebcf56e682504da22c4035b39a2d451e8ffd | 72963719227623516762803191293835350908 | 177,751 | 8 | The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory... |
true | add_range(fz_context *ctx, pdf_cmap *cmap, unsigned int low, unsigned int high, unsigned int out, int check_for_overlap, int many)
{
int current;
cmap_splay *tree;
if (low > high)
{
fz_warn(ctx, "range limits out of range in cmap %s", cmap->cmap_name);
return;
}
tree = cmap->tree;
if (cmap->tlen)
{
uns... | [
"CWE-416"
] | ghostscript | 71ceebcf56e682504da22c4035b39a2d451e8ffd | 146583299015225488764454157462983427672 | 177,751 | 157,863 | The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory... |
false | pdf_show_image(fz_context *ctx, pdf_run_processor *pr, fz_image *image)
{
pdf_gstate *gstate = pr->gstate + pr->gtop;
fz_matrix image_ctm;
fz_rect bbox;
softmask_save softmask = { NULL };
if (pr->super.hidden)
return;
break;
case PDF_MAT_SHADE:
if (gsta... | [
"CWE-20"
] | ghostscript | b2e7d38e845c7d4922d05e6e41f3a2dc1bc1b14a | 327424409628836476675717770567987598130 | 177,752 | 9 | The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly. |
true | pdf_show_image(fz_context *ctx, pdf_run_processor *pr, fz_image *image)
{
pdf_gstate *gstate = pr->gstate + pr->gtop;
fz_matrix image_ctm;
fz_rect bbox;
if (pr->super.hidden)
return;
break;
case PDF_MAT_SHADE:
if (gstate->fill.shade)
{
fz_clip_image_mas... | [
"CWE-20"
] | ghostscript | b2e7d38e845c7d4922d05e6e41f3a2dc1bc1b14a | 103996721370606474168467973808469707242 | 177,752 | 157,864 | The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly. |
false | sparse_dump_region (struct tar_sparse_file *file, size_t i)
{
union block *blk;
off_t bytes_left = file->stat_info->sparse_map[i].numbytes;
if (!lseek_or_error (file, file->stat_info->sparse_map[i].offset))
return false;
while (bytes_left > 0)
{
size_t bufsize = (bytes_left > BLOCKSIZE) ? BLOCKS... | [
"CWE-835"
] | savannah | c15c42ccd1e2377945fd0414eca1a49294bff454 | 265039722963046446329719176641029797849 | 177,768 | 23 | The product contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop. |
true | sparse_dump_region (struct tar_sparse_file *file, size_t i)
{
union block *blk;
off_t bytes_left = file->stat_info->sparse_map[i].numbytes;
if (!lseek_or_error (file, file->stat_info->sparse_map[i].offset))
return false;
while (bytes_left > 0)
{
size_t bufsize = (bytes_left > BLOCKSIZE) ? BLOCKS... | [
"CWE-835"
] | savannah | c15c42ccd1e2377945fd0414eca1a49294bff454 | 67919736298016751923724729486340465129 | 177,768 | 157,878 | The product contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop. |
false | int read_ndx_and_attrs(int f_in, int f_out, int *iflag_ptr, uchar *type_ptr,
char *buf, int *len_ptr)
{
int len, iflags = 0;
struct file_list *flist;
uchar fnamecmp_type = FNAMECMP_FNAME;
int ndx;
read_loop:
while (1) {
ndx = read_ndx(f_in);
if (ndx >= 0)
break;
if (ndx == NDX_DONE)
return... | [
"Other"
] | samba | 70aeb5fddd1b2f8e143276f8d5a085db16c593b9 | 218007185182567162788891557146038450271 | 177,770 | 25 | Unknown |
true | int read_ndx_and_attrs(int f_in, int f_out, int *iflag_ptr, uchar *type_ptr,
char *buf, int *len_ptr)
{
int len, iflags = 0;
struct file_list *flist;
uchar fnamecmp_type = FNAMECMP_FNAME;
int ndx;
read_loop:
while (1) {
ndx = read_ndx(f_in);
if (ndx >= 0)
break;
if (ndx == NDX_DONE)
return... | [
"Other"
] | samba | 70aeb5fddd1b2f8e143276f8d5a085db16c593b9 | 173509734569313928092432437809749954291 | 177,770 | 157,880 | Unknown |
false | int dns_read_name(unsigned char *buffer, unsigned char *bufend,
unsigned char *name, char *destination, int dest_len,
int *offset)
{
int nb_bytes = 0, n = 0;
int label_len;
unsigned char *reader = name;
char *dest = destination;
while (1) {
/* Name compression ... | [
"CWE-835"
] | haproxy | 58df5aea0a0c926b2238f65908f5e9f83d1cca25 | 6381338430754950645676757195002300075 | 177,771 | 26 | The product contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop. |
true | int dns_read_name(unsigned char *buffer, unsigned char *bufend,
unsigned char *name, char *destination, int dest_len,
int *offset, unsigned int depth)
{
int nb_bytes = 0, n = 0;
int label_len;
unsigned char *reader = name;
char *dest = destination;
while (1) {
... | [
"CWE-835"
] | haproxy | 58df5aea0a0c926b2238f65908f5e9f83d1cca25 | 89452639221463286839806233233037284865 | 177,771 | 157,881 | The product contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop. |
false | void SplashOutputDev::drawImage(GfxState *state, Object *ref, Stream *str,
int width, int height,
GfxImageColorMap *colorMap,
int *maskColors, GBool inlineImg) {
double *ctm;
SplashCoord mat[6];
SplashOutImageData imgData;
SplashColorMode srcMode;
SplashImageSource src;
GfxGray gray;
GfxRGB rg... | [
"CWE-189"
] | poppler | 284a92899602daa4a7f429e61849e794569310b5 | 304076538021281751998637961089745244390 | 177,774 | 27 | This weakness involves numeric computation errors, such as integer overflows, underflows, or precision losses, which can lead to miscalculations and exploitable behaviors in software. |
true | void SplashOutputDev::drawImage(GfxState *state, Object *ref, Stream *str,
int width, int height,
GfxImageColorMap *colorMap,
int *maskColors, GBool inlineImg) {
double *ctm;
SplashCoord mat[6];
SplashOutImageData imgData;
SplashColorMode srcMode;
SplashImageSource src;
GfxGray gray;
GfxRGB rg... | [
"CWE-189"
] | poppler | 284a92899602daa4a7f429e61849e794569310b5 | 238370966634441304873792337937568791030 | 177,774 | 157,883 | This weakness involves numeric computation errors, such as integer overflows, underflows, or precision losses, which can lead to miscalculations and exploitable behaviors in software. |
false | void ArthurOutputDev::drawImage(GfxState *state, Object *ref, Stream *str,
int width, int height,
GfxImageColorMap *colorMap,
int *maskColors, GBool inlineImg)
{
unsigned char *buffer;
unsigned int *dest;
int x, y;
ImageStream *imgStr;
Guchar *pix;
int i;
double *ctm;
QMatrix matrix;
int... | [
"CWE-189"
] | poppler | 7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | 145223011821522984832787544024029108709 | 177,775 | 28 | This weakness involves numeric computation errors, such as integer overflows, underflows, or precision losses, which can lead to miscalculations and exploitable behaviors in software. |
true | void ArthurOutputDev::drawImage(GfxState *state, Object *ref, Stream *str,
int width, int height,
GfxImageColorMap *colorMap,
int *maskColors, GBool inlineImg)
{
unsigned char *buffer;
unsigned int *dest;
int x, y;
ImageStream *imgStr;
Guchar *pix;
int i;
double *ctm;
QMatrix matrix;
int... | [
"CWE-189"
] | poppler | 7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | 328681969473388669211085267743237662516 | 177,775 | 157,884 | This weakness involves numeric computation errors, such as integer overflows, underflows, or precision losses, which can lead to miscalculations and exploitable behaviors in software. |
false | DynamicMetadataProvider::DynamicMetadataProvider(const DOMElement* e)
: saml2md::DynamicMetadataProvider(e),
m_verifyHost(XMLHelper::getAttrBool(e, true, verifyHost)),
m_ignoreTransport(XMLHelper::getAttrBool(e, false, ignoreTransport)),
m_encoded(true), m_trust(nullptr)
{
const DOME... | [
"CWE-347"
] | shibboleth | b66cceb0e992c351ad5e2c665229ede82f261b16 | 11538925675754479849567947994472519439 | 177,795 | 40 | The product does not verify, or incorrectly verifies, the cryptographic signature for data. |
true | DynamicMetadataProvider::DynamicMetadataProvider(const DOMElement* e)
: saml2md::DynamicMetadataProvider(e), MetadataProvider(e),
m_verifyHost(XMLHelper::getAttrBool(e, true, verifyHost)),
m_ignoreTransport(XMLHelper::getAttrBool(e, false, ignoreTransport)),
m_encoded(true), m_trust(null... | [
"CWE-347"
] | shibboleth | b66cceb0e992c351ad5e2c665229ede82f261b16 | 313820794002673879698519839177687302127 | 177,795 | 157,898 | The product does not verify, or incorrectly verifies, the cryptographic signature for data. |
false | static int nfs_readlink_req(struct nfs_priv *npriv, struct nfs_fh *fh,
char **target)
{
uint32_t data[1024];
uint32_t *p;
uint32_t len;
struct packet *nfs_packet;
/*
* struct READLINK3args {
* nfs_fh3 symlink;
* };
*
* struct READLINK3resok {
* post_op_attr symlink_attributes;
* nfspath3 d... | [
"CWE-119"
] | pengutronix | 574ce994016107ad8ab0f845a785f28d7eaa5208 | 165064796667373419921312233428470052444 | 177,796 | 41 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
true | static int nfs_readlink_req(struct nfs_priv *npriv, struct nfs_fh *fh,
char **target)
{
uint32_t data[1024];
uint32_t *p;
uint32_t len;
struct packet *nfs_packet;
/*
* struct READLINK3args {
* nfs_fh3 symlink;
* };
*
* struct READLINK3resok {
* post_op_attr symlink_attributes;
* nfspath3 d... | [
"CWE-119"
] | pengutronix | 574ce994016107ad8ab0f845a785f28d7eaa5208 | 52376305515786293225734978443916270796 | 177,796 | 157,899 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
false | static int nfs_readlink_reply(unsigned char *pkt, unsigned len)
{
uint32_t *data;
char *path;
int rlen;
int ret;
ret = rpc_check_reply(pkt, 1);
if (ret)
return ret;
data = (uint32_t *)(pkt + sizeof(struct rpc_reply));
data++;
rlen = ntohl(net_read_uint32(data)); /* new path length */
data++;
... | [
"CWE-119"
] | pengutronix | 84986ca024462058574432b5483f4bf9136c538d | 197742048742816713437466148600234690021 | 177,797 | 42 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
true | static int nfs_readlink_reply(unsigned char *pkt, unsigned len)
{
uint32_t *data;
char *path;
unsigned int rlen;
int ret;
ret = rpc_check_reply(pkt, 1);
if (ret)
return ret;
data = (uint32_t *)(pkt + sizeof(struct rpc_reply));
data++;
rlen = ntohl(net_read_uint32(data)); /* new path length */
... | [
"CWE-119"
] | pengutronix | 84986ca024462058574432b5483f4bf9136c538d | 206056256559243150120680816426898705118 | 177,797 | 157,900 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
false | zsetdevice(i_ctx_t *i_ctx_p)
{
gx_device *dev = gs_currentdevice(igs);
os_ptr op = osp;
int code = 0;
check_write_type(*op, t_device);
if (dev->LockSafetyParams) { /* do additional checking if locked */
if(op->value.pdevice != dev) /* don't allow a different device */
... | [
"Other"
] | ghostscript | 661e8d8fb8248c38d67958beda32f3a5876d0c3f | 340004772641014275916898545695953737482 | 177,810 | 52 | Unknown |
true | zsetdevice(i_ctx_t *i_ctx_p)
{
gx_device *odev = NULL, *dev = gs_currentdevice(igs);
os_ptr op = osp;
int code = dev_proc(dev, dev_spec_op)(dev,
gxdso_current_output_device, (void *)&odev, 0);
if (code < 0)
return code;
check_write_type(*op, t_device);
if (... | [
"Other"
] | ghostscript | 661e8d8fb8248c38d67958beda32f3a5876d0c3f | 59315764021980318626003459290825520793 | 177,810 | 157,910 | Unknown |
false | void sum_update(const char *p, int32 len)
{
switch (cursum_type) {
case CSUM_MD5:
md5_update(&md, (uchar *)p, len);
break;
case CSUM_MD4:
case CSUM_MD4_OLD:
case CSUM_MD4_BUSTED:
if (len + sumresidue < CSUM_CHUNK) {
memcpy(md.buffer + sumresi... | [
"CWE-354"
] | samba | c252546ceeb0925eb8a4061315e3ff0a8c55b48b | 337655106013087126363639454838638190943 | 177,812 | 54 | The product does not validate or incorrectly validates the integrity check values or checksums of a message. This may prevent it from detecting if the data has been modified or corrupted in transmission. |
true | void sum_update(const char *p, int32 len)
{
switch (cursum_type) {
case CSUM_MD5:
md5_update(&md, (uchar *)p, len);
break;
case CSUM_MD4:
case CSUM_MD4_OLD:
case CSUM_MD4_BUSTED:
case CSUM_MD4_ARCHAIC:
if (len + sumresidue < CSUM_CHUNK) {
... | [
"CWE-354"
] | samba | c252546ceeb0925eb8a4061315e3ff0a8c55b48b | 127195280572279640618380038836318413135 | 177,812 | 157,912 | The product does not validate or incorrectly validates the integrity check values or checksums of a message. This may prevent it from detecting if the data has been modified or corrupted in transmission. |
false | char *auth_server(int f_in, int f_out, int module, const char *host,
const char *addr, const char *leader)
{
char *users = lp_auth_users(module);
char challenge[MAX_DIGEST_LEN*2];
char line[BIGPATHBUFLEN];
char **auth_uid_groups = NULL;
int auth_uid_groups_cnt = -1;
const char *err = NULL;
int group_match = ... | [
"CWE-354"
] | samba | 9a480deec4d20277d8e20bc55515ef0640ca1e55 | 98721516615150795159214070101872089036 | 177,813 | 55 | The product does not validate or incorrectly validates the integrity check values or checksums of a message. This may prevent it from detecting if the data has been modified or corrupted in transmission. |
true | char *auth_server(int f_in, int f_out, int module, const char *host,
const char *addr, const char *leader)
{
char *users = lp_auth_users(module);
char challenge[MAX_DIGEST_LEN*2];
char line[BIGPATHBUFLEN];
char **auth_uid_groups = NULL;
int auth_uid_groups_cnt = -1;
const char *err = NULL;
int group_match = ... | [
"CWE-354"
] | samba | 9a480deec4d20277d8e20bc55515ef0640ca1e55 | 143115557888664430123988818349954566324 | 177,813 | 157,913 | The product does not validate or incorrectly validates the integrity check values or checksums of a message. This may prevent it from detecting if the data has been modified or corrupted in transmission. |
false | static int get_next_block(bunzip_data *bd)
{
struct group_data *hufGroup;
int dbufCount, dbufSize, groupCount, *base, *limit, selector,
i, j, runPos, symCount, symTotal, nSelectors, byteCount[256];
int runCnt = runCnt; /* for compiler */
uint8_t uc, symToByte[256], mtfSymbol[256], *selectors;
uint32_t *dbuf... | [
"CWE-190"
] | busybox | 0402cb32df015d9372578e3db27db47b33d5c7b0 | 238413816495536863232825191293924303166 | 177,822 | 62 | The product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value that is too large to store in the associated representation. When this occurs, ... |
true | static int get_next_block(bunzip_data *bd)
{
struct group_data *hufGroup;
int groupCount, *base, *limit, selector,
i, j, symCount, symTotal, nSelectors, byteCount[256];
uint8_t uc, symToByte[256], mtfSymbol[256], *selectors;
uint32_t *dbuf;
unsigned origPtr, t;
unsigned dbufCount, runPos;
unsigned runCnt... | [
"CWE-190"
] | busybox | 0402cb32df015d9372578e3db27db47b33d5c7b0 | 312101605599426186472577359417874735416 | 177,822 | 157,918 | The product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value that is too large to store in the associated representation. When this occurs, ... |
false | BufCompressedFill (BufFilePtr f)
{
CompressedFile *file;
register char_type *stackp, *de_stack;
register char_type finchar;
register code_int code, oldcode, incode;
BufChar *buf, *bufend;
file = (CompressedFile *) f->private;
buf = f->buffer;
bufend = buf + BUFFILESIZE;
stackp... | [
"CWE-119"
] | libxfont | d11ee5886e9d9ec610051a206b135a4cdc1e09a0 | 314816336443270992925734214319385584087 | 177,823 | 63 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
true | BufCompressedFill (BufFilePtr f)
{
CompressedFile *file;
register char_type *stackp, *de_stack;
register char_type finchar;
register code_int code, oldcode, incode;
BufChar *buf, *bufend;
file = (CompressedFile *) f->private;
buf = f->buffer;
bufend = buf + BUFFILESIZE;
stackp... | [
"CWE-119"
] | libxfont | d11ee5886e9d9ec610051a206b135a4cdc1e09a0 | 176288859918527814344787198280161772156 | 177,823 | 157,919 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
false | static int dns_parse_callback(void *c, int rr, const void *data, int len, const void *packet)
{
char tmp[256];
struct dpc_ctx *ctx = c;
switch (rr) {
case RR_A:
if (len != 4) return -1;
ctx->addrs[ctx->cnt].scopeid = 0;
memcpy(ctx->addrs[ctx->cnt++].addr, data, 4);
break;
case RR_AAAA:
if (len != 1... | [
"CWE-119"
] | musl | 45ca5d3fcb6f874bf5ba55d0e9651cef68515395 | 212099417602244187828055587331477277729 | 177,824 | 64 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
true | static int dns_parse_callback(void *c, int rr, const void *data, int len, const void *packet)
{
char tmp[256];
struct dpc_ctx *ctx = c;
if (ctx->cnt >= MAXADDRS) return -1;
switch (rr) {
case RR_A:
if (len != 4) return -1;
ctx->addrs[ctx->cnt].scopeid = 0;
memcpy(ctx->addrs[ctx->cnt++].addr, data, 4);
... | [
"CWE-119"
] | musl | 45ca5d3fcb6f874bf5ba55d0e9651cef68515395 | 60029525500602919860744776503907800398 | 177,824 | 157,920 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
false | bool extractPages (const char *srcFileName, const char *destFileName) {
char pathName[4096];
GooString *gfileName = new GooString (srcFileName);
PDFDoc *doc = new PDFDoc (gfileName, NULL, NULL, NULL);
if (!doc->isOk()) {
error(errSyntaxError, -1, "Could not extract page(s) from damaged file ('{0:s}')", src... | [
"CWE-20"
] | poppler | 61f79b8447c3ac8ab5a26e79e0c28053ffdccf75 | 41887122719404523174993334902149265910 | 177,825 | 65 | The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly. |
true | bool extractPages (const char *srcFileName, const char *destFileName) {
char pathName[4096];
GooString *gfileName = new GooString (srcFileName);
PDFDoc *doc = new PDFDoc (gfileName, NULL, NULL, NULL);
if (!doc->isOk()) {
error(errSyntaxError, -1, "Could not extract page(s) from damaged file ('{0:s}')", src... | [
"CWE-20"
] | poppler | 61f79b8447c3ac8ab5a26e79e0c28053ffdccf75 | 226017378882353720793476700179562068873 | 177,825 | 157,921 | The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly. |
false | bool extractPages (const char *srcFileName, const char *destFileName) {
char pathName[1024];
GooString *gfileName = new GooString (srcFileName);
PDFDoc *doc = new PDFDoc (gfileName, NULL, NULL, NULL);
if (!doc->isOk()) {
error(errSyntaxError, -1, "Could not extract page(s) from damaged file ('{0:s}')",... | [
"CWE-119"
] | poppler | b8682d868ddf7f741e93b791588af0932893f95c | 244634780333143587019078565382798831655 | 177,826 | 66 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
End of preview. Expand in Data Studio
README.md exists but content is empty.
- Downloads last month
- 37