Dataset Viewer
Auto-converted to Parquet Duplicate
instance_id
string
description
string
exploit(poc)_url
string
patch_url
string
weakness_enumeration
string
github_repo
string
base_commit
string
developers_patch
string
bug_report
string
sanitizer_report
string
sanitizer
string
github_issue
string
nvd_url
string
minimized_patch
string
njs.cve-2022-32414
Nginx NJS v0.7.2 was discovered to contain a segmentation violation in the function njs_vmcode_interpreter at src/njs_vmcode.c.
https://github.com/nginx/njs/issues/483
https://github.com/nginx/njs/commit/31ed93a5623f24ca94e6d47e895ba735d9d97d46
CWE-416
nginx/njs
31ed93a5623f24ca94e6d47e895ba735d9d97d46~1
diff --git a/src/njs_promise.c b/src/njs_promise.c index 52ae5b570..ea162d533 100644 --- a/src/njs_promise.c +++ b/src/njs_promise.c @@ -1369,6 +1369,10 @@ njs_promise_perform_all_handler(njs_vm_t *vm, njs_iterator_args_t *args, njs_promise_all_context_t *context; njs_promise_iterator_args_t *pargs; + ...
https://github.com/nginx/njs/issues/483
AddressSanitizer:DEADLYSIGNAL ================================================================= ==732128==ERROR: AddressSanitizer: SEGV on unknown address (pc 0x0000004e3e53 bp 0x7ffe6e1f76b0 sp 0x7ffe6e1f6e80 T0) ==732128==The signal is caused by a READ memory access. ==732128==Hint: this fault was caused by a derefer...
=== https://github.com/nginx/njs/issues/483 === Title: SEGV njs_vmcode.c:802:27 in njs_vmcode_interpreter --- Body: ### Environment ``` OS : Linux ubuntu 5.13.0-27-generic #29~20.04.1-Ubuntu SMP Fri Jan 14 00:32:30 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux Commit : f65981b0b8fcf02d69a40bc934803c25c9f607ab V...
https://nvd.nist.gov/vuln/detail/CVE-2022-32414
gpac.cve-2023-5586
NULL Pointer Dereference in GitHub repository gpac/gpac prior to 2.3.0-DEV.
https://huntr.dev/bounties/d2a6ea71-3555-47a6-9b18-35455d103740
https://github.com/gpac/gpac/commit/ca1b48f0abe71bf81a58995d7d75dc27f5a17ddc, https://huntr.dev/bounties/d2a6ea71-3555-47a6-9b18-35455d103740
CWE-476
gpac/gpac
5692dc729491805e0e5f55c21d50ba1e6b19e88e
diff --git a/src/filters/reframe_rawpcm.c b/src/filters/reframe_rawpcm.c index 37decc00e6..406c6638de 100644 --- a/src/filters/reframe_rawpcm.c +++ b/src/filters/reframe_rawpcm.c @@ -360,6 +360,14 @@ GF_Err pcmreframe_process(GF_Filter *filter) } wav_ok = GF_FALSE; } + if (!ctx->ch) { + GF_LOG(GF_LOG_ERRO...
https://nvd.nist.gov/vuln/detail/CVE-2023-5586
mruby.cve-2022-0240
mruby is vulnerable to NULL Pointer Dereference
https://huntr.dev/bounties/5857eced-aad9-417d-864e-0bdf17226cbb
https://github.com/mruby/mruby/commit/31fa3304049fc406a201a72293cce140f0557dca
CWE-476
mruby/mruby
171d32c0071d776207174a40a8fa26def3dbb931
diff --git a/src/class.c b/src/class.c index ec9c648e5d..8751dcaf05 100644 --- a/src/class.c +++ b/src/class.c @@ -357,6 +357,7 @@ prepare_singleton_class(mrb_state *mrb, struct RBasic *o) { struct RClass *sc, *c; + mrb_assert(o->c); if (o->c->tt == MRB_TT_SCLASS) return; sc = MRB_OBJ_ALLOC(mrb, MRB_TT_SCL...
https://nvd.nist.gov/vuln/detail/CVE-2022-0240
diff --git a/src/class.c b/src/class.c index ec9c648e5d..8751dcaf05 100644 --- a/src/class.c +++ b/src/class.c @@ -357,6 +357,7 @@ prepare_singleton_class(mrb_state *mrb, struct RBasic *o) { struct RClass *sc, *c; + mrb_assert(o->c); if (o->c->tt == MRB_TT_SCLASS) return; sc = MRB_OBJ_ALLOC(mrb, MRB_TT_SCL...
njs.cve-2022-28049
NGINX NJS 0.7.2 was discovered to contain a NULL pointer dereference via the component njs_vmcode_array at /src/njs_vmcode.c.
https://github.com/nginx/njs/issues/473
https://github.com/nginx/njs/commit/f65981b0b8fcf02d69a40bc934803c25c9f607ab
CWE-476
nginx/njs
f65981b0b8fcf02d69a40bc934803c25c9f607ab~1
diff --git a/src/njs_vmcode.c b/src/njs_vmcode.c index ef0beb5e0..ec478659c 100644 --- a/src/njs_vmcode.c +++ b/src/njs_vmcode.c @@ -1055,14 +1055,16 @@ njs_vmcode_array(njs_vm_t *vm, u_char *pc) if (code->ctor) { /* Array of the form [,,,], [1,,]. */ - value = array->start; - ...
https://github.com/nginx/njs/issues/473
INFO: Seed: 2125423890 INFO: Loaded 1 modules (53334 inline 8-bit counters): 53334 [0x95f010, 0x96c066), INFO: Loaded 1 PC tables (53334 PCs): 53334 [0x96c068,0xa3c5c8), /out/njs_process_script_fuzzer: Running 1 inputs 1 time(s) each. Running: crashes/njs_njs_process_script_fuzzer/id:000002,sig:06,src:001260+005121...
=== https://github.com/nginx/njs/issues/473 === Title: Null pointer dereference in src/njs_vmcode.c:1049:17 --- Body: Hi, this bug was found by fuzzing the current master branch, to reproduce build the OSS-Fuzz harness with ASan and UBSan. The bug is a write to a NULL pointer, this is the sanitizer report: ```...
https://nvd.nist.gov/vuln/detail/CVE-2022-28049
njs.cve-2022-38890
Nginx NJS v0.7.7 was discovered to contain a segmentation violation via njs_utf8_next at src/njs_utf8.h
https://github.com/nginx/njs/issues/569
https://github.com/nginx/njs/commit/b9aea5854bcf6f2de8f7a7f1550874e392b94be2
CWE-125
nginx/njs
b9aea5854bcf6f2de8f7a7f1550874e392b94be2~1
diff --git a/src/njs_string.c b/src/njs_string.c index 83cede548..62bece0de 100644 --- a/src/njs_string.c +++ b/src/njs_string.c @@ -2849,6 +2849,7 @@ njs_string_trim(const njs_value_t *value, njs_string_prop_t *string, for ( ;; ) { if (start == prev) { + end = prev; ...
https://github.com/nginx/njs/issues/569
AddressSanitizer:DEADLYSIGNAL ================================================================= ==1550478==ERROR: AddressSanitizer: SEGV on unknown address 0x6170bebedece (pc 0x000000505f0e bp 0x7fff88dc8f70 sp 0x7fff88dc8e40 T0) ==1550478==The signal is caused by a READ memory access. #0 0x505f0e in njs_utf8_next ...
=== https://github.com/nginx/njs/issues/569 === Title: Another way to trigger SEGV in njs_utf8_next cause oob read --- Body: the call stack is different with https://github.com/nginx/njs/issues/522 ``` Environment commit: 569292e0a74f2b1ec09566f3329f82bdd0d58e87 version: 0.7.7 Build : ./configure --cc=c...
https://nvd.nist.gov/vuln/detail/CVE-2022-38890
libredwg.cve-2020-21816
A heab based buffer overflow issue exists in GNU LibreDWG 0.10.2641 via htmlescape ../../programs/escape.c:46.
https://github.com/LibreDWG/libredwg/issues/182#issuecomment-572890865
https://github.com/LibreDWG/libredwg/commit/7e4c59b63d9c5b4b513cba1d0f33612042524563
CWE-787
LibreDWG/libredwg
7b9cb829f93d1c1f67584345ed65ea830de8bdda
diff --git a/programs/escape.c b/programs/escape.c index 8a907414e0..4d409ea43f 100644 --- a/programs/escape.c +++ b/programs/escape.c @@ -27,42 +27,74 @@ char * ATTRIBUTE_MALLOC htmlescape (const char *restrict src, const int cp) { int len; - char *dest, *d; + char *dest, *d, *end; unsigned char *s; if (!...
https://github.com/LibreDWG/libredwg/issues/182#issuecomment-572890865
=== https://github.com/LibreDWG/libredwg/issues/182#issuecomment-572890865 === Title: Several bugs found by fuzzing --- Body: Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: ./dwg2SVG $PoC **1.NULL pointer dereference in htmlescape ../../programs/escape.c:29** POC: ...
https://nvd.nist.gov/vuln/detail/CVE-2020-21816
diff --git a/programs/escape.c b/programs/escape.c index 8a907414e0..4d409ea43f 100644 --- a/programs/escape.c +++ b/programs/escape.c @@ -27,42 +27,74 @@ char * ATTRIBUTE_MALLOC htmlescape (const char *restrict src, const int cp) { int len; - char *dest, *d; + char *dest, *d, *end; unsigned char *s; if (!...
gpac.cve-2023-46929
An issue discovered in GPAC 2.3-DEV-rev605-gfc9e29089-master in MP4Box in gf_avc_change_vui /afltest/gpac/src/media_tools/av_parsers.c:6872:55 allows attackers to crash the application.
https://github.com/gpac/gpac/issues/2662
https://github.com/gpac/gpac/commit/4248def5d24325aeb0e35cacde3d56c9411816a6
CWE-20
gpac/gpac
4248def5d24325aeb0e35cacde3d56c9411816a6~1
diff --git a/src/media_tools/av_parsers.c b/src/media_tools/av_parsers.c index 43c3200b90..84e6601b64 100644 --- a/src/media_tools/av_parsers.c +++ b/src/media_tools/av_parsers.c @@ -6865,6 +6865,9 @@ GF_Err gf_avc_change_vui(GF_AVCConfig *avcc, GF_VUIInfo *vui_info) GF_AVCConfigSlot *slc; orig = NULL; + if (!avc...
https://github.com/gpac/gpac/issues/2662
AddressSanitizer:DEADLYSIGNAL ================================================================= ==3037856==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000008 (pc 0x7ffff67d35c7 bp 0x7ffffffec090 sp 0x7ffffffe29c0 T0) ==3037856==The signal is caused by a READ memory access. ==3037856==Hint: address points t...
=== https://github.com/gpac/gpac/issues/2662 === Title: SEGV in MP4Box in gf_avc_change_vui /afltest/gpac/src/media_tools/av_parsers.c:6872:55 --- Body: # SEGV in MP4Box ### Description SEGV in gpac/MP4Box. #0 0x7ffff67d35c7 in gf_avc_change_vui /afltest/gpac/src/media_tools/av_parsers.c:6872:55 ### Versi...
https://nvd.nist.gov/vuln/detail/CVE-2023-46929
gpac.cve-2024-0321
Stack-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.3-DEV.
https://huntr.com/bounties/4c027b94-8e9c-4c31-a169-893b25047769
https://github.com/gpac/gpac/commit/d0ced41651b279bb054eb6390751e2d4eb84819a
CWE-121, CWE-787
gpac/gpac
d0ced41651b279bb054eb6390751e2d4eb84819a~1
diff --git a/src/filters/load_text.c b/src/filters/load_text.c index 6373398228..877b285a80 100644 --- a/src/filters/load_text.c +++ b/src/filters/load_text.c @@ -377,6 +377,10 @@ char *gf_text_get_utf8_line(char *szLine, u32 lineSize, FILE *txt_in, s32 unicod GF_LOG(GF_LOG_DEBUG, GF_LOG_PARSER, ("[TXTIn] Line too ...
https://nvd.nist.gov/vuln/detail/CVE-2024-0321
libarchive.cve-2017-14503
libarchive 3.3.2 suffers from an out-of-bounds read within lha_read_data_none() in archive_read_support_format_lha.c when extracting a specially crafted lha archive, related to lha_crc16.
https://github.com/libarchive/libarchive/commit/2c8c83b9731ff822fad6cc8c670ea5519c366a14
CWE-125
libarchive/libarchive
2c8c83b9731ff822fad6cc8c670ea5519c366a14~1
diff --git a/libarchive/archive_read_support_format_lha.c b/libarchive/archive_read_support_format_lha.c index b8ef4ae10e..95c99bb1f3 100644 --- a/libarchive/archive_read_support_format_lha.c +++ b/libarchive/archive_read_support_format_lha.c @@ -701,6 +701,12 @@ archive_read_format_lha_read_header(struct archive_read ...
https://bugs.debian.org/875960, https://github.com/libarchive/libarchive/issues/948
==21722==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x631000024800 at pc 0x56536be61878 bp 0x7fffa2254ec0 sp 0x7fffa2254eb8 READ of size 2 at 0x631000024800 thread T0 #0 0x56536be61877 in lha_crc16 libarchive/archive_read_support_format_lha.c:1740 #1 0x56536be5f791 in lha_read_data_none libarchive...
ASan (inferred)
=== https://github.com/libarchive/libarchive/issues/948 === Title: out-of-bounds read in lha_read_data_none() --- Body: Hi The following was reported downstream in Debian at https://bugs.debian.org/875960 The `oob.lha` base64 encoded is: ```` YQAtbGgwLQwAAAAMAAAAADs9SyACeJdNBwBh5AQAAAwAAWhlbGxvLnR4dBMAQv9zd...
https://nvd.nist.gov/vuln/detail/CVE-2017-14503
gpac.cve-2023-0760
Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to V2.1.0-DEV.
https://github.com/gpac/gpac/commit/ea7395f39f601a7750d48d606e9d10ea0b7beefe, https://huntr.dev/bounties/d06223df-a473-4c82-96d0-23726b844b21
https://github.com/gpac/gpac/commit/ea7395f39f601a7750d48d606e9d10ea0b7beefe, https://huntr.dev/bounties/d06223df-a473-4c82-96d0-23726b844b21
CWE-122, CWE-787
gpac/gpac
ea7395f39f601a7750d48d606e9d10ea0b7beefe~1
diff --git a/src/isomedia/box_code_base.c b/src/isomedia/box_code_base.c index baf07ff352..9a9ad09b45 100644 --- a/src/isomedia/box_code_base.c +++ b/src/isomedia/box_code_base.c @@ -4429,7 +4429,7 @@ GF_Err video_sample_entry_box_size(GF_Box *s) /*VVC*/ gf_isom_check_position(s, (GF_Box *)ptr->vvc_config, &pos);...
https://huntr.dev/bounties/d06223df-a473-4c82-96d0-23726b844b21
https://nvd.nist.gov/vuln/detail/CVE-2023-0760
diff --git a/src/isomedia/box_code_base.c b/src/isomedia/box_code_base.c index baf07ff352..9a9ad09b45 100644 --- a/src/isomedia/box_code_base.c +++ b/src/isomedia/box_code_base.c @@ -9983,6 +9983,9 @@ static void *sgpd_parse_entry(u32 grouping_type, GF_BitStream *bs, s32 bytes_in_ } return ptr; } + case 0: + G...
njs.cve-2022-31307
Nginx NJS v0.7.2 was discovered to contain a segmentation violation in the function njs_string_offset at src/njs_string.c.
https://github.com/nginx/njs/issues/482
https://github.com/nginx/njs/commit/eafe4c7a326b163612f10861392622b5da5b1792
CWE-416
nginx/njs
eafe4c7a326b163612f10861392622b5da5b1792~1
diff --git a/src/njs_iterator.c b/src/njs_iterator.c index 90c3046fb..043e4483c 100644 --- a/src/njs_iterator.c +++ b/src/njs_iterator.c @@ -560,11 +560,14 @@ njs_object_iterate_reverse(njs_vm_t *vm, njs_iterator_args_t *args, } else { /* UTF-8 string. */ - p = njs_string_offset(strin...
https://github.com/nginx/njs/issues/482
AddressSanitizer:DEADLYSIGNAL ================================================================= ==732134==ERROR: AddressSanitizer: SEGV on unknown address (pc 0x0000004f44ab bp 0x7ffee1c1f9b0 sp 0x7ffee1c1f9b0 T0) ==732134==The signal is caused by a READ memory access. ==732134==Hint: this fault was caused by a derefer...
=== https://github.com/nginx/njs/issues/482 === Title: SEGV njs_string.c:2535:18 in njs_string_offset --- Body: ### Environment ``` OS : Linux ubuntu 5.13.0-27-generic #29~20.04.1-Ubuntu SMP Fri Jan 14 00:32:30 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux Commit : f65981b0b8fcf02d69a40bc934803c25c9f607ab Versi...
https://nvd.nist.gov/vuln/detail/CVE-2022-31307
njs.cve-2021-46462
njs through 0.7.1, used in NGINX, was discovered to contain a segmentation violation via njs_object_set_prototype in /src/njs_object.c.
https://github.com/nginx/njs/issues/449
https://github.com/nginx/njs/commit/39e8fa1b7db1680654527f8fa0e9ee93b334ecba, https://github.com/nginx/njs/issues/449
nginx/njs
39e8fa1b7db1680654527f8fa0e9ee93b334ecba~1
diff --git a/src/njs_function.c b/src/njs_function.c index 0c23ca05c..ae0fa11ff 100644 --- a/src/njs_function.c +++ b/src/njs_function.c @@ -1385,18 +1385,10 @@ njs_function_prototype_apply(njs_vm_t *vm, njs_value_t *args, njs_uint_t nargs, if (njs_is_null_or_undefined(arr_like)) { length = 0; - - ...
https://github.com/nginx/njs/issues/449
AddressSanitizer:DEADLYSIGNAL ================================================================= ==466519==ERROR: AddressSanitizer: SEGV on unknown address (pc 0x00000050d6d4 bp 0x7ffc8e2432f0 sp 0x7ffc8e2432e0 T0) ==466519==The signal is caused by a READ memory access. ==466519==Hint: this fault was caused by a derefer...
=== https://github.com/nginx/njs/issues/449 === Title: SEGV /njs/src/njs_object.c:2136:24 in njs_object_set_prototype --- Body: ## Env ``` Version : 0.7.0 Git Commit : 2da5d8b246b806bee6f74b575217ec3b61a25548 OS : Ubuntu 20.04 Configure : ./configure --address-sanitizer=YES ``` ## POC ``` functio...
https://nvd.nist.gov/vuln/detail/CVE-2021-46462
diff --git a/src/njs_function.c b/src/njs_function.c index 0c23ca05c..ae0fa11ff 100644 --- a/src/njs_function.c +++ b/src/njs_function.c @@ -1385,18 +1385,10 @@ njs_function_prototype_apply(njs_vm_t *vm, njs_value_t *args, njs_uint_t nargs, if (njs_is_null_or_undefined(arr_like)) { length = 0; - - ...
njs.cve-2022-29779
Nginx NJS v0.7.2 was discovered to contain a segmentation violation in the function njs_value_own_enumerate at src/njs_value.c.
https://github.com/nginx/njs/issues/485
https://github.com/nginx/njs/commit/2e00e95473861846aa8538be87db07699d9f676d
nginx/njs
2e00e95473861846aa8538be87db07699d9f676d~1
diff --git a/src/njs_array.c b/src/njs_array.c index 0b8c7b919..2ceb6be7e 100644 --- a/src/njs_array.c +++ b/src/njs_array.c @@ -1284,6 +1284,11 @@ njs_array_prototype_splice(njs_vm_t *vm, njs_value_t *args, njs_uint_t nargs, if (njs_slow_path(ret == NJS_ERROR)) { return ret; ...
https://github.com/nginx/njs/issues/485
AddressSanitizer:DEADLYSIGNAL ================================================================= ==2523460==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x555b64452f1c bp 0x7ffdcdd97650 sp 0x7ffdcdd97520 T0) ==2523460==The signal is caused by a READ memory access. ==2523460==Hint: address points t...
=== https://github.com/nginx/njs/issues/485 === Title: SEGV src/njs_value.c:240 in njs_value_own_enumerate --- Body: # Environment OS : Linux leanderwang-LC2 5.13.0-30-generic https://github.com/nginx/njs/issues/33 SMP Mon Feb 7 14:25:10 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux Commit : https://github.com/nginx/njs/...
https://nvd.nist.gov/vuln/detail/CVE-2022-29779
njs.cve-2022-29369
Nginx NJS v0.7.2 was discovered to contain a segmentation violation via njs_lvlhsh_bucket_find at njs_lvlhsh.c.
https://github.com/nginx/njs/commit/222d6fdcf0c6485ec8e175f3a7b70d650c234b4e
CWE-754
nginx/njs
222d6fdcf0c6485ec8e175f3a7b70d650c234b4e~1
diff --git a/src/njs_vmcode.c b/src/njs_vmcode.c index 0b07ec67e..6b10200ee 100644 --- a/src/njs_vmcode.c +++ b/src/njs_vmcode.c @@ -700,7 +700,7 @@ njs_vmcode_interpreter(njs_vm_t *vm, u_char *pc, void *promise_cap, ret = njs_object_prop_define(vm, value1, &name, function, ...
https://github.com/nginx/njs/issues/467
AddressSanitizer:DEADLYSIGNAL ================================================================= ==2064577==ERROR: AddressSanitizer: SEGV on unknown address (pc 0x0000004cac48 bp 0x7ffcc1edfbf0 sp 0x7ffcc1edfbb0 T0) ==2064577==The signal is caused by a READ memory access. ==2064577==Hint: this fault was caused by a dere...
=== https://github.com/nginx/njs/issues/467 === Title: SEGV njs_lvlhsh.c:231:17 in njs_lvlhsh_bucket_find --- Body: ### Environment ``` OS : Linux ubuntu 5.13.0-27-generic #29~20.04.1-Ubuntu SMP Fri Jan 14 00:32:30 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux Commit : 7bd570b39297d3d91902c93a624c89b08be7a6fe V...
https://nvd.nist.gov/vuln/detail/CVE-2022-29369
mruby.cve-2022-1201
NULL Pointer Dereference in mrb_vm_exec with super in GitHub repository mruby/mruby prior to 3.2. This vulnerability is capable of making the mruby interpreter crash, thus affecting the availability of the system.
https://huntr.dev/bounties/6f930add-c9d8-4870-ae56-d4bd8354703b
https://github.com/mruby/mruby/commit/00acae117da1b45b318dc36531a7b0021b8097ae
CWE-476
mruby/mruby
00acae117da1b45b318dc36531a7b0021b8097ae~1
diff --git a/src/vm.c b/src/vm.c index 77edbb38fc..3bb9510ec1 100644 --- a/src/vm.c +++ b/src/vm.c @@ -1749,7 +1749,7 @@ mrb_vm_exec(mrb_state *mrb, const struct RProc *proc, const mrb_code *pc) } else if (target_class->tt == MRB_TT_MODULE) { target_class = mrb_vm_ci_target_class(ci); - if...
https://nvd.nist.gov/vuln/detail/CVE-2022-1201
faad2.cve-2018-20198
A NULL pointer dereference was discovered in ifilter_bank of libfaad/filtbank.c in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8. The vulnerability causes a segmentation fault and application crash, which leads to denial of service because adding to windowed output is mishandled in the LONG_START_SEQUENCE case.
https://github.com/fantasy7082/image_test/blob/master/002-null-point-filtbank_246
https://github.com/knik0/faad2/commit/466b01d504d7e45f1e9169ac90b3e34ab94aed14
CWE-476
knik0/faad2
466b01d504d7e45f1e9169ac90b3e34ab94aed14~1
diff --git a/libfaad/syntax.c b/libfaad/syntax.c index f8e808c2..e7fb1138 100644 --- a/libfaad/syntax.c +++ b/libfaad/syntax.c @@ -344,6 +344,12 @@ static void decode_sce_lfe(NeAACDecStruct *hDecoder, can become 2 when some form of Parametric Stereo coding is used */ + if (hDecoder->frame && hDecoder-...
https://github.com/knik0/faad2/issues/23, https://seclists.org/bugtraq/2019/Sep/28
./faad faad_res/002-null-point-filtbank_246 -o out.wav *********** Ahead Software MPEG-4 AAC Decoder V2.8.8 ****************** Build: Dec 13 2018 Copyright 2002-2004: Ahead Software AG http://www.audiocoding.com bug tracking: https://sourceforge.net/p/faac/bugs/ Floating point version This program is free soft...
=== https://github.com/knik0/faad2/issues/23 === Title: Null pointer dereference vulnerability in ifilter_bank(libfaad/filtbank.c:246) --- Body: Hi, i found a null pointer dereference bug in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8. It crashed in function ifilter_bank.the details are below(ASAN): ``` ./faa...
https://nvd.nist.gov/vuln/detail/CVE-2018-20198
diff --git a/libfaad/syntax.c b/libfaad/syntax.c index f8e808c2..e7fb1138 100644 --- a/libfaad/syntax.c +++ b/libfaad/syntax.c @@ -344,6 +344,12 @@ static void decode_sce_lfe(NeAACDecStruct *hDecoder, can become 2 when some form of Parametric Stereo coding is used */ + if (hDecoder->frame && hDecoder-...
mruby.cve-2022-1427
Out-of-bounds Read in mrb_obj_is_kind_of in in GitHub repository mruby/mruby prior to 3.2. # Impact: Possible arbitrary code execution if being exploited.
https://huntr.dev/bounties/23b6f0a9-64f5-421e-a55f-b5b7a671f301
https://github.com/mruby/mruby/commit/a4d97934d51cb88954cc49161dc1d151f64afb6b
CWE-125
mruby/mruby
a4d97934d51cb88954cc49161dc1d151f64afb6b~1
diff --git a/src/vm.c b/src/vm.c index 5013c877d4..aa043b06ae 100644 --- a/src/vm.c +++ b/src/vm.c @@ -1750,10 +1750,7 @@ mrb_vm_exec(mrb_state *mrb, const struct RProc *proc, const mrb_code *pc) mrb_exc_set(mrb, exc); goto L_RAISE; } - if (target_class->flags & MRB_FL_CLASS_IS_PREPENDED) ...
ASan (inferred)
https://nvd.nist.gov/vuln/detail/CVE-2022-1427
gpac.cve-2023-48013
GPAC v2.3-DEV-rev566-g50c2ab06f-master was discovered to contain a double free via the gf_filterpacket_del function at /gpac/src/filter_core/filter.c.
https://github.com/gpac/gpac/issues/2612
https://github.com/gpac/gpac/commit/cd8a95c1efb8f5bfc950b86c2ef77b4c76f6b893
CWE-415
gpac/gpac
cd8a95c1efb8f5bfc950b86c2ef77b4c76f6b893~1
diff --git a/src/filters/isoffin_read_ch.c b/src/filters/isoffin_read_ch.c index bd96400689..6e74ce8e3f 100644 --- a/src/filters/isoffin_read_ch.c +++ b/src/filters/isoffin_read_ch.c @@ -395,6 +395,8 @@ void isor_reader_get_sample(ISOMChannel *ch) if (ch->edit_sync_frame) { ch->edit_sync_frame++; if (ch->...
https://github.com/gpac/gpac/issues/2612
==827317==ERROR: AddressSanitizer: attempting double-free on 0x619000015980 in thread T0: #0 0x55e7797a5972 in free (/home/user/fuzzing_gpac/gpac/bin/gcc/MP4Box+0x105972) (BuildId: 53333ca7bff59dd9a3d1b2821e7c5f3a9aac76b9) #1 0x7f525cd97945 in gf_filterpacket_del /home/user/fuzzing_gpac/gpac/src/filter_core/fil...
=== https://github.com/gpac/gpac/issues/2612 === Title: double-free in gf_filterpacket_del /home/user/fuzzing_gpac/gpac/src/filter_core/filter.c:38:17 --- Body: # Version ``` $ ./MP4Box -version MP4Box - GPAC version 2.3-DEV-rev566-g50c2ab06f-master ``` # Platform ``` $ uname -a Linux user-GE40-2PC-Dragon-E...
https://nvd.nist.gov/vuln/detail/CVE-2023-48013
diff --git a/src/filters/isoffin_read_ch.c b/src/filters/isoffin_read_ch.c index bd96400689..6e74ce8e3f 100644 --- a/src/filters/isoffin_read_ch.c +++ b/src/filters/isoffin_read_ch.c @@ -395,6 +395,8 @@ void isor_reader_get_sample(ISOMChannel *ch) if (ch->edit_sync_frame) { ch->edit_sync_frame++; if (ch->...
gpac.cve-2023-48011
GPAC v2.3-DEV-rev566-g50c2ab06f-master was discovered to contain a heap-use-after-free via the flush_ref_samples function at /gpac/src/isomedia/movie_fragments.c.
https://github.com/gpac/gpac/issues/2611
https://github.com/gpac/gpac/commit/c70f49dda4946d6db6aa55588f6a756b76bd84ea
CWE-416
gpac/gpac
c70f49dda4946d6db6aa55588f6a756b76bd84ea~1
diff --git a/src/isomedia/movie_fragments.c b/src/isomedia/movie_fragments.c index b7f7ade327..d665eeb9d0 100644 --- a/src/isomedia/movie_fragments.c +++ b/src/isomedia/movie_fragments.c @@ -591,6 +591,7 @@ u32 UpdateRuns(GF_ISOFile *movie, GF_TrackFragmentBox *traf) while (gf_list_count(traf->TrackRuns)) { trun...
https://github.com/gpac/gpac/issues/2611
==836900==ERROR: AddressSanitizer: heap-use-after-free on address 0x60b000001d88 at pc 0x7f57c0120bf1 bp 0x7ffeac405a70 sp 0x7ffeac405a68 READ of size 8 at 0x60b000001d88 thread T0 #0 0x7f57c0120bf0 in flush_ref_samples /home/user/fuzzing_gpac/gpac/src/isomedia/movie_fragments.c:936:37 #1 0x7f57c0128df2 in gf_i...
ASan (inferred)
=== https://github.com/gpac/gpac/issues/2611 === Title: heap-use-after-free in ./gpac/src/isomedia/movie_fragments.c:936:37 in flush_ref_samples --- Body: # Version ``` $ ./MP4Box -version MP4Box - GPAC version 2.3-DEV-rev566-g50c2ab06f-master ``` # Platform ``` $ uname -a Linux user-GE40-2PC-Dragon-Eyes 6....
https://nvd.nist.gov/vuln/detail/CVE-2023-48011
diff --git a/src/isomedia/movie_fragments.c b/src/isomedia/movie_fragments.c index b7f7ade327..d665eeb9d0 100644 --- a/src/isomedia/movie_fragments.c +++ b/src/isomedia/movie_fragments.c @@ -591,6 +591,7 @@ u32 UpdateRuns(GF_ISOFile *movie, GF_TrackFragmentBox *traf) while (gf_list_count(traf->TrackRuns)) { trun...
libredwg.cve-2021-28237
LibreDWG v0.12.3 was discovered to contain a heap-buffer overflow via decode_preR13.
https://github.com/LibreDWG/libredwg/issues/325
https://github.com/LibreDWG/libredwg/commit/ea0b9522f63d049ded2c3cff8d9a8c360119951c
CWE-787
LibreDWG/libredwg
ea0b9522f63d049ded2c3cff8d9a8c360119951c~1
diff --git a/src/decode.c b/src/decode.c index 444775afd1..79134db0b3 100644 --- a/src/decode.c +++ b/src/decode.c @@ -329,19 +329,20 @@ decode_preR13_section (Dwg_Section_Type_r11 id, Bit_Chain *restrict dat, // TODO: move to a spec dwg_r11.spec, and dwg_decode_r11_NAME #define PREP_TABLE(token) ...
https://github.com/LibreDWG/libredwg/issues/325
➜ ./dwgread ./poc ERROR: This version of LibreDWG is only capable of decoding version r13-r2018 (code: AC1012-AC1032) DWG files. We don't decode many entities and no blocks yet. ERROR: offset -39 ERROR: offset -85 ================================================================= ==12538==ERROR: AddressSanitizer: heap-...
=== https://github.com/LibreDWG/libredwg/issues/325 === Title: Heap-buffer-overflow in decode_preR13 line 470 --- Body: I found a heap buffer overflow in the current master (8072563). # Configure CFLAGS="-g -fsanitize=address" LDFLAGS="-fsanitize=address" ./configure # Command `./dwgread ./poc` # ASAN repo...
https://nvd.nist.gov/vuln/detail/CVE-2021-28237
mruby.cve-2022-0631
Heap-based Buffer Overflow in Homebrew mruby prior to 3.2.
https://huntr.dev/bounties/9bdc49ca-6697-4adc-a785-081e1961bf40
https://github.com/mruby/mruby/commit/47068ae07a5fa3aa9a1879cdfe98a9ce0f339299, https://huntr.dev/bounties/9bdc49ca-6697-4adc-a785-081e1961bf40
CWE-122
mruby/mruby
47068ae07a5fa3aa9a1879cdfe98a9ce0f339299~1
diff --git a/src/vm.c b/src/vm.c index 9cb50847f2..aa5569503e 100644 --- a/src/vm.c +++ b/src/vm.c @@ -689,9 +689,11 @@ mrb_f_send(mrb_state *mrb, mrb_value self) regs = mrb->c->ci->stack+1; if (n == 0) { + argnum_error: mrb_argnum_error(mrb, 0, 1, -1); } else if (n == 15) { + if (RARRAY_LEN(regs...
https://nvd.nist.gov/vuln/detail/CVE-2022-0631
mruby.cve-2022-1934
Use After Free in GitHub repository mruby/mruby prior to 3.2.
https://huntr.dev/bounties/99e6df06-b9f7-4c53-a722-6bb89fbfb51f
https://github.com/mruby/mruby/commit/aa7f98dedb68d735a1665d3a289036c88b0c47ce, https://huntr.dev/bounties/99e6df06-b9f7-4c53-a722-6bb89fbfb51f
CWE-416
mruby/mruby
aa7f98dedb68d735a1665d3a289036c88b0c47ce~1
diff --git a/src/vm.c b/src/vm.c index b04c9d7e58..09e557dc8e 100644 --- a/src/vm.c +++ b/src/vm.c @@ -1159,18 +1159,20 @@ check_target_class(mrb_state *mrb) return target; } +#define regs (mrb->c->ci->stack) + static mrb_value -hash_new_from_values(mrb_state *mrb, mrb_int argc, mrb_value *regs) +hash_new_from_r...
https://nvd.nist.gov/vuln/detail/CVE-2022-1934
njs.cve-2022-34029
Nginx NJS v0.7.4 was discovered to contain an out-of-bounds read via njs_scope_value at njs_scope.h.
https://github.com/nginx/njs/issues/506
https://github.com/nginx/njs/commit/d09868bc71f9a990445959329ad8c1b10d3898f5
CWE-125
nginx/njs
d09868bc71f9a990445959329ad8c1b10d3898f5~1
diff --git a/src/njs_vmcode.c b/src/njs_vmcode.c index 9833ada03..cc33d20b2 100644 --- a/src/njs_vmcode.c +++ b/src/njs_vmcode.c @@ -856,9 +856,15 @@ njs_vmcode_interpreter(njs_vm_t *vm, u_char *pc, void *promise_cap, case NJS_VMCODE_AWAIT: await = (njs_vmcode_await_t *) pc; + ...
https://github.com/nginx/njs/issues/506
AddressSanitizer:DEADLYSIGNAL ================================================================= ==815==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000040 (pc 0x0000004ff20b bp 0x7ffc7abf6030 sp 0x7ffc7abf5880 T0) ==815==The signal is caused by a READ memory access. ==815==Hint: address points to the zero p...
ASan (inferred)
=== https://github.com/nginx/njs/issues/506 === Title: SEGV njs_scope.h:74:12 Out-of-bounds Read in njs_scope_value --- Body: Environment ```OS : Linux ubuntu 5.13.0-27-generic #29~20.04.1-Ubuntu SMP Fri Jan 14 00:32:30 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux Commit : 9f4ebc96148308a8ce12f2b54432c87e6d78b881 ...
https://nvd.nist.gov/vuln/detail/CVE-2022-34029
diff --git a/src/njs_vmcode.c b/src/njs_vmcode.c index 9833ada03..cc33d20b2 100644 --- a/src/njs_vmcode.c +++ b/src/njs_vmcode.c @@ -856,9 +856,15 @@ njs_vmcode_interpreter(njs_vm_t *vm, u_char *pc, void *promise_cap, case NJS_VMCODE_AWAIT: await = (njs_vmcode_await_t *) pc; + ...
libarchive.cve-2019-11463
A memory leak in archive_read_format_zip_cleanup in archive_read_support_format_zip.c in libarchive 3.3.4-dev allows remote attackers to cause a denial of service via a crafted ZIP file because of a HAVE_LZMA_H typo. NOTE: this only affects users who downloaded the development code from GitHub. Users of the product's o...
https://github.com/libarchive/libarchive/issues/1165
https://github.com/libarchive/libarchive/commit/ba641f73f3d758d9032b3f0e5597a9c6e593a505
CWE-401
libarchive/libarchive
ba641f73f3d758d9032b3f0e5597a9c6e593a505~1
diff --git a/libarchive/archive_read_support_format_zip.c b/libarchive/archive_read_support_format_zip.c index 677c437095..6937969c16 100644 --- a/libarchive/archive_read_support_format_zip.c +++ b/libarchive/archive_read_support_format_zip.c @@ -2751,7 +2751,7 @@ archive_read_format_zip_cleanup(struct archive_read *a)...
https://github.com/libarchive/libarchive/issues/1165
==15753==ERROR: LeakSanitizer: detected memory leaks Direct leak of 96 byte(s) in 1 object(s) allocated from: #0 0x7f4c0b1dfb50 in __interceptor_malloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xdeb50) #1 0x7f4c0a85dced (/lib/x86_64-linux-gnu/liblzma.so.5+0x2ced) Indirect leak of 224 byte(s) in 1 object(s) al...
=== https://github.com/libarchive/libarchive/issues/1165 === Title: Memory leak when decoding LZMA --- Body: I've encountered a memory leak while fuzzing libarchive. A 32-byte reproducer input is attached: [input.zip](https://github.com/libarchive/libarchive/files/3019394/input.zip). Do not extract this zip file -- ...
https://nvd.nist.gov/vuln/detail/CVE-2019-11463
mruby.cve-2022-0614
Use of Out-of-range Pointer Offset in Homebrew mruby prior to 3.2.
https://huntr.dev/bounties/a980ce4d-c359-4425-92c4-e844c0055879
https://github.com/mruby/mruby/commit/ff3a5ebed6ffbe3e70481531cfb969b497aa73ad, https://huntr.dev/bounties/a980ce4d-c359-4425-92c4-e844c0055879
CWE-119, CWE-823
mruby/mruby
ff3a5ebed6ffbe3e70481531cfb969b497aa73ad~1
diff --git a/src/vm.c b/src/vm.c index 6133cbccac..9cb50847f2 100644 --- a/src/vm.c +++ b/src/vm.c @@ -2766,7 +2766,7 @@ mrb_vm_exec(mrb_state *mrb, const struct RProc *proc, const mrb_code *pc) int lim = a+b*2+1; hash = regs[a]; - mrb_assert(mrb_hash_p(hash)); + mrb_ensure_hash_type(mrb, hash...
https://nvd.nist.gov/vuln/detail/CVE-2022-0614
faad2.cve-2018-20194
There is a stack-based buffer underflow in the third instance of the calculate_gain function in libfaad/sbr_hfadj.c in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8. A crafted input will lead to a denial of service or possibly unspecified other impact because limiting the additional noise energy level is mishandled f...
https://github.com/knik0/faad2/issues/21
https://github.com/hlef/faad2/commit/6b4a7cde30f2e2cb03e78ef476cc73179cfffda3
CWE-787
hlef/faad2
5d380279cb00ea7a8b24f647f3790a1fc5342731
diff --git a/libfaad/sbr_hfadj.c b/libfaad/sbr_hfadj.c index 3f310b81..dda1ce8e 100644 --- a/libfaad/sbr_hfadj.c +++ b/libfaad/sbr_hfadj.c @@ -485,6 +485,12 @@ static void calculate_gain(sbr_info *sbr, sbr_hfadj_info *adj, uint8_t ch) ml1 = sbr->f_table_lim[sbr->bs_limiter_bands][k]; ml2 = sbr...
https://github.com/knik0/faad2/issues/21, https://seclists.org/bugtraq/2019/Sep/28
./faad faad_res/015-stack-buffer-underflow-sbr_hfadj_1314 -o out.wav *********** Ahead Software MPEG-4 AAC Decoder V2.8.8 ****************** Build: Dec 13 2018 Copyright 2002-2004: Ahead Software AG http://www.audiocoding.com bug tracking: https://sourceforge.net/p/faac/bugs/ Floating point version This progra...
=== https://github.com/knik0/faad2/issues/21 === Title: stack-buffer-underflow in function calculate_gain(libfaad/sbr_hfadj.c:1314) --- Body: Hi, i found a stack-buffer-overflow bug in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8, the details are below(ASAN): ``` ./faad faad_res/015-stack-buffer-underflow-sb...
https://nvd.nist.gov/vuln/detail/CVE-2018-20194
diff --git a/libfaad/sbr_hfadj.c b/libfaad/sbr_hfadj.c index 3f310b81..dda1ce8e 100644 --- a/libfaad/sbr_hfadj.c +++ b/libfaad/sbr_hfadj.c @@ -485,6 +485,12 @@ static void calculate_gain(sbr_info *sbr, sbr_hfadj_info *adj, uint8_t ch) ml1 = sbr->f_table_lim[sbr->bs_limiter_bands][k]; ml2 = sbr...
gpac.cve-2023-4721
Out-of-bounds Read in GitHub repository gpac/gpac prior to 2.3-DEV.
https://huntr.dev/bounties/f457dc62-3cff-47bd-8fd2-1cb2b4a832fc
https://github.com/gpac/gpac/commit/3ec93d73d048ed7b46fe6e9f307cc7a0cc13db63, https://huntr.dev/bounties/f457dc62-3cff-47bd-8fd2-1cb2b4a832fc
CWE-125
gpac/gpac
3ec93d73d048ed7b46fe6e9f307cc7a0cc13db63~1
diff --git a/src/media_tools/mpeg2_ps.c b/src/media_tools/mpeg2_ps.c index 0af7a31f32..b0182f2249 100644 --- a/src/media_tools/mpeg2_ps.c +++ b/src/media_tools/mpeg2_ps.c @@ -266,6 +266,8 @@ int MPEG12_ParseSeqHdr(unsigned char *pbuffer, u32 buflen, s32 *have_mpeg2, u32 u32 scode, ix; s32 found = -1; *have_mpeg2 ...
ASan (inferred)
https://nvd.nist.gov/vuln/detail/CVE-2023-4721
gpac.cve-2022-3178
Buffer Over-read in GitHub repository gpac/gpac prior to 2.1.0-DEV.
https://huntr.dev/bounties/f022fc50-3dfd-450a-ab47-3d75d2bf44c0
https://github.com/gpac/gpac/commit/77510778516803b7f7402d7423c6d6bef50254c3, https://huntr.dev/bounties/f022fc50-3dfd-450a-ab47-3d75d2bf44c0
CWE-125, CWE-126
gpac/gpac
77510778516803b7f7402d7423c6d6bef50254c3~1
diff --git a/src/isomedia/box_code_base.c b/src/isomedia/box_code_base.c index 3cf6b3bd38..b7ee3e356e 100644 --- a/src/isomedia/box_code_base.c +++ b/src/isomedia/box_code_base.c @@ -12886,11 +12886,12 @@ GF_Err xtra_box_read(GF_Box *s, GF_BitStream *bs) prop_type = gf_bs_read_u16(bs); prop_size -= 6; ISOM_...
https://nvd.nist.gov/vuln/detail/CVE-2022-3178
End of preview. Expand in Data Studio

CVE_NVD

A curated dataset of 200 CVE vulnerability instances from the National Vulnerability Database (NVD), enriched with exploit PoCs, developer patches, bug reports, sanitizer reports, and GitHub issue context.

Dataset Fields

Field Description
instance_id Unique identifier (e.g., njs.cve-2022-32414)
description CVE description from NVD
exploit(poc)_url URL to exploit or proof-of-concept
patch_url URL to the developer's patch commit
weakness_enumeration CWE classification
github_repo GitHub repository (owner/repo)
base_commit Base commit hash (pre-patch)
developers_patch Full diff of the developer's fix
bug_report Bug report text
sanitizer_report ASAN/MSAN/UBSAN/TSAN sanitizer output
sanitizer Sanitizer type used
github_issue Full GitHub issue text
nvd_url Link to the NVD entry
minimized_patch Minimized version of the developer's patch
Downloads last month
286