aliasrobotics/RVD
Robot Vulnerability Database. An archive of robot vulnerabilities and bugs.
PythonGPL-3.0
Issues
- 0
- 0
RVD#3272: printf, stemcmds/tests/test_hrt.c:130, ...
#3272 opened by rvd-bot - 0
RVD#3273: fprintf, temcmds/tests/test_time.c:156, ...
#3273 opened by rvd-bot - 0
RVD#3269: CWE-120 (buffer), Does not check for buffer overflows (CWE-120)... @ mander/PreflightCheck.cpp:364
#3269 opened by rvd-bot - 0
RVD#3268: CWE-120 (buffer), Does not check for buffer overflows (CWE-120)... @ mander/PreflightCheck.cpp:320
#3268 opened by rvd-bot - 0
RVD#3266: CWE-120 (buffer), Does not check for buffer overflows (CWE-120)... @ mander/PreflightCheck.cpp:127
#3266 opened by rvd-bot - 0
RVD#3267: CWE-120 (buffer), Does not check for buffer overflows (CWE-120)... @ mander/PreflightCheck.cpp:247
#3267 opened by rvd-bot - 0
RVD#3265: CWE-134 (format), Potential format string problem (CWE-134)... @ mander/PreflightCheck.cpp:97
#3265 opened by rvd-bot - 0
RVD#3287: Starting a process with a shell, possible injection detected, security i..., ./Firmware/Tools/ecl_ekf/batch_process_logdata_ekf.py:27
#3287 opened by rvd-bot - 0
RVD#3285: compile, am/px4params/srcparser.py:145,146,147,148,149,150,151,152,153,154,155, ...
#3285 opened by rvd-bot - 0
- 0
RVD#3286: getopt_long, ...s/systemlib/getopt_long.c:414
#3286 opened by rvd-bot - 0
RVD#3282: sprintf, ander/mag_calibration.cpp:201,803, ...
#3282 opened by rvd-bot - 0
RVD#3283: sscanf, k/mavlink_log_handler.cpp:378, ...
#3283 opened by rvd-bot - 0
RVD#3280: Check to be sure that argument 2 passed to this function call will not..., .../kinetis/board_identity.c:78, ...
#3280 opened by rvd-bot - 0
- 0
RVD#3279: Check to be sure that argument 2 passed to this function call will not..., ...batt_smbus/batt_smbus.cpp:607,618,629, ...
#3279 opened by rvd-bot - 0
RVD#3277: getopt, lemetry/frsky_telemetry.c:211, ...
#3277 opened by rvd-bot - 0
RVD#3278: vprintf, /px4io/px4io_uploader.cpp:674, ...
#3278 opened by rvd-bot - 0
RVD#3274: syslog, fault_log/hardfault_log.c:198,214,226,625,657,712,758,803,809,820,823,834,838,843,877,971,976,995,998,1008,1013,1020,1046,1111,1120,1130, ...
#3274 opened by rvd-bot - 0
- 0
RVD#3276: Check to be sure that argument 1 passed to this function call will not..., ...fault_log/hardfault_log.c:314,315,319,323,324, ...
#3276 opened by rvd-bot - 0
RVD#3248: CWE-134 (format), If syslogs format strings can be influenced by an attacker, they can b... @ 767ZI-v1/px4nucleo_init.c:102
#3248 opened by rvd-bot - 0
RVD#3270: CWE-120 (buffer), Does not check for buffer overflows (CWE-120)... @ ander/mag_calibration.cpp:803
#3270 opened by rvd-bot - 0
RVD#3245: CWE-134 (format), If format strings can be influenced by an attacker, they can be exploi... @ rds/px4io-v2/px4io_init.c:81
#3245 opened by rvd-bot - 0
RVD#3246: CWE-134 (format), If syslogs format strings can be influenced by an attacker, they can b... @ 767ZI-v1/px4nucleo_init.c:96
#3246 opened by rvd-bot - 0
RVD#3242: CWE-134 (format), If syslogs format strings can be influenced by an attacker, they can b... @ rds/px4io-v2/px4io_init.c:73
#3242 opened by rvd-bot - 0
RVD#3244: CWE-134 (format), If syslogs format strings can be influenced by an attacker, they can b... @ rds/px4io-v2/px4io_init.c:79
#3244 opened by rvd-bot - 0
RVD#3243: CWE-134 (format), If format strings can be influenced by an attacker, they can be exploi... @ rds/px4io-v2/px4io_init.c:75
#3243 opened by rvd-bot - 0
RVD#3241: CWE-134 (format), If format strings can be influenced by an attacker, they can be exploi... @ x4fmu-v4pro/px4fmu_init.c:103
#3241 opened by rvd-bot - 0
RVD#3240: CWE-134 (format), If syslogs format strings can be influenced by an attacker, they can b... @ x4fmu-v4pro/px4fmu_init.c:101
#3240 opened by rvd-bot - 0
RVD#3262: CWE-134 (format), If format strings can be influenced by an attacker, they can be exploi... @ /boards/tap-v1/tap_sdio.c:74
#3262 opened by rvd-bot - 0
RVD#3263: CWE-134 (format), If format strings can be influenced by an attacker, they can be exploi... @ /boards/tap-v1/tap_sdio.c:80
#3263 opened by rvd-bot - 0
RVD#3264: CWE-134 (format), If format strings can be influenced by an attacker, they can be exploi... @ /px4io/px4io_uploader.cpp:674
#3264 opened by rvd-bot - 0
RVD#3260: CWE-134 (format), If syslogs format strings can be influenced by an attacker, they can b... @ /boards/tap-v1/tap_init.c:98
#3260 opened by rvd-bot - 0
RVD#3261: CWE-134 (format), If format strings can be influenced by an attacker, they can be exploi... @ /boards/tap-v1/tap_init.c:100
#3261 opened by rvd-bot - 0
RVD#3257: CWE-134 (format), If format strings can be influenced by an attacker, they can be exploi... @ F767ZI-v1/px4nucleo_spi.c:79
#3257 opened by rvd-bot - 0
RVD#3259: CWE-134 (format), If format strings can be influenced by an attacker, they can be exploi... @ /boards/tap-v1/tap_init.c:94
#3259 opened by rvd-bot - 0
RVD#3258: CWE-134 (format), If syslogs format strings can be influenced by an attacker, they can b... @ /boards/tap-v1/tap_init.c:92
#3258 opened by rvd-bot - 0
RVD#3256: CWE-134 (format), If syslogs format strings can be influenced by an attacker, they can b... @ F767ZI-v1/px4nucleo_spi.c:77
#3256 opened by rvd-bot - 0
RVD#3255: CWE-134 (format), If format strings can be influenced by an attacker, they can be exploi... @ F767ZI-v1/px4nucleo_spi.c:73
#3255 opened by rvd-bot - 0
RVD#3253: CWE-134 (format), If format strings can be influenced by an attacker, they can be exploi... @ 767ZI-v1/px4nucleo_sdio.c:74
#3253 opened by rvd-bot - 0
RVD#3254: CWE-134 (format), If syslogs format strings can be influenced by an attacker, they can b... @ F767ZI-v1/px4nucleo_spi.c:71
#3254 opened by rvd-bot - 0
RVD#3251: CWE-134 (format), If format strings can be influenced by an attacker, they can be exploi... @ 767ZI-v1/px4nucleo_sdio.c:68
#3251 opened by rvd-bot - 0
RVD#3252: CWE-134 (format), If syslogs format strings can be influenced by an attacker, they can b... @ 767ZI-v1/px4nucleo_sdio.c:72
#3252 opened by rvd-bot - 0
RVD#3247: CWE-134 (format), If format strings can be influenced by an attacker, they can be exploi... @ 767ZI-v1/px4nucleo_init.c:98
#3247 opened by rvd-bot - 0
RVD#3250: CWE-134 (format), If syslogs format strings can be influenced by an attacker, they can b... @ 767ZI-v1/px4nucleo_sdio.c:66
#3250 opened by rvd-bot - 0
RVD#3249: CWE-134 (format), If format strings can be influenced by an attacker, they can be exploi... @ 767ZI-v1/px4nucleo_init.c:104
#3249 opened by rvd-bot - 0
RVD#3238: CWE-134 (format), If syslogs format strings can be influenced by an attacker, they can b... @ x4fmu-v4pro/px4fmu_init.c:95
#3238 opened by rvd-bot - 0
RVD#3239: CWE-134 (format), If format strings can be influenced by an attacker, they can be exploi... @ x4fmu-v4pro/px4fmu_init.c:97
#3239 opened by rvd-bot