cve large_string | desc large_string | repo large_string | commit_id large_string | commit_message large_string | diff large_string | label int64 | rank uint32 |
|---|---|---|---|---|---|---|---|
CVE-2005-2351 | Mutt before 1.5.20 patch 7 allows an attacker to cause a denial of service via a series of requests to mutt temporary files. | muttmua/mutt | 4927240d1f8fca0806df1e48e5b09ef067bd3930 | automatic post-release commit for mutt-2.2.7
| commit 4927240d1f8fca0806df1e48e5b09ef067bd3930
Author: Kevin McCarthy <kevin@8t8.us>
Date: Sun Aug 7 10:20:17 2022 -0700
automatic post-release commit for mutt-2.2.7
diff --git a/ChangeLog b/ChangeLog
index 9a356c55..1665b5c1 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,3 +1,151 @@
+2022-08-07 10:15:32 -0700 ... | 0 | 7 |
CVE-2005-2351 | Mutt before 1.5.20 patch 7 allows an attacker to cause a denial of service via a series of requests to mutt temporary files. | muttmua/mutt | 848834424235c850947c164ff782d4b8292e084d | Fix next_token() oob read. (closes #3787)
With specially crafted input to 'mutt -H', the line "Return-Path:<() "
is read and passed to mutt_parse_rfc822_line(). "<() " is then passed
through to rfc822_parse_adrlist().
Eventually, inside next_token(), is_special(*s) is called when s
points to the end of the string ('... | commit 848834424235c850947c164ff782d4b8292e084d
Author: Kevin McCarthy <kevin@8t8.us>
Date: Sun Oct 18 19:45:51 2015 +0800
Fix next_token() oob read. (closes #3787)
With specially crafted input to 'mutt -H', the line "Return-Path:<() "
is read and passed to mutt_parse_rfc822_line(). "<() " is then ... | 0 | 6 |
CVE-2005-2351 | Mutt before 1.5.20 patch 7 allows an attacker to cause a denial of service via a series of requests to mutt temporary files. | muttmua/mutt | 85a0ec8505d8cf9ab29765a07fc721f6018f59ea | Fix pgp_application_pgp_handler to remove all tempfiles.
If multiple PGP blocks are present in an email, Mutt only cleans up the
tempfiles for the last block. Thanks to Dennis Preiser for the patch
and sample mbox file demonstrating the problem.
This patch also fixes the argument to mutt_perror for the pgpout
tempfi... | commit 85a0ec8505d8cf9ab29765a07fc721f6018f59ea
Author: Kevin McCarthy <kevin@8t8.us>
Date: Wed Mar 4 19:24:31 2015 -0800
Fix pgp_application_pgp_handler to remove all tempfiles.
If multiple PGP blocks are present in an email, Mutt only cleans up the
tempfiles for the last block. Thanks to Dennis P... | 0 | 2 |
CVE-2005-2351 | Mutt before 1.5.20 patch 7 allows an attacker to cause a denial of service via a series of requests to mutt temporary files. | muttmua/mutt | 4fc97a2026f671a35e3d296bbfdeb3794d6313c7 | Display error if no imap authenticators are available.
Without SASL enabled, and with an explicit value in
$imap_authenticators not natively implemented by Mutt, no calls to
authenticator->authenticate() were occuring.
This resulted in the default r value of -1 passing through, which did
not trigger the mutt_error() ... | commit 4fc97a2026f671a35e3d296bbfdeb3794d6313c7
Author: Kevin McCarthy <kevin@8t8.us>
Date: Wed Apr 8 09:20:54 2020 -0700
Display error if no imap authenticators are available.
Without SASL enabled, and with an explicit value in
$imap_authenticators not natively implemented by Mutt, no calls to
... | 0 | 5 |
CVE-2005-2351 | Mutt before 1.5.20 patch 7 allows an attacker to cause a denial of service via a series of requests to mutt temporary files. | muttmua/mutt | c160ca1d74915f7b6a2fa18a5f4bdfc1663b7c88 | Reset invalid parsed received dates to 0. (closes #3878)
The actual problem in the ticket would be solved by d3f31cf9239e (see
#3798). However there is still the bug that Mutt considers a
(hdr->received != 0) to be set and usable, despite not checking the
return value of mutt_parse_date().
Change mutt_read_rfc822_h... | commit c160ca1d74915f7b6a2fa18a5f4bdfc1663b7c88
Author: Kevin McCarthy <kevin@8t8.us>
Date: Sun Sep 25 13:11:03 2016 -0700
Reset invalid parsed received dates to 0. (closes #3878)
The actual problem in the ticket would be solved by d3f31cf9239e (see
#3798). However there is still the bug that Mutt... | 0 | 1 |
CVE-2005-2351 | Mutt before 1.5.20 patch 7 allows an attacker to cause a denial of service via a series of requests to mutt temporary files. | muttmua/mutt | 3d8baab528e370cabb12baf9102d668cead809a7 | I've attached a patch for bug number 1036, as reported at
http://bugs.guug.de/db/pa/lmutt.html ("segfault when more than one
msg is postponed"). This is a patch against mutt 1.4.1.
As it was previously left, no one could reproduce it. The problem
occurs because sorting is disabled when opening the postponed
folder, ... | commit 3d8baab528e370cabb12baf9102d668cead809a7
Author: Dan Fandrich <dan@coneharvesters.com>
Date: Wed Sep 3 17:22:09 2003 +0000
I've attached a patch for bug number 1036, as reported at
http://bugs.guug.de/db/pa/lmutt.html ("segfault when more than one
msg is postponed"). This is a patch against mutt ... | 0 | 8 |
CVE-2005-2351 | Mutt before 1.5.20 patch 7 allows an attacker to cause a denial of service via a series of requests to mutt temporary files. | muttmua/mutt | 356ef5a5f9a508c8f935eb0839b1cc574672057d | Pause for a moment when a hostname fails to resolve. Closes #1942.
There are a number of cases where mutt cascades error messages. It might
be nice if there were an error stack so that low level functions could
push_error instead of displaying it right away, and the higher level ones
could eg mutt_message(_("Failed to ... | commit 356ef5a5f9a508c8f935eb0839b1cc574672057d
Author: Brendan Cully <brendan@kublai.com>
Date: Mon Aug 8 18:59:43 2005 +0000
Pause for a moment when a hostname fails to resolve. Closes #1942.
There are a number of cases where mutt cascades error messages. It might
be nice if there were an error stack s... | 0 | 3 |
CVE-2005-2351 | Mutt before 1.5.20 patch 7 allows an attacker to cause a denial of service via a series of requests to mutt temporary files. | muttmua/mutt | 50e6f343e055dd32be1e3080de4bc9a7e560e685 | Manual: Add a short chapter summarizing security considerations
| commit 50e6f343e055dd32be1e3080de4bc9a7e560e685
Author: Rocco Rutte <pdmef@gmx.net>
Date: Sat Apr 4 14:28:58 2009 +0200
Manual: Add a short chapter summarizing security considerations
diff --git a/doc/Makefile.am b/doc/Makefile.am
index 65d01765..eb568769 100644
--- a/doc/Makefile.am
+++ b/doc/Makefile.am
@@ -3... | 0 | 10 |
CVE-2005-2351 | Mutt before 1.5.20 patch 7 allows an attacker to cause a denial of service via a series of requests to mutt temporary files. | muttmua/mutt | 829db35b1a61f9642e9c9857ecd0d0a9bfde6029 | Use fgets_unlocked and fgetc_unlocked if available.
Since mutt does not use threads, there is no reason it should use the
locked variants of the FILE* IO functions. This checks if the unlocked
functions are available, and if so enables them globally via mutt.h.
Cuts load time for a 56k message, 1.8GB /var/mail mailbo... | commit 829db35b1a61f9642e9c9857ecd0d0a9bfde6029
Author: David Wilson <dw@botanicus.net>
Date: Wed Nov 8 13:40:34 2017 -0800
Use fgets_unlocked and fgetc_unlocked if available.
Since mutt does not use threads, there is no reason it should use the
locked variants of the FILE* IO functions. This checks... | 0 | 9 |
CVE-2005-2351 | Mutt before 1.5.20 patch 7 allows an attacker to cause a denial of service via a series of requests to mutt temporary files. | muttmua/mutt | 781acdf0601fca98aadf1bbfdaae743084cb5f88 | With SASL, expect the server to prompt for additional auth data if
we have some to send (#129961, upstream #1845)
| commit 781acdf0601fca98aadf1bbfdaae743084cb5f88
Author: Bill Nottingham <notting@redhat.com>
Date: Thu Jan 27 18:48:41 2005 +0000
With SASL, expect the server to prompt for additional auth data if
we have some to send (#129961, upstream #1845)
diff --git a/mutt_sasl.c b/mutt_sasl.c
index aa41f2c8..efe7e146 ... | 0 | 4 |
CVE-2005-3745 | Cross-site scripting (XSS) vulnerability in Apache Struts 1.2.7, and possibly other versions allows remote attackers to inject arbitrary web script or HTML via the query string, which is not properly quoted or filtered when the request handler generates an error message. | apache/struts1 | e387b6df99b7ea797814a8b233ae48df12f68763 | Added storeException() method that takes an ActionMessage instead of
ActionError.
git-svn-id: https://svn.apache.org/repos/asf/struts/trunk@50964 13f79535-47bb-0310-9956-ffa450edef68
| commit e387b6df99b7ea797814a8b233ae48df12f68763
Author: David Graham <dgraham@apache.org>
Date: Sat Aug 16 17:50:10 2003 +0000
Added storeException() method that takes an ActionMessage instead of
ActionError.
git-svn-id: https://svn.apache.org/repos/asf/struts/trunk@50964 13f79535-47bb-0310-995... | 0 | 10 |
CVE-2005-3745 | Cross-site scripting (XSS) vulnerability in Apache Struts 1.2.7, and possibly other versions allows remote attackers to inject arbitrary web script or HTML via the query string, which is not properly quoted or filtered when the request handler generates an error message. | apache/struts1 | fa2d79ae6b60f7c3c7b3be2c2da0b0ea361ab5c9 | STR-3004: Delete new copy; use svn copy to retain history
git-svn-id: https://svn.apache.org/repos/asf/struts/struts1/trunk@505772 13f79535-47bb-0310-9956-ffa450edef68
| commit fa2d79ae6b60f7c3c7b3be2c2da0b0ea361ab5c9
Author: Paul C. Benedict Jr <pbenedict@apache.org>
Date: Sat Feb 10 21:44:56 2007 +0000
STR-3004: Delete new copy; use svn copy to retain history
git-svn-id: https://svn.apache.org/repos/asf/struts/struts1/trunk@505772 13f79535-47bb-0310-9956-ffa450edef68
... | 0 | 2 |
CVE-2005-3745 | Cross-site scripting (XSS) vulnerability in Apache Struts 1.2.7, and possibly other versions allows remote attackers to inject arbitrary web script or HTML via the query string, which is not properly quoted or filtered when the request handler generates an error message. | apache/struts1 | dc188fbdf90d6210937dd25d03037018c5f41a87 | Submitted by Ted Husted. Minor changes to hilight standard
ActionForm validate methods.
<snip>
<li>Generally, there will be very little input validation logic in an
<code>ActionForm</code> bean. The primary reason such beans exist
is to save the most recent values entered by the user ... | commit dc188fbdf90d6210937dd25d03037018c5f41a87
Author: Ted Nathan Husted <husted@apache.org>
Date: Wed Jan 10 22:39:27 2001 +0000
Submitted by Ted Husted. Minor changes to hilight standard
ActionForm validate methods.
<snip>
<li>Generally, there will be very little input validation... | 0 | 9 |
CVE-2005-3745 | Cross-site scripting (XSS) vulnerability in Apache Struts 1.2.7, and possibly other versions allows remote attackers to inject arbitrary web script or HTML via the query string, which is not properly quoted or filtered when the request handler generates an error message. | apache/struts1 | 7ac7d6d69ac64863983b2b673aab62241b33ce8f | Bring the release notes for beta-2 up to date with respect to recent changes.
git-svn-id: https://svn.apache.org/repos/asf/struts/trunk@48341 13f79535-47bb-0310-9956-ffa450edef68
| commit 7ac7d6d69ac64863983b2b673aab62241b33ce8f
Author: Craig R. McClanahan <craigmcc@apache.org>
Date: Sun May 13 02:56:19 2001 +0000
Bring the release notes for beta-2 up to date with respect to recent changes.
git-svn-id: https://svn.apache.org/repos/asf/struts/trunk@48341 13f79535-47bb-0310-995... | 0 | 7 |
CVE-2005-3745 | Cross-site scripting (XSS) vulnerability in Apache Struts 1.2.7, and possibly other versions allows remote attackers to inject arbitrary web script or HTML via the query string, which is not properly quoted or filtered when the request handler generates an error message. | apache/struts1 | 0c52833f19f85825e04d16a3a4b8aad3595ce0e6 | Initial checkin of the "Declarative Exception Handling" feature (sorry
this took so long). I've incorporated it as presented, based on the
original configuration mechanism, to get it in play as quickly as possible.
It will next be integrated into the new ApplicationConfig approach so that
it works in sub-applications ... | commit 0c52833f19f85825e04d16a3a4b8aad3595ce0e6
Author: Craig R. McClanahan <craigmcc@apache.org>
Date: Mon Dec 31 01:14:36 2001 +0000
Initial checkin of the "Declarative Exception Handling" feature (sorry
this took so long). I've incorporated it as presented, based on the
original configuration mechani... | 0 | 4 |
CVE-2005-3745 | Cross-site scripting (XSS) vulnerability in Apache Struts 1.2.7, and possibly other versions allows remote attackers to inject arbitrary web script or HTML via the query string, which is not properly quoted or filtered when the request handler generates an error message. | apache/struts1 | bbacb93047499aa5694058ec5379ed7b68420662 | Moved ssl page from taglib to core.
git-svn-id: https://svn.apache.org/repos/asf/struts/core/trunk@332197 13f79535-47bb-0310-9956-ffa450edef68
| commit bbacb93047499aa5694058ec5379ed7b68420662
Author: Wendy Smoak <wsmoak@apache.org>
Date: Thu Nov 10 02:11:47 2005 +0000
Moved ssl page from taglib to core.
git-svn-id: https://svn.apache.org/repos/asf/struts/core/trunk@332197 13f79535-47bb-0310-9956-ffa450edef68
diff --git a/xdocs/ssl.xml b/xdocs/... | 0 | 8 |
CVE-2005-3745 | Cross-site scripting (XSS) vulnerability in Apache Struts 1.2.7, and possibly other versions allows remote attackers to inject arbitrary web script or HTML via the query string, which is not properly quoted or filtered when the request handler generates an error message. | apache/struts1 | 5b26c0cd85dc51f47ef8496ce8f9d73c651196e8 | Submitted by Ted Husted. Updated "presentation tags" segment to include present/notPresent, and omit 0.5 versions. Updated beginning of "Automatic Form Validation" section to omit non-HTTP version (beyond scope of users guide).
<section name="3.3.3 Other Useful Presentation Tags" href="presentation_tags">
... | commit 5b26c0cd85dc51f47ef8496ce8f9d73c651196e8
Author: Ted Nathan Husted <husted@apache.org>
Date: Thu Jan 11 00:20:03 2001 +0000
Submitted by Ted Husted. Updated "presentation tags" segment to include present/notPresent, and omit 0.5 versions. Updated beginning of "Automatic Form Validation" section to omit n... | 0 | 1 |
CVE-2005-3745 | Cross-site scripting (XSS) vulnerability in Apache Struts 1.2.7, and possibly other versions allows remote attackers to inject arbitrary web script or HTML via the query string, which is not properly quoted or filtered when the request handler generates an error message. | apache/struts1 | 942be4854f1ddf98a64e4dee7bb14fcb40d23d25 | Submitted by Ted Husted. Minor stylistic changes to introduction. Refactor section 1.2 to segue from 1.1 and 1.3.
[1.1]
Good Thing.
Java code.
in-and-of itself
resolve /the/ flow control issues
under the Sun ...
released, and IOHO, Java Model 2 development will never be quite the same.
<strike>If you are new ..... | commit 942be4854f1ddf98a64e4dee7bb14fcb40d23d25
Author: Ted Nathan Husted <husted@apache.org>
Date: Sun Jan 21 12:57:51 2001 +0000
Submitted by Ted Husted. Minor stylistic changes to introduction. Refactor section 1.2 to segue from 1.1 and 1.3.
[1.1]
Good Thing.
Java code.
in-... | 0 | 3 |
CVE-2005-3745 | Cross-site scripting (XSS) vulnerability in Apache Struts 1.2.7, and possibly other versions allows remote attackers to inject arbitrary web script or HTML via the query string, which is not properly quoted or filtered when the request handler generates an error message. | apache/struts1 | 8056f6ea913ff717dcbdcca6d5fcb8f0946c10a0 | Fix line ends, in preparation for other changes.
git-svn-id: https://svn.apache.org/repos/asf/struts/trunk@48660 13f79535-47bb-0310-9956-ffa450edef68
| commit 8056f6ea913ff717dcbdcca6d5fcb8f0946c10a0
Author: Martin Cooper <martinc@apache.org>
Date: Fri Oct 19 05:15:16 2001 +0000
Fix line ends, in preparation for other changes.
git-svn-id: https://svn.apache.org/repos/asf/struts/trunk@48660 13f79535-47bb-0310-9956-ffa450edef68
diff --git a/doc/use... | 0 | 6 |
CVE-2005-3745 | Cross-site scripting (XSS) vulnerability in Apache Struts 1.2.7, and possibly other versions allows remote attackers to inject arbitrary web script or HTML via the query string, which is not properly quoted or filtered when the request handler generates an error message. | apache/struts1 | 577746b34784c7acbc0920567580b848114452e5 | Oops, meant to copy this in r279152, but I moved it instead.
git-svn-id: https://svn.apache.org/repos/asf/struts/core/trunk@279968 13f79535-47bb-0310-9956-ffa450edef68
| commit 577746b34784c7acbc0920567580b848114452e5
Author: Ted Nathan Husted <husted@apache.org>
Date: Sat Sep 10 08:07:48 2005 +0000
Oops, meant to copy this in r279152, but I moved it instead.
git-svn-id: https://svn.apache.org/repos/asf/struts/core/trunk@279968 13f79535-47bb-0310-9956-ffa450edef68
diff... | 0 | 5 |
CVE-2006-0847 | Directory traversal vulnerability in the staticfilter component in CherryPy before 2.1.1 allows remote attackers to read arbitrary files via ".." sequences in unspecified vectors. | cherrypy/cherrypy | 8a592984cb69669bb05cabf29a54cffcd744ab9d | Fix (partial?) for #373. Fixes staticFilter.
| commit 8a592984cb69669bb05cabf29a54cffcd744ab9d
Author: Robert Brewer <fumanchu@aminus.org>
Date: Fri Oct 28 00:14:53 2005 +0000
Fix (partial?) for #373. Fixes staticFilter.
diff --git a/cherrypy/lib/filter/staticfilter.py b/cherrypy/lib/filter/staticfilter.py
index a1bafcad..de7e8c33 100644
--- a/cherrypy/lib/... | 0 | 8 |
CVE-2006-0847 | Directory traversal vulnerability in the staticfilter component in CherryPy before 2.1.1 allows remote attackers to read arbitrary files via ".." sequences in unspecified vectors. | cherrypy/cherrypy | f71d502fcb5c77fa80ad8e305de5fdf13e2bad7f | Trunk fix for #744 (Malicious cookies may allow access to files outside the session directory).
| commit f71d502fcb5c77fa80ad8e305de5fdf13e2bad7f
Author: Robert Brewer <fumanchu@aminus.org>
Date: Sat Oct 27 17:15:58 2007 +0000
Trunk fix for #744 (Malicious cookies may allow access to files outside the session directory).
diff --git a/cherrypy/lib/sessions.py b/cherrypy/lib/sessions.py
index 8b1c3760..810b8c... | 0 | 7 |
CVE-2006-0847 | Directory traversal vulnerability in the staticfilter component in CherryPy before 2.1.1 allows remote attackers to read arbitrary files via ".." sequences in unspecified vectors. | cherrypy/cherrypy | 85a2984b3dfa29b2ce9c03abe9a7bb4a385b22c4 | Replaced request.remote_addr, remote_port, and remote_host with a single "remote" attribute, an instance of lib.http.Host, which has "ip", "port" and "name" attributes. Added a similar request.local attribute. Changed request() signature to (local, remote, scheme). This allows requests run behind multiple HTTP servers ... | commit 85a2984b3dfa29b2ce9c03abe9a7bb4a385b22c4
Author: Robert Brewer <fumanchu@aminus.org>
Date: Mon Aug 7 02:48:57 2006 +0000
Replaced request.remote_addr, remote_port, and remote_host with a single "remote" attribute, an instance of lib.http.Host, which has "ip", "port" and "name" attributes. Added a similar ... | 0 | 9 |
CVE-2006-0847 | Directory traversal vulnerability in the staticfilter component in CherryPy before 2.1.1 allows remote attackers to read arbitrary files via ".." sequences in unspecified vectors. | cherrypy/cherrypy | b673abd4486e5776130be58204cbef59473cb18f | Fix for #404, #417 (index files and staticfilter). New "static_filter.index" config entry.
| commit b673abd4486e5776130be58204cbef59473cb18f
Author: Robert Brewer <fumanchu@aminus.org>
Date: Thu Dec 29 23:03:46 2005 +0000
Fix for #404, #417 (index files and staticfilter). New "static_filter.index" config entry.
diff --git a/cherrypy/filters/staticfilter.py b/cherrypy/filters/staticfilter.py
index 33c34... | 0 | 4 |
CVE-2006-0847 | Directory traversal vulnerability in the staticfilter component in CherryPy before 2.1.1 allows remote attackers to read arbitrary files via ".." sequences in unspecified vectors. | cherrypy/cherrypy | 2d1f9c0b09420909a3ee8540e901d62b7b7d2cd0 | A more inclusive, os-level check for staticfilter uplevel attacks.
| commit 2d1f9c0b09420909a3ee8540e901d62b7b7d2cd0
Author: Robert Brewer <fumanchu@aminus.org>
Date: Tue Jan 10 21:47:24 2006 +0000
A more inclusive, os-level check for staticfilter uplevel attacks.
diff --git a/cherrypy/filters/staticfilter.py b/cherrypy/filters/staticfilter.py
index c0c34fc1..c885fbea 100644
---... | 0 | 1 |
CVE-2006-0847 | Directory traversal vulnerability in the staticfilter component in CherryPy before 2.1.1 allows remote attackers to read arbitrary files via ".." sequences in unspecified vectors. | cherrypy/cherrypy | 7e6187ee19a90ebe7f8597296bfa942cd1eb1864 | Patch for serious security flaw in staticfilter
| commit 7e6187ee19a90ebe7f8597296bfa942cd1eb1864
Author: Remi Delon <rdelon@cherrypy.org>
Date: Tue Jan 10 15:40:43 2006 +0000
Patch for serious security flaw in staticfilter
diff --git a/cherrypy/_cputil.py b/cherrypy/_cputil.py
index 0ba12570..a0be071b 100644
--- a/cherrypy/_cputil.py
+++ b/cherrypy/_cputil.py... | 1 | 3 |
CVE-2006-0847 | Directory traversal vulnerability in the staticfilter component in CherryPy before 2.1.1 allows remote attackers to read arbitrary files via ".." sequences in unspecified vectors. | cherrypy/cherrypy | f9a56a72a69d9ecc62d745141735aee8bd4eade3 | Fix for #402 (staticfilter errors if .on but no .file nor .dir).
| commit f9a56a72a69d9ecc62d745141735aee8bd4eade3
Author: Robert Brewer <fumanchu@aminus.org>
Date: Fri Dec 30 07:04:41 2005 +0000
Fix for #402 (staticfilter errors if .on but no .file nor .dir).
diff --git a/cherrypy/filters/staticfilter.py b/cherrypy/filters/staticfilter.py
index b82ae989..a4235f37 100644
--- a... | 0 | 5 |
CVE-2006-0847 | Directory traversal vulnerability in the staticfilter component in CherryPy before 2.1.1 allows remote attackers to read arbitrary files via ".." sequences in unspecified vectors. | cherrypy/cherrypy | c1de1a99373fb76b287636a47c3c2e57b690c7df | Test for staticfilter uplevel security, plus a more-informative error if staticfilter can't obtain an absolute path.
| commit c1de1a99373fb76b287636a47c3c2e57b690c7df
Author: Robert Brewer <fumanchu@aminus.org>
Date: Tue Jan 10 19:13:07 2006 +0000
Test for staticfilter uplevel security, plus a more-informative error if staticfilter can't obtain an absolute path.
diff --git a/cherrypy/filters/staticfilter.py b/cherrypy/filters/s... | 0 | 2 |
CVE-2006-0847 | Directory traversal vulnerability in the staticfilter component in CherryPy before 2.1.1 allows remote attackers to read arbitrary files via ".." sequences in unspecified vectors. | cherrypy/cherrypy | 09f4d4b6c3c1db6949eb4cdab195b7485a90e600 | fix which now allows us to serve static content directly alongside dynamic content. staticFilter won't take over the entire request if it doesn't find the file
| commit 09f4d4b6c3c1db6949eb4cdab195b7485a90e600
Author: Peter Hunt <none@none>
Date: Tue Dec 20 02:03:58 2005 +0000
fix which now allows us to serve static content directly alongside dynamic content. staticFilter won't take over the entire request if it doesn't find the file
diff --git a/cherrypy/filters/static... | 0 | 6 |
CVE-2006-0847 | Directory traversal vulnerability in the staticfilter component in CherryPy before 2.1.1 allows remote attackers to read arbitrary files via ".." sequences in unspecified vectors. | cherrypy/cherrypy | 3fcc339cb6cd8a633f6be06220a3db5188069e24 | X-Forwarded-For should overwrite remote.ip, not remote.name.
| commit 3fcc339cb6cd8a633f6be06220a3db5188069e24
Author: Robert Brewer <fumanchu@aminus.org>
Date: Fri Aug 11 16:55:20 2006 +0000
X-Forwarded-For should overwrite remote.ip, not remote.name.
diff --git a/cherrypy/lib/cptools.py b/cherrypy/lib/cptools.py
index ef25c1a9..e570e1cf 100644
--- a/cherrypy/lib/cptools.... | 0 | 10 |
CVE-2007-2383 | The Prototype (prototypejs) framework before 1.5.1 RC3 exchanges data using JavaScript Object Notation (JSON) without an associated protection scheme, which allows remote attackers to obtain the data via a web page that retrieves the data through a URL in the SRC attribute of a SCRIPT element and captures the data usin... | sstephenson/prototype | 29c436886cc019e72eeb39fe6ef99af1f70bd86c | Merge pull request #43 from victor-homyakov/patch-5
Fix PDoc. | commit 29c436886cc019e72eeb39fe6ef99af1f70bd86c (from 7b09d807dad9f1be0d3e56125ecdc991996fec0b)
Merge: 7b09d80 308917b
Author: Andrew Dupont <andrew@andrewdupont.net>
Date: Fri Mar 30 12:50:21 2012 -0700
Merge pull request #43 from victor-homyakov/patch-5
Fix PDoc.
diff --git a/src/prototype/lang/strin... | 0 | 8 |
CVE-2007-2383 | The Prototype (prototypejs) framework before 1.5.1 RC3 exchanges data using JavaScript Object Notation (JSON) without an associated protection scheme, which allows remote attackers to obtain the data via a web page that retrieves the data through a URL in the SRC attribute of a SCRIPT element and captures the data usin... | sstephenson/prototype | 093c0cce4bbb89b88b0af20356faa83906b3aafa | Optimize retrieving of top|left|right|bottom properties. Add some documentation. Disable setting of properties for now. | commit 093c0cce4bbb89b88b0af20356faa83906b3aafa
Author: Andrew Dupont <prototype@andrewdupont.net>
Date: Mon Nov 2 23:54:25 2009 -0600
Optimize retrieving of top|left|right|bottom properties. Add some documentation. Disable setting of properties for now.
diff --git a/src/dom/layout.js b/src/dom/layout.js
index ... | 0 | 9 |
CVE-2007-2383 | The Prototype (prototypejs) framework before 1.5.1 RC3 exchanges data using JavaScript Object Notation (JSON) without an associated protection scheme, which allows remote attackers to obtain the data via a web page that retrieves the data through a URL in the SRC attribute of a SCRIPT element and captures the data usin... | sstephenson/prototype | c2c47da6aa4e41d2cb45255ad8f3c95eb26f8b44 | Optimize retrieving of top|left|right|bottom properties. Add some documentation. Disable setting of properties for now.
| commit c2c47da6aa4e41d2cb45255ad8f3c95eb26f8b44
Author: Andrew Dupont <prototype@andrewdupont.net>
Date: Mon Nov 2 23:54:25 2009 -0600
Optimize retrieving of top|left|right|bottom properties. Add some documentation. Disable setting of properties for now.
diff --git a/src/dom/layout.js b/src/dom/layout.js
index ... | 0 | 10 |
CVE-2007-2383 | The Prototype (prototypejs) framework before 1.5.1 RC3 exchanges data using JavaScript Object Notation (JSON) without an associated protection scheme, which allows remote attackers to obtain the data via a web page that retrieves the data through a URL in the SRC attribute of a SCRIPT element and captures the data usin... | sstephenson/prototype | 36a9f70687b0a1b0d93349d9e1ba7061059399f9 | Merge pull request #27 from rlineweaver/master
Avoid an infinite loop in `String#gsub` when there is a zero-length match. | commit 36a9f70687b0a1b0d93349d9e1ba7061059399f9 (from c8a6942a0cd0537ed4168f837cd1aa99dcacc17e)
Merge: c8a6942 075625c
Author: Andrew Dupont <andrew@andrewdupont.net>
Date: Mon Aug 27 15:10:48 2012 -0700
Merge pull request #27 from rlineweaver/master
Avoid an infinite loop in `String#gsub` when there is... | 0 | 4 |
CVE-2007-2383 | The Prototype (prototypejs) framework before 1.5.1 RC3 exchanges data using JavaScript Object Notation (JSON) without an associated protection scheme, which allows remote attackers to obtain the data via a web page that retrieves the data through a URL in the SRC attribute of a SCRIPT element and captures the data usin... | sstephenson/prototype | 1d617df4df4b2ae8dff41038c59ee67928e0f3cd | Avoid using arguments.callee in string.js.
| commit 1d617df4df4b2ae8dff41038c59ee67928e0f3cd
Author: Tobie Langel <tobie.langel@gmail.com>
Date: Thu Dec 11 04:28:35 2008 +0100
Avoid using arguments.callee in string.js.
diff --git a/src/lang/string.js b/src/lang/string.js
index f50e570..587c944 100644
--- a/src/lang/string.js
+++ b/src/lang/string.js
@@ -8... | 0 | 7 |
CVE-2007-2383 | The Prototype (prototypejs) framework before 1.5.1 RC3 exchanges data using JavaScript Object Notation (JSON) without an associated protection scheme, which allows remote attackers to obtain the data via a web page that retrieves the data through a URL in the SRC attribute of a SCRIPT element and captures the data usin... | sstephenson/prototype | 9e78eff0245c23b3104a814db0920f9b9740f938 | Ensure `String#extractScripts` and `String#evalScripts` ignore `SCRIPT` tags with a `type` attribute set to a non-JavaScript MIME-type. (Closes #304) | commit 9e78eff0245c23b3104a814db0920f9b9740f938
Author: Andrew Dupont <github@andrewdupont.net>
Date: Sun Apr 9 17:39:14 2017 -0500
Ensure `String#extractScripts` and `String#evalScripts` ignore `SCRIPT` tags with a `type` attribute set to a non-JavaScript MIME-type. (Closes #304)
diff --git a/src/prototype/lan... | 0 | 2 |
CVE-2007-2383 | The Prototype (prototypejs) framework before 1.5.1 RC3 exchanges data using JavaScript Object Notation (JSON) without an associated protection scheme, which allows remote attackers to obtain the data via a web page that retrieves the data through a URL in the SRC attribute of a SCRIPT element and captures the data usin... | sstephenson/prototype | 6a992259424e028616dc83147d18f0160219079d | Add a numeric query string to all the assets we serve out of /static just to be safe. | commit 6a992259424e028616dc83147d18f0160219079d
Author: Andrew Dupont <github@andrewdupont.net>
Date: Sun May 18 20:46:06 2014 -0500
Add a numeric query string to all the assets we serve out of /static just to be safe.
diff --git a/test.new/views/layout.erb b/test.new/views/layout.erb
index 4567690..74eebc6 100... | 0 | 3 |
CVE-2007-2383 | The Prototype (prototypejs) framework before 1.5.1 RC3 exchanges data using JavaScript Object Notation (JSON) without an associated protection scheme, which allows remote attackers to obtain the data via a web page that retrieves the data through a URL in the SRC attribute of a SCRIPT element and captures the data usin... | sstephenson/prototype | f64393e13b33ef61c435f9e03ad610e75e59df0d | Fix a URIError encountered in Chrome when interpreting an `X-JSON` header with extended characters. | commit f64393e13b33ef61c435f9e03ad610e75e59df0d
Author: Andrew Dupont <prototype@andrewdupont.net>
Date: Tue Jun 5 01:21:35 2012 -0500
Fix a URIError encountered in Chrome when interpreting an `X-JSON` header with extended characters.
diff --git a/src/prototype/ajax/response.js b/src/prototype/ajax/response.js
... | 0 | 5 |
CVE-2007-2383 | The Prototype (prototypejs) framework before 1.5.1 RC3 exchanges data using JavaScript Object Notation (JSON) without an associated protection scheme, which allows remote attackers to obtain the data via a web page that retrieves the data through a URL in the SRC attribute of a SCRIPT element and captures the data usin... | sstephenson/prototype | 5e5cfff7c2c253eaf415c279f9083b4650cd4506 | Sprockets 2 compatibility
| commit 5e5cfff7c2c253eaf415c279f9083b4650cd4506
Author: Joshua Peek <josh@joshpeek.com>
Date: Wed Dec 1 14:16:11 2010 -0600
Sprockets 2 compatibility
diff --git a/Rakefile b/Rakefile
index f3dc99e..c2b744c 100755
--- a/Rakefile
+++ b/Rakefile
@@ -76,7 +76,7 @@ module PrototypeHelper
</h1>
EOF
PDoc.run({
... | 0 | 6 |
CVE-2007-2383 | The Prototype (prototypejs) framework before 1.5.1 RC3 exchanges data using JavaScript Object Notation (JSON) without an associated protection scheme, which allows remote attackers to obtain the data via a web page that retrieves the data through a URL in the SRC attribute of a SCRIPT element and captures the data usin... | sstephenson/prototype | fea6bc1a21011c82290f6b5eeb3c3a34e9cdc62b | prototype: Automatically strip security delimiter comments from JSON strings before evaling them. The default delimiter is '/*-secure- ... */' or you can specify your own with the Prototype.JSONFilter regular expression. If you wrap your JSON response bodies in this delimiter on the server side, rogue external sites ... | commit fea6bc1a21011c82290f6b5eeb3c3a34e9cdc62b
Author: Sam Stephenson <sam@37signals.com>
Date: Tue Apr 24 03:31:14 2007 +0000
prototype: Automatically strip security delimiter comments from JSON strings before evaling them. The default delimiter is '/*-secure- ... */' or you can specify your own with the Prot... | 1 | 1 |
CVE-2008-7050 | The password_check function in auth/auth_phpbb3.php in WoW Raid Manager 3.5.1 before Patch 1, when using PHPBB3 authentication, (1) does not invoke the CheckPassword function with the required arguments, which always triggers an authentication failure, and (2) returns true instead of false when an authentication failur... | Illydth/wowraidmanager | baaccba1411afab6b3794d405d5143b4cf9d75c0 | Fixed Signup Limits bug where an invalid check was being done on the role
limit, causing queuing when over limit not to occur.
The software was checking $count['Tank'] instead of $count['role1'] (which
is what is returned by the count function) and thus the equality check
always failed (meaning $queue was never set).
| commit baaccba1411afab6b3794d405d5143b4cf9d75c0
Author: Douglas Wagner <douglasw@wagnerweb.org>
Date: Wed Jul 15 16:18:41 2009 -0500
Fixed Signup Limits bug where an invalid check was being done on the role
limit, causing queuing when over limit not to occur.
The software was checking $count['Tank']... | 0 | 3 |
CVE-2008-7050 | The password_check function in auth/auth_phpbb3.php in WoW Raid Manager 3.5.1 before Patch 1, when using PHPBB3 authentication, (1) does not invoke the CheckPassword function with the required arguments, which always triggers an authentication failure, and (2) returns true instead of false when an authentication failur... | Illydth/wowraidmanager | 7e018942065a006e82c0789230824783a4f171c5 | Bug fix for getCookiePath() to support users below PHP v5.1.2
The second parameter (PHP_URL_PATH) added to parse_url is not supported
until php 5.1.2, this was causing people to get parse_url errors and
session start errors thrown at them.
This should now be fixed.
| commit 7e018942065a006e82c0789230824783a4f171c5
Author: Douglas Wagner <dwagner@wstldwagner2.rgare.net>
Date: Fri Jan 2 18:25:50 2009 -0600
Bug fix for getCookiePath() to support users below PHP v5.1.2
The second parameter (PHP_URL_PATH) added to parse_url is not supported
until php 5.1.2, this was ... | 0 | 6 |
CVE-2008-7050 | The password_check function in auth/auth_phpbb3.php in WoW Raid Manager 3.5.1 before Patch 1, when using PHPBB3 authentication, (1) does not invoke the CheckPassword function with the required arguments, which always triggers an authentication failure, and (2) returns true instead of false when an authentication failur... | Illydth/wowraidmanager | 8e73576c53b13b4583e1bf796492ca9e49db184a | clean up Auth Code
Signed-off-by: neme <carsten@hoelbing.net>
| commit 8e73576c53b13b4583e1bf796492ca9e49db184a
Author: neme <carsten@hoelbing.net>
Date: Tue Aug 24 00:57:56 2010 +0200
clean up Auth Code
Signed-off-by: neme <carsten@hoelbing.net>
diff --git a/auth/auth_e107.php b/auth/auth_e107.php
index 51098bc..b835582 100644
--- a/auth/auth_e107.php
+++ b/auth/a... | 0 | 5 |
CVE-2008-7050 | The password_check function in auth/auth_phpbb3.php in WoW Raid Manager 3.5.1 before Patch 1, when using PHPBB3 authentication, (1) does not invoke the CheckPassword function with the required arguments, which always triggers an authentication failure, and (2) returns true instead of false when an authentication failur... | Illydth/wowraidmanager | 8d04162c448ba0b179058a4a77f301cec8f8fc7a | Bridge Updates: Bug 0000047 and 0000048
Fix to the "Update" statement bugs and a bug in PHPBB3 that removed the
ability to display pages anonymously...as well as allowed raid creation to
users that weren't supposed to be able to creat raids.
| commit 8d04162c448ba0b179058a4a77f301cec8f8fc7a
Author: Douglas Wagner <dwagner@wstldwagner2.rgare.net>
Date: Mon Aug 11 13:30:03 2008 -0500
Bridge Updates: Bug 0000047 and 0000048
Fix to the "Update" statement bugs and a bug in PHPBB3 that removed the
ability to display pages anonymously...as well ... | 0 | 9 |
CVE-2008-7050 | The password_check function in auth/auth_phpbb3.php in WoW Raid Manager 3.5.1 before Patch 1, when using PHPBB3 authentication, (1) does not invoke the CheckPassword function with the required arguments, which always triggers an authentication failure, and (2) returns true instead of false when an authentication failur... | Illydth/wowraidmanager | 17ead31e9541467a897ccd23bdb480383c1808db | Bridge Update: Brings all bridges into alignment.
This update to the bridge files by Neme brings all bridge files into
aligment code wise. They should now all be doing the same thing. At this
point a massive re-write needs to be done on all bridges to get them to
work properly.
| commit 17ead31e9541467a897ccd23bdb480383c1808db
Author: Douglas Wagner <dwagner@wstldwagner2.rgare.net>
Date: Thu Sep 11 11:26:53 2008 -0500
Bridge Update: Brings all bridges into alignment.
This update to the bridge files by Neme brings all bridge files into
aligment code wise. They should now all... | 0 | 10 |
CVE-2008-7050 | The password_check function in auth/auth_phpbb3.php in WoW Raid Manager 3.5.1 before Patch 1, when using PHPBB3 authentication, (1) does not invoke the CheckPassword function with the required arguments, which always triggers an authentication failure, and (2) returns true instead of false when an authentication failur... | Illydth/wowraidmanager | f85e6f5d9d29110be9564e008d8f40cb4dd2bab6 | Bug 0000039: HTMLSPECIALCHARS_DECODE Fails on PHP4.
The htmlspecialchars_decode function is PHP5 (5.1.0) only and doesn't work
for php4.
There is a new function definition at the top of the file to define the
function for php4 folks.
| commit f85e6f5d9d29110be9564e008d8f40cb4dd2bab6
Author: Douglas Wagner <dwagner@wstldwagner2.rgare.net>
Date: Tue Aug 5 13:33:30 2008 -0500
Bug 0000039: HTMLSPECIALCHARS_DECODE Fails on PHP4.
The htmlspecialchars_decode function is PHP5 (5.1.0) only and doesn't work
for php4.
There is a new... | 0 | 7 |
CVE-2008-7050 | The password_check function in auth/auth_phpbb3.php in WoW Raid Manager 3.5.1 before Patch 1, when using PHPBB3 authentication, (1) does not invoke the CheckPassword function with the required arguments, which always triggers an authentication failure, and (2) returns true instead of false when an authentication failur... | Illydth/wowraidmanager | 64ad34abd7c038572b2cceee4f9efd9c3399ccdb | Quick fix for log deletes that doesn't leave a vulnerability.
Code submitted by LuL0r of wowraidmanager.net. This quick
change fixes the problems of deleting logs without the
"hole" introduced in the last patch. The table name is now
generated passed through quote smart before being used in the
truncate SQL.
| commit 64ad34abd7c038572b2cceee4f9efd9c3399ccdb
Author: Douglas Wagner (Illydth) <douglasw@wagnerweb.org>
Date: Sun Apr 27 17:04:24 2008 -0500
Quick fix for log deletes that doesn't leave a vulnerability.
Code submitted by LuL0r of wowraidmanager.net. This quick
change fixes the problems of deletin... | 0 | 8 |
CVE-2008-7050 | The password_check function in auth/auth_phpbb3.php in WoW Raid Manager 3.5.1 before Patch 1, when using PHPBB3 authentication, (1) does not invoke the CheckPassword function with the required arguments, which always triggers an authentication failure, and (2) returns true instead of false when an authentication failur... | Illydth/wowraidmanager | 8b65411c17f2b9a2729976e2719f0c2f4e2d310d | Cookie/Login fix:
Problem identified with cookies and being logged out of the software
tracked back to an issue with capitalization. The incoming cookie username
was NOT being passed through strtolower, and thus did not match the
username being passed in or compared against (which WAS being strtolowered).
Thanks go ... | commit 8b65411c17f2b9a2729976e2719f0c2f4e2d310d
Author: Douglas Wagner <douglasw@pixie.wagnerwebhome.org>
Date: Wed Feb 16 01:37:01 2011 -0600
Cookie/Login fix:
Problem identified with cookies and being logged out of the software
tracked back to an issue with capitalization. The incoming cookie use... | 0 | 4 |
CVE-2008-7050 | The password_check function in auth/auth_phpbb3.php in WoW Raid Manager 3.5.1 before Patch 1, when using PHPBB3 authentication, (1) does not invoke the CheckPassword function with the required arguments, which always triggers an authentication failure, and (2) returns true instead of false when an authentication failur... | Illydth/wowraidmanager | 26e2f2ddffb886bdd7bd877c09da3049e47ff7e9 | v3.2.1 De-Sanitization Error Fix
While 3.2.0 Sanitized all database inputs, the code failed to
de-sanitize data as it came back out of the database. Generally this
showed up as escaped quotes (\') and other display issues such as this. | commit 26e2f2ddffb886bdd7bd877c09da3049e47ff7e9
Author: root <root@darkstar.wagnerweb.org>
Date: Sun Apr 13 23:57:14 2008 -0500
v3.2.1 De-Sanitization Error Fix
While 3.2.0 Sanitized all database inputs, the code failed to
de-sanitize data as it came back out of the database. Generally this
sho... | 0 | 1 |
CVE-2008-7050 | The password_check function in auth/auth_phpbb3.php in WoW Raid Manager 3.5.1 before Patch 1, when using PHPBB3 authentication, (1) does not invoke the CheckPassword function with the required arguments, which always triggers an authentication failure, and (2) returns true instead of false when an authentication failur... | Illydth/wowraidmanager | 48e6e105c87618f8de5f5123b98f3ef6adf2c11e | Bug 0000055: Fix for UTF8 in Username failing phpbb3 auth.
Added utf8_decode() (Thanks Muffin) to the input value from the login page.
This forces the login information into UTF8 format and allows the
information to be properly used to pull info from the database.
| commit 48e6e105c87618f8de5f5123b98f3ef6adf2c11e
Author: Douglas Wagner <dwagner@wstldwagner2.rgare.net>
Date: Mon Sep 8 15:47:43 2008 -0500
Bug 0000055: Fix for UTF8 in Username failing phpbb3 auth.
Added utf8_decode() (Thanks Muffin) to the input value from the login page.
This forces the login inf... | 0 | 2 |
CVE-2008-7220 | Unspecified vulnerability in Prototype JavaScript framework (prototypejs) before 1.6.0.2 allows attackers to make "cross-site ajax requests" via unknown vectors. | sstephenson/prototype | cb729625ae2d5eff54a162e9a9c2c4f78ef83dd2 | Use native `String.prototype.trim` in `String.prototype.trim` when available. (kangax)
| commit cb729625ae2d5eff54a162e9a9c2c4f78ef83dd2
Author: Juriy Zaytsev <juriy@ny3-11-132.dhcp.ithaka.org>
Date: Thu May 7 15:33:13 2009 -0400
Use native `String.prototype.trim` in `String.prototype.trim` when available. (kangax)
diff --git a/src/lang/string.js b/src/lang/string.js
index 6d715c1..2798bcc 100644
-... | 0 | 5 |
CVE-2008-7220 | Unspecified vulnerability in Prototype JavaScript framework (prototypejs) before 1.6.0.2 allows attackers to make "cross-site ajax requests" via unknown vectors. | sstephenson/prototype | 86407790d238f74cb4e6858998f467e39d20e846 | Fix issue where certain versions of Safari treat class names
case-insensitively in Selector/7390 queries. [#390 state:resolved]
| commit 86407790d238f74cb4e6858998f467e39d20e846
Author: Tobie Langel <tobie.langel@gmail.com>
Date: Thu Dec 11 12:07:23 2008 +0100
Fix issue where certain versions of Safari treat class names
case-insensitively in Selector/7390 queries. [#390 state:resolved]
diff --git a/CHANGELOG b/CHANGELOG
index adb377e.... | 0 | 6 |
CVE-2008-7220 | Unspecified vulnerability in Prototype JavaScript framework (prototypejs) before 1.6.0.2 allows attackers to make "cross-site ajax requests" via unknown vectors. | sstephenson/prototype | 29cd62ebeb41b2ca528f1b6eae83e3ad5144010e | prototype: Temporary workaround for Prototype.BrowserFeatures.SpecificElementExtensions incorrectly evaluating to true on iPhone.
| commit 29cd62ebeb41b2ca528f1b6eae83e3ad5144010e
Author: Sam Stephenson <sam@37signals.com>
Date: Sat Jun 30 16:38:18 2007 +0000
prototype: Temporary workaround for Prototype.BrowserFeatures.SpecificElementExtensions incorrectly evaluating to true on iPhone.
diff --git a/CHANGELOG b/CHANGELOG
index 972d389..1f0d... | 0 | 7 |
CVE-2008-7220 | Unspecified vulnerability in Prototype JavaScript framework (prototypejs) before 1.6.0.2 allows attackers to make "cross-site ajax requests" via unknown vectors. | sstephenson/prototype | 769ae42fcc7f32b6e4726b26a1ae5f2fd2b560a5 | prototype: Ensure that an Ajax.Request's parameters option can be a Hash. Closes #10172.
| commit 769ae42fcc7f32b6e4726b26a1ae5f2fd2b560a5
Author: Sam Stephenson <sam@37signals.com>
Date: Thu Nov 29 00:24:54 2007 +0000
prototype: Ensure that an Ajax.Request's parameters option can be a Hash. Closes #10172.
diff --git a/CHANGELOG b/CHANGELOG
index cb7fe5e..a88b262 100644
--- a/CHANGELOG
+++ b/CHANGEL... | 0 | 8 |
CVE-2008-7220 | Unspecified vulnerability in Prototype JavaScript framework (prototypejs) before 1.6.0.2 allows attackers to make "cross-site ajax requests" via unknown vectors. | sstephenson/prototype | 4174060d5bd3721089ea9b949da9f2ea667c67a7 | prototype: Don't call evalResponse() when an Ajax response has no Content-type header. Closes #7827.
| commit 4174060d5bd3721089ea9b949da9f2ea667c67a7
Author: Sam Stephenson <sam@37signals.com>
Date: Tue Apr 24 03:34:30 2007 +0000
prototype: Don't call evalResponse() when an Ajax response has no Content-type header. Closes #7827.
diff --git a/CHANGELOG b/CHANGELOG
index 69dfe48..0c3a831 100644
--- a/CHANGELOG
+... | 0 | 4 |
CVE-2008-7220 | Unspecified vulnerability in Prototype JavaScript framework (prototypejs) before 1.6.0.2 allows attackers to make "cross-site ajax requests" via unknown vectors. | sstephenson/prototype | 29c0de6937d84593c89aa6f77d23dd69480fe909 | prototype: Make submitting forms work in Opera < 9.1.
| commit 29c0de6937d84593c89aa6f77d23dd69480fe909
Author: Tobie Langel <tobie.langel@gmail.com>
Date: Thu Oct 18 15:46:30 2007 +0000
prototype: Make submitting forms work in Opera < 9.1.
diff --git a/CHANGELOG b/CHANGELOG
index 59b8f25..5867df3 100644
--- a/CHANGELOG
+++ b/CHANGELOG
@@ -1,5 +1,7 @@
*SVN*
+* Ma... | 0 | 3 |
CVE-2008-7220 | Unspecified vulnerability in Prototype JavaScript framework (prototypejs) before 1.6.0.2 allows attackers to make "cross-site ajax requests" via unknown vectors. | sstephenson/prototype | 704aa4033010059402336437f7fe6498ce780be0 | Stop appending `&_=` to the parameters for non-GET Ajax requests in Safari. We no longer support any version of Safari for which this is necessary. [#327 state:resolved] (John-David Dalton, Andrew Dupont) | commit 704aa4033010059402336437f7fe6498ce780be0
Author: Andrew Dupont <prototype@andrewdupont.net>
Date: Mon Oct 18 20:55:06 2010 -0500
Stop appending `&_=` to the parameters for non-GET Ajax requests in Safari. We no longer support any version of Safari for which this is necessary. [#327 state:resolved] (John-D... | 0 | 9 |
CVE-2008-7220 | Unspecified vulnerability in Prototype JavaScript framework (prototypejs) before 1.6.0.2 allows attackers to make "cross-site ajax requests" via unknown vectors. | sstephenson/prototype | 23823048d13e1d70bee26908760381e943f7e483 | prototype: Prevent memory leaks in Ajax.PeriodicalUpdater. Closes #10049
| commit 23823048d13e1d70bee26908760381e943f7e483
Author: Tobie Langel <tobie.langel@gmail.com>
Date: Thu Nov 15 23:14:36 2007 +0000
prototype: Prevent memory leaks in Ajax.PeriodicalUpdater. Closes #10049
diff --git a/CHANGELOG b/CHANGELOG
index c3fd9ee..bac2d0c 100644
--- a/CHANGELOG
+++ b/CHANGELOG
@@ -1,3 +1,... | 0 | 2 |
CVE-2008-7220 | Unspecified vulnerability in Prototype JavaScript framework (prototypejs) before 1.6.0.2 allows attackers to make "cross-site ajax requests" via unknown vectors. | sstephenson/prototype | 484287d1de3b66933a5e159bcfd6dff0be9e4d6f | Ensure Ajax.activeRequestCount decrements even if an exception is thrown in an `onComplete` callback. (close #324) | commit 484287d1de3b66933a5e159bcfd6dff0be9e4d6f
Author: Andrew Dupont <github@andrewdupont.net>
Date: Sat Apr 8 16:48:06 2017 -0500
Ensure Ajax.activeRequestCount decrements even if an exception is thrown in an `onComplete` callback. (close #324)
diff --git a/src/prototype/ajax/request.js b/src/prototype/ajax/r... | 0 | 10 |
CVE-2008-7220 | Unspecified vulnerability in Prototype JavaScript framework (prototypejs) before 1.6.0.2 allows attackers to make "cross-site ajax requests" via unknown vectors. | sstephenson/prototype | 02cc9992e915c024650ddc77a91064f7a4252914 | prototype: Prevent a potential security issue for cross-site ajax requests.
| commit 02cc9992e915c024650ddc77a91064f7a4252914
Author: Tobie Langel <tobie.langel@gmail.com>
Date: Wed Jan 23 00:51:25 2008 +0000
prototype: Prevent a potential security issue for cross-site ajax requests.
diff --git a/CHANGELOG b/CHANGELOG
index 37ac38e..cd5bdb2 100644
--- a/CHANGELOG
+++ b/CHANGELOG
@@ -1,5 ... | 1 | 1 |
CVE-2009-1194 | Integer overflow in the pango_glyph_string_set_size function in pango/glyphstring.c in Pango before 1.24 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long glyph string that triggers a heap-based buffer overflow, as demonstrated by a long do... | bratsche/pango | 7e0e0a79d54e6bcd80ef3794eaf10de8bf579c56 | === Released 1.15.1 ===
2006-12-04 Behdad Esfahbod <behdad@gnome.org>
* === Released 1.15.1 ===
* configure.in: Version 1.15.1
* NEWS: Updated.
| commit 7e0e0a79d54e6bcd80ef3794eaf10de8bf579c56
Author: Behdad Esfahbod <behdad@gnome.org>
Date: Tue Dec 5 00:23:25 2006 +0000
=== Released 1.15.1 ===
2006-12-04 Behdad Esfahbod <behdad@gnome.org>
* === Released 1.15.1 ===
* configure.in: Version 1.15.1
... | 0 | 6 |
CVE-2009-1194 | Integer overflow in the pango_glyph_string_set_size function in pango/glyphstring.c in Pango before 1.24 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long glyph string that triggers a heap-based buffer overflow, as demonstrated by a long do... | bratsche/pango | 58359bf5d1fcfb54a160992df44dd897854f5bdd | Find shaper/font for Private Use and space characters too. Finding shaper
2006-08-22 Behdad Esfahbod <behdad@gnome.org>
* pango/pango-context.c (itemize_state_process_run): Find shaper/font
for Private Use and space characters too. Finding shaper for Private
Use is needed for any practical ... | commit 58359bf5d1fcfb54a160992df44dd897854f5bdd
Author: Behdad Esfahbod <behdad@gnome.org>
Date: Tue Aug 22 23:12:28 2006 +0000
Find shaper/font for Private Use and space characters too. Finding shaper
2006-08-22 Behdad Esfahbod <behdad@gnome.org>
* pango/pango-context.c (itemize_stat... | 0 | 9 |
CVE-2009-1194 | Integer overflow in the pango_glyph_string_set_size function in pango/glyphstring.c in Pango before 1.24 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long glyph string that triggers a heap-based buffer overflow, as demonstrated by a long do... | bratsche/pango | 55bdaf842fb6cf02eae9bbbb1a6e48bfbed021cf | Fix the "menu accels are two chars wide" bug that was introduced by the
2007-01-22 Behdad Esfahbod <behdad@gnome.org>
* pango/pango-glyph-item.c (_pango_glyph_item_iter_next_cluster):
Fix the "menu accels are two chars wide" bug that was introduced
by the recent changes in this function, in ... | commit 55bdaf842fb6cf02eae9bbbb1a6e48bfbed021cf
Author: Behdad Esfahbod <behdad@gnome.org>
Date: Tue Jan 23 00:15:32 2007 +0000
Fix the "menu accels are two chars wide" bug that was introduced by the
2007-01-22 Behdad Esfahbod <behdad@gnome.org>
* pango/pango-glyph-item.c (_pango_glyp... | 0 | 7 |
CVE-2009-1194 | Integer overflow in the pango_glyph_string_set_size function in pango/glyphstring.c in Pango before 1.24 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long glyph string that triggers a heap-based buffer overflow, as demonstrated by a long do... | bratsche/pango | 25878a0341a8076296ab4ae88ee972641e6f963c | Use complete PANGO_VERSION in zip file names.
2002-05-26 Tor Lillqvist <tml@iki.fi>
* pango-zip.sh.in: Use complete PANGO_VERSION in zip file
names.
* pango/Makefile.am: (Win32) Compile resource files and link with
them.
* pango/pango.rc.in
* pango/pangoft2.rc.in
* pango/pangowin32.rc.in: Include also the ... | commit 25878a0341a8076296ab4ae88ee972641e6f963c
Author: Tor Lillqvist <tml@iki.fi>
Date: Sun May 26 00:19:10 2002 +0000
Use complete PANGO_VERSION in zip file names.
2002-05-26 Tor Lillqvist <tml@iki.fi>
* pango-zip.sh.in: Use complete PANGO_VERSION in zip file
names.
... | 0 | 10 |
CVE-2009-1194 | Integer overflow in the pango_glyph_string_set_size function in pango/glyphstring.c in Pango before 1.24 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long glyph string that triggers a heap-based buffer overflow, as demonstrated by a long do... | bratsche/pango | b9f7b88e3d100b87a856e077b5f2fdbf49c73ebb | Fix silly error in implementation of pango_glyph_string_get_width(), and
2006-07-08 Behdad Esfahbod <behdad@gnome.org>
* pango/glyphstring.c (pango_glyph_string_get_width):
* pango/pango-glyph.h:
* pango/pango-layout.c (pango_layout_line_index_to_x),
(pango_layout_line_x_to_index), (... | commit b9f7b88e3d100b87a856e077b5f2fdbf49c73ebb
Author: Behdad Esfahbod <behdad@gnome.org>
Date: Sat Jul 8 22:15:32 2006 +0000
Fix silly error in implementation of pango_glyph_string_get_width(), and
2006-07-08 Behdad Esfahbod <behdad@gnome.org>
* pango/glyphstring.c (pango_glyph_stri... | 0 | 8 |
CVE-2009-1194 | Integer overflow in the pango_glyph_string_set_size function in pango/glyphstring.c in Pango before 1.24 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long glyph string that triggers a heap-based buffer overflow, as demonstrated by a long do... | bratsche/pango | b178da14dabd63937c3867f6d5cbb29f7a31d69f | Bug 471577 – GBoxed GType for PangoGlyphItem
2007-10-24 Behdad Esfahbod <behdad@gnome.org>
Bug 471577 – GBoxed GType for PangoGlyphItem
* pango/pango-glyph-item.h:
* pango/pango-glyph-item.c:
New public API:
PANGO_TYPE_GLYPH_ITEM
pango_glyph_item_c... | commit b178da14dabd63937c3867f6d5cbb29f7a31d69f
Author: Behdad Esfahbod <behdad@gnome.org>
Date: Wed Oct 24 04:50:09 2007 +0000
Bug 471577 – GBoxed GType for PangoGlyphItem
2007-10-24 Behdad Esfahbod <behdad@gnome.org>
Bug 471577 – GBoxed GType for PangoGlyphItem
* pa... | 0 | 4 |
CVE-2009-1194 | Integer overflow in the pango_glyph_string_set_size function in pango/glyphstring.c in Pango before 1.24 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long glyph string that triggers a heap-based buffer overflow, as demonstrated by a long do... | bratsche/pango | f4fad0c741636d017aefd76d58e271466696cc6f | Bug 478914 – Use something invalid instead of '?' when validating input
2007-12-10 Behdad Esfahbod <behdad@gnome.org>
Bug 478914 – Use something invalid instead of '?' when validating
input text
* pango/pango-layout.c (pango_layout_set_text): Set invalid input
bytes to -1, which giv... | commit f4fad0c741636d017aefd76d58e271466696cc6f
Author: Behdad Esfahbod <behdad@gnome.org>
Date: Mon Dec 10 08:31:33 2007 +0000
Bug 478914 – Use something invalid instead of '?' when validating input
2007-12-10 Behdad Esfahbod <behdad@gnome.org>
Bug 478914 – Use something invalid inst... | 0 | 2 |
CVE-2009-1194 | Integer overflow in the pango_glyph_string_set_size function in pango/glyphstring.c in Pango before 1.24 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long glyph string that triggers a heap-based buffer overflow, as demonstrated by a long do... | bratsche/pango | 4de30e5500eaeb49f4bf0b7a07f718e149a2ed5e | [glyphstring] Handle overflow with very long glyphstrings
| commit 4de30e5500eaeb49f4bf0b7a07f718e149a2ed5e
Author: Behdad Esfahbod <behdad@behdad.org>
Date: Mon Mar 2 12:00:52 2009 +0330
[glyphstring] Handle overflow with very long glyphstrings
diff --git a/pango/glyphstring.c b/pango/glyphstring.c
index 42601d52..8fb70313 100644
--- a/pango/glyphstring.c
+++ b/pango/g... | 1 | 1 |
CVE-2009-1194 | Integer overflow in the pango_glyph_string_set_size function in pango/glyphstring.c in Pango before 1.24 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long glyph string that triggers a heap-based buffer overflow, as demonstrated by a long do... | bratsche/pango | 12091072940c4cd649d0230f45937f65adbfce46 | Bug 488840 – harfbuzz: protect against ligid overflow
2007-10-21 Behdad Esfahbod <behdad@gnome.org>
Bug 488840 – harfbuzz: protect against ligid overflow
* pango/opentype/harfbuzz-buffer.c (_hb_buffer_allocate_ligid):
Never return zero, even in case of overflow.
* pango/opentype/ha... | commit 12091072940c4cd649d0230f45937f65adbfce46
Author: Behdad Esfahbod <behdad@gnome.org>
Date: Sun Oct 21 18:17:02 2007 +0000
Bug 488840 – harfbuzz: protect against ligid overflow
2007-10-21 Behdad Esfahbod <behdad@gnome.org>
Bug 488840 – harfbuzz: protect against ligid overflow
... | 0 | 5 |
CVE-2009-1194 | Integer overflow in the pango_glyph_string_set_size function in pango/glyphstring.c in Pango before 1.24 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long glyph string that triggers a heap-based buffer overflow, as demonstrated by a long do... | bratsche/pango | 8d45583fa1f13d77feb5d96abeae59d21ad5fe65 | Fixes for signed/unsigned in PangoAttrIterator ((#166700, Morten Welinder)
2005-07-26 Owen Taylor <otaylor@redhat.com>
Fixes for signed/unsigned in PangoAttrIterator ((#166700,
Morten Welinder)
* pango/pango-attributes.c (pango_attr_iterator_range):
Clamp results to G_MAXINT to avoi... | commit 8d45583fa1f13d77feb5d96abeae59d21ad5fe65
Author: Owen Taylor <otaylor@redhat.com>
Date: Tue Jul 26 18:07:59 2005 +0000
Fixes for signed/unsigned in PangoAttrIterator ((#166700, Morten Welinder)
2005-07-26 Owen Taylor <otaylor@redhat.com>
Fixes for signed/unsigned in PangoAttrIt... | 0 | 3 |
CVE-2009-1275 | Apache Tiles 2.1 before 2.1.2, as used in Apache Struts and other products, evaluates Expression Language (EL) expressions twice in certain circumstances, which allows remote attackers to conduct cross-site scripting (XSS) attacks or obtain sensitive information via unspecified vectors, related to the (1) tiles:putAttr... | apache/tiles | 91caaaf07953d150af744b55fc3496bcf0b0bcd0 | Establish a version 2.0 tiles-config dtd.
SB-30
git-svn-id: https://svn.apache.org/repos/asf/struts/sandbox/trunk/tiles@442103 13f79535-47bb-0310-9956-ffa450edef68
| commit 91caaaf07953d150af744b55fc3496bcf0b0bcd0
Author: Wendy Smoak <wsmoak@apache.org>
Date: Mon Sep 11 05:12:59 2006 +0000
Establish a version 2.0 tiles-config dtd.
SB-30
git-svn-id: https://svn.apache.org/repos/asf/struts/sandbox/trunk/tiles@442103 13f79535-47bb-0310-9956-ffa450edef68
diff --git... | 0 | 5 |
CVE-2009-1275 | Apache Tiles 2.1 before 2.1.2, as used in Apache Struts and other products, evaluates Expression Language (EL) expressions twice in certain circumstances, which allows remote attackers to conduct cross-site scripting (XSS) attacks or obtain sensitive information via unspecified vectors, related to the (1) tiles:putAttr... | apache/tiles | 2720827d886488f3ca12ebb03992de113571c135 | further improvements from Michael Isvy, use tiles-3* dependencies in the example.
git-svn-id: https://svn.apache.org/repos/asf/tiles/framework/trunk@1427704 13f79535-47bb-0310-9956-ffa450edef68
| commit 2720827d886488f3ca12ebb03992de113571c135
Author: Michael Semb Wever <mck@apache.org>
Date: Wed Jan 2 08:47:11 2013 +0000
further improvements from Michael Isvy, use tiles-3* dependencies in the example.
git-svn-id: https://svn.apache.org/repos/asf/tiles/framework/trunk@1427704 13f79535-47bb-... | 0 | 2 |
CVE-2009-1275 | Apache Tiles 2.1 before 2.1.2, as used in Apache Struts and other products, evaluates Expression Language (EL) expressions twice in certain circumstances, which allows remote attackers to conduct cross-site scripting (XSS) attacks or obtain sensitive information via unspecified vectors, related to the (1) tiles:putAttr... | apache/tiles | b3895f4105ddbb3e1de392c9d703fa42b4ce3464 | TILES-458
Move of EL code from tiles-core and tiles-jsp to tiles-el.
git-svn-id: https://svn.apache.org/repos/asf/tiles/framework/trunk@816358 13f79535-47bb-0310-9956-ffa450edef68
| commit b3895f4105ddbb3e1de392c9d703fa42b4ce3464
Author: Antonio Petrelli <apetrelli@apache.org>
Date: Thu Sep 17 19:54:15 2009 +0000
TILES-458
Move of EL code from tiles-core and tiles-jsp to tiles-el.
git-svn-id: https://svn.apache.org/repos/asf/tiles/framework/trunk@816358 13f79535-47bb-0310-9956-... | 0 | 7 |
CVE-2009-1275 | Apache Tiles 2.1 before 2.1.2, as used in Apache Struts and other products, evaluates Expression Language (EL) expressions twice in certain circumstances, which allows remote attackers to conduct cross-site scripting (XSS) attacks or obtain sensitive information via unspecified vectors, related to the (1) tiles:putAttr... | apache/tiles | cbe34a8e0f06d02b110049ad129a4a8089ce3edd | TILES-48
Added a new method in AttributeEvaluators. Fixed tests accordingly.
Added Selenium test.
git-svn-id: https://svn.apache.org/repos/asf/tiles/framework/trunk@637208 13f79535-47bb-0310-9956-ffa450edef68
| commit cbe34a8e0f06d02b110049ad129a4a8089ce3edd
Author: Antonio Petrelli <apetrelli@apache.org>
Date: Fri Mar 14 18:49:39 2008 +0000
TILES-48
Added a new method in AttributeEvaluators. Fixed tests accordingly.
Added Selenium test.
git-svn-id: https://svn.apache.org/repos/asf/tiles/framework/trun... | 0 | 6 |
CVE-2009-1275 | Apache Tiles 2.1 before 2.1.2, as used in Apache Struts and other products, evaluates Expression Language (EL) expressions twice in certain circumstances, which allows remote attackers to conduct cross-site scripting (XSS) attacks or obtain sensitive information via unspecified vectors, related to the (1) tiles:putAttr... | apache/tiles | fc6b298402991eae5d729a865c7391f06f55e450 | TILESSB-3
pom.xml and sources directories.
git-svn-id: https://svn.apache.org/repos/asf/tiles/sandbox/trunk@707110 13f79535-47bb-0310-9956-ffa450edef68
| commit fc6b298402991eae5d729a865c7391f06f55e450
Author: Antonio Petrelli <apetrelli@apache.org>
Date: Wed Oct 22 16:06:00 2008 +0000
TILESSB-3
pom.xml and sources directories.
git-svn-id: https://svn.apache.org/repos/asf/tiles/sandbox/trunk@707110 13f79535-47bb-0310-9956-ffa450edef68
diff --git a/t... | 0 | 3 |
CVE-2009-1275 | Apache Tiles 2.1 before 2.1.2, as used in Apache Struts and other products, evaluates Expression Language (EL) expressions twice in certain circumstances, which allows remote attackers to conduct cross-site scripting (XSS) attacks or obtain sensitive information via unspecified vectors, related to the (1) tiles:putAttr... | apache/tiles | 9103c763711371a60b88425c737921ab8da8aeef | TILESSB-40
First classes of tiles-eval-api.
git-svn-id: https://svn.apache.org/repos/asf/tiles/sandbox/trunk@1068494 13f79535-47bb-0310-9956-ffa450edef68
| commit 9103c763711371a60b88425c737921ab8da8aeef
Author: Antonio Petrelli <apetrelli@apache.org>
Date: Tue Feb 8 17:48:49 2011 +0000
TILESSB-40
First classes of tiles-eval-api.
git-svn-id: https://svn.apache.org/repos/asf/tiles/sandbox/trunk@1068494 13f79535-47bb-0310-9956-ffa450edef68
diff --git a/... | 0 | 8 |
CVE-2009-1275 | Apache Tiles 2.1 before 2.1.2, as used in Apache Struts and other products, evaluates Expression Language (EL) expressions twice in certain circumstances, which allows remote attackers to conduct cross-site scripting (XSS) attacks or obtain sensitive information via unspecified vectors, related to the (1) tiles:putAttr... | apache/tiles | 49073c6d86954bb219a1e2fbbe468fd0e470fd5b | TILESSB-38
Fixed tiles-el checkstyle.
git-svn-id: https://svn.apache.org/repos/asf/tiles/sandbox/trunk@1049676 13f79535-47bb-0310-9956-ffa450edef68
| commit 49073c6d86954bb219a1e2fbbe468fd0e470fd5b
Author: Antonio Petrelli <apetrelli@apache.org>
Date: Wed Dec 15 19:38:54 2010 +0000
TILESSB-38
Fixed tiles-el checkstyle.
git-svn-id: https://svn.apache.org/repos/asf/tiles/sandbox/trunk@1049676 13f79535-47bb-0310-9956-ffa450edef68
diff --git a/tiles... | 0 | 1 |
CVE-2009-1275 | Apache Tiles 2.1 before 2.1.2, as used in Apache Struts and other products, evaluates Expression Language (EL) expressions twice in certain circumstances, which allows remote attackers to conduct cross-site scripting (XSS) attacks or obtain sensitive information via unspecified vectors, related to the (1) tiles:putAttr... | apache/tiles | ccd7ea759fc550e496f376ed355a81318b17da5f | Set svn:eol-style=native to files that have not this property.
git-svn-id: https://svn.apache.org/repos/asf/struts/sandbox/trunk/tiles@465598 13f79535-47bb-0310-9956-ffa450edef68
| commit ccd7ea759fc550e496f376ed355a81318b17da5f
Author: Antonio Petrelli <apetrelli@apache.org>
Date: Thu Oct 19 12:12:44 2006 +0000
Set svn:eol-style=native to files that have not this property.
git-svn-id: https://svn.apache.org/repos/asf/struts/sandbox/trunk/tiles@465598 13f79535-47bb-0310-9956-ffa45... | 0 | 10 |
CVE-2009-1275 | Apache Tiles 2.1 before 2.1.2, as used in Apache Struts and other products, evaluates Expression Language (EL) expressions twice in certain circumstances, which allows remote attackers to conduct cross-site scripting (XSS) attacks or obtain sensitive information via unspecified vectors, related to the (1) tiles:putAttr... | apache/tiles | 927e12152b24a5b3926f9a6206a8ffa4a34dd840 | TILES-432
Polished tiles-core (a missing file added).
git-svn-id: https://svn.apache.org/repos/asf/tiles/framework/trunk@787727 13f79535-47bb-0310-9956-ffa450edef68
| commit 927e12152b24a5b3926f9a6206a8ffa4a34dd840
Author: Antonio Petrelli <apetrelli@apache.org>
Date: Tue Jun 23 15:45:36 2009 +0000
TILES-432
Polished tiles-core (a missing file added).
git-svn-id: https://svn.apache.org/repos/asf/tiles/framework/trunk@787727 13f79535-47bb-0310-9956-ffa450edef68
d... | 0 | 9 |
CVE-2009-1275 | Apache Tiles 2.1 before 2.1.2, as used in Apache Struts and other products, evaluates Expression Language (EL) expressions twice in certain circumstances, which allows remote attackers to conduct cross-site scripting (XSS) attacks or obtain sensitive information via unspecified vectors, related to the (1) tiles:putAttr... | apache/tiles | f8e58ae817fb4b8a9128df5c60bf432a3fe46ae1 | TILES-428
Added expression property in AddAttributeTag and PutAttributeTag.
Added templateExpression attribute in insertDefinition, insertTemplate, addAttribute and putAttribute.
Added templateType in insertTemplate and insertDefinition.
git-svn-id: https://svn.apache.org/repos/asf/tiles/framework/trunk@796822 13f7953... | commit f8e58ae817fb4b8a9128df5c60bf432a3fe46ae1
Author: Antonio Petrelli <apetrelli@apache.org>
Date: Wed Jul 22 18:25:50 2009 +0000
TILES-428
Added expression property in AddAttributeTag and PutAttributeTag.
Added templateExpression attribute in insertDefinition, insertTemplate, addAttribute and putAttr... | 0 | 4 |
CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | uzbl/uzbl | 7bfb3b5b56e30b157cfb750657de104055fe6da3 | eval_js: print file where the error occured
| commit 7bfb3b5b56e30b157cfb750657de104055fe6da3
Author: Simon Lipp <sloonz@gmail.com>
Date: Sun Feb 14 16:23:31 2010 +0100
eval_js: print file where the error occured
diff --git a/src/uzbl-core.c b/src/uzbl-core.c
index 2b473800..ebd8ef83 100644
--- a/src/uzbl-core.c
+++ b/src/uzbl-core.c
@@ -321,7 +321,7 @@ ex... | 0 | 4 |
CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | uzbl/uzbl | 94fff950c6c2d388591233aaa08b5471607f001f | merge in Duclares stuff
| commit 94fff950c6c2d388591233aaa08b5471607f001f (from 64a4f8d02c1e6900b8b46a7b3fd5bd5232e3b685)
Merge: 64a4f8d0 57665dc0
Author: Dieter Plaetinck <dieter@plaetinck.be>
Date: Sat May 16 16:24:59 2009 +0200
merge in Duclares stuff
diff --git a/uzbl.c b/uzbl.c
index 3e767de7..b2b996bc 100644
--- a/uzbl.c
+++ b/uzb... | 0 | 7 |
CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | uzbl/uzbl | 6653a8167ce787b0227e720a1b05cf17090009be | Cleanups after switching to hard wrapping.
Signed-off-by: Dan Hackney <dan@haxney.org>
| commit 6653a8167ce787b0227e720a1b05cf17090009be
Author: Dan Hackney <dan@haxney.org>
Date: Sat Jan 2 21:45:24 2010 -0500
Cleanups after switching to hard wrapping.
Signed-off-by: Dan Hackney <dan@haxney.org>
diff --git a/README b/README
index 358096cc..451cf34e 100644
--- a/README
+++ b/README
@@ -98,8... | 0 | 9 |
CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | uzbl/uzbl | e3f6305e0455b6c88b7ff3fc140d7d520f344a0b | Make progress bar show empty on start of page load
Previously, when clicking on a link or opening a new URL, the user would
not get any feedback showing that the command was taken until after a
progress change, which could sometimes take a prolonged period of time.
Now, the user is immediately alerted via the statusba... | commit e3f6305e0455b6c88b7ff3fc140d7d520f344a0b
Author: Jeremy O'Brien <obrien654j@gmail.com>
Date: Thu Jun 4 23:51:34 2009 -0400
Make progress bar show empty on start of page load
Previously, when clicking on a link or opening a new URL, the user would
not get any feedback showing that the command ... | 0 | 10 |
CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | uzbl/uzbl | 2926b0f55122b131e0b9d2cf857d2b78d202c5ab | Fixed array bug.
When e.g. spawn_sh modifies the array, invalid stuff is send to the
python script, which then breaks while decoding them.
| commit 2926b0f55122b131e0b9d2cf857d2b78d202c5ab
Author: Olof-Joachim Frahm <Olof.Frahm@web.de>
Date: Mon Mar 21 06:23:23 2011 +0100
Fixed array bug.
When e.g. spawn_sh modifies the array, invalid stuff is send to the
python script, which then breaks while decoding them.
diff --git a/src/uzbl-core.c... | 0 | 5 |
CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | uzbl/uzbl | 0cd3f65d05e7d966ff66d2aa97908332eb2d6c06 | merge in pawelz' authentication handler + some other fixes
| commit 0cd3f65d05e7d966ff66d2aa97908332eb2d6c06 (from c3c4d481079f2a24ea16cd49b785b6f358a28fc9)
Merge: c3c4d481 67c68ee6
Author: Dieter Plaetinck <dieter@plaetinck.be>
Date: Sun Jan 24 16:21:11 2010 +0100
merge in pawelz' authentication handler + some other fixes
diff --git a/AUTHORS b/AUTHORS
index 165eae08..8... | 0 | 6 |
CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | uzbl/uzbl | f7608a8fc48ad98e6d7227c10cf3786e37c4a2ab | Merge branch 'security-fix'
| commit f7608a8fc48ad98e6d7227c10cf3786e37c4a2ab (from a5f014de5f76169a38ee67e46a0526e5d80a3433)
Merge: a5f014de 1958b52d
Author: Dieter Plaetinck <dieter@plaetinck.be>
Date: Tue Jan 5 20:37:08 2010 +0100
Merge branch 'security-fix'
diff --git a/README b/README
index 0d6ed046..a22e1059 100644
--- a/README
+++ b/... | 0 | 3 |
CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | uzbl/uzbl | 786744aea678a45136b2692b189ff96d225b9167 | Merge branch 'master' of git://github.com/Dieterbe/uzbl
| commit 786744aea678a45136b2692b189ff96d225b9167 (from 585226c1cb80488f1fbd4ad2635550a728bf2747)
Merge: 585226c1 f7608a8f
Author: Mason Larobina <mason.larobina@gmail.com>
Date: Sat Jan 9 13:42:07 2010 +0800
Merge branch 'master' of git://github.com/Dieterbe/uzbl
diff --git a/README b/README
index 0d6ed046..a22e... | 0 | 8 |
CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | uzbl/uzbl | f2c7c41f6cc70e1d509967c7487aec5126495557 | remove the vestiges of Uzbl.run
| commit f2c7c41f6cc70e1d509967c7487aec5126495557
Author: Brendan Taylor <whateley@gmail.com>
Date: Thu Jan 13 11:59:23 2011 -0700
remove the vestiges of Uzbl.run
diff --git a/README b/README
index 051fe6b6..d1f23572 100644
--- a/README
+++ b/README
@@ -602,25 +602,6 @@ This script tries to authenticate as user a... | 0 | 2 |
CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | uzbl/uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem.
| commit 1958b52d41cba96956dc1995660de49525ed1047
Author: Dieter Plaetinck <dieter@plaetinck.be>
Date: Tue Jan 5 20:17:29 2010 +0100
disable Uzbl javascript object because of security problem.
diff --git a/README b/README
index 0d6ed046..a22e1059 100644
--- a/README
+++ b/README
@@ -397,7 +397,7 @@ The script spe... | 1 | 1 |
CVE-2010-1666 | Buffer overflow in Dan Pascu python-cjson 1.0.5, when UCS-4 encoding is enabled, allows context-dependent attackers to cause a denial of service (application crash) or possibly have unspecified other impact via vectors involving crafted Unicode input to the cjson.encode function. | AGProjects/python-cjson | 5fe446896a2d8847d506cd672f5c249c605335a3 | More strict and faster check for numbers when decoding | commit 5fe446896a2d8847d506cd672f5c249c605335a3
Author: Dan Pascu <dan@ag-projects.com>
Date: Wed May 7 12:46:45 2008 +0000
More strict and faster check for numbers when decoding
diff --git a/cjson.c b/cjson.c
index 5f0b81e..5f448a4 100644
--- a/cjson.c
+++ b/cjson.c
@@ -253,68 +253,71 @@ decode_nan(JSONData *j... | 0 | 6 |
CVE-2010-1666 | Buffer overflow in Dan Pascu python-cjson 1.0.5, when UCS-4 encoding is enabled, allows context-dependent attackers to cause a denial of service (application crash) or possibly have unspecified other impact via vectors involving crafted Unicode input to the cjson.encode function. | AGProjects/python-cjson | d6adf10ae863159a9e32f64115598c0d9a1324de | Fixed issue with core file regexp on OS X | commit d6adf10ae863159a9e32f64115598c0d9a1324de
Author: Dan Pascu <dan@ag-projects.com>
Date: Fri Oct 30 13:06:59 2009 +0000
Fixed issue with core file regexp on OS X
diff --git a/.boring b/.boring
index 208f3ba..eab8aa8 100644
--- a/.boring
+++ b/.boring
@@ -6,7 +6,7 @@
(^|/)Thumbs\.db$
\#
~$
-(^|/)core(\.[... | 0 | 4 |
CVE-2010-1666 | Buffer overflow in Dan Pascu python-cjson 1.0.5, when UCS-4 encoding is enabled, allows context-dependent attackers to cause a denial of service (application crash) or possibly have unspecified other impact via vectors involving crafted Unicode input to the cjson.encode function. | AGProjects/python-cjson | b6e3c7edfe5b835e5d6407c568003093c3efe0e0 | Fixed some list/dict decoding bugs. Use a state machine for decoding them. | commit b6e3c7edfe5b835e5d6407c568003093c3efe0e0
Author: Dan Pascu <dan@ag-projects.com>
Date: Tue May 6 06:33:28 2008 +0000
Fixed some list/dict decoding bugs. Use a state machine for decoding them.
diff --git a/cjson.c b/cjson.c
index 7844924..37e1fb3 100644
--- a/cjson.c
+++ b/cjson.c
@@ -318,47 +318,51 @@ de... | 0 | 7 |
CVE-2010-1666 | Buffer overflow in Dan Pascu python-cjson 1.0.5, when UCS-4 encoding is enabled, allows context-dependent attackers to cause a denial of service (application crash) or possibly have unspecified other impact via vectors involving crafted Unicode input to the cjson.encode function. | AGProjects/python-cjson | 6e916608ec8ccbc1e56d2f263a95f79127eeb685 | Fixed 64-bit portability problems | commit 6e916608ec8ccbc1e56d2f263a95f79127eeb685
Author: Dan Pascu <dan@ag-projects.com>
Date: Tue Jul 24 22:10:29 2007 +0000
Fixed 64-bit portability problems
diff --git a/ChangeLog b/ChangeLog
index 1f768a4..ad4bdf0 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -4,6 +4,8 @@ Changes in version 1.0.4
* Added lice... | 0 | 5 |
CVE-2010-1666 | Buffer overflow in Dan Pascu python-cjson 1.0.5, when UCS-4 encoding is enabled, allows context-dependent attackers to cause a denial of service (application crash) or possibly have unspecified other impact via vectors involving crafted Unicode input to the cjson.encode function. | AGProjects/python-cjson | 61d86dc39dfc32e6b933d0c03594e53fe88d323e | Implemented recursion limit check for encoding/decoding arrays and objects | commit 61d86dc39dfc32e6b933d0c03594e53fe88d323e
Author: Dan Pascu <dan@ag-projects.com>
Date: Tue Feb 28 13:02:18 2017 +0000
Implemented recursion limit check for encoding/decoding arrays and objects
diff --git a/cjson.c b/cjson.c
index 9084fb2..2a87de8 100644
--- a/cjson.c
+++ b/cjson.c
@@ -526,10 +526,16 @@ d... | 0 | 8 |
CVE-2010-1666 | Buffer overflow in Dan Pascu python-cjson 1.0.5, when UCS-4 encoding is enabled, allows context-dependent attackers to cause a denial of service (application crash) or possibly have unspecified other impact via vectors involving crafted Unicode input to the cjson.encode function. | AGProjects/python-cjson | a454ab7c621f2e816fec9206feb4326d43ffe0d6 | Fix encoding of UTF-16 surrogate pairs
UCS4 escape sequences aren't valid JSON, so when Py_UNICODE_WIDE
is defined, UTF-16 surrogate pairs need to be produced.
Decoding retains the surrogate pairs as separate code points
instead of joining them, something that perhaps should be
improved, but isn't invalid (just inco... | commit a454ab7c621f2e816fec9206feb4326d43ffe0d6
Author: Claudio Freire <klaussfreire@gmail.com>
Date: Tue Oct 2 16:56:22 2018 +0000
Fix encoding of UTF-16 surrogate pairs
UCS4 escape sequences aren't valid JSON, so when Py_UNICODE_WIDE
is defined, UTF-16 surrogate pairs need to be produced.
... | 0 | 2 |
CVE-2010-1666 | Buffer overflow in Dan Pascu python-cjson 1.0.5, when UCS-4 encoding is enabled, allows context-dependent attackers to cause a denial of service (application crash) or possibly have unspecified other impact via vectors involving crafted Unicode input to the cjson.encode function. | AGProjects/python-cjson | dc2b8781b8666de5ca707318521f554904fdd690 | Integrate modified 0001-fix-for-CVE-2010-1666 patch from Debian | commit dc2b8781b8666de5ca707318521f554904fdd690
Author: Saul Ibarra <saul@ag-projects.com>
Date: Wed Jun 15 11:10:10 2011 +0000
Integrate modified 0001-fix-for-CVE-2010-1666 patch from Debian
diff --git a/cjson.c b/cjson.c
index 76ce8b4..9084fb2 100644
--- a/cjson.c
+++ b/cjson.c
@@ -663,17 +663,36 @@ encode_un... | 1 | 1 |
CVE-2010-1666 | Buffer overflow in Dan Pascu python-cjson 1.0.5, when UCS-4 encoding is enabled, allows context-dependent attackers to cause a denial of service (application crash) or possibly have unspecified other impact via vectors involving crafted Unicode input to the cjson.encode function. | AGProjects/python-cjson | 85bbce276950218c41e9d8d508ee1562e7ff0aff | Use repr instead of str when encoding floats to preserve full preicision | commit 85bbce276950218c41e9d8d508ee1562e7ff0aff
Author: Dan Pascu <dan@ag-projects.com>
Date: Fri Mar 7 06:25:49 2008 +0000
Use repr instead of str when encoding floats to preserve full preicision
diff --git a/cjson.c b/cjson.c
index 04de52c..69aaf0f 100644
--- a/cjson.c
+++ b/cjson.c
@@ -1019,7 +1019,7 @@ enco... | 0 | 10 |
CVE-2010-1666 | Buffer overflow in Dan Pascu python-cjson 1.0.5, when UCS-4 encoding is enabled, allows context-dependent attackers to cause a denial of service (application crash) or possibly have unspecified other impact via vectors involving crafted Unicode input to the cjson.encode function. | AGProjects/python-cjson | 4067ad7e9e0b9783c290a9a7e04eb4498bd49a5e | Raised version and updated changelog | commit 4067ad7e9e0b9783c290a9a7e04eb4498bd49a5e
Author: Saul Ibarra <saul@ag-projects.com>
Date: Wed Jun 15 12:02:05 2011 +0000
Raised version and updated changelog
diff --git a/debian/changelog b/debian/changelog
index 1bc4dc0..c9d2f73 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,15 @@
+pyth... | 0 | 9 |
CVE-2010-1666 | Buffer overflow in Dan Pascu python-cjson 1.0.5, when UCS-4 encoding is enabled, allows context-dependent attackers to cause a denial of service (application crash) or possibly have unspecified other impact via vectors involving crafted Unicode input to the cjson.encode function. | AGProjects/python-cjson | b477c18dca392fedb4c60df76ad8bf8db535786c | Fixed 2 potential buffer overflow errors when encoding string/unicode | commit b477c18dca392fedb4c60df76ad8bf8db535786c
Author: Dan Pascu <dan@ag-projects.com>
Date: Wed Jul 25 13:45:51 2007 +0000
Fixed 2 potential buffer overflow errors when encoding string/unicode
diff --git a/ChangeLog b/ChangeLog
index 414dcc4..beed6d7 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -8,6 +8,8 @@ Chan... | 0 | 3 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.