idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
14,906
savannah
7f2e4f4f553f6836be7683f66226afac3fa979b8
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7f2e4f4f553f6836be7683f66226afac3fa979b8
None
0
_bdf_list_shift( _bdf_list_t* list, unsigned long n ) { unsigned long i, u; if ( list == 0 || list->used == 0 || n == 0 ) return; if ( n >= list->used ) { list->used = 0; return; } for ( u = n, i = 0; u < list->used; i++, u++ ) list->field[i...
72,721,678,065,279,450,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2012-5670
The _bdf_parse_glyphs function in FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) via vectors related to BDF fonts and an ENCODING field with a negative value.
https://nvd.nist.gov/vuln/detail/CVE-2012-5670
14,907
savannah
7f2e4f4f553f6836be7683f66226afac3fa979b8
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7f2e4f4f553f6836be7683f66226afac3fa979b8
None
0
_bdf_list_split( _bdf_list_t* list, char* separators, char* line, unsigned long linelen ) { int mult, final_empty; char *sp, *ep, *end; char seps[32]; FT_Error error = BDF_Err_Ok; /* Initialize the l...
71,652,461,231,648,830,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2012-5670
The _bdf_parse_glyphs function in FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) via vectors related to BDF fonts and an ENCODING field with a negative value.
https://nvd.nist.gov/vuln/detail/CVE-2012-5670
14,908
savannah
7f2e4f4f553f6836be7683f66226afac3fa979b8
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7f2e4f4f553f6836be7683f66226afac3fa979b8
None
0
_bdf_parse_properties( char* line, unsigned long linelen, unsigned long lineno, void* call_data, void* client_data ) { unsigned long vlen; _bdf_line_func_t* next; _bdf_p...
337,904,500,919,883,920,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2012-5670
The _bdf_parse_glyphs function in FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) via vectors related to BDF fonts and an ENCODING field with a negative value.
https://nvd.nist.gov/vuln/detail/CVE-2012-5670
14,909
savannah
7f2e4f4f553f6836be7683f66226afac3fa979b8
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7f2e4f4f553f6836be7683f66226afac3fa979b8
None
0
_bdf_parse_start( char* line, unsigned long linelen, unsigned long lineno, void* call_data, void* client_data ) { unsigned long slen; _bdf_line_func_t* next; _bdf_parse_t* p; bdf_f...
176,427,778,408,371,570,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2012-5670
The _bdf_parse_glyphs function in FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) via vectors related to BDF fonts and an ENCODING field with a negative value.
https://nvd.nist.gov/vuln/detail/CVE-2012-5670
14,910
savannah
7f2e4f4f553f6836be7683f66226afac3fa979b8
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7f2e4f4f553f6836be7683f66226afac3fa979b8
None
0
_bdf_readstream( FT_Stream stream, _bdf_line_func_t callback, void* client_data, unsigned long *lno ) { _bdf_line_func_t cb; unsigned long lineno, buf_size; int refill, hold, to_skip; ptrdiff_t ...
188,470,612,920,133,380,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2012-5670
The _bdf_parse_glyphs function in FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) via vectors related to BDF fonts and an ENCODING field with a negative value.
https://nvd.nist.gov/vuln/detail/CVE-2012-5670
14,911
savannah
7f2e4f4f553f6836be7683f66226afac3fa979b8
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7f2e4f4f553f6836be7683f66226afac3fa979b8
None
0
_bdf_set_default_spacing( bdf_font_t* font, bdf_options_t* opts, unsigned long lineno ) { size_t len; char name[256]; _bdf_list_t list; FT_Memory memory; FT_Error error = BDF_Err_Ok; if ( font == 0 || font...
123,681,094,405,704,800,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2012-5670
The _bdf_parse_glyphs function in FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) via vectors related to BDF fonts and an ENCODING field with a negative value.
https://nvd.nist.gov/vuln/detail/CVE-2012-5670
14,912
savannah
7f2e4f4f553f6836be7683f66226afac3fa979b8
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7f2e4f4f553f6836be7683f66226afac3fa979b8
None
0
bdf_free_font( bdf_font_t* font ) { bdf_property_t* prop; unsigned long i; bdf_glyph_t* glyphs; FT_Memory memory; if ( font == 0 ) return; memory = font->memory; FT_FREE( font->name ); /* Free up the internal hash table of property names. */ if ( font->...
208,427,650,405,724,270,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2012-5670
The _bdf_parse_glyphs function in FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) via vectors related to BDF fonts and an ENCODING field with a negative value.
https://nvd.nist.gov/vuln/detail/CVE-2012-5670
14,913
savannah
7f2e4f4f553f6836be7683f66226afac3fa979b8
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7f2e4f4f553f6836be7683f66226afac3fa979b8
None
0
bdf_get_font_property( bdf_font_t* font, const char* name ) { hashnode hn; if ( font == 0 || font->props_size == 0 || name == 0 || *name == 0 ) return 0; hn = hash_lookup( name, (hashtable *)font->internal ); return hn ? ( font->props + hn->data ) : 0; }
47,153,926,451,912,050,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2012-5670
The _bdf_parse_glyphs function in FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) via vectors related to BDF fonts and an ENCODING field with a negative value.
https://nvd.nist.gov/vuln/detail/CVE-2012-5670
14,914
savannah
7f2e4f4f553f6836be7683f66226afac3fa979b8
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7f2e4f4f553f6836be7683f66226afac3fa979b8
None
0
bdf_get_property( char* name, bdf_font_t* font ) { hashnode hn; size_t propid; if ( name == 0 || *name == 0 ) return 0; if ( ( hn = hash_lookup( name, &(font->proptbl) ) ) == 0 ) return 0; propid = hn->data; if ( propid >= _num_bdf_properties )...
177,826,559,973,479,400,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2012-5670
The _bdf_parse_glyphs function in FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) via vectors related to BDF fonts and an ENCODING field with a negative value.
https://nvd.nist.gov/vuln/detail/CVE-2012-5670
14,915
savannah
7f2e4f4f553f6836be7683f66226afac3fa979b8
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7f2e4f4f553f6836be7683f66226afac3fa979b8
None
0
bdf_load_font( FT_Stream stream, FT_Memory extmemory, bdf_options_t* opts, bdf_font_t* *font ) { unsigned long lineno = 0; /* make compiler happy */ _bdf_parse_t *p = NULL; FT_Memory memory = extmemory; FT_Error er...
193,496,153,099,539,400,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2012-5670
The _bdf_parse_glyphs function in FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) via vectors related to BDF fonts and an ENCODING field with a negative value.
https://nvd.nist.gov/vuln/detail/CVE-2012-5670
14,916
savannah
7f2e4f4f553f6836be7683f66226afac3fa979b8
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7f2e4f4f553f6836be7683f66226afac3fa979b8
None
0
by_encoding( const void* a, const void* b ) { bdf_glyph_t *c1, *c2; c1 = (bdf_glyph_t *)a; c2 = (bdf_glyph_t *)b; if ( c1->encoding < c2->encoding ) return -1; if ( c1->encoding > c2->encoding ) return 1; return 0; }
52,403,353,390,518,970,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2012-5670
The _bdf_parse_glyphs function in FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) via vectors related to BDF fonts and an ENCODING field with a negative value.
https://nvd.nist.gov/vuln/detail/CVE-2012-5670
14,917
savannah
7f2e4f4f553f6836be7683f66226afac3fa979b8
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7f2e4f4f553f6836be7683f66226afac3fa979b8
None
0
hash_bucket( const char* key, hashtable* ht ) { const char* kp = key; unsigned long res = 0; hashnode* bp = ht->table, *ndp; /* Mocklisp hash function. */ while ( *kp ) res = ( res << 5 ) - res + *kp++; ndp = bp + ( res % ht->size ); while ( *ndp ) ...
21,205,221,549,940,090,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2012-5670
The _bdf_parse_glyphs function in FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) via vectors related to BDF fonts and an ENCODING field with a negative value.
https://nvd.nist.gov/vuln/detail/CVE-2012-5670
14,918
savannah
7f2e4f4f553f6836be7683f66226afac3fa979b8
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7f2e4f4f553f6836be7683f66226afac3fa979b8
None
0
hash_init( hashtable* ht, FT_Memory memory ) { int sz = INITIAL_HT_SIZE; FT_Error error = BDF_Err_Ok; ht->size = sz; ht->limit = sz / 3; ht->used = 0; if ( FT_NEW_ARRAY( ht->table, sz ) ) goto Exit; Exit: return error; }
185,106,914,343,496,980,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2012-5670
The _bdf_parse_glyphs function in FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) via vectors related to BDF fonts and an ENCODING field with a negative value.
https://nvd.nist.gov/vuln/detail/CVE-2012-5670
14,919
savannah
7f2e4f4f553f6836be7683f66226afac3fa979b8
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7f2e4f4f553f6836be7683f66226afac3fa979b8
None
0
hash_insert( char* key, size_t data, hashtable* ht, FT_Memory memory ) { hashnode nn, *bp = hash_bucket( key, ht ); FT_Error error = BDF_Err_Ok; nn = *bp; if ( !nn ) { if ( FT_NEW( nn ) ) goto Exit; *bp = nn; ...
255,041,518,469,385,240,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2012-5670
The _bdf_parse_glyphs function in FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) via vectors related to BDF fonts and an ENCODING field with a negative value.
https://nvd.nist.gov/vuln/detail/CVE-2012-5670
14,920
savannah
7f2e4f4f553f6836be7683f66226afac3fa979b8
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7f2e4f4f553f6836be7683f66226afac3fa979b8
None
0
hash_lookup( const char* key, hashtable* ht ) { hashnode *np = hash_bucket( key, ht ); return *np; }
323,874,323,324,099,100,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2012-5670
The _bdf_parse_glyphs function in FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) via vectors related to BDF fonts and an ENCODING field with a negative value.
https://nvd.nist.gov/vuln/detail/CVE-2012-5670
14,921
savannah
7f2e4f4f553f6836be7683f66226afac3fa979b8
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7f2e4f4f553f6836be7683f66226afac3fa979b8
None
0
hash_rehash( hashtable* ht, FT_Memory memory ) { hashnode* obp = ht->table, *bp, *nbp; int i, sz = ht->size; FT_Error error = BDF_Err_Ok; ht->size <<= 1; ht->limit = ht->size / 3; if ( FT_NEW_ARRAY( ht->table, ht->size ) ) goto Exit; for ( i = 0, bp...
32,250,450,914,333,760,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2012-5670
The _bdf_parse_glyphs function in FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) via vectors related to BDF fonts and an ENCODING field with a negative value.
https://nvd.nist.gov/vuln/detail/CVE-2012-5670
14,932
savannah
8fcf61523644df42e1905c81bed26838e0b04f91
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/grep.git/commit/?id=8fcf61523644df42e1905c81bed26838e0b04f91
None
0
clean_up_stdout (void) { if (! write_error_seen) close_stdout (); close_stdout (); }
132,634,513,834,645,370,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2012-5667
Multiple integer overflows in GNU Grep before 2.11 might allow context-dependent attackers to execute arbitrary code via vectors involving a long input line that triggers a heap-based buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2012-5667
14,933
savannah
8fcf61523644df42e1905c81bed26838e0b04f91
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/grep.git/commit/?id=8fcf61523644df42e1905c81bed26838e0b04f91
None
0
color_cap_mt_fct (void) { /* Our caller just set selected_match_color. */ context_match_color = selected_match_color; }
253,386,071,307,148,160,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2012-5667
Multiple integer overflows in GNU Grep before 2.11 might allow context-dependent attackers to execute arbitrary code via vectors involving a long input line that triggers a heap-based buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2012-5667
14,934
savannah
8fcf61523644df42e1905c81bed26838e0b04f91
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/grep.git/commit/?id=8fcf61523644df42e1905c81bed26838e0b04f91
None
0
color_cap_rv_fct (void) { /* By this point, it was 1 (or already -1). */ color_option = -1; /* That's still != 0. */ }
156,779,631,654,124,800,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2012-5667
Multiple integer overflows in GNU Grep before 2.11 might allow context-dependent attackers to execute arbitrary code via vectors involving a long input line that triggers a heap-based buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2012-5667
14,935
savannah
8fcf61523644df42e1905c81bed26838e0b04f91
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/grep.git/commit/?id=8fcf61523644df42e1905c81bed26838e0b04f91
None
0
pr_sgr_end (char const *s) { if (*s) print_end_colorize (sgr_end); }
45,027,698,786,525,800,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2012-5667
Multiple integer overflows in GNU Grep before 2.11 might allow context-dependent attackers to execute arbitrary code via vectors involving a long input line that triggers a heap-based buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2012-5667
14,936
savannah
8fcf61523644df42e1905c81bed26838e0b04f91
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/grep.git/commit/?id=8fcf61523644df42e1905c81bed26838e0b04f91
None
0
pr_sgr_end_if (char const *s) { if (color_option) pr_sgr_end (s); }
89,011,712,709,266,240,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2012-5667
Multiple integer overflows in GNU Grep before 2.11 might allow context-dependent attackers to execute arbitrary code via vectors involving a long input line that triggers a heap-based buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2012-5667
14,937
savannah
8fcf61523644df42e1905c81bed26838e0b04f91
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/grep.git/commit/?id=8fcf61523644df42e1905c81bed26838e0b04f91
None
0
pr_sgr_start (char const *s) { if (*s) print_start_colorize (sgr_start, s); }
281,615,131,643,818,800,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2012-5667
Multiple integer overflows in GNU Grep before 2.11 might allow context-dependent attackers to execute arbitrary code via vectors involving a long input line that triggers a heap-based buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2012-5667
14,938
savannah
8fcf61523644df42e1905c81bed26838e0b04f91
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/grep.git/commit/?id=8fcf61523644df42e1905c81bed26838e0b04f91
None
0
pr_sgr_start_if (char const *s) { if (color_option) pr_sgr_start (s); }
223,712,926,835,811,230,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2012-5667
Multiple integer overflows in GNU Grep before 2.11 might allow context-dependent attackers to execute arbitrary code via vectors involving a long input line that triggers a heap-based buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2012-5667
14,939
savannah
8fcf61523644df42e1905c81bed26838e0b04f91
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/grep.git/commit/?id=8fcf61523644df42e1905c81bed26838e0b04f91
None
0
suppressible_error (char const *mesg, int errnum) { if (! suppress_errors) error (0, errnum, "%s", mesg); errseen = 1; }
138,096,839,284,279,440,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2012-5667
Multiple integer overflows in GNU Grep before 2.11 might allow context-dependent attackers to execute arbitrary code via vectors involving a long input line that triggers a heap-based buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2012-5667
14,974
kde
a90289b0962663bc1d247bbbd31b9e65b2ca000e
https://cgit.kde.org/konversation
https://cgit.kde.org/smb4k.git/commit/?id=a90289b0962663bc1d247bbbd31b9e65b2ca000e
None
0
bool Smb4KGlobal::addMountedShare(Smb4KShare *share) { Q_ASSERT(share); bool added = false; if (share) { mutex.lock(); if (!findShareByPath(share->path())) { p->mountedSharesList.append(share); added = true; p->onlyForeignShares = true; for (Smb4KShare *s : p->mounte...
93,985,563,280,098,740,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2017-8849
smb4k before 2.0.1 allows local users to gain root privileges by leveraging failure to verify arguments to the mount helper DBUS service.
https://nvd.nist.gov/vuln/detail/CVE-2017-8849
14,975
kde
a90289b0962663bc1d247bbbd31b9e65b2ca000e
https://cgit.kde.org/konversation
https://cgit.kde.org/smb4k.git/commit/?id=a90289b0962663bc1d247bbbd31b9e65b2ca000e
None
0
bool Smb4KGlobal::addShare(Smb4KShare *share) { Q_ASSERT(share); bool added = false; if (share) { mutex.lock(); if (!findShare(share->unc(), share->workgroupName())) { p->sharesList.append(share); added = true; } else { } } else { } mutex.unlock(); retu...
253,812,826,845,781,240,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2017-8849
smb4k before 2.0.1 allows local users to gain root privileges by leveraging failure to verify arguments to the mount helper DBUS service.
https://nvd.nist.gov/vuln/detail/CVE-2017-8849
14,976
kde
a90289b0962663bc1d247bbbd31b9e65b2ca000e
https://cgit.kde.org/konversation
https://cgit.kde.org/smb4k.git/commit/?id=a90289b0962663bc1d247bbbd31b9e65b2ca000e
None
0
bool Smb4KGlobal::addWorkgroup(Smb4KWorkgroup *workgroup) { Q_ASSERT(workgroup); bool added = false; mutex.lock(); if (!findWorkgroup(workgroup->workgroupName())) { p->workgroupsList.append(workgroup); added = true; } else { } mutex.unlock(); return added; }
89,190,517,553,389,300,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2017-8849
smb4k before 2.0.1 allows local users to gain root privileges by leveraging failure to verify arguments to the mount helper DBUS service.
https://nvd.nist.gov/vuln/detail/CVE-2017-8849
14,977
kde
a90289b0962663bc1d247bbbd31b9e65b2ca000e
https://cgit.kde.org/konversation
https://cgit.kde.org/smb4k.git/commit/?id=a90289b0962663bc1d247bbbd31b9e65b2ca000e
None
0
void Smb4KGlobal::clearSharesList() { mutex.lock(); while (!p->sharesList.isEmpty()) { delete p->sharesList.takeFirst(); } mutex.unlock(); }
71,861,335,382,434,470,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2017-8849
smb4k before 2.0.1 allows local users to gain root privileges by leveraging failure to verify arguments to the mount helper DBUS service.
https://nvd.nist.gov/vuln/detail/CVE-2017-8849
14,978
kde
a90289b0962663bc1d247bbbd31b9e65b2ca000e
https://cgit.kde.org/konversation
https://cgit.kde.org/smb4k.git/commit/?id=a90289b0962663bc1d247bbbd31b9e65b2ca000e
None
0
QList<Smb4KShare*> Smb4KGlobal::findInaccessibleShares() { QList<Smb4KShare *> inaccessibleShares; mutex.lock(); for (Smb4KShare *s : p->mountedSharesList) { if (s->isInaccessible()) { inaccessibleShares += s; } else { } } mutex.unlock(); return inaccessibleShares; }
207,253,593,853,782,700,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2017-8849
smb4k before 2.0.1 allows local users to gain root privileges by leveraging failure to verify arguments to the mount helper DBUS service.
https://nvd.nist.gov/vuln/detail/CVE-2017-8849
14,979
kde
a90289b0962663bc1d247bbbd31b9e65b2ca000e
https://cgit.kde.org/konversation
https://cgit.kde.org/smb4k.git/commit/?id=a90289b0962663bc1d247bbbd31b9e65b2ca000e
None
0
Smb4KShare *Smb4KGlobal::findShare(const QString& unc, const QString& workgroup) { Smb4KShare *share = 0; mutex.lock(); for (Smb4KShare *s : p->sharesList) { if (QString::compare(s->unc(), unc, Qt::CaseInsensitive) == 0 && (workgroup.isEmpty() || QString::compare(s->workgroupName(), workgroup, Q...
125,501,319,450,043,310,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2017-8849
smb4k before 2.0.1 allows local users to gain root privileges by leveraging failure to verify arguments to the mount helper DBUS service.
https://nvd.nist.gov/vuln/detail/CVE-2017-8849
14,980
kde
a90289b0962663bc1d247bbbd31b9e65b2ca000e
https://cgit.kde.org/konversation
https://cgit.kde.org/smb4k.git/commit/?id=a90289b0962663bc1d247bbbd31b9e65b2ca000e
None
0
Smb4KShare* Smb4KGlobal::findShareByPath(const QString &path) { Smb4KShare *share = 0; mutex.lock(); if (!path.isEmpty() && !p->mountedSharesList.isEmpty()) { for (Smb4KShare *s : p->mountedSharesList) { if (QString::compare(s->path(), path, Qt::CaseInsensitive) == 0 || QString::compar...
275,643,678,662,584,530,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2017-8849
smb4k before 2.0.1 allows local users to gain root privileges by leveraging failure to verify arguments to the mount helper DBUS service.
https://nvd.nist.gov/vuln/detail/CVE-2017-8849
14,981
kde
a90289b0962663bc1d247bbbd31b9e65b2ca000e
https://cgit.kde.org/konversation
https://cgit.kde.org/smb4k.git/commit/?id=a90289b0962663bc1d247bbbd31b9e65b2ca000e
None
0
QList<Smb4KShare *> Smb4KGlobal::findShareByUNC(const QString &unc) { QList<Smb4KShare *> shares; mutex.lock(); if (!unc.isEmpty() && !p->mountedSharesList.isEmpty()) { for (Smb4KShare *s : p->mountedSharesList) { if (QString::compare(s->unc(), unc, Qt::CaseInsensitive) == 0) { sha...
117,356,764,085,892,500,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2017-8849
smb4k before 2.0.1 allows local users to gain root privileges by leveraging failure to verify arguments to the mount helper DBUS service.
https://nvd.nist.gov/vuln/detail/CVE-2017-8849
14,982
kde
a90289b0962663bc1d247bbbd31b9e65b2ca000e
https://cgit.kde.org/konversation
https://cgit.kde.org/smb4k.git/commit/?id=a90289b0962663bc1d247bbbd31b9e65b2ca000e
None
0
void Smb4KGlobal::openShare(Smb4KShare *share, OpenWith openWith) { if (!share || share->isInaccessible()) { return; } switch (openWith) { case FileManager: { QUrl url = QUrl::fromLocalFile(share->canonicalPath()); (void) new KRun(url, 0); break; } case Konsole: { ...
35,369,758,559,161,976,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2017-8849
smb4k before 2.0.1 allows local users to gain root privileges by leveraging failure to verify arguments to the mount helper DBUS service.
https://nvd.nist.gov/vuln/detail/CVE-2017-8849
14,983
kde
a90289b0962663bc1d247bbbd31b9e65b2ca000e
https://cgit.kde.org/konversation
https://cgit.kde.org/smb4k.git/commit/?id=a90289b0962663bc1d247bbbd31b9e65b2ca000e
None
0
bool Smb4KGlobal::removeMountedShare(Smb4KShare *share) { Q_ASSERT(share); bool removed = false; if (share) { mutex.lock(); QMutableListIterator<Smb4KShare *> it(p->mountedSharesList); while (it.hasNext()) { Smb4KShare *s = it.next(); if (QString::compare(s->path()...
264,058,344,729,509,770,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2017-8849
smb4k before 2.0.1 allows local users to gain root privileges by leveraging failure to verify arguments to the mount helper DBUS service.
https://nvd.nist.gov/vuln/detail/CVE-2017-8849
14,984
kde
a90289b0962663bc1d247bbbd31b9e65b2ca000e
https://cgit.kde.org/konversation
https://cgit.kde.org/smb4k.git/commit/?id=a90289b0962663bc1d247bbbd31b9e65b2ca000e
None
0
bool Smb4KGlobal::removeShare(Smb4KShare *share) { Q_ASSERT(share); bool removed = false; if (share) { mutex.lock(); int index = p->sharesList.indexOf(share); if (index != -1) { delete p->sharesList.takeAt(index); removed = true; } else { Smb4KShare *s = findS...
196,118,442,381,516,000,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2017-8849
smb4k before 2.0.1 allows local users to gain root privileges by leveraging failure to verify arguments to the mount helper DBUS service.
https://nvd.nist.gov/vuln/detail/CVE-2017-8849
14,985
kde
a90289b0962663bc1d247bbbd31b9e65b2ca000e
https://cgit.kde.org/konversation
https://cgit.kde.org/smb4k.git/commit/?id=a90289b0962663bc1d247bbbd31b9e65b2ca000e
None
0
bool Smb4KGlobal::removeWorkgroup(Smb4KWorkgroup *workgroup) { Q_ASSERT(workgroup); bool removed = false; mutex.lock(); int index = p->workgroupsList.indexOf(workgroup); if (index != -1) { delete p->workgroupsList.takeAt(index); removed = true; } else { Smb4KWorkgroup *wg = findWorkgro...
171,659,747,544,462,630,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2017-8849
smb4k before 2.0.1 allows local users to gain root privileges by leveraging failure to verify arguments to the mount helper DBUS service.
https://nvd.nist.gov/vuln/detail/CVE-2017-8849
14,986
kde
a90289b0962663bc1d247bbbd31b9e65b2ca000e
https://cgit.kde.org/konversation
https://cgit.kde.org/smb4k.git/commit/?id=a90289b0962663bc1d247bbbd31b9e65b2ca000e
None
0
QList<Smb4KShare *> Smb4KGlobal::sharedResources(Smb4KHost *host) { QList<Smb4KShare *> shares; mutex.lock(); for (Smb4KShare *s : p->sharesList) { if (QString::compare(s->hostName(), host->hostName(), Qt::CaseInsensitive) == 0 && QString::compare(s->workgroupName(), host->workgroupName(), Qt::C...
186,421,230,871,593,200,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2017-8849
smb4k before 2.0.1 allows local users to gain root privileges by leveraging failure to verify arguments to the mount helper DBUS service.
https://nvd.nist.gov/vuln/detail/CVE-2017-8849
14,987
kde
a90289b0962663bc1d247bbbd31b9e65b2ca000e
https://cgit.kde.org/konversation
https://cgit.kde.org/smb4k.git/commit/?id=a90289b0962663bc1d247bbbd31b9e65b2ca000e
None
0
QList<Smb4KHost *> Smb4KGlobal::workgroupMembers(Smb4KWorkgroup *workgroup) { QList<Smb4KHost *> hosts; mutex.lock(); for (Smb4KHost *h : p->hostsList) { if (QString::compare(h->workgroupName(), workgroup->workgroupName(), Qt::CaseInsensitive) == 0) { hosts += h; } else { } }...
46,044,036,347,644,590,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2017-8849
smb4k before 2.0.1 allows local users to gain root privileges by leveraging failure to verify arguments to the mount helper DBUS service.
https://nvd.nist.gov/vuln/detail/CVE-2017-8849
14,988
kde
a90289b0962663bc1d247bbbd31b9e65b2ca000e
https://cgit.kde.org/konversation
https://cgit.kde.org/smb4k.git/commit/?id=a90289b0962663bc1d247bbbd31b9e65b2ca000e
None
0
void Smb4KMounter::abortAll() { if (!QCoreApplication::closingDown()) { QListIterator<KJob *> it(subjobs()); while (it.hasNext()) { it.next()->kill(KJob::EmitResult); } } else { } }
242,019,033,904,363,100,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2017-8849
smb4k before 2.0.1 allows local users to gain root privileges by leveraging failure to verify arguments to the mount helper DBUS service.
https://nvd.nist.gov/vuln/detail/CVE-2017-8849
15,021
savannah
df14e6c0b9592cbb24d5381dfc6106b14f915e75
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=df14e6c0b9592cbb24d5381dfc6106b14f915e75
None
0
T1_Done_Blend( T1_Face face ) { FT_Memory memory = face->root.memory; PS_Blend blend = face->blend; if ( blend ) { FT_UInt num_designs = blend->num_designs; FT_UInt num_axis = blend->num_axis; FT_UInt n; /* release design pos table */ FT_FREE( blend->desi...
21,490,475,045,498,910,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2014-9745
The parse_encoding function in type1/t1load.c in FreeType before 2.5.3 allows remote attackers to cause a denial of service (infinite loop) via a "broken number-with-base" in a Postscript stream, as demonstrated by 8#garbage.
https://nvd.nist.gov/vuln/detail/CVE-2014-9745
15,022
savannah
df14e6c0b9592cbb24d5381dfc6106b14f915e75
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=df14e6c0b9592cbb24d5381dfc6106b14f915e75
None
0
T1_Get_MM_Var( T1_Face face, FT_MM_Var* *master ) { FT_Memory memory = face->root.memory; FT_MM_Var *mmvar = NULL; FT_Multi_Master mmaster; FT_Error error; FT_UInt i; FT_Fixed axiscoords[T1_MAX_MM_AXIS]; PS_Blend blend...
2,842,027,867,262,882,700,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2014-9745
The parse_encoding function in type1/t1load.c in FreeType before 2.5.3 allows remote attackers to cause a denial of service (infinite loop) via a "broken number-with-base" in a Postscript stream, as demonstrated by 8#garbage.
https://nvd.nist.gov/vuln/detail/CVE-2014-9745
15,023
savannah
df14e6c0b9592cbb24d5381dfc6106b14f915e75
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=df14e6c0b9592cbb24d5381dfc6106b14f915e75
None
0
T1_Get_Multi_Master( T1_Face face, FT_Multi_Master* master ) { PS_Blend blend = face->blend; FT_UInt n; FT_Error error; error = FT_THROW( Invalid_Argument ); if ( blend ) { master->num_axis = blend->num_axis; master->num_designs = blend...
270,069,423,638,040,700,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2014-9745
The parse_encoding function in type1/t1load.c in FreeType before 2.5.3 allows remote attackers to cause a denial of service (infinite loop) via a "broken number-with-base" in a Postscript stream, as demonstrated by 8#garbage.
https://nvd.nist.gov/vuln/detail/CVE-2014-9745
15,024
savannah
df14e6c0b9592cbb24d5381dfc6106b14f915e75
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=df14e6c0b9592cbb24d5381dfc6106b14f915e75
None
0
T1_Set_Var_Design( T1_Face face, FT_UInt num_coords, FT_Fixed* coords ) { FT_Long lcoords[4]; /* maximum axis count is 4 */ FT_UInt i; FT_Error error; error = FT_ERR( Invalid_Argument ); if ( num_coords <= 4 && num_coords > 0 ...
128,665,001,610,397,300,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2014-9745
The parse_encoding function in type1/t1load.c in FreeType before 2.5.3 allows remote attackers to cause a denial of service (infinite loop) via a "broken number-with-base" in a Postscript stream, as demonstrated by 8#garbage.
https://nvd.nist.gov/vuln/detail/CVE-2014-9745
15,025
savannah
df14e6c0b9592cbb24d5381dfc6106b14f915e75
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=df14e6c0b9592cbb24d5381dfc6106b14f915e75
None
0
mm_weights_unmap( FT_Fixed* weights, FT_Fixed* axiscoords, FT_UInt axis_count ) { FT_ASSERT( axis_count <= T1_MAX_MM_AXIS ); if ( axis_count == 1 ) axiscoords[0] = weights[1]; else if ( axis_count == 2 ) { axiscoords[0] = weights[3] + weight...
121,263,882,194,033,950,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2014-9745
The parse_encoding function in type1/t1load.c in FreeType before 2.5.3 allows remote attackers to cause a denial of service (infinite loop) via a "broken number-with-base" in a Postscript stream, as demonstrated by 8#garbage.
https://nvd.nist.gov/vuln/detail/CVE-2014-9745
15,026
savannah
df14e6c0b9592cbb24d5381dfc6106b14f915e75
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=df14e6c0b9592cbb24d5381dfc6106b14f915e75
None
0
parse_blend_axis_types( T1_Face face, T1_Loader loader ) { T1_TokenRec axis_tokens[T1_MAX_MM_AXIS]; FT_Int n, num_axis; FT_Error error = FT_Err_Ok; PS_Blend blend; FT_Memory memory; /* take an array of objects */ T1_ToTokenArray( &loader-...
239,593,505,326,708,240,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2014-9745
The parse_encoding function in type1/t1load.c in FreeType before 2.5.3 allows remote attackers to cause a denial of service (infinite loop) via a "broken number-with-base" in a Postscript stream, as demonstrated by 8#garbage.
https://nvd.nist.gov/vuln/detail/CVE-2014-9745
15,027
savannah
df14e6c0b9592cbb24d5381dfc6106b14f915e75
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=df14e6c0b9592cbb24d5381dfc6106b14f915e75
None
0
parse_blend_design_map( T1_Face face, T1_Loader loader ) { FT_Error error = FT_Err_Ok; T1_Parser parser = &loader->parser; PS_Blend blend; T1_TokenRec axis_tokens[T1_MAX_MM_AXIS]; FT_Int n, num_axis; FT_Byte* old_cursor; FT_Byte* o...
242,351,288,979,242,560,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2014-9745
The parse_encoding function in type1/t1load.c in FreeType before 2.5.3 allows remote attackers to cause a denial of service (infinite loop) via a "broken number-with-base" in a Postscript stream, as demonstrated by 8#garbage.
https://nvd.nist.gov/vuln/detail/CVE-2014-9745
15,028
savannah
df14e6c0b9592cbb24d5381dfc6106b14f915e75
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=df14e6c0b9592cbb24d5381dfc6106b14f915e75
None
0
parse_blend_design_positions( T1_Face face, T1_Loader loader ) { T1_TokenRec design_tokens[T1_MAX_MM_DESIGNS]; FT_Int num_designs; FT_Int num_axis; T1_Parser parser = &loader->parser; FT_Error error = FT_Err_Ok; PS_Blend blend; ...
257,776,473,922,649,470,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2014-9745
The parse_encoding function in type1/t1load.c in FreeType before 2.5.3 allows remote attackers to cause a denial of service (infinite loop) via a "broken number-with-base" in a Postscript stream, as demonstrated by 8#garbage.
https://nvd.nist.gov/vuln/detail/CVE-2014-9745
15,029
savannah
df14e6c0b9592cbb24d5381dfc6106b14f915e75
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=df14e6c0b9592cbb24d5381dfc6106b14f915e75
None
0
parse_buildchar( T1_Face face, T1_Loader loader ) { face->len_buildchar = T1_ToFixedArray( &loader->parser, 0, NULL, 0 ); return; }
178,303,617,151,332,500,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2014-9745
The parse_encoding function in type1/t1load.c in FreeType before 2.5.3 allows remote attackers to cause a denial of service (infinite loop) via a "broken number-with-base" in a Postscript stream, as demonstrated by 8#garbage.
https://nvd.nist.gov/vuln/detail/CVE-2014-9745
15,030
savannah
df14e6c0b9592cbb24d5381dfc6106b14f915e75
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=df14e6c0b9592cbb24d5381dfc6106b14f915e75
None
0
parse_private( T1_Face face, T1_Loader loader ) { FT_UNUSED( face ); loader->keywords_encountered |= T1_PRIVATE; }
126,864,828,796,635,240,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2014-9745
The parse_encoding function in type1/t1load.c in FreeType before 2.5.3 allows remote attackers to cause a denial of service (infinite loop) via a "broken number-with-base" in a Postscript stream, as demonstrated by 8#garbage.
https://nvd.nist.gov/vuln/detail/CVE-2014-9745
15,031
savannah
df14e6c0b9592cbb24d5381dfc6106b14f915e75
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=df14e6c0b9592cbb24d5381dfc6106b14f915e75
None
0
parse_weight_vector( T1_Face face, T1_Loader loader ) { T1_TokenRec design_tokens[T1_MAX_MM_DESIGNS]; FT_Int num_designs; FT_Error error = FT_Err_Ok; T1_Parser parser = &loader->parser; PS_Blend blend = face->blend; T1_Token token; FT_In...
117,070,451,376,203,480,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2014-9745
The parse_encoding function in type1/t1load.c in FreeType before 2.5.3 allows remote attackers to cause a denial of service (infinite loop) via a "broken number-with-base" in a Postscript stream, as demonstrated by 8#garbage.
https://nvd.nist.gov/vuln/detail/CVE-2014-9745
15,032
savannah
df14e6c0b9592cbb24d5381dfc6106b14f915e75
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=df14e6c0b9592cbb24d5381dfc6106b14f915e75
None
0
read_binary_data( T1_Parser parser, FT_Long* size, FT_Byte** base, FT_Bool incremental ) { FT_Byte* cur; FT_Byte* limit = parser->root.limit; /* the binary data has one of the following formats */ /* ...
139,237,799,842,348,400,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2014-9745
The parse_encoding function in type1/t1load.c in FreeType before 2.5.3 allows remote attackers to cause a denial of service (infinite loop) via a "broken number-with-base" in a Postscript stream, as demonstrated by 8#garbage.
https://nvd.nist.gov/vuln/detail/CVE-2014-9745
15,034
haproxy
17514045e5d934dede62116216c1b016fe23dd06
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06
None
0
static void __http_protocol_init(void) { acl_register_keywords(&acl_kws); sample_register_fetches(&sample_fetch_keywords); sample_register_convs(&sample_conv_kws); http_req_keywords_register(&http_req_actions); http_res_keywords_register(&http_res_actions); cli_register_kw(&cli_kws); }
195,241,065,913,255,860,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2018-11469
Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function.
https://nvd.nist.gov/vuln/detail/CVE-2018-11469
15,035
haproxy
17514045e5d934dede62116216c1b016fe23dd06
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06
None
0
struct action_kw *action_http_req_custom(const char *kw) { return action_lookup(&http_req_keywords.list, kw); }
328,699,117,525,423,830,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2018-11469
Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function.
https://nvd.nist.gov/vuln/detail/CVE-2018-11469
15,036
haproxy
17514045e5d934dede62116216c1b016fe23dd06
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06
None
0
struct action_kw *action_http_res_custom(const char *kw) { return action_lookup(&http_res_keywords.list, kw); }
156,535,480,136,449,730,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2018-11469
Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function.
https://nvd.nist.gov/vuln/detail/CVE-2018-11469
15,037
haproxy
17514045e5d934dede62116216c1b016fe23dd06
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06
None
0
enum act_return action_http_set_status(struct act_rule *rule, struct proxy *px, struct session *sess, struct stream *s, int flags) { http_set_status(rule->arg.status.code, rule->arg.status.reason, s); return ACT_RET_CONT; }
44,457,810,946,535,050,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2018-11469
Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function.
https://nvd.nist.gov/vuln/detail/CVE-2018-11469
15,038
haproxy
17514045e5d934dede62116216c1b016fe23dd06
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06
None
0
int apply_filter_to_req_line(struct stream *s, struct channel *req, struct hdr_exp *exp) { char *cur_ptr, *cur_end; int done; struct http_txn *txn = s->txn; int delta; if (unlikely(txn->flags & (TX_CLDENY | TX_CLTARPIT))) return 1; else if (unlikely(txn->flags & TX_CLALLOW) && (exp->action == ACT_ALLOW || ...
138,269,546,679,631,230,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2018-11469
Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function.
https://nvd.nist.gov/vuln/detail/CVE-2018-11469
15,039
haproxy
17514045e5d934dede62116216c1b016fe23dd06
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06
None
0
int apply_filter_to_resp_headers(struct stream *s, struct channel *rtr, struct hdr_exp *exp) { char *cur_ptr, *cur_end, *cur_next; int cur_idx, old_idx, last_hdr; struct http_txn *txn = s->txn; struct hdr_idx_elem *cur_hdr; int delta; last_hdr = 0; cur_next = rtr->buf->p + hdr_idx_first_pos(&txn->hdr_idx); ol...
180,776,059,794,866,600,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2018-11469
Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function.
https://nvd.nist.gov/vuln/detail/CVE-2018-11469
15,040
haproxy
17514045e5d934dede62116216c1b016fe23dd06
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06
None
0
int apply_filter_to_sts_line(struct stream *s, struct channel *rtr, struct hdr_exp *exp) { char *cur_ptr, *cur_end; int done; struct http_txn *txn = s->txn; int delta; if (unlikely(txn->flags & TX_SVDENY)) return 1; else if (unlikely(txn->flags & TX_SVALLOW) && (exp->action == ACT_ALLOW || exp->action ...
325,999,339,057,921,450,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2018-11469
Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function.
https://nvd.nist.gov/vuln/detail/CVE-2018-11469
15,041
haproxy
17514045e5d934dede62116216c1b016fe23dd06
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06
None
0
int apply_filters_to_request(struct stream *s, struct channel *req, struct proxy *px) { struct session *sess = s->sess; struct http_txn *txn = s->txn; struct hdr_exp *exp; for (exp = px->req_exp; exp; exp = exp->next) { int ret; /* * The interleaving of transformations and verdicts * makes it difficult ...
211,163,005,605,842,470,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2018-11469
Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function.
https://nvd.nist.gov/vuln/detail/CVE-2018-11469
15,042
haproxy
17514045e5d934dede62116216c1b016fe23dd06
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06
None
0
int apply_filters_to_response(struct stream *s, struct channel *rtr, struct proxy *px) { struct session *sess = s->sess; struct http_txn *txn = s->txn; struct hdr_exp *exp; for (exp = px->rsp_exp; exp; exp = exp->next) { int ret; /* * The interleaving of transformations and verdicts * makes it difficult...
81,131,791,987,331,700,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2018-11469
Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function.
https://nvd.nist.gov/vuln/detail/CVE-2018-11469
15,043
haproxy
17514045e5d934dede62116216c1b016fe23dd06
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06
None
0
void capture_headers(char *som, struct hdr_idx *idx, char **cap, struct cap_hdr *cap_hdr) { char *eol, *sol, *col, *sov; int cur_idx; struct cap_hdr *h; int len; sol = som + hdr_idx_first_pos(idx); cur_idx = hdr_idx_first_idx(idx); while (cur_idx) { eol = sol + idx->v[cur_idx].len; col = sol; whi...
182,795,259,851,491,500,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2018-11469
Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function.
https://nvd.nist.gov/vuln/detail/CVE-2018-11469
15,044
haproxy
17514045e5d934dede62116216c1b016fe23dd06
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06
None
0
int check_http_res_capture(struct act_rule *rule, struct proxy *px, char **err) { if (rule->action_ptr != http_action_res_capture_by_id) return 1; if (rule->arg.capid.idx >= px->nb_rsp_cap) { memprintf(err, "unable to find capture id '%d' referenced by http-response capture rule", rule->arg.capid.idx); re...
167,199,778,828,526,760,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2018-11469
Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function.
https://nvd.nist.gov/vuln/detail/CVE-2018-11469
15,045
haproxy
17514045e5d934dede62116216c1b016fe23dd06
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06
None
0
void check_response_for_cacheability(struct stream *s, struct channel *rtr) { struct http_txn *txn = s->txn; char *p1, *p2; char *cur_ptr, *cur_end, *cur_next; int cur_idx; if (txn->status < 200) { /* do not try to cache interim responses! */ txn->flags &= ~TX_CACHEABLE & ~TX_CACHE_COOK; return; } /* It...
92,332,580,689,782,970,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2018-11469
Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function.
https://nvd.nist.gov/vuln/detail/CVE-2018-11469
15,046
haproxy
17514045e5d934dede62116216c1b016fe23dd06
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06
None
0
static int cli_io_handler_show_errors(struct appctx *appctx) { struct stream_interface *si = appctx->owner; extern const char *monthname[12]; if (unlikely(si_ic(si)->flags & (CF_WRITE_ERROR|CF_SHUTW))) return 1; chunk_reset(&trash); if (!appctx->ctx.errors.px) { /* the function had not been called yet, let'...
150,388,449,049,083,700,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2018-11469
Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function.
https://nvd.nist.gov/vuln/detail/CVE-2018-11469
15,047
haproxy
17514045e5d934dede62116216c1b016fe23dd06
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06
None
0
static int cli_parse_show_errors(char **args, struct appctx *appctx, void *private) { if (!cli_has_level(appctx, ACCESS_LVL_OPER)) return 1; if (*args[2]) { struct proxy *px; px = proxy_find_by_name(args[2], 0, 0); if (px) appctx->ctx.errors.iid = px->uuid; else appctx->ctx.errors.iid = atoi(args[2]...
170,853,061,042,486,200,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2018-11469
Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function.
https://nvd.nist.gov/vuln/detail/CVE-2018-11469
15,048
haproxy
17514045e5d934dede62116216c1b016fe23dd06
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06
None
0
void debug_hdr(const char *dir, struct stream *s, const char *start, const char *end) { struct session *sess = strm_sess(s); int max; chunk_printf(&trash, "%08x:%s.%s[%04x:%04x]: ", s->uniq_id, s->be->id, dir, objt_conn(sess->origin) ? (unsigned short)objt_conn(sess->origin)->handle.fd : -1, o...
333,837,843,425,412,250,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2018-11469
Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function.
https://nvd.nist.gov/vuln/detail/CVE-2018-11469
15,049
haproxy
17514045e5d934dede62116216c1b016fe23dd06
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06
None
0
int del_hdr_value(struct buffer *buf, char **from, char *next) { char *prev = *from; if (*prev == ':') { /* We're removing the first value, preserve the colon and add a * space if possible. */ if (!HTTP_IS_CRLF(*next)) next++; prev++; if (prev < next) *prev++ = ' '; while (HTTP_IS_SPHT(*next))...
162,268,723,669,375,740,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2018-11469
Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function.
https://nvd.nist.gov/vuln/detail/CVE-2018-11469
15,050
haproxy
17514045e5d934dede62116216c1b016fe23dd06
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06
None
0
extract_cookie_value(char *hdr, const char *hdr_end, char *cookie_name, size_t cookie_name_l, int list, char **value, int *value_l) { char *equal, *att_end, *att_beg, *val_beg, *val_end; char *next; /* we search at least a cookie name followed by an equal, and more * generally something like this : * Co...
295,798,792,550,227,700,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2018-11469
Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function.
https://nvd.nist.gov/vuln/detail/CVE-2018-11469
15,051
haproxy
17514045e5d934dede62116216c1b016fe23dd06
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06
None
0
char *find_hdr_value_end(char *s, const char *e) { int quoted, qdpair; quoted = qdpair = 0; #if defined(__x86_64__) || \ defined(__i386__) || defined(__i486__) || defined(__i586__) || defined(__i686__) || \ defined(__ARM_ARCH_7A__) /* speedup: skip everything not a comma nor a double quote */ for (; ...
12,597,157,124,595,968,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2018-11469
Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function.
https://nvd.nist.gov/vuln/detail/CVE-2018-11469
15,052
haproxy
17514045e5d934dede62116216c1b016fe23dd06
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06
None
0
enum http_meth_t find_http_meth(const char *str, const int len) { unsigned char m; const struct http_method_desc *h; m = ((unsigned)*str - 'A'); if (m < 26) { for (h = http_methods[m]; h->len > 0; h++) { if (unlikely(h->len != len)) continue; if (likely(memcmp(str, h->text, h->len) == 0)) return h...
10,182,886,481,391,848,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2018-11469
Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function.
https://nvd.nist.gov/vuln/detail/CVE-2018-11469
15,053
haproxy
17514045e5d934dede62116216c1b016fe23dd06
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06
None
0
static inline char *find_param_list(char *path, size_t path_l, char delim) { char *p; p = memchr(path, delim, path_l); return p ? p + 1 : NULL; }
255,767,243,097,592,140,000,000,000,000,000,000,000
proto_http.c
303,284,703,978,098,730,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2018-11469
Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function.
https://nvd.nist.gov/vuln/detail/CVE-2018-11469
15,054
haproxy
17514045e5d934dede62116216c1b016fe23dd06
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06
None
0
find_url_param_pos(const char **chunks, const char* url_param_name, size_t url_param_name_l, char delim) { const char *pos, *last, *equal; const char **bufs = chunks; int l1, l2; pos = bufs[0]; last = bufs[1]; while (pos < last) { /* Check the equal. */ equal = pos + u...
270,302,425,006,512,660,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2018-11469
Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function.
https://nvd.nist.gov/vuln/detail/CVE-2018-11469
15,055
haproxy
17514045e5d934dede62116216c1b016fe23dd06
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06
None
0
static inline int fix_pointer_if_wrap(const char **chunks, const char **ptr) { if (*ptr < chunks[1]) return 0; if (!chunks[2]) return 0; *ptr = chunks[2] + ( *ptr - chunks[1] ); return 1; }
169,647,373,589,215,030,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2018-11469
Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function.
https://nvd.nist.gov/vuln/detail/CVE-2018-11469
15,056
haproxy
17514045e5d934dede62116216c1b016fe23dd06
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06
None
0
void free_http_req_rules(struct list *r) { struct act_rule *tr, *pr; list_for_each_entry_safe(pr, tr, r, list) { LIST_DEL(&pr->list); if (pr->action == ACT_HTTP_REQ_AUTH) free(pr->arg.auth.realm); regex_free(&pr->arg.hdr_add.re); free(pr); } }
173,910,951,655,223,760,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2018-11469
Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function.
https://nvd.nist.gov/vuln/detail/CVE-2018-11469
15,057
haproxy
17514045e5d934dede62116216c1b016fe23dd06
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06
None
0
void free_http_res_rules(struct list *r) { struct act_rule *tr, *pr; list_for_each_entry_safe(pr, tr, r, list) { LIST_DEL(&pr->list); regex_free(&pr->arg.hdr_add.re); free(pr); } }
46,502,125,898,370,790,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2018-11469
Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function.
https://nvd.nist.gov/vuln/detail/CVE-2018-11469
15,058
haproxy
17514045e5d934dede62116216c1b016fe23dd06
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06
None
0
const char *get_reason(unsigned int status) { switch (status) { case 100: return "Continue"; case 101: return "Switching Protocols"; case 102: return "Processing"; case 200: return "OK"; case 201: return "Created"; case 202: return "Accepted"; case 203: return "Non-Authoritative Information"; case 204: return ...
39,780,823,657,068,320,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2018-11469
Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function.
https://nvd.nist.gov/vuln/detail/CVE-2018-11469
15,059
haproxy
17514045e5d934dede62116216c1b016fe23dd06
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06
None
0
enum act_return http_action_reject(struct act_rule *rule, struct proxy *px, struct session *sess, struct stream *s, int flags) { channel_abort(&s->req); channel_abort(&s->res); s->req.analysers = 0; s->res.analysers = 0; HA_ATOMIC_ADD(&s->be->be_counters.denied_req, 1); HA_ATOM...
322,037,278,619,453,700,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2018-11469
Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function.
https://nvd.nist.gov/vuln/detail/CVE-2018-11469
15,060
haproxy
17514045e5d934dede62116216c1b016fe23dd06
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06
None
0
enum act_return http_action_req_capture(struct act_rule *rule, struct proxy *px, struct session *sess, struct stream *s, int flags) { struct sample *key; struct cap_hdr *h = rule->arg.cap.hdr; char **cap = s->req_cap; int len; key = sample_fetch_as_type(s->be, sess, s, SMP_...
32,396,962,920,387,456,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2018-11469
Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function.
https://nvd.nist.gov/vuln/detail/CVE-2018-11469
15,061
haproxy
17514045e5d934dede62116216c1b016fe23dd06
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06
None
0
enum act_return http_action_req_capture_by_id(struct act_rule *rule, struct proxy *px, struct session *sess, struct stream *s, int flags) { struct sample *key; struct cap_hdr *h; char **cap = s->req_cap; struct proxy *fe = strm_fe(s); int len; int i; /* Look for the...
146,140,563,482,517,860,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2018-11469
Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function.
https://nvd.nist.gov/vuln/detail/CVE-2018-11469
15,062
haproxy
17514045e5d934dede62116216c1b016fe23dd06
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06
None
0
enum act_return http_action_res_capture_by_id(struct act_rule *rule, struct proxy *px, struct session *sess, struct stream *s, int flags) { struct sample *key; struct cap_hdr *h; char **cap = s->res_cap; struct proxy *fe = strm_fe(s); int len; int i; /* Look for the...
197,847,233,984,926,870,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2018-11469
Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function.
https://nvd.nist.gov/vuln/detail/CVE-2018-11469
15,063
haproxy
17514045e5d934dede62116216c1b016fe23dd06
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06
None
0
enum act_return http_action_set_req_line(struct act_rule *rule, struct proxy *px, struct session *sess, struct stream *s, int flags) { struct chunk *replace; enum act_return ret = ACT_RET_ERR; replace = alloc_trash_chunk(); if (!replace) goto leave; /* If we have to cre...
9,503,962,735,727,992,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2018-11469
Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function.
https://nvd.nist.gov/vuln/detail/CVE-2018-11469
15,064
haproxy
17514045e5d934dede62116216c1b016fe23dd06
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06
None
0
void http_adjust_conn_mode(struct stream *s, struct http_txn *txn, struct http_msg *msg) { struct proxy *fe = strm_fe(s); int tmp = TX_CON_WANT_KAL; if (!((fe->options2|s->be->options2) & PR_O2_FAKE_KA)) { if ((fe->options & PR_O_HTTP_MODE) == PR_O_HTTP_TUN || (s->be->options & PR_O_HTTP_MODE) == PR_O_HTTP_...
301,478,221,094,158,640,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2018-11469
Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function.
https://nvd.nist.gov/vuln/detail/CVE-2018-11469
15,065
haproxy
17514045e5d934dede62116216c1b016fe23dd06
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06
None
0
struct http_txn *http_alloc_txn(struct stream *s) { struct http_txn *txn = s->txn; if (txn) return txn; txn = pool_alloc(pool_head_http_txn); if (!txn) return txn; txn->hdr_idx.size = global.tune.max_http_hdr; txn->hdr_idx.v = pool_alloc(pool_head_hdr_idx); if (!txn->hdr_idx.v) { pool_free(pool_head_...
183,309,505,891,001,600,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2018-11469
Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function.
https://nvd.nist.gov/vuln/detail/CVE-2018-11469
15,066
haproxy
17514045e5d934dede62116216c1b016fe23dd06
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06
None
0
static int http_apply_redirect_rule(struct redirect_rule *rule, struct stream *s, struct http_txn *txn) { struct http_msg *req = &txn->req; struct http_msg *res = &txn->rsp; const char *msg_fmt; struct chunk *chunk; int ret = 0; chunk = alloc_trash_chunk(); if (!chunk) goto leave; /* build redirect message ...
104,480,225,191,529,080,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2018-11469
Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function.
https://nvd.nist.gov/vuln/detail/CVE-2018-11469
15,067
haproxy
17514045e5d934dede62116216c1b016fe23dd06
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06
None
0
void http_capture_bad_message(struct proxy *proxy, struct error_snapshot *es, struct stream *s, struct http_msg *msg, enum h1_state state, struct proxy *other_end) { struct session *sess = strm_sess(s); struct channel *chn = msg->chn; int len1, len2; HA_SPIN_LOCK(PROXY_LOCK, ...
5,947,119,158,805,257,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2018-11469
Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function.
https://nvd.nist.gov/vuln/detail/CVE-2018-11469
15,068
haproxy
17514045e5d934dede62116216c1b016fe23dd06
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06
None
0
void http_change_connection_header(struct http_txn *txn, struct http_msg *msg, int wanted) { struct hdr_ctx ctx; const char *hdr_val = "Connection"; int hdr_len = 10; ctx.idx = 0; if (unlikely(txn->flags & TX_USE_PX_CONN)) { hdr_val = "Proxy-Connection"; hdr_len = 16; } txn->flags &= ~(TX_CON_CLO_SET | T...
225,612,205,013,002,400,000,000,000,000,000,000,000
proto_http.c
303,284,703,978,098,730,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2018-11469
Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function.
https://nvd.nist.gov/vuln/detail/CVE-2018-11469
15,069
haproxy
17514045e5d934dede62116216c1b016fe23dd06
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06
None
0
void http_end_txn(struct stream *s) { struct http_txn *txn = s->txn; struct proxy *fe = strm_fe(s); /* these ones will have been dynamically allocated */ pool_free(pool_head_requri, txn->uri); pool_free(pool_head_capture, txn->cli_cookie); pool_free(pool_head_capture, txn->srv_cookie); pool_free(pool_head_uniqu...
131,585,145,308,538,400,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2018-11469
Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function.
https://nvd.nist.gov/vuln/detail/CVE-2018-11469
15,070
haproxy
17514045e5d934dede62116216c1b016fe23dd06
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06
None
0
void http_end_txn_clean_session(struct stream *s) { int prev_status = s->txn->status; struct proxy *fe = strm_fe(s); struct proxy *be = s->be; struct conn_stream *cs; struct connection *srv_conn; struct server *srv; unsigned int prev_flags = s->txn->flags; /* FIXME: We need a more portable way of releasing a b...
11,244,401,457,962,764,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2018-11469
Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function.
https://nvd.nist.gov/vuln/detail/CVE-2018-11469
15,071
haproxy
17514045e5d934dede62116216c1b016fe23dd06
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06
None
0
int http_find_full_header2(const char *name, int len, char *sol, struct hdr_idx *idx, struct hdr_ctx *ctx) { char *eol, *sov; int cur_idx, old_idx; cur_idx = ctx->idx; if (cur_idx) { /* We have previously returned a header, let's search another one */ sol =...
201,693,680,599,081,940,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2018-11469
Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function.
https://nvd.nist.gov/vuln/detail/CVE-2018-11469
15,072
haproxy
17514045e5d934dede62116216c1b016fe23dd06
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06
None
0
int http_find_header(const char *name, char *sol, struct hdr_idx *idx, struct hdr_ctx *ctx) { return http_find_header2(name, strlen(name), sol, idx, ctx); }
20,222,144,593,902,206,000,000,000,000,000,000,000
proto_http.c
303,284,703,978,098,730,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2018-11469
Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function.
https://nvd.nist.gov/vuln/detail/CVE-2018-11469
15,073
haproxy
17514045e5d934dede62116216c1b016fe23dd06
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06
None
0
int http_find_header2(const char *name, int len, char *sol, struct hdr_idx *idx, struct hdr_ctx *ctx) { char *eol, *sov; int cur_idx, old_idx; cur_idx = ctx->idx; if (cur_idx) { /* We have previously returned a value, let's search * another one on the same line. */ sol = ctx->line; ctx-...
90,203,286,400,939,450,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2018-11469
Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function.
https://nvd.nist.gov/vuln/detail/CVE-2018-11469
15,074
haproxy
17514045e5d934dede62116216c1b016fe23dd06
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06
None
0
int http_find_next_header(char *sol, struct hdr_idx *idx, struct hdr_ctx *ctx) { char *eol, *sov; int cur_idx, old_idx; int len; cur_idx = ctx->idx; if (cur_idx) { /* We have previously returned a header, let's search another one */ sol = ctx->line; eol = sol + idx->v[cur_idx].len; goto next_hdr; } /* ...
3,387,830,111,791,831,700,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2018-11469
Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function.
https://nvd.nist.gov/vuln/detail/CVE-2018-11469
15,075
haproxy
17514045e5d934dede62116216c1b016fe23dd06
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06
None
0
unsigned int http_get_fhdr(const struct http_msg *msg, const char *hname, int hlen, struct hdr_idx *idx, int occ, struct hdr_ctx *ctx, char **vptr, int *vlen) { struct hdr_ctx local_ctx; char *ptr_hist[MAX_HDR_HISTORY]; int len_hist[MAX_HDR_HISTORY]; unsigned int hist_ptr; int found; if (!ctx) { lo...
39,618,821,478,038,054,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2018-11469
Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function.
https://nvd.nist.gov/vuln/detail/CVE-2018-11469
15,076
haproxy
17514045e5d934dede62116216c1b016fe23dd06
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06
None
0
unsigned int http_get_hdr(const struct http_msg *msg, const char *hname, int hlen, struct hdr_idx *idx, int occ, struct hdr_ctx *ctx, char **vptr, int *vlen) { struct hdr_ctx local_ctx; char *ptr_hist[MAX_HDR_HISTORY]; int len_hist[MAX_HDR_HISTORY]; unsigned int hist_ptr; int found; if (!ctx) { local...
94,449,097,079,872,300,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2018-11469
Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function.
https://nvd.nist.gov/vuln/detail/CVE-2018-11469
15,077
haproxy
17514045e5d934dede62116216c1b016fe23dd06
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06
None
0
char *http_get_path(struct http_txn *txn) { char *ptr, *end; ptr = txn->req.chn->buf->p + txn->req.sl.rq.u; end = ptr + txn->req.sl.rq.u_l; if (ptr >= end) return NULL; /* RFC7230, par. 2.7 : * Request-URI = "*" | absuri | abspath | authority */ if (*ptr == '*') return NULL; if (isalpha((unsigned ch...
196,652,537,585,071,660,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2018-11469
Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function.
https://nvd.nist.gov/vuln/detail/CVE-2018-11469
15,078
haproxy
17514045e5d934dede62116216c1b016fe23dd06
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06
None
0
http_get_path_from_string(char *str) { char *ptr = str; /* RFC2616, par. 5.1.2 : * Request-URI = "*" | absuri | abspath | authority */ if (*ptr == '*') return NULL; if (isalpha((unsigned char)*ptr)) { /* this is a scheme as described by RFC3986, par. 3.1 */ ptr++; while (isalnum((unsigned char)*ptr) ...
229,444,230,795,946,840,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2018-11469
Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function.
https://nvd.nist.gov/vuln/detail/CVE-2018-11469
15,079
haproxy
17514045e5d934dede62116216c1b016fe23dd06
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06
None
0
static const int http_get_status_idx(unsigned int status) { switch (status) { case 200: return HTTP_ERR_200; case 400: return HTTP_ERR_400; case 403: return HTTP_ERR_403; case 405: return HTTP_ERR_405; case 408: return HTTP_ERR_408; case 425: return HTTP_ERR_425; case 429: return HTTP_ERR_429; case 500: return...
10,831,206,232,386,120,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2018-11469
Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function.
https://nvd.nist.gov/vuln/detail/CVE-2018-11469
15,080
haproxy
17514045e5d934dede62116216c1b016fe23dd06
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06
None
0
int http_handle_stats(struct stream *s, struct channel *req) { struct stats_admin_rule *stats_admin_rule; struct stream_interface *si = &s->si[1]; struct session *sess = s->sess; struct http_txn *txn = s->txn; struct http_msg *msg = &txn->req; struct uri_auth *uri_auth = s->be->uri_auth; const char *uri, *h, *lo...
19,462,455,139,814,292,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2018-11469
Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function.
https://nvd.nist.gov/vuln/detail/CVE-2018-11469
15,081
haproxy
17514045e5d934dede62116216c1b016fe23dd06
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06
None
0
int http_header_add_tail(struct http_msg *msg, struct hdr_idx *hdr_idx, const char *text) { int bytes, len; len = strlen(text); bytes = buffer_insert_line2(msg->chn->buf, msg->chn->buf->p + msg->eoh, text, len); if (!bytes) return -1; http_msg_move_end(msg, bytes); return hdr_idx_add(len, 1, hdr_idx, hdr_idx->...
146,120,320,198,028,960,000,000,000,000,000,000,000
proto_http.c
303,284,703,978,098,730,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2018-11469
Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function.
https://nvd.nist.gov/vuln/detail/CVE-2018-11469
15,082
haproxy
17514045e5d934dede62116216c1b016fe23dd06
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06
None
0
int http_header_add_tail2(struct http_msg *msg, struct hdr_idx *hdr_idx, const char *text, int len) { int bytes; bytes = buffer_insert_line2(msg->chn->buf, msg->chn->buf->p + msg->eoh, text, len); if (!bytes) return -1; http_msg_move_end(msg, bytes); return hdr_idx_add(len, 1, hdr_idx,...
102,463,366,260,821,750,000,000,000,000,000,000,000
proto_http.c
303,284,703,978,098,730,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2018-11469
Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function.
https://nvd.nist.gov/vuln/detail/CVE-2018-11469