cve
large_string
desc
large_string
repo
large_string
commit_id
large_string
commit_message
large_string
diff
large_string
label
int64
rank
uint32
CVE-2005-2351
Mutt before 1.5.20 patch 7 allows an attacker to cause a denial of service via a series of requests to mutt temporary files.
muttmua/mutt
4927240d1f8fca0806df1e48e5b09ef067bd3930
automatic post-release commit for mutt-2.2.7
commit 4927240d1f8fca0806df1e48e5b09ef067bd3930 Author: Kevin McCarthy <kevin@8t8.us> Date: Sun Aug 7 10:20:17 2022 -0700 automatic post-release commit for mutt-2.2.7 diff --git a/ChangeLog b/ChangeLog index 9a356c55..1665b5c1 100644 --- a/ChangeLog +++ b/ChangeLog @@ -1,3 +1,151 @@ +2022-08-07 10:15:32 -0700 ...
0
7
CVE-2005-2351
Mutt before 1.5.20 patch 7 allows an attacker to cause a denial of service via a series of requests to mutt temporary files.
muttmua/mutt
848834424235c850947c164ff782d4b8292e084d
Fix next_token() oob read. (closes #3787) With specially crafted input to 'mutt -H', the line "Return-Path:<() " is read and passed to mutt_parse_rfc822_line(). "<() " is then passed through to rfc822_parse_adrlist(). Eventually, inside next_token(), is_special(*s) is called when s points to the end of the string ('...
commit 848834424235c850947c164ff782d4b8292e084d Author: Kevin McCarthy <kevin@8t8.us> Date: Sun Oct 18 19:45:51 2015 +0800 Fix next_token() oob read. (closes #3787) With specially crafted input to 'mutt -H', the line "Return-Path:<() " is read and passed to mutt_parse_rfc822_line(). "<() " is then ...
0
6
CVE-2005-2351
Mutt before 1.5.20 patch 7 allows an attacker to cause a denial of service via a series of requests to mutt temporary files.
muttmua/mutt
85a0ec8505d8cf9ab29765a07fc721f6018f59ea
Fix pgp_application_pgp_handler to remove all tempfiles. If multiple PGP blocks are present in an email, Mutt only cleans up the tempfiles for the last block. Thanks to Dennis Preiser for the patch and sample mbox file demonstrating the problem. This patch also fixes the argument to mutt_perror for the pgpout tempfi...
commit 85a0ec8505d8cf9ab29765a07fc721f6018f59ea Author: Kevin McCarthy <kevin@8t8.us> Date: Wed Mar 4 19:24:31 2015 -0800 Fix pgp_application_pgp_handler to remove all tempfiles. If multiple PGP blocks are present in an email, Mutt only cleans up the tempfiles for the last block. Thanks to Dennis P...
0
2
CVE-2005-2351
Mutt before 1.5.20 patch 7 allows an attacker to cause a denial of service via a series of requests to mutt temporary files.
muttmua/mutt
4fc97a2026f671a35e3d296bbfdeb3794d6313c7
Display error if no imap authenticators are available. Without SASL enabled, and with an explicit value in $imap_authenticators not natively implemented by Mutt, no calls to authenticator->authenticate() were occuring. This resulted in the default r value of -1 passing through, which did not trigger the mutt_error() ...
commit 4fc97a2026f671a35e3d296bbfdeb3794d6313c7 Author: Kevin McCarthy <kevin@8t8.us> Date: Wed Apr 8 09:20:54 2020 -0700 Display error if no imap authenticators are available. Without SASL enabled, and with an explicit value in $imap_authenticators not natively implemented by Mutt, no calls to ...
0
5
CVE-2005-2351
Mutt before 1.5.20 patch 7 allows an attacker to cause a denial of service via a series of requests to mutt temporary files.
muttmua/mutt
c160ca1d74915f7b6a2fa18a5f4bdfc1663b7c88
Reset invalid parsed received dates to 0. (closes #3878) The actual problem in the ticket would be solved by d3f31cf9239e (see #3798). However there is still the bug that Mutt considers a (hdr->received != 0) to be set and usable, despite not checking the return value of mutt_parse_date(). Change mutt_read_rfc822_h...
commit c160ca1d74915f7b6a2fa18a5f4bdfc1663b7c88 Author: Kevin McCarthy <kevin@8t8.us> Date: Sun Sep 25 13:11:03 2016 -0700 Reset invalid parsed received dates to 0. (closes #3878) The actual problem in the ticket would be solved by d3f31cf9239e (see #3798). However there is still the bug that Mutt...
0
1
CVE-2005-2351
Mutt before 1.5.20 patch 7 allows an attacker to cause a denial of service via a series of requests to mutt temporary files.
muttmua/mutt
3d8baab528e370cabb12baf9102d668cead809a7
I've attached a patch for bug number 1036, as reported at http://bugs.guug.de/db/pa/lmutt.html ("segfault when more than one msg is postponed"). This is a patch against mutt 1.4.1. As it was previously left, no one could reproduce it. The problem occurs because sorting is disabled when opening the postponed folder, ...
commit 3d8baab528e370cabb12baf9102d668cead809a7 Author: Dan Fandrich <dan@coneharvesters.com> Date: Wed Sep 3 17:22:09 2003 +0000 I've attached a patch for bug number 1036, as reported at http://bugs.guug.de/db/pa/lmutt.html ("segfault when more than one msg is postponed"). This is a patch against mutt ...
0
8
CVE-2005-2351
Mutt before 1.5.20 patch 7 allows an attacker to cause a denial of service via a series of requests to mutt temporary files.
muttmua/mutt
356ef5a5f9a508c8f935eb0839b1cc574672057d
Pause for a moment when a hostname fails to resolve. Closes #1942. There are a number of cases where mutt cascades error messages. It might be nice if there were an error stack so that low level functions could push_error instead of displaying it right away, and the higher level ones could eg mutt_message(_("Failed to ...
commit 356ef5a5f9a508c8f935eb0839b1cc574672057d Author: Brendan Cully <brendan@kublai.com> Date: Mon Aug 8 18:59:43 2005 +0000 Pause for a moment when a hostname fails to resolve. Closes #1942. There are a number of cases where mutt cascades error messages. It might be nice if there were an error stack s...
0
3
CVE-2005-2351
Mutt before 1.5.20 patch 7 allows an attacker to cause a denial of service via a series of requests to mutt temporary files.
muttmua/mutt
50e6f343e055dd32be1e3080de4bc9a7e560e685
Manual: Add a short chapter summarizing security considerations
commit 50e6f343e055dd32be1e3080de4bc9a7e560e685 Author: Rocco Rutte <pdmef@gmx.net> Date: Sat Apr 4 14:28:58 2009 +0200 Manual: Add a short chapter summarizing security considerations diff --git a/doc/Makefile.am b/doc/Makefile.am index 65d01765..eb568769 100644 --- a/doc/Makefile.am +++ b/doc/Makefile.am @@ -3...
0
10
CVE-2005-2351
Mutt before 1.5.20 patch 7 allows an attacker to cause a denial of service via a series of requests to mutt temporary files.
muttmua/mutt
829db35b1a61f9642e9c9857ecd0d0a9bfde6029
Use fgets_unlocked and fgetc_unlocked if available. Since mutt does not use threads, there is no reason it should use the locked variants of the FILE* IO functions. This checks if the unlocked functions are available, and if so enables them globally via mutt.h. Cuts load time for a 56k message, 1.8GB /var/mail mailbo...
commit 829db35b1a61f9642e9c9857ecd0d0a9bfde6029 Author: David Wilson <dw@botanicus.net> Date: Wed Nov 8 13:40:34 2017 -0800 Use fgets_unlocked and fgetc_unlocked if available. Since mutt does not use threads, there is no reason it should use the locked variants of the FILE* IO functions. This checks...
0
9
CVE-2005-2351
Mutt before 1.5.20 patch 7 allows an attacker to cause a denial of service via a series of requests to mutt temporary files.
muttmua/mutt
781acdf0601fca98aadf1bbfdaae743084cb5f88
With SASL, expect the server to prompt for additional auth data if we have some to send (#129961, upstream #1845)
commit 781acdf0601fca98aadf1bbfdaae743084cb5f88 Author: Bill Nottingham <notting@redhat.com> Date: Thu Jan 27 18:48:41 2005 +0000 With SASL, expect the server to prompt for additional auth data if we have some to send (#129961, upstream #1845) diff --git a/mutt_sasl.c b/mutt_sasl.c index aa41f2c8..efe7e146 ...
0
4
CVE-2005-3745
Cross-site scripting (XSS) vulnerability in Apache Struts 1.2.7, and possibly other versions allows remote attackers to inject arbitrary web script or HTML via the query string, which is not properly quoted or filtered when the request handler generates an error message.
apache/struts1
e387b6df99b7ea797814a8b233ae48df12f68763
Added storeException() method that takes an ActionMessage instead of ActionError. git-svn-id: https://svn.apache.org/repos/asf/struts/trunk@50964 13f79535-47bb-0310-9956-ffa450edef68
commit e387b6df99b7ea797814a8b233ae48df12f68763 Author: David Graham <dgraham@apache.org> Date: Sat Aug 16 17:50:10 2003 +0000 Added storeException() method that takes an ActionMessage instead of ActionError. git-svn-id: https://svn.apache.org/repos/asf/struts/trunk@50964 13f79535-47bb-0310-995...
0
10
CVE-2005-3745
Cross-site scripting (XSS) vulnerability in Apache Struts 1.2.7, and possibly other versions allows remote attackers to inject arbitrary web script or HTML via the query string, which is not properly quoted or filtered when the request handler generates an error message.
apache/struts1
fa2d79ae6b60f7c3c7b3be2c2da0b0ea361ab5c9
STR-3004: Delete new copy; use svn copy to retain history git-svn-id: https://svn.apache.org/repos/asf/struts/struts1/trunk@505772 13f79535-47bb-0310-9956-ffa450edef68
commit fa2d79ae6b60f7c3c7b3be2c2da0b0ea361ab5c9 Author: Paul C. Benedict Jr <pbenedict@apache.org> Date: Sat Feb 10 21:44:56 2007 +0000 STR-3004: Delete new copy; use svn copy to retain history git-svn-id: https://svn.apache.org/repos/asf/struts/struts1/trunk@505772 13f79535-47bb-0310-9956-ffa450edef68 ...
0
2
CVE-2005-3745
Cross-site scripting (XSS) vulnerability in Apache Struts 1.2.7, and possibly other versions allows remote attackers to inject arbitrary web script or HTML via the query string, which is not properly quoted or filtered when the request handler generates an error message.
apache/struts1
dc188fbdf90d6210937dd25d03037018c5f41a87
Submitted by Ted Husted. Minor changes to hilight standard ActionForm validate methods. <snip> <li>Generally, there will be very little input validation logic in an <code>ActionForm</code> bean. The primary reason such beans exist is to save the most recent values entered by the user ...
commit dc188fbdf90d6210937dd25d03037018c5f41a87 Author: Ted Nathan Husted <husted@apache.org> Date: Wed Jan 10 22:39:27 2001 +0000 Submitted by Ted Husted. Minor changes to hilight standard ActionForm validate methods. <snip> <li>Generally, there will be very little input validation...
0
9
CVE-2005-3745
Cross-site scripting (XSS) vulnerability in Apache Struts 1.2.7, and possibly other versions allows remote attackers to inject arbitrary web script or HTML via the query string, which is not properly quoted or filtered when the request handler generates an error message.
apache/struts1
7ac7d6d69ac64863983b2b673aab62241b33ce8f
Bring the release notes for beta-2 up to date with respect to recent changes. git-svn-id: https://svn.apache.org/repos/asf/struts/trunk@48341 13f79535-47bb-0310-9956-ffa450edef68
commit 7ac7d6d69ac64863983b2b673aab62241b33ce8f Author: Craig R. McClanahan <craigmcc@apache.org> Date: Sun May 13 02:56:19 2001 +0000 Bring the release notes for beta-2 up to date with respect to recent changes. git-svn-id: https://svn.apache.org/repos/asf/struts/trunk@48341 13f79535-47bb-0310-995...
0
7
CVE-2005-3745
Cross-site scripting (XSS) vulnerability in Apache Struts 1.2.7, and possibly other versions allows remote attackers to inject arbitrary web script or HTML via the query string, which is not properly quoted or filtered when the request handler generates an error message.
apache/struts1
0c52833f19f85825e04d16a3a4b8aad3595ce0e6
Initial checkin of the "Declarative Exception Handling" feature (sorry this took so long). I've incorporated it as presented, based on the original configuration mechanism, to get it in play as quickly as possible. It will next be integrated into the new ApplicationConfig approach so that it works in sub-applications ...
commit 0c52833f19f85825e04d16a3a4b8aad3595ce0e6 Author: Craig R. McClanahan <craigmcc@apache.org> Date: Mon Dec 31 01:14:36 2001 +0000 Initial checkin of the "Declarative Exception Handling" feature (sorry this took so long). I've incorporated it as presented, based on the original configuration mechani...
0
4
CVE-2005-3745
Cross-site scripting (XSS) vulnerability in Apache Struts 1.2.7, and possibly other versions allows remote attackers to inject arbitrary web script or HTML via the query string, which is not properly quoted or filtered when the request handler generates an error message.
apache/struts1
bbacb93047499aa5694058ec5379ed7b68420662
Moved ssl page from taglib to core. git-svn-id: https://svn.apache.org/repos/asf/struts/core/trunk@332197 13f79535-47bb-0310-9956-ffa450edef68
commit bbacb93047499aa5694058ec5379ed7b68420662 Author: Wendy Smoak <wsmoak@apache.org> Date: Thu Nov 10 02:11:47 2005 +0000 Moved ssl page from taglib to core. git-svn-id: https://svn.apache.org/repos/asf/struts/core/trunk@332197 13f79535-47bb-0310-9956-ffa450edef68 diff --git a/xdocs/ssl.xml b/xdocs/...
0
8
CVE-2005-3745
Cross-site scripting (XSS) vulnerability in Apache Struts 1.2.7, and possibly other versions allows remote attackers to inject arbitrary web script or HTML via the query string, which is not properly quoted or filtered when the request handler generates an error message.
apache/struts1
5b26c0cd85dc51f47ef8496ce8f9d73c651196e8
Submitted by Ted Husted. Updated "presentation tags" segment to include present/notPresent, and omit 0.5 versions. Updated beginning of "Automatic Form Validation" section to omit non-HTTP version (beyond scope of users guide). <section name="3.3.3 Other Useful Presentation Tags" href="presentation_tags"> ...
commit 5b26c0cd85dc51f47ef8496ce8f9d73c651196e8 Author: Ted Nathan Husted <husted@apache.org> Date: Thu Jan 11 00:20:03 2001 +0000 Submitted by Ted Husted. Updated "presentation tags" segment to include present/notPresent, and omit 0.5 versions. Updated beginning of "Automatic Form Validation" section to omit n...
0
1
CVE-2005-3745
Cross-site scripting (XSS) vulnerability in Apache Struts 1.2.7, and possibly other versions allows remote attackers to inject arbitrary web script or HTML via the query string, which is not properly quoted or filtered when the request handler generates an error message.
apache/struts1
942be4854f1ddf98a64e4dee7bb14fcb40d23d25
Submitted by Ted Husted. Minor stylistic changes to introduction. Refactor section 1.2 to segue from 1.1 and 1.3. [1.1] Good Thing. Java code. in-and-of itself resolve /the/ flow control issues under the Sun ... released, and IOHO, Java Model 2 development will never be quite the same. <strike>If you are new .....
commit 942be4854f1ddf98a64e4dee7bb14fcb40d23d25 Author: Ted Nathan Husted <husted@apache.org> Date: Sun Jan 21 12:57:51 2001 +0000 Submitted by Ted Husted. Minor stylistic changes to introduction. Refactor section 1.2 to segue from 1.1 and 1.3. [1.1] Good Thing. Java code. in-...
0
3
CVE-2005-3745
Cross-site scripting (XSS) vulnerability in Apache Struts 1.2.7, and possibly other versions allows remote attackers to inject arbitrary web script or HTML via the query string, which is not properly quoted or filtered when the request handler generates an error message.
apache/struts1
8056f6ea913ff717dcbdcca6d5fcb8f0946c10a0
Fix line ends, in preparation for other changes. git-svn-id: https://svn.apache.org/repos/asf/struts/trunk@48660 13f79535-47bb-0310-9956-ffa450edef68
commit 8056f6ea913ff717dcbdcca6d5fcb8f0946c10a0 Author: Martin Cooper <martinc@apache.org> Date: Fri Oct 19 05:15:16 2001 +0000 Fix line ends, in preparation for other changes. git-svn-id: https://svn.apache.org/repos/asf/struts/trunk@48660 13f79535-47bb-0310-9956-ffa450edef68 diff --git a/doc/use...
0
6
CVE-2005-3745
Cross-site scripting (XSS) vulnerability in Apache Struts 1.2.7, and possibly other versions allows remote attackers to inject arbitrary web script or HTML via the query string, which is not properly quoted or filtered when the request handler generates an error message.
apache/struts1
577746b34784c7acbc0920567580b848114452e5
Oops, meant to copy this in r279152, but I moved it instead. git-svn-id: https://svn.apache.org/repos/asf/struts/core/trunk@279968 13f79535-47bb-0310-9956-ffa450edef68
commit 577746b34784c7acbc0920567580b848114452e5 Author: Ted Nathan Husted <husted@apache.org> Date: Sat Sep 10 08:07:48 2005 +0000 Oops, meant to copy this in r279152, but I moved it instead. git-svn-id: https://svn.apache.org/repos/asf/struts/core/trunk@279968 13f79535-47bb-0310-9956-ffa450edef68 diff...
0
5
CVE-2006-0847
Directory traversal vulnerability in the staticfilter component in CherryPy before 2.1.1 allows remote attackers to read arbitrary files via ".." sequences in unspecified vectors.
cherrypy/cherrypy
8a592984cb69669bb05cabf29a54cffcd744ab9d
Fix (partial?) for #373. Fixes staticFilter.
commit 8a592984cb69669bb05cabf29a54cffcd744ab9d Author: Robert Brewer <fumanchu@aminus.org> Date: Fri Oct 28 00:14:53 2005 +0000 Fix (partial?) for #373. Fixes staticFilter. diff --git a/cherrypy/lib/filter/staticfilter.py b/cherrypy/lib/filter/staticfilter.py index a1bafcad..de7e8c33 100644 --- a/cherrypy/lib/...
0
8
CVE-2006-0847
Directory traversal vulnerability in the staticfilter component in CherryPy before 2.1.1 allows remote attackers to read arbitrary files via ".." sequences in unspecified vectors.
cherrypy/cherrypy
f71d502fcb5c77fa80ad8e305de5fdf13e2bad7f
Trunk fix for #744 (Malicious cookies may allow access to files outside the session directory).
commit f71d502fcb5c77fa80ad8e305de5fdf13e2bad7f Author: Robert Brewer <fumanchu@aminus.org> Date: Sat Oct 27 17:15:58 2007 +0000 Trunk fix for #744 (Malicious cookies may allow access to files outside the session directory). diff --git a/cherrypy/lib/sessions.py b/cherrypy/lib/sessions.py index 8b1c3760..810b8c...
0
7
CVE-2006-0847
Directory traversal vulnerability in the staticfilter component in CherryPy before 2.1.1 allows remote attackers to read arbitrary files via ".." sequences in unspecified vectors.
cherrypy/cherrypy
85a2984b3dfa29b2ce9c03abe9a7bb4a385b22c4
Replaced request.remote_addr, remote_port, and remote_host with a single "remote" attribute, an instance of lib.http.Host, which has "ip", "port" and "name" attributes. Added a similar request.local attribute. Changed request() signature to (local, remote, scheme). This allows requests run behind multiple HTTP servers ...
commit 85a2984b3dfa29b2ce9c03abe9a7bb4a385b22c4 Author: Robert Brewer <fumanchu@aminus.org> Date: Mon Aug 7 02:48:57 2006 +0000 Replaced request.remote_addr, remote_port, and remote_host with a single "remote" attribute, an instance of lib.http.Host, which has "ip", "port" and "name" attributes. Added a similar ...
0
9
CVE-2006-0847
Directory traversal vulnerability in the staticfilter component in CherryPy before 2.1.1 allows remote attackers to read arbitrary files via ".." sequences in unspecified vectors.
cherrypy/cherrypy
b673abd4486e5776130be58204cbef59473cb18f
Fix for #404, #417 (index files and staticfilter). New "static_filter.index" config entry.
commit b673abd4486e5776130be58204cbef59473cb18f Author: Robert Brewer <fumanchu@aminus.org> Date: Thu Dec 29 23:03:46 2005 +0000 Fix for #404, #417 (index files and staticfilter). New "static_filter.index" config entry. diff --git a/cherrypy/filters/staticfilter.py b/cherrypy/filters/staticfilter.py index 33c34...
0
4
CVE-2006-0847
Directory traversal vulnerability in the staticfilter component in CherryPy before 2.1.1 allows remote attackers to read arbitrary files via ".." sequences in unspecified vectors.
cherrypy/cherrypy
2d1f9c0b09420909a3ee8540e901d62b7b7d2cd0
A more inclusive, os-level check for staticfilter uplevel attacks.
commit 2d1f9c0b09420909a3ee8540e901d62b7b7d2cd0 Author: Robert Brewer <fumanchu@aminus.org> Date: Tue Jan 10 21:47:24 2006 +0000 A more inclusive, os-level check for staticfilter uplevel attacks. diff --git a/cherrypy/filters/staticfilter.py b/cherrypy/filters/staticfilter.py index c0c34fc1..c885fbea 100644 ---...
0
1
CVE-2006-0847
Directory traversal vulnerability in the staticfilter component in CherryPy before 2.1.1 allows remote attackers to read arbitrary files via ".." sequences in unspecified vectors.
cherrypy/cherrypy
7e6187ee19a90ebe7f8597296bfa942cd1eb1864
Patch for serious security flaw in staticfilter
commit 7e6187ee19a90ebe7f8597296bfa942cd1eb1864 Author: Remi Delon <rdelon@cherrypy.org> Date: Tue Jan 10 15:40:43 2006 +0000 Patch for serious security flaw in staticfilter diff --git a/cherrypy/_cputil.py b/cherrypy/_cputil.py index 0ba12570..a0be071b 100644 --- a/cherrypy/_cputil.py +++ b/cherrypy/_cputil.py...
1
3
CVE-2006-0847
Directory traversal vulnerability in the staticfilter component in CherryPy before 2.1.1 allows remote attackers to read arbitrary files via ".." sequences in unspecified vectors.
cherrypy/cherrypy
f9a56a72a69d9ecc62d745141735aee8bd4eade3
Fix for #402 (staticfilter errors if .on but no .file nor .dir).
commit f9a56a72a69d9ecc62d745141735aee8bd4eade3 Author: Robert Brewer <fumanchu@aminus.org> Date: Fri Dec 30 07:04:41 2005 +0000 Fix for #402 (staticfilter errors if .on but no .file nor .dir). diff --git a/cherrypy/filters/staticfilter.py b/cherrypy/filters/staticfilter.py index b82ae989..a4235f37 100644 --- a...
0
5
CVE-2006-0847
Directory traversal vulnerability in the staticfilter component in CherryPy before 2.1.1 allows remote attackers to read arbitrary files via ".." sequences in unspecified vectors.
cherrypy/cherrypy
c1de1a99373fb76b287636a47c3c2e57b690c7df
Test for staticfilter uplevel security, plus a more-informative error if staticfilter can't obtain an absolute path.
commit c1de1a99373fb76b287636a47c3c2e57b690c7df Author: Robert Brewer <fumanchu@aminus.org> Date: Tue Jan 10 19:13:07 2006 +0000 Test for staticfilter uplevel security, plus a more-informative error if staticfilter can't obtain an absolute path. diff --git a/cherrypy/filters/staticfilter.py b/cherrypy/filters/s...
0
2
CVE-2006-0847
Directory traversal vulnerability in the staticfilter component in CherryPy before 2.1.1 allows remote attackers to read arbitrary files via ".." sequences in unspecified vectors.
cherrypy/cherrypy
09f4d4b6c3c1db6949eb4cdab195b7485a90e600
fix which now allows us to serve static content directly alongside dynamic content. staticFilter won't take over the entire request if it doesn't find the file
commit 09f4d4b6c3c1db6949eb4cdab195b7485a90e600 Author: Peter Hunt <none@none> Date: Tue Dec 20 02:03:58 2005 +0000 fix which now allows us to serve static content directly alongside dynamic content. staticFilter won't take over the entire request if it doesn't find the file diff --git a/cherrypy/filters/static...
0
6
CVE-2006-0847
Directory traversal vulnerability in the staticfilter component in CherryPy before 2.1.1 allows remote attackers to read arbitrary files via ".." sequences in unspecified vectors.
cherrypy/cherrypy
3fcc339cb6cd8a633f6be06220a3db5188069e24
X-Forwarded-For should overwrite remote.ip, not remote.name.
commit 3fcc339cb6cd8a633f6be06220a3db5188069e24 Author: Robert Brewer <fumanchu@aminus.org> Date: Fri Aug 11 16:55:20 2006 +0000 X-Forwarded-For should overwrite remote.ip, not remote.name. diff --git a/cherrypy/lib/cptools.py b/cherrypy/lib/cptools.py index ef25c1a9..e570e1cf 100644 --- a/cherrypy/lib/cptools....
0
10
CVE-2007-2383
The Prototype (prototypejs) framework before 1.5.1 RC3 exchanges data using JavaScript Object Notation (JSON) without an associated protection scheme, which allows remote attackers to obtain the data via a web page that retrieves the data through a URL in the SRC attribute of a SCRIPT element and captures the data usin...
sstephenson/prototype
29c436886cc019e72eeb39fe6ef99af1f70bd86c
Merge pull request #43 from victor-homyakov/patch-5 Fix PDoc.
commit 29c436886cc019e72eeb39fe6ef99af1f70bd86c (from 7b09d807dad9f1be0d3e56125ecdc991996fec0b) Merge: 7b09d80 308917b Author: Andrew Dupont <andrew@andrewdupont.net> Date: Fri Mar 30 12:50:21 2012 -0700 Merge pull request #43 from victor-homyakov/patch-5 Fix PDoc. diff --git a/src/prototype/lang/strin...
0
8
CVE-2007-2383
The Prototype (prototypejs) framework before 1.5.1 RC3 exchanges data using JavaScript Object Notation (JSON) without an associated protection scheme, which allows remote attackers to obtain the data via a web page that retrieves the data through a URL in the SRC attribute of a SCRIPT element and captures the data usin...
sstephenson/prototype
093c0cce4bbb89b88b0af20356faa83906b3aafa
Optimize retrieving of top|left|right|bottom properties. Add some documentation. Disable setting of properties for now.
commit 093c0cce4bbb89b88b0af20356faa83906b3aafa Author: Andrew Dupont <prototype@andrewdupont.net> Date: Mon Nov 2 23:54:25 2009 -0600 Optimize retrieving of top|left|right|bottom properties. Add some documentation. Disable setting of properties for now. diff --git a/src/dom/layout.js b/src/dom/layout.js index ...
0
9
CVE-2007-2383
The Prototype (prototypejs) framework before 1.5.1 RC3 exchanges data using JavaScript Object Notation (JSON) without an associated protection scheme, which allows remote attackers to obtain the data via a web page that retrieves the data through a URL in the SRC attribute of a SCRIPT element and captures the data usin...
sstephenson/prototype
c2c47da6aa4e41d2cb45255ad8f3c95eb26f8b44
Optimize retrieving of top|left|right|bottom properties. Add some documentation. Disable setting of properties for now.
commit c2c47da6aa4e41d2cb45255ad8f3c95eb26f8b44 Author: Andrew Dupont <prototype@andrewdupont.net> Date: Mon Nov 2 23:54:25 2009 -0600 Optimize retrieving of top|left|right|bottom properties. Add some documentation. Disable setting of properties for now. diff --git a/src/dom/layout.js b/src/dom/layout.js index ...
0
10
CVE-2007-2383
The Prototype (prototypejs) framework before 1.5.1 RC3 exchanges data using JavaScript Object Notation (JSON) without an associated protection scheme, which allows remote attackers to obtain the data via a web page that retrieves the data through a URL in the SRC attribute of a SCRIPT element and captures the data usin...
sstephenson/prototype
36a9f70687b0a1b0d93349d9e1ba7061059399f9
Merge pull request #27 from rlineweaver/master Avoid an infinite loop in `String#gsub` when there is a zero-length match.
commit 36a9f70687b0a1b0d93349d9e1ba7061059399f9 (from c8a6942a0cd0537ed4168f837cd1aa99dcacc17e) Merge: c8a6942 075625c Author: Andrew Dupont <andrew@andrewdupont.net> Date: Mon Aug 27 15:10:48 2012 -0700 Merge pull request #27 from rlineweaver/master Avoid an infinite loop in `String#gsub` when there is...
0
4
CVE-2007-2383
The Prototype (prototypejs) framework before 1.5.1 RC3 exchanges data using JavaScript Object Notation (JSON) without an associated protection scheme, which allows remote attackers to obtain the data via a web page that retrieves the data through a URL in the SRC attribute of a SCRIPT element and captures the data usin...
sstephenson/prototype
1d617df4df4b2ae8dff41038c59ee67928e0f3cd
Avoid using arguments.callee in string.js.
commit 1d617df4df4b2ae8dff41038c59ee67928e0f3cd Author: Tobie Langel <tobie.langel@gmail.com> Date: Thu Dec 11 04:28:35 2008 +0100 Avoid using arguments.callee in string.js. diff --git a/src/lang/string.js b/src/lang/string.js index f50e570..587c944 100644 --- a/src/lang/string.js +++ b/src/lang/string.js @@ -8...
0
7
CVE-2007-2383
The Prototype (prototypejs) framework before 1.5.1 RC3 exchanges data using JavaScript Object Notation (JSON) without an associated protection scheme, which allows remote attackers to obtain the data via a web page that retrieves the data through a URL in the SRC attribute of a SCRIPT element and captures the data usin...
sstephenson/prototype
9e78eff0245c23b3104a814db0920f9b9740f938
Ensure `String#extractScripts` and `String#evalScripts` ignore `SCRIPT` tags with a `type` attribute set to a non-JavaScript MIME-type. (Closes #304)
commit 9e78eff0245c23b3104a814db0920f9b9740f938 Author: Andrew Dupont <github@andrewdupont.net> Date: Sun Apr 9 17:39:14 2017 -0500 Ensure `String#extractScripts` and `String#evalScripts` ignore `SCRIPT` tags with a `type` attribute set to a non-JavaScript MIME-type. (Closes #304) diff --git a/src/prototype/lan...
0
2
CVE-2007-2383
The Prototype (prototypejs) framework before 1.5.1 RC3 exchanges data using JavaScript Object Notation (JSON) without an associated protection scheme, which allows remote attackers to obtain the data via a web page that retrieves the data through a URL in the SRC attribute of a SCRIPT element and captures the data usin...
sstephenson/prototype
6a992259424e028616dc83147d18f0160219079d
Add a numeric query string to all the assets we serve out of /static just to be safe.
commit 6a992259424e028616dc83147d18f0160219079d Author: Andrew Dupont <github@andrewdupont.net> Date: Sun May 18 20:46:06 2014 -0500 Add a numeric query string to all the assets we serve out of /static just to be safe. diff --git a/test.new/views/layout.erb b/test.new/views/layout.erb index 4567690..74eebc6 100...
0
3
CVE-2007-2383
The Prototype (prototypejs) framework before 1.5.1 RC3 exchanges data using JavaScript Object Notation (JSON) without an associated protection scheme, which allows remote attackers to obtain the data via a web page that retrieves the data through a URL in the SRC attribute of a SCRIPT element and captures the data usin...
sstephenson/prototype
f64393e13b33ef61c435f9e03ad610e75e59df0d
Fix a URIError encountered in Chrome when interpreting an `X-JSON` header with extended characters.
commit f64393e13b33ef61c435f9e03ad610e75e59df0d Author: Andrew Dupont <prototype@andrewdupont.net> Date: Tue Jun 5 01:21:35 2012 -0500 Fix a URIError encountered in Chrome when interpreting an `X-JSON` header with extended characters. diff --git a/src/prototype/ajax/response.js b/src/prototype/ajax/response.js ...
0
5
CVE-2007-2383
The Prototype (prototypejs) framework before 1.5.1 RC3 exchanges data using JavaScript Object Notation (JSON) without an associated protection scheme, which allows remote attackers to obtain the data via a web page that retrieves the data through a URL in the SRC attribute of a SCRIPT element and captures the data usin...
sstephenson/prototype
5e5cfff7c2c253eaf415c279f9083b4650cd4506
Sprockets 2 compatibility
commit 5e5cfff7c2c253eaf415c279f9083b4650cd4506 Author: Joshua Peek <josh@joshpeek.com> Date: Wed Dec 1 14:16:11 2010 -0600 Sprockets 2 compatibility diff --git a/Rakefile b/Rakefile index f3dc99e..c2b744c 100755 --- a/Rakefile +++ b/Rakefile @@ -76,7 +76,7 @@ module PrototypeHelper </h1> EOF PDoc.run({ ...
0
6
CVE-2007-2383
The Prototype (prototypejs) framework before 1.5.1 RC3 exchanges data using JavaScript Object Notation (JSON) without an associated protection scheme, which allows remote attackers to obtain the data via a web page that retrieves the data through a URL in the SRC attribute of a SCRIPT element and captures the data usin...
sstephenson/prototype
fea6bc1a21011c82290f6b5eeb3c3a34e9cdc62b
prototype: Automatically strip security delimiter comments from JSON strings before evaling them. The default delimiter is '/*-secure- ... */' or you can specify your own with the Prototype.JSONFilter regular expression. If you wrap your JSON response bodies in this delimiter on the server side, rogue external sites ...
commit fea6bc1a21011c82290f6b5eeb3c3a34e9cdc62b Author: Sam Stephenson <sam@37signals.com> Date: Tue Apr 24 03:31:14 2007 +0000 prototype: Automatically strip security delimiter comments from JSON strings before evaling them. The default delimiter is '/*-secure- ... */' or you can specify your own with the Prot...
1
1
CVE-2008-7050
The password_check function in auth/auth_phpbb3.php in WoW Raid Manager 3.5.1 before Patch 1, when using PHPBB3 authentication, (1) does not invoke the CheckPassword function with the required arguments, which always triggers an authentication failure, and (2) returns true instead of false when an authentication failur...
Illydth/wowraidmanager
baaccba1411afab6b3794d405d5143b4cf9d75c0
Fixed Signup Limits bug where an invalid check was being done on the role limit, causing queuing when over limit not to occur. The software was checking $count['Tank'] instead of $count['role1'] (which is what is returned by the count function) and thus the equality check always failed (meaning $queue was never set).
commit baaccba1411afab6b3794d405d5143b4cf9d75c0 Author: Douglas Wagner <douglasw@wagnerweb.org> Date: Wed Jul 15 16:18:41 2009 -0500 Fixed Signup Limits bug where an invalid check was being done on the role limit, causing queuing when over limit not to occur. The software was checking $count['Tank']...
0
3
CVE-2008-7050
The password_check function in auth/auth_phpbb3.php in WoW Raid Manager 3.5.1 before Patch 1, when using PHPBB3 authentication, (1) does not invoke the CheckPassword function with the required arguments, which always triggers an authentication failure, and (2) returns true instead of false when an authentication failur...
Illydth/wowraidmanager
7e018942065a006e82c0789230824783a4f171c5
Bug fix for getCookiePath() to support users below PHP v5.1.2 The second parameter (PHP_URL_PATH) added to parse_url is not supported until php 5.1.2, this was causing people to get parse_url errors and session start errors thrown at them. This should now be fixed.
commit 7e018942065a006e82c0789230824783a4f171c5 Author: Douglas Wagner <dwagner@wstldwagner2.rgare.net> Date: Fri Jan 2 18:25:50 2009 -0600 Bug fix for getCookiePath() to support users below PHP v5.1.2 The second parameter (PHP_URL_PATH) added to parse_url is not supported until php 5.1.2, this was ...
0
6
CVE-2008-7050
The password_check function in auth/auth_phpbb3.php in WoW Raid Manager 3.5.1 before Patch 1, when using PHPBB3 authentication, (1) does not invoke the CheckPassword function with the required arguments, which always triggers an authentication failure, and (2) returns true instead of false when an authentication failur...
Illydth/wowraidmanager
8e73576c53b13b4583e1bf796492ca9e49db184a
clean up Auth Code Signed-off-by: neme <carsten@hoelbing.net>
commit 8e73576c53b13b4583e1bf796492ca9e49db184a Author: neme <carsten@hoelbing.net> Date: Tue Aug 24 00:57:56 2010 +0200 clean up Auth Code Signed-off-by: neme <carsten@hoelbing.net> diff --git a/auth/auth_e107.php b/auth/auth_e107.php index 51098bc..b835582 100644 --- a/auth/auth_e107.php +++ b/auth/a...
0
5
CVE-2008-7050
The password_check function in auth/auth_phpbb3.php in WoW Raid Manager 3.5.1 before Patch 1, when using PHPBB3 authentication, (1) does not invoke the CheckPassword function with the required arguments, which always triggers an authentication failure, and (2) returns true instead of false when an authentication failur...
Illydth/wowraidmanager
8d04162c448ba0b179058a4a77f301cec8f8fc7a
Bridge Updates: Bug 0000047 and 0000048 Fix to the "Update" statement bugs and a bug in PHPBB3 that removed the ability to display pages anonymously...as well as allowed raid creation to users that weren't supposed to be able to creat raids.
commit 8d04162c448ba0b179058a4a77f301cec8f8fc7a Author: Douglas Wagner <dwagner@wstldwagner2.rgare.net> Date: Mon Aug 11 13:30:03 2008 -0500 Bridge Updates: Bug 0000047 and 0000048 Fix to the "Update" statement bugs and a bug in PHPBB3 that removed the ability to display pages anonymously...as well ...
0
9
CVE-2008-7050
The password_check function in auth/auth_phpbb3.php in WoW Raid Manager 3.5.1 before Patch 1, when using PHPBB3 authentication, (1) does not invoke the CheckPassword function with the required arguments, which always triggers an authentication failure, and (2) returns true instead of false when an authentication failur...
Illydth/wowraidmanager
17ead31e9541467a897ccd23bdb480383c1808db
Bridge Update: Brings all bridges into alignment. This update to the bridge files by Neme brings all bridge files into aligment code wise. They should now all be doing the same thing. At this point a massive re-write needs to be done on all bridges to get them to work properly.
commit 17ead31e9541467a897ccd23bdb480383c1808db Author: Douglas Wagner <dwagner@wstldwagner2.rgare.net> Date: Thu Sep 11 11:26:53 2008 -0500 Bridge Update: Brings all bridges into alignment. This update to the bridge files by Neme brings all bridge files into aligment code wise. They should now all...
0
10
CVE-2008-7050
The password_check function in auth/auth_phpbb3.php in WoW Raid Manager 3.5.1 before Patch 1, when using PHPBB3 authentication, (1) does not invoke the CheckPassword function with the required arguments, which always triggers an authentication failure, and (2) returns true instead of false when an authentication failur...
Illydth/wowraidmanager
f85e6f5d9d29110be9564e008d8f40cb4dd2bab6
Bug 0000039: HTMLSPECIALCHARS_DECODE Fails on PHP4. The htmlspecialchars_decode function is PHP5 (5.1.0) only and doesn't work for php4. There is a new function definition at the top of the file to define the function for php4 folks.
commit f85e6f5d9d29110be9564e008d8f40cb4dd2bab6 Author: Douglas Wagner <dwagner@wstldwagner2.rgare.net> Date: Tue Aug 5 13:33:30 2008 -0500 Bug 0000039: HTMLSPECIALCHARS_DECODE Fails on PHP4. The htmlspecialchars_decode function is PHP5 (5.1.0) only and doesn't work for php4. There is a new...
0
7
CVE-2008-7050
The password_check function in auth/auth_phpbb3.php in WoW Raid Manager 3.5.1 before Patch 1, when using PHPBB3 authentication, (1) does not invoke the CheckPassword function with the required arguments, which always triggers an authentication failure, and (2) returns true instead of false when an authentication failur...
Illydth/wowraidmanager
64ad34abd7c038572b2cceee4f9efd9c3399ccdb
Quick fix for log deletes that doesn't leave a vulnerability. Code submitted by LuL0r of wowraidmanager.net. This quick change fixes the problems of deleting logs without the "hole" introduced in the last patch. The table name is now generated passed through quote smart before being used in the truncate SQL.
commit 64ad34abd7c038572b2cceee4f9efd9c3399ccdb Author: Douglas Wagner (Illydth) <douglasw@wagnerweb.org> Date: Sun Apr 27 17:04:24 2008 -0500 Quick fix for log deletes that doesn't leave a vulnerability. Code submitted by LuL0r of wowraidmanager.net. This quick change fixes the problems of deletin...
0
8
CVE-2008-7050
The password_check function in auth/auth_phpbb3.php in WoW Raid Manager 3.5.1 before Patch 1, when using PHPBB3 authentication, (1) does not invoke the CheckPassword function with the required arguments, which always triggers an authentication failure, and (2) returns true instead of false when an authentication failur...
Illydth/wowraidmanager
8b65411c17f2b9a2729976e2719f0c2f4e2d310d
Cookie/Login fix: Problem identified with cookies and being logged out of the software tracked back to an issue with capitalization. The incoming cookie username was NOT being passed through strtolower, and thus did not match the username being passed in or compared against (which WAS being strtolowered). Thanks go ...
commit 8b65411c17f2b9a2729976e2719f0c2f4e2d310d Author: Douglas Wagner <douglasw@pixie.wagnerwebhome.org> Date: Wed Feb 16 01:37:01 2011 -0600 Cookie/Login fix: Problem identified with cookies and being logged out of the software tracked back to an issue with capitalization. The incoming cookie use...
0
4
CVE-2008-7050
The password_check function in auth/auth_phpbb3.php in WoW Raid Manager 3.5.1 before Patch 1, when using PHPBB3 authentication, (1) does not invoke the CheckPassword function with the required arguments, which always triggers an authentication failure, and (2) returns true instead of false when an authentication failur...
Illydth/wowraidmanager
26e2f2ddffb886bdd7bd877c09da3049e47ff7e9
v3.2.1 De-Sanitization Error Fix While 3.2.0 Sanitized all database inputs, the code failed to de-sanitize data as it came back out of the database. Generally this showed up as escaped quotes (\') and other display issues such as this.
commit 26e2f2ddffb886bdd7bd877c09da3049e47ff7e9 Author: root <root@darkstar.wagnerweb.org> Date: Sun Apr 13 23:57:14 2008 -0500 v3.2.1 De-Sanitization Error Fix While 3.2.0 Sanitized all database inputs, the code failed to de-sanitize data as it came back out of the database. Generally this sho...
0
1
CVE-2008-7050
The password_check function in auth/auth_phpbb3.php in WoW Raid Manager 3.5.1 before Patch 1, when using PHPBB3 authentication, (1) does not invoke the CheckPassword function with the required arguments, which always triggers an authentication failure, and (2) returns true instead of false when an authentication failur...
Illydth/wowraidmanager
48e6e105c87618f8de5f5123b98f3ef6adf2c11e
Bug 0000055: Fix for UTF8 in Username failing phpbb3 auth. Added utf8_decode() (Thanks Muffin) to the input value from the login page. This forces the login information into UTF8 format and allows the information to be properly used to pull info from the database.
commit 48e6e105c87618f8de5f5123b98f3ef6adf2c11e Author: Douglas Wagner <dwagner@wstldwagner2.rgare.net> Date: Mon Sep 8 15:47:43 2008 -0500 Bug 0000055: Fix for UTF8 in Username failing phpbb3 auth. Added utf8_decode() (Thanks Muffin) to the input value from the login page. This forces the login inf...
0
2
CVE-2008-7220
Unspecified vulnerability in Prototype JavaScript framework (prototypejs) before 1.6.0.2 allows attackers to make "cross-site ajax requests" via unknown vectors.
sstephenson/prototype
cb729625ae2d5eff54a162e9a9c2c4f78ef83dd2
Use native `String.prototype.trim` in `String.prototype.trim` when available. (kangax)
commit cb729625ae2d5eff54a162e9a9c2c4f78ef83dd2 Author: Juriy Zaytsev <juriy@ny3-11-132.dhcp.ithaka.org> Date: Thu May 7 15:33:13 2009 -0400 Use native `String.prototype.trim` in `String.prototype.trim` when available. (kangax) diff --git a/src/lang/string.js b/src/lang/string.js index 6d715c1..2798bcc 100644 -...
0
5
CVE-2008-7220
Unspecified vulnerability in Prototype JavaScript framework (prototypejs) before 1.6.0.2 allows attackers to make "cross-site ajax requests" via unknown vectors.
sstephenson/prototype
86407790d238f74cb4e6858998f467e39d20e846
Fix issue where certain versions of Safari treat class names case-insensitively in Selector/7390 queries. [#390 state:resolved]
commit 86407790d238f74cb4e6858998f467e39d20e846 Author: Tobie Langel <tobie.langel@gmail.com> Date: Thu Dec 11 12:07:23 2008 +0100 Fix issue where certain versions of Safari treat class names case-insensitively in Selector/7390 queries. [#390 state:resolved] diff --git a/CHANGELOG b/CHANGELOG index adb377e....
0
6
CVE-2008-7220
Unspecified vulnerability in Prototype JavaScript framework (prototypejs) before 1.6.0.2 allows attackers to make "cross-site ajax requests" via unknown vectors.
sstephenson/prototype
29cd62ebeb41b2ca528f1b6eae83e3ad5144010e
prototype: Temporary workaround for Prototype.BrowserFeatures.SpecificElementExtensions incorrectly evaluating to true on iPhone.
commit 29cd62ebeb41b2ca528f1b6eae83e3ad5144010e Author: Sam Stephenson <sam@37signals.com> Date: Sat Jun 30 16:38:18 2007 +0000 prototype: Temporary workaround for Prototype.BrowserFeatures.SpecificElementExtensions incorrectly evaluating to true on iPhone. diff --git a/CHANGELOG b/CHANGELOG index 972d389..1f0d...
0
7
CVE-2008-7220
Unspecified vulnerability in Prototype JavaScript framework (prototypejs) before 1.6.0.2 allows attackers to make "cross-site ajax requests" via unknown vectors.
sstephenson/prototype
769ae42fcc7f32b6e4726b26a1ae5f2fd2b560a5
prototype: Ensure that an Ajax.Request's parameters option can be a Hash. Closes #10172.
commit 769ae42fcc7f32b6e4726b26a1ae5f2fd2b560a5 Author: Sam Stephenson <sam@37signals.com> Date: Thu Nov 29 00:24:54 2007 +0000 prototype: Ensure that an Ajax.Request's parameters option can be a Hash. Closes #10172. diff --git a/CHANGELOG b/CHANGELOG index cb7fe5e..a88b262 100644 --- a/CHANGELOG +++ b/CHANGEL...
0
8
CVE-2008-7220
Unspecified vulnerability in Prototype JavaScript framework (prototypejs) before 1.6.0.2 allows attackers to make "cross-site ajax requests" via unknown vectors.
sstephenson/prototype
4174060d5bd3721089ea9b949da9f2ea667c67a7
prototype: Don't call evalResponse() when an Ajax response has no Content-type header. Closes #7827.
commit 4174060d5bd3721089ea9b949da9f2ea667c67a7 Author: Sam Stephenson <sam@37signals.com> Date: Tue Apr 24 03:34:30 2007 +0000 prototype: Don't call evalResponse() when an Ajax response has no Content-type header. Closes #7827. diff --git a/CHANGELOG b/CHANGELOG index 69dfe48..0c3a831 100644 --- a/CHANGELOG +...
0
4
CVE-2008-7220
Unspecified vulnerability in Prototype JavaScript framework (prototypejs) before 1.6.0.2 allows attackers to make "cross-site ajax requests" via unknown vectors.
sstephenson/prototype
29c0de6937d84593c89aa6f77d23dd69480fe909
prototype: Make submitting forms work in Opera < 9.1.
commit 29c0de6937d84593c89aa6f77d23dd69480fe909 Author: Tobie Langel <tobie.langel@gmail.com> Date: Thu Oct 18 15:46:30 2007 +0000 prototype: Make submitting forms work in Opera < 9.1. diff --git a/CHANGELOG b/CHANGELOG index 59b8f25..5867df3 100644 --- a/CHANGELOG +++ b/CHANGELOG @@ -1,5 +1,7 @@ *SVN* +* Ma...
0
3
CVE-2008-7220
Unspecified vulnerability in Prototype JavaScript framework (prototypejs) before 1.6.0.2 allows attackers to make "cross-site ajax requests" via unknown vectors.
sstephenson/prototype
704aa4033010059402336437f7fe6498ce780be0
Stop appending `&_=` to the parameters for non-GET Ajax requests in Safari. We no longer support any version of Safari for which this is necessary. [#327 state:resolved] (John-David Dalton, Andrew Dupont)
commit 704aa4033010059402336437f7fe6498ce780be0 Author: Andrew Dupont <prototype@andrewdupont.net> Date: Mon Oct 18 20:55:06 2010 -0500 Stop appending `&_=` to the parameters for non-GET Ajax requests in Safari. We no longer support any version of Safari for which this is necessary. [#327 state:resolved] (John-D...
0
9
CVE-2008-7220
Unspecified vulnerability in Prototype JavaScript framework (prototypejs) before 1.6.0.2 allows attackers to make "cross-site ajax requests" via unknown vectors.
sstephenson/prototype
23823048d13e1d70bee26908760381e943f7e483
prototype: Prevent memory leaks in Ajax.PeriodicalUpdater. Closes #10049
commit 23823048d13e1d70bee26908760381e943f7e483 Author: Tobie Langel <tobie.langel@gmail.com> Date: Thu Nov 15 23:14:36 2007 +0000 prototype: Prevent memory leaks in Ajax.PeriodicalUpdater. Closes #10049 diff --git a/CHANGELOG b/CHANGELOG index c3fd9ee..bac2d0c 100644 --- a/CHANGELOG +++ b/CHANGELOG @@ -1,3 +1,...
0
2
CVE-2008-7220
Unspecified vulnerability in Prototype JavaScript framework (prototypejs) before 1.6.0.2 allows attackers to make "cross-site ajax requests" via unknown vectors.
sstephenson/prototype
484287d1de3b66933a5e159bcfd6dff0be9e4d6f
Ensure Ajax.activeRequestCount decrements even if an exception is thrown in an `onComplete` callback. (close #324)
commit 484287d1de3b66933a5e159bcfd6dff0be9e4d6f Author: Andrew Dupont <github@andrewdupont.net> Date: Sat Apr 8 16:48:06 2017 -0500 Ensure Ajax.activeRequestCount decrements even if an exception is thrown in an `onComplete` callback. (close #324) diff --git a/src/prototype/ajax/request.js b/src/prototype/ajax/r...
0
10
CVE-2008-7220
Unspecified vulnerability in Prototype JavaScript framework (prototypejs) before 1.6.0.2 allows attackers to make "cross-site ajax requests" via unknown vectors.
sstephenson/prototype
02cc9992e915c024650ddc77a91064f7a4252914
prototype: Prevent a potential security issue for cross-site ajax requests.
commit 02cc9992e915c024650ddc77a91064f7a4252914 Author: Tobie Langel <tobie.langel@gmail.com> Date: Wed Jan 23 00:51:25 2008 +0000 prototype: Prevent a potential security issue for cross-site ajax requests. diff --git a/CHANGELOG b/CHANGELOG index 37ac38e..cd5bdb2 100644 --- a/CHANGELOG +++ b/CHANGELOG @@ -1,5 ...
1
1
CVE-2009-1194
Integer overflow in the pango_glyph_string_set_size function in pango/glyphstring.c in Pango before 1.24 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long glyph string that triggers a heap-based buffer overflow, as demonstrated by a long do...
bratsche/pango
7e0e0a79d54e6bcd80ef3794eaf10de8bf579c56
=== Released 1.15.1 === 2006-12-04 Behdad Esfahbod <behdad@gnome.org> * === Released 1.15.1 === * configure.in: Version 1.15.1 * NEWS: Updated.
commit 7e0e0a79d54e6bcd80ef3794eaf10de8bf579c56 Author: Behdad Esfahbod <behdad@gnome.org> Date: Tue Dec 5 00:23:25 2006 +0000 === Released 1.15.1 === 2006-12-04 Behdad Esfahbod <behdad@gnome.org> * === Released 1.15.1 === * configure.in: Version 1.15.1 ...
0
6
CVE-2009-1194
Integer overflow in the pango_glyph_string_set_size function in pango/glyphstring.c in Pango before 1.24 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long glyph string that triggers a heap-based buffer overflow, as demonstrated by a long do...
bratsche/pango
58359bf5d1fcfb54a160992df44dd897854f5bdd
Find shaper/font for Private Use and space characters too. Finding shaper 2006-08-22 Behdad Esfahbod <behdad@gnome.org> * pango/pango-context.c (itemize_state_process_run): Find shaper/font for Private Use and space characters too. Finding shaper for Private Use is needed for any practical ...
commit 58359bf5d1fcfb54a160992df44dd897854f5bdd Author: Behdad Esfahbod <behdad@gnome.org> Date: Tue Aug 22 23:12:28 2006 +0000 Find shaper/font for Private Use and space characters too. Finding shaper 2006-08-22 Behdad Esfahbod <behdad@gnome.org> * pango/pango-context.c (itemize_stat...
0
9
CVE-2009-1194
Integer overflow in the pango_glyph_string_set_size function in pango/glyphstring.c in Pango before 1.24 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long glyph string that triggers a heap-based buffer overflow, as demonstrated by a long do...
bratsche/pango
55bdaf842fb6cf02eae9bbbb1a6e48bfbed021cf
Fix the "menu accels are two chars wide" bug that was introduced by the 2007-01-22 Behdad Esfahbod <behdad@gnome.org> * pango/pango-glyph-item.c (_pango_glyph_item_iter_next_cluster): Fix the "menu accels are two chars wide" bug that was introduced by the recent changes in this function, in ...
commit 55bdaf842fb6cf02eae9bbbb1a6e48bfbed021cf Author: Behdad Esfahbod <behdad@gnome.org> Date: Tue Jan 23 00:15:32 2007 +0000 Fix the "menu accels are two chars wide" bug that was introduced by the 2007-01-22 Behdad Esfahbod <behdad@gnome.org> * pango/pango-glyph-item.c (_pango_glyp...
0
7
CVE-2009-1194
Integer overflow in the pango_glyph_string_set_size function in pango/glyphstring.c in Pango before 1.24 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long glyph string that triggers a heap-based buffer overflow, as demonstrated by a long do...
bratsche/pango
25878a0341a8076296ab4ae88ee972641e6f963c
Use complete PANGO_VERSION in zip file names. 2002-05-26 Tor Lillqvist <tml@iki.fi> * pango-zip.sh.in: Use complete PANGO_VERSION in zip file names. * pango/Makefile.am: (Win32) Compile resource files and link with them. * pango/pango.rc.in * pango/pangoft2.rc.in * pango/pangowin32.rc.in: Include also the ...
commit 25878a0341a8076296ab4ae88ee972641e6f963c Author: Tor Lillqvist <tml@iki.fi> Date: Sun May 26 00:19:10 2002 +0000 Use complete PANGO_VERSION in zip file names. 2002-05-26 Tor Lillqvist <tml@iki.fi> * pango-zip.sh.in: Use complete PANGO_VERSION in zip file names. ...
0
10
CVE-2009-1194
Integer overflow in the pango_glyph_string_set_size function in pango/glyphstring.c in Pango before 1.24 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long glyph string that triggers a heap-based buffer overflow, as demonstrated by a long do...
bratsche/pango
b9f7b88e3d100b87a856e077b5f2fdbf49c73ebb
Fix silly error in implementation of pango_glyph_string_get_width(), and 2006-07-08 Behdad Esfahbod <behdad@gnome.org> * pango/glyphstring.c (pango_glyph_string_get_width): * pango/pango-glyph.h: * pango/pango-layout.c (pango_layout_line_index_to_x), (pango_layout_line_x_to_index), (...
commit b9f7b88e3d100b87a856e077b5f2fdbf49c73ebb Author: Behdad Esfahbod <behdad@gnome.org> Date: Sat Jul 8 22:15:32 2006 +0000 Fix silly error in implementation of pango_glyph_string_get_width(), and 2006-07-08 Behdad Esfahbod <behdad@gnome.org> * pango/glyphstring.c (pango_glyph_stri...
0
8
CVE-2009-1194
Integer overflow in the pango_glyph_string_set_size function in pango/glyphstring.c in Pango before 1.24 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long glyph string that triggers a heap-based buffer overflow, as demonstrated by a long do...
bratsche/pango
b178da14dabd63937c3867f6d5cbb29f7a31d69f
Bug 471577 – GBoxed GType for PangoGlyphItem 2007-10-24 Behdad Esfahbod <behdad@gnome.org> Bug 471577 – GBoxed GType for PangoGlyphItem * pango/pango-glyph-item.h: * pango/pango-glyph-item.c: New public API: PANGO_TYPE_GLYPH_ITEM pango_glyph_item_c...
commit b178da14dabd63937c3867f6d5cbb29f7a31d69f Author: Behdad Esfahbod <behdad@gnome.org> Date: Wed Oct 24 04:50:09 2007 +0000 Bug 471577 – GBoxed GType for PangoGlyphItem 2007-10-24 Behdad Esfahbod <behdad@gnome.org> Bug 471577 – GBoxed GType for PangoGlyphItem * pa...
0
4
CVE-2009-1194
Integer overflow in the pango_glyph_string_set_size function in pango/glyphstring.c in Pango before 1.24 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long glyph string that triggers a heap-based buffer overflow, as demonstrated by a long do...
bratsche/pango
f4fad0c741636d017aefd76d58e271466696cc6f
Bug 478914 – Use something invalid instead of '?' when validating input 2007-12-10 Behdad Esfahbod <behdad@gnome.org> Bug 478914 – Use something invalid instead of '?' when validating input text * pango/pango-layout.c (pango_layout_set_text): Set invalid input bytes to -1, which giv...
commit f4fad0c741636d017aefd76d58e271466696cc6f Author: Behdad Esfahbod <behdad@gnome.org> Date: Mon Dec 10 08:31:33 2007 +0000 Bug 478914 – Use something invalid instead of '?' when validating input 2007-12-10 Behdad Esfahbod <behdad@gnome.org> Bug 478914 – Use something invalid inst...
0
2
CVE-2009-1194
Integer overflow in the pango_glyph_string_set_size function in pango/glyphstring.c in Pango before 1.24 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long glyph string that triggers a heap-based buffer overflow, as demonstrated by a long do...
bratsche/pango
4de30e5500eaeb49f4bf0b7a07f718e149a2ed5e
[glyphstring] Handle overflow with very long glyphstrings
commit 4de30e5500eaeb49f4bf0b7a07f718e149a2ed5e Author: Behdad Esfahbod <behdad@behdad.org> Date: Mon Mar 2 12:00:52 2009 +0330 [glyphstring] Handle overflow with very long glyphstrings diff --git a/pango/glyphstring.c b/pango/glyphstring.c index 42601d52..8fb70313 100644 --- a/pango/glyphstring.c +++ b/pango/g...
1
1
CVE-2009-1194
Integer overflow in the pango_glyph_string_set_size function in pango/glyphstring.c in Pango before 1.24 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long glyph string that triggers a heap-based buffer overflow, as demonstrated by a long do...
bratsche/pango
12091072940c4cd649d0230f45937f65adbfce46
Bug 488840 – harfbuzz: protect against ligid overflow 2007-10-21 Behdad Esfahbod <behdad@gnome.org> Bug 488840 – harfbuzz: protect against ligid overflow * pango/opentype/harfbuzz-buffer.c (_hb_buffer_allocate_ligid): Never return zero, even in case of overflow. * pango/opentype/ha...
commit 12091072940c4cd649d0230f45937f65adbfce46 Author: Behdad Esfahbod <behdad@gnome.org> Date: Sun Oct 21 18:17:02 2007 +0000 Bug 488840 – harfbuzz: protect against ligid overflow 2007-10-21 Behdad Esfahbod <behdad@gnome.org> Bug 488840 – harfbuzz: protect against ligid overflow ...
0
5
CVE-2009-1194
Integer overflow in the pango_glyph_string_set_size function in pango/glyphstring.c in Pango before 1.24 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long glyph string that triggers a heap-based buffer overflow, as demonstrated by a long do...
bratsche/pango
8d45583fa1f13d77feb5d96abeae59d21ad5fe65
Fixes for signed/unsigned in PangoAttrIterator ((#166700, Morten Welinder) 2005-07-26 Owen Taylor <otaylor@redhat.com> Fixes for signed/unsigned in PangoAttrIterator ((#166700, Morten Welinder) * pango/pango-attributes.c (pango_attr_iterator_range): Clamp results to G_MAXINT to avoi...
commit 8d45583fa1f13d77feb5d96abeae59d21ad5fe65 Author: Owen Taylor <otaylor@redhat.com> Date: Tue Jul 26 18:07:59 2005 +0000 Fixes for signed/unsigned in PangoAttrIterator ((#166700, Morten Welinder) 2005-07-26 Owen Taylor <otaylor@redhat.com> Fixes for signed/unsigned in PangoAttrIt...
0
3
CVE-2009-1275
Apache Tiles 2.1 before 2.1.2, as used in Apache Struts and other products, evaluates Expression Language (EL) expressions twice in certain circumstances, which allows remote attackers to conduct cross-site scripting (XSS) attacks or obtain sensitive information via unspecified vectors, related to the (1) tiles:putAttr...
apache/tiles
91caaaf07953d150af744b55fc3496bcf0b0bcd0
Establish a version 2.0 tiles-config dtd. SB-30 git-svn-id: https://svn.apache.org/repos/asf/struts/sandbox/trunk/tiles@442103 13f79535-47bb-0310-9956-ffa450edef68
commit 91caaaf07953d150af744b55fc3496bcf0b0bcd0 Author: Wendy Smoak <wsmoak@apache.org> Date: Mon Sep 11 05:12:59 2006 +0000 Establish a version 2.0 tiles-config dtd. SB-30 git-svn-id: https://svn.apache.org/repos/asf/struts/sandbox/trunk/tiles@442103 13f79535-47bb-0310-9956-ffa450edef68 diff --git...
0
5
CVE-2009-1275
Apache Tiles 2.1 before 2.1.2, as used in Apache Struts and other products, evaluates Expression Language (EL) expressions twice in certain circumstances, which allows remote attackers to conduct cross-site scripting (XSS) attacks or obtain sensitive information via unspecified vectors, related to the (1) tiles:putAttr...
apache/tiles
2720827d886488f3ca12ebb03992de113571c135
further improvements from Michael Isvy, use tiles-3* dependencies in the example. git-svn-id: https://svn.apache.org/repos/asf/tiles/framework/trunk@1427704 13f79535-47bb-0310-9956-ffa450edef68
commit 2720827d886488f3ca12ebb03992de113571c135 Author: Michael Semb Wever <mck@apache.org> Date: Wed Jan 2 08:47:11 2013 +0000 further improvements from Michael Isvy, use tiles-3* dependencies in the example. git-svn-id: https://svn.apache.org/repos/asf/tiles/framework/trunk@1427704 13f79535-47bb-...
0
2
CVE-2009-1275
Apache Tiles 2.1 before 2.1.2, as used in Apache Struts and other products, evaluates Expression Language (EL) expressions twice in certain circumstances, which allows remote attackers to conduct cross-site scripting (XSS) attacks or obtain sensitive information via unspecified vectors, related to the (1) tiles:putAttr...
apache/tiles
b3895f4105ddbb3e1de392c9d703fa42b4ce3464
TILES-458 Move of EL code from tiles-core and tiles-jsp to tiles-el. git-svn-id: https://svn.apache.org/repos/asf/tiles/framework/trunk@816358 13f79535-47bb-0310-9956-ffa450edef68
commit b3895f4105ddbb3e1de392c9d703fa42b4ce3464 Author: Antonio Petrelli <apetrelli@apache.org> Date: Thu Sep 17 19:54:15 2009 +0000 TILES-458 Move of EL code from tiles-core and tiles-jsp to tiles-el. git-svn-id: https://svn.apache.org/repos/asf/tiles/framework/trunk@816358 13f79535-47bb-0310-9956-...
0
7
CVE-2009-1275
Apache Tiles 2.1 before 2.1.2, as used in Apache Struts and other products, evaluates Expression Language (EL) expressions twice in certain circumstances, which allows remote attackers to conduct cross-site scripting (XSS) attacks or obtain sensitive information via unspecified vectors, related to the (1) tiles:putAttr...
apache/tiles
cbe34a8e0f06d02b110049ad129a4a8089ce3edd
TILES-48 Added a new method in AttributeEvaluators. Fixed tests accordingly. Added Selenium test. git-svn-id: https://svn.apache.org/repos/asf/tiles/framework/trunk@637208 13f79535-47bb-0310-9956-ffa450edef68
commit cbe34a8e0f06d02b110049ad129a4a8089ce3edd Author: Antonio Petrelli <apetrelli@apache.org> Date: Fri Mar 14 18:49:39 2008 +0000 TILES-48 Added a new method in AttributeEvaluators. Fixed tests accordingly. Added Selenium test. git-svn-id: https://svn.apache.org/repos/asf/tiles/framework/trun...
0
6
CVE-2009-1275
Apache Tiles 2.1 before 2.1.2, as used in Apache Struts and other products, evaluates Expression Language (EL) expressions twice in certain circumstances, which allows remote attackers to conduct cross-site scripting (XSS) attacks or obtain sensitive information via unspecified vectors, related to the (1) tiles:putAttr...
apache/tiles
fc6b298402991eae5d729a865c7391f06f55e450
TILESSB-3 pom.xml and sources directories. git-svn-id: https://svn.apache.org/repos/asf/tiles/sandbox/trunk@707110 13f79535-47bb-0310-9956-ffa450edef68
commit fc6b298402991eae5d729a865c7391f06f55e450 Author: Antonio Petrelli <apetrelli@apache.org> Date: Wed Oct 22 16:06:00 2008 +0000 TILESSB-3 pom.xml and sources directories. git-svn-id: https://svn.apache.org/repos/asf/tiles/sandbox/trunk@707110 13f79535-47bb-0310-9956-ffa450edef68 diff --git a/t...
0
3
CVE-2009-1275
Apache Tiles 2.1 before 2.1.2, as used in Apache Struts and other products, evaluates Expression Language (EL) expressions twice in certain circumstances, which allows remote attackers to conduct cross-site scripting (XSS) attacks or obtain sensitive information via unspecified vectors, related to the (1) tiles:putAttr...
apache/tiles
9103c763711371a60b88425c737921ab8da8aeef
TILESSB-40 First classes of tiles-eval-api. git-svn-id: https://svn.apache.org/repos/asf/tiles/sandbox/trunk@1068494 13f79535-47bb-0310-9956-ffa450edef68
commit 9103c763711371a60b88425c737921ab8da8aeef Author: Antonio Petrelli <apetrelli@apache.org> Date: Tue Feb 8 17:48:49 2011 +0000 TILESSB-40 First classes of tiles-eval-api. git-svn-id: https://svn.apache.org/repos/asf/tiles/sandbox/trunk@1068494 13f79535-47bb-0310-9956-ffa450edef68 diff --git a/...
0
8
CVE-2009-1275
Apache Tiles 2.1 before 2.1.2, as used in Apache Struts and other products, evaluates Expression Language (EL) expressions twice in certain circumstances, which allows remote attackers to conduct cross-site scripting (XSS) attacks or obtain sensitive information via unspecified vectors, related to the (1) tiles:putAttr...
apache/tiles
49073c6d86954bb219a1e2fbbe468fd0e470fd5b
TILESSB-38 Fixed tiles-el checkstyle. git-svn-id: https://svn.apache.org/repos/asf/tiles/sandbox/trunk@1049676 13f79535-47bb-0310-9956-ffa450edef68
commit 49073c6d86954bb219a1e2fbbe468fd0e470fd5b Author: Antonio Petrelli <apetrelli@apache.org> Date: Wed Dec 15 19:38:54 2010 +0000 TILESSB-38 Fixed tiles-el checkstyle. git-svn-id: https://svn.apache.org/repos/asf/tiles/sandbox/trunk@1049676 13f79535-47bb-0310-9956-ffa450edef68 diff --git a/tiles...
0
1
CVE-2009-1275
Apache Tiles 2.1 before 2.1.2, as used in Apache Struts and other products, evaluates Expression Language (EL) expressions twice in certain circumstances, which allows remote attackers to conduct cross-site scripting (XSS) attacks or obtain sensitive information via unspecified vectors, related to the (1) tiles:putAttr...
apache/tiles
ccd7ea759fc550e496f376ed355a81318b17da5f
Set svn:eol-style=native to files that have not this property. git-svn-id: https://svn.apache.org/repos/asf/struts/sandbox/trunk/tiles@465598 13f79535-47bb-0310-9956-ffa450edef68
commit ccd7ea759fc550e496f376ed355a81318b17da5f Author: Antonio Petrelli <apetrelli@apache.org> Date: Thu Oct 19 12:12:44 2006 +0000 Set svn:eol-style=native to files that have not this property. git-svn-id: https://svn.apache.org/repos/asf/struts/sandbox/trunk/tiles@465598 13f79535-47bb-0310-9956-ffa45...
0
10
CVE-2009-1275
Apache Tiles 2.1 before 2.1.2, as used in Apache Struts and other products, evaluates Expression Language (EL) expressions twice in certain circumstances, which allows remote attackers to conduct cross-site scripting (XSS) attacks or obtain sensitive information via unspecified vectors, related to the (1) tiles:putAttr...
apache/tiles
927e12152b24a5b3926f9a6206a8ffa4a34dd840
TILES-432 Polished tiles-core (a missing file added). git-svn-id: https://svn.apache.org/repos/asf/tiles/framework/trunk@787727 13f79535-47bb-0310-9956-ffa450edef68
commit 927e12152b24a5b3926f9a6206a8ffa4a34dd840 Author: Antonio Petrelli <apetrelli@apache.org> Date: Tue Jun 23 15:45:36 2009 +0000 TILES-432 Polished tiles-core (a missing file added). git-svn-id: https://svn.apache.org/repos/asf/tiles/framework/trunk@787727 13f79535-47bb-0310-9956-ffa450edef68 d...
0
9
CVE-2009-1275
Apache Tiles 2.1 before 2.1.2, as used in Apache Struts and other products, evaluates Expression Language (EL) expressions twice in certain circumstances, which allows remote attackers to conduct cross-site scripting (XSS) attacks or obtain sensitive information via unspecified vectors, related to the (1) tiles:putAttr...
apache/tiles
f8e58ae817fb4b8a9128df5c60bf432a3fe46ae1
TILES-428 Added expression property in AddAttributeTag and PutAttributeTag. Added templateExpression attribute in insertDefinition, insertTemplate, addAttribute and putAttribute. Added templateType in insertTemplate and insertDefinition. git-svn-id: https://svn.apache.org/repos/asf/tiles/framework/trunk@796822 13f7953...
commit f8e58ae817fb4b8a9128df5c60bf432a3fe46ae1 Author: Antonio Petrelli <apetrelli@apache.org> Date: Wed Jul 22 18:25:50 2009 +0000 TILES-428 Added expression property in AddAttributeTag and PutAttributeTag. Added templateExpression attribute in insertDefinition, insertTemplate, addAttribute and putAttr...
0
4
CVE-2010-0011
The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code.
uzbl/uzbl
7bfb3b5b56e30b157cfb750657de104055fe6da3
eval_js: print file where the error occured
commit 7bfb3b5b56e30b157cfb750657de104055fe6da3 Author: Simon Lipp <sloonz@gmail.com> Date: Sun Feb 14 16:23:31 2010 +0100 eval_js: print file where the error occured diff --git a/src/uzbl-core.c b/src/uzbl-core.c index 2b473800..ebd8ef83 100644 --- a/src/uzbl-core.c +++ b/src/uzbl-core.c @@ -321,7 +321,7 @@ ex...
0
4
CVE-2010-0011
The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code.
uzbl/uzbl
94fff950c6c2d388591233aaa08b5471607f001f
merge in Duclares stuff
commit 94fff950c6c2d388591233aaa08b5471607f001f (from 64a4f8d02c1e6900b8b46a7b3fd5bd5232e3b685) Merge: 64a4f8d0 57665dc0 Author: Dieter Plaetinck <dieter@plaetinck.be> Date: Sat May 16 16:24:59 2009 +0200 merge in Duclares stuff diff --git a/uzbl.c b/uzbl.c index 3e767de7..b2b996bc 100644 --- a/uzbl.c +++ b/uzb...
0
7
CVE-2010-0011
The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code.
uzbl/uzbl
6653a8167ce787b0227e720a1b05cf17090009be
Cleanups after switching to hard wrapping. Signed-off-by: Dan Hackney <dan@haxney.org>
commit 6653a8167ce787b0227e720a1b05cf17090009be Author: Dan Hackney <dan@haxney.org> Date: Sat Jan 2 21:45:24 2010 -0500 Cleanups after switching to hard wrapping. Signed-off-by: Dan Hackney <dan@haxney.org> diff --git a/README b/README index 358096cc..451cf34e 100644 --- a/README +++ b/README @@ -98,8...
0
9
CVE-2010-0011
The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code.
uzbl/uzbl
e3f6305e0455b6c88b7ff3fc140d7d520f344a0b
Make progress bar show empty on start of page load Previously, when clicking on a link or opening a new URL, the user would not get any feedback showing that the command was taken until after a progress change, which could sometimes take a prolonged period of time. Now, the user is immediately alerted via the statusba...
commit e3f6305e0455b6c88b7ff3fc140d7d520f344a0b Author: Jeremy O'Brien <obrien654j@gmail.com> Date: Thu Jun 4 23:51:34 2009 -0400 Make progress bar show empty on start of page load Previously, when clicking on a link or opening a new URL, the user would not get any feedback showing that the command ...
0
10
CVE-2010-0011
The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code.
uzbl/uzbl
2926b0f55122b131e0b9d2cf857d2b78d202c5ab
Fixed array bug. When e.g. spawn_sh modifies the array, invalid stuff is send to the python script, which then breaks while decoding them.
commit 2926b0f55122b131e0b9d2cf857d2b78d202c5ab Author: Olof-Joachim Frahm <Olof.Frahm@web.de> Date: Mon Mar 21 06:23:23 2011 +0100 Fixed array bug. When e.g. spawn_sh modifies the array, invalid stuff is send to the python script, which then breaks while decoding them. diff --git a/src/uzbl-core.c...
0
5
CVE-2010-0011
The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code.
uzbl/uzbl
0cd3f65d05e7d966ff66d2aa97908332eb2d6c06
merge in pawelz' authentication handler + some other fixes
commit 0cd3f65d05e7d966ff66d2aa97908332eb2d6c06 (from c3c4d481079f2a24ea16cd49b785b6f358a28fc9) Merge: c3c4d481 67c68ee6 Author: Dieter Plaetinck <dieter@plaetinck.be> Date: Sun Jan 24 16:21:11 2010 +0100 merge in pawelz' authentication handler + some other fixes diff --git a/AUTHORS b/AUTHORS index 165eae08..8...
0
6
CVE-2010-0011
The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code.
uzbl/uzbl
f7608a8fc48ad98e6d7227c10cf3786e37c4a2ab
Merge branch 'security-fix'
commit f7608a8fc48ad98e6d7227c10cf3786e37c4a2ab (from a5f014de5f76169a38ee67e46a0526e5d80a3433) Merge: a5f014de 1958b52d Author: Dieter Plaetinck <dieter@plaetinck.be> Date: Tue Jan 5 20:37:08 2010 +0100 Merge branch 'security-fix' diff --git a/README b/README index 0d6ed046..a22e1059 100644 --- a/README +++ b/...
0
3
CVE-2010-0011
The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code.
uzbl/uzbl
786744aea678a45136b2692b189ff96d225b9167
Merge branch 'master' of git://github.com/Dieterbe/uzbl
commit 786744aea678a45136b2692b189ff96d225b9167 (from 585226c1cb80488f1fbd4ad2635550a728bf2747) Merge: 585226c1 f7608a8f Author: Mason Larobina <mason.larobina@gmail.com> Date: Sat Jan 9 13:42:07 2010 +0800 Merge branch 'master' of git://github.com/Dieterbe/uzbl diff --git a/README b/README index 0d6ed046..a22e...
0
8
CVE-2010-0011
The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code.
uzbl/uzbl
f2c7c41f6cc70e1d509967c7487aec5126495557
remove the vestiges of Uzbl.run
commit f2c7c41f6cc70e1d509967c7487aec5126495557 Author: Brendan Taylor <whateley@gmail.com> Date: Thu Jan 13 11:59:23 2011 -0700 remove the vestiges of Uzbl.run diff --git a/README b/README index 051fe6b6..d1f23572 100644 --- a/README +++ b/README @@ -602,25 +602,6 @@ This script tries to authenticate as user a...
0
2
CVE-2010-0011
The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code.
uzbl/uzbl
1958b52d41cba96956dc1995660de49525ed1047
disable Uzbl javascript object because of security problem.
commit 1958b52d41cba96956dc1995660de49525ed1047 Author: Dieter Plaetinck <dieter@plaetinck.be> Date: Tue Jan 5 20:17:29 2010 +0100 disable Uzbl javascript object because of security problem. diff --git a/README b/README index 0d6ed046..a22e1059 100644 --- a/README +++ b/README @@ -397,7 +397,7 @@ The script spe...
1
1
CVE-2010-1666
Buffer overflow in Dan Pascu python-cjson 1.0.5, when UCS-4 encoding is enabled, allows context-dependent attackers to cause a denial of service (application crash) or possibly have unspecified other impact via vectors involving crafted Unicode input to the cjson.encode function.
AGProjects/python-cjson
5fe446896a2d8847d506cd672f5c249c605335a3
More strict and faster check for numbers when decoding
commit 5fe446896a2d8847d506cd672f5c249c605335a3 Author: Dan Pascu <dan@ag-projects.com> Date: Wed May 7 12:46:45 2008 +0000 More strict and faster check for numbers when decoding diff --git a/cjson.c b/cjson.c index 5f0b81e..5f448a4 100644 --- a/cjson.c +++ b/cjson.c @@ -253,68 +253,71 @@ decode_nan(JSONData *j...
0
6
CVE-2010-1666
Buffer overflow in Dan Pascu python-cjson 1.0.5, when UCS-4 encoding is enabled, allows context-dependent attackers to cause a denial of service (application crash) or possibly have unspecified other impact via vectors involving crafted Unicode input to the cjson.encode function.
AGProjects/python-cjson
d6adf10ae863159a9e32f64115598c0d9a1324de
Fixed issue with core file regexp on OS X
commit d6adf10ae863159a9e32f64115598c0d9a1324de Author: Dan Pascu <dan@ag-projects.com> Date: Fri Oct 30 13:06:59 2009 +0000 Fixed issue with core file regexp on OS X diff --git a/.boring b/.boring index 208f3ba..eab8aa8 100644 --- a/.boring +++ b/.boring @@ -6,7 +6,7 @@ (^|/)Thumbs\.db$ \# ~$ -(^|/)core(\.[...
0
4
CVE-2010-1666
Buffer overflow in Dan Pascu python-cjson 1.0.5, when UCS-4 encoding is enabled, allows context-dependent attackers to cause a denial of service (application crash) or possibly have unspecified other impact via vectors involving crafted Unicode input to the cjson.encode function.
AGProjects/python-cjson
b6e3c7edfe5b835e5d6407c568003093c3efe0e0
Fixed some list/dict decoding bugs. Use a state machine for decoding them.
commit b6e3c7edfe5b835e5d6407c568003093c3efe0e0 Author: Dan Pascu <dan@ag-projects.com> Date: Tue May 6 06:33:28 2008 +0000 Fixed some list/dict decoding bugs. Use a state machine for decoding them. diff --git a/cjson.c b/cjson.c index 7844924..37e1fb3 100644 --- a/cjson.c +++ b/cjson.c @@ -318,47 +318,51 @@ de...
0
7
CVE-2010-1666
Buffer overflow in Dan Pascu python-cjson 1.0.5, when UCS-4 encoding is enabled, allows context-dependent attackers to cause a denial of service (application crash) or possibly have unspecified other impact via vectors involving crafted Unicode input to the cjson.encode function.
AGProjects/python-cjson
6e916608ec8ccbc1e56d2f263a95f79127eeb685
Fixed 64-bit portability problems
commit 6e916608ec8ccbc1e56d2f263a95f79127eeb685 Author: Dan Pascu <dan@ag-projects.com> Date: Tue Jul 24 22:10:29 2007 +0000 Fixed 64-bit portability problems diff --git a/ChangeLog b/ChangeLog index 1f768a4..ad4bdf0 100644 --- a/ChangeLog +++ b/ChangeLog @@ -4,6 +4,8 @@ Changes in version 1.0.4 * Added lice...
0
5
CVE-2010-1666
Buffer overflow in Dan Pascu python-cjson 1.0.5, when UCS-4 encoding is enabled, allows context-dependent attackers to cause a denial of service (application crash) or possibly have unspecified other impact via vectors involving crafted Unicode input to the cjson.encode function.
AGProjects/python-cjson
61d86dc39dfc32e6b933d0c03594e53fe88d323e
Implemented recursion limit check for encoding/decoding arrays and objects
commit 61d86dc39dfc32e6b933d0c03594e53fe88d323e Author: Dan Pascu <dan@ag-projects.com> Date: Tue Feb 28 13:02:18 2017 +0000 Implemented recursion limit check for encoding/decoding arrays and objects diff --git a/cjson.c b/cjson.c index 9084fb2..2a87de8 100644 --- a/cjson.c +++ b/cjson.c @@ -526,10 +526,16 @@ d...
0
8
CVE-2010-1666
Buffer overflow in Dan Pascu python-cjson 1.0.5, when UCS-4 encoding is enabled, allows context-dependent attackers to cause a denial of service (application crash) or possibly have unspecified other impact via vectors involving crafted Unicode input to the cjson.encode function.
AGProjects/python-cjson
a454ab7c621f2e816fec9206feb4326d43ffe0d6
Fix encoding of UTF-16 surrogate pairs UCS4 escape sequences aren't valid JSON, so when Py_UNICODE_WIDE is defined, UTF-16 surrogate pairs need to be produced. Decoding retains the surrogate pairs as separate code points instead of joining them, something that perhaps should be improved, but isn't invalid (just inco...
commit a454ab7c621f2e816fec9206feb4326d43ffe0d6 Author: Claudio Freire <klaussfreire@gmail.com> Date: Tue Oct 2 16:56:22 2018 +0000 Fix encoding of UTF-16 surrogate pairs UCS4 escape sequences aren't valid JSON, so when Py_UNICODE_WIDE is defined, UTF-16 surrogate pairs need to be produced. ...
0
2
CVE-2010-1666
Buffer overflow in Dan Pascu python-cjson 1.0.5, when UCS-4 encoding is enabled, allows context-dependent attackers to cause a denial of service (application crash) or possibly have unspecified other impact via vectors involving crafted Unicode input to the cjson.encode function.
AGProjects/python-cjson
dc2b8781b8666de5ca707318521f554904fdd690
Integrate modified 0001-fix-for-CVE-2010-1666 patch from Debian
commit dc2b8781b8666de5ca707318521f554904fdd690 Author: Saul Ibarra <saul@ag-projects.com> Date: Wed Jun 15 11:10:10 2011 +0000 Integrate modified 0001-fix-for-CVE-2010-1666 patch from Debian diff --git a/cjson.c b/cjson.c index 76ce8b4..9084fb2 100644 --- a/cjson.c +++ b/cjson.c @@ -663,17 +663,36 @@ encode_un...
1
1
CVE-2010-1666
Buffer overflow in Dan Pascu python-cjson 1.0.5, when UCS-4 encoding is enabled, allows context-dependent attackers to cause a denial of service (application crash) or possibly have unspecified other impact via vectors involving crafted Unicode input to the cjson.encode function.
AGProjects/python-cjson
85bbce276950218c41e9d8d508ee1562e7ff0aff
Use repr instead of str when encoding floats to preserve full preicision
commit 85bbce276950218c41e9d8d508ee1562e7ff0aff Author: Dan Pascu <dan@ag-projects.com> Date: Fri Mar 7 06:25:49 2008 +0000 Use repr instead of str when encoding floats to preserve full preicision diff --git a/cjson.c b/cjson.c index 04de52c..69aaf0f 100644 --- a/cjson.c +++ b/cjson.c @@ -1019,7 +1019,7 @@ enco...
0
10
CVE-2010-1666
Buffer overflow in Dan Pascu python-cjson 1.0.5, when UCS-4 encoding is enabled, allows context-dependent attackers to cause a denial of service (application crash) or possibly have unspecified other impact via vectors involving crafted Unicode input to the cjson.encode function.
AGProjects/python-cjson
4067ad7e9e0b9783c290a9a7e04eb4498bd49a5e
Raised version and updated changelog
commit 4067ad7e9e0b9783c290a9a7e04eb4498bd49a5e Author: Saul Ibarra <saul@ag-projects.com> Date: Wed Jun 15 12:02:05 2011 +0000 Raised version and updated changelog diff --git a/debian/changelog b/debian/changelog index 1bc4dc0..c9d2f73 100644 --- a/debian/changelog +++ b/debian/changelog @@ -1,3 +1,15 @@ +pyth...
0
9
CVE-2010-1666
Buffer overflow in Dan Pascu python-cjson 1.0.5, when UCS-4 encoding is enabled, allows context-dependent attackers to cause a denial of service (application crash) or possibly have unspecified other impact via vectors involving crafted Unicode input to the cjson.encode function.
AGProjects/python-cjson
b477c18dca392fedb4c60df76ad8bf8db535786c
Fixed 2 potential buffer overflow errors when encoding string/unicode
commit b477c18dca392fedb4c60df76ad8bf8db535786c Author: Dan Pascu <dan@ag-projects.com> Date: Wed Jul 25 13:45:51 2007 +0000 Fixed 2 potential buffer overflow errors when encoding string/unicode diff --git a/ChangeLog b/ChangeLog index 414dcc4..beed6d7 100644 --- a/ChangeLog +++ b/ChangeLog @@ -8,6 +8,8 @@ Chan...
0
3