idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
14,906 | savannah | 7f2e4f4f553f6836be7683f66226afac3fa979b8 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7f2e4f4f553f6836be7683f66226afac3fa979b8 | None | 0 | _bdf_list_shift( _bdf_list_t* list,
unsigned long n )
{
unsigned long i, u;
if ( list == 0 || list->used == 0 || n == 0 )
return;
if ( n >= list->used )
{
list->used = 0;
return;
}
for ( u = n, i = 0; u < list->used; i++, u++ )
list->field[i... | 72,721,678,065,279,450,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2012-5670 | The _bdf_parse_glyphs function in FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) via vectors related to BDF fonts and an ENCODING field with a negative value. | https://nvd.nist.gov/vuln/detail/CVE-2012-5670 |
14,907 | savannah | 7f2e4f4f553f6836be7683f66226afac3fa979b8 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7f2e4f4f553f6836be7683f66226afac3fa979b8 | None | 0 | _bdf_list_split( _bdf_list_t* list,
char* separators,
char* line,
unsigned long linelen )
{
int mult, final_empty;
char *sp, *ep, *end;
char seps[32];
FT_Error error = BDF_Err_Ok;
/* Initialize the l... | 71,652,461,231,648,830,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2012-5670 | The _bdf_parse_glyphs function in FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) via vectors related to BDF fonts and an ENCODING field with a negative value. | https://nvd.nist.gov/vuln/detail/CVE-2012-5670 |
14,908 | savannah | 7f2e4f4f553f6836be7683f66226afac3fa979b8 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7f2e4f4f553f6836be7683f66226afac3fa979b8 | None | 0 | _bdf_parse_properties( char* line,
unsigned long linelen,
unsigned long lineno,
void* call_data,
void* client_data )
{
unsigned long vlen;
_bdf_line_func_t* next;
_bdf_p... | 337,904,500,919,883,920,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2012-5670 | The _bdf_parse_glyphs function in FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) via vectors related to BDF fonts and an ENCODING field with a negative value. | https://nvd.nist.gov/vuln/detail/CVE-2012-5670 |
14,909 | savannah | 7f2e4f4f553f6836be7683f66226afac3fa979b8 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7f2e4f4f553f6836be7683f66226afac3fa979b8 | None | 0 | _bdf_parse_start( char* line,
unsigned long linelen,
unsigned long lineno,
void* call_data,
void* client_data )
{
unsigned long slen;
_bdf_line_func_t* next;
_bdf_parse_t* p;
bdf_f... | 176,427,778,408,371,570,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2012-5670 | The _bdf_parse_glyphs function in FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) via vectors related to BDF fonts and an ENCODING field with a negative value. | https://nvd.nist.gov/vuln/detail/CVE-2012-5670 |
14,910 | savannah | 7f2e4f4f553f6836be7683f66226afac3fa979b8 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7f2e4f4f553f6836be7683f66226afac3fa979b8 | None | 0 | _bdf_readstream( FT_Stream stream,
_bdf_line_func_t callback,
void* client_data,
unsigned long *lno )
{
_bdf_line_func_t cb;
unsigned long lineno, buf_size;
int refill, hold, to_skip;
ptrdiff_t ... | 188,470,612,920,133,380,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2012-5670 | The _bdf_parse_glyphs function in FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) via vectors related to BDF fonts and an ENCODING field with a negative value. | https://nvd.nist.gov/vuln/detail/CVE-2012-5670 |
14,911 | savannah | 7f2e4f4f553f6836be7683f66226afac3fa979b8 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7f2e4f4f553f6836be7683f66226afac3fa979b8 | None | 0 | _bdf_set_default_spacing( bdf_font_t* font,
bdf_options_t* opts,
unsigned long lineno )
{
size_t len;
char name[256];
_bdf_list_t list;
FT_Memory memory;
FT_Error error = BDF_Err_Ok;
if ( font == 0 || font... | 123,681,094,405,704,800,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2012-5670 | The _bdf_parse_glyphs function in FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) via vectors related to BDF fonts and an ENCODING field with a negative value. | https://nvd.nist.gov/vuln/detail/CVE-2012-5670 |
14,912 | savannah | 7f2e4f4f553f6836be7683f66226afac3fa979b8 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7f2e4f4f553f6836be7683f66226afac3fa979b8 | None | 0 | bdf_free_font( bdf_font_t* font )
{
bdf_property_t* prop;
unsigned long i;
bdf_glyph_t* glyphs;
FT_Memory memory;
if ( font == 0 )
return;
memory = font->memory;
FT_FREE( font->name );
/* Free up the internal hash table of property names. */
if ( font->... | 208,427,650,405,724,270,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2012-5670 | The _bdf_parse_glyphs function in FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) via vectors related to BDF fonts and an ENCODING field with a negative value. | https://nvd.nist.gov/vuln/detail/CVE-2012-5670 |
14,913 | savannah | 7f2e4f4f553f6836be7683f66226afac3fa979b8 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7f2e4f4f553f6836be7683f66226afac3fa979b8 | None | 0 | bdf_get_font_property( bdf_font_t* font,
const char* name )
{
hashnode hn;
if ( font == 0 || font->props_size == 0 || name == 0 || *name == 0 )
return 0;
hn = hash_lookup( name, (hashtable *)font->internal );
return hn ? ( font->props + hn->data ) : 0;
}
| 47,153,926,451,912,050,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2012-5670 | The _bdf_parse_glyphs function in FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) via vectors related to BDF fonts and an ENCODING field with a negative value. | https://nvd.nist.gov/vuln/detail/CVE-2012-5670 |
14,914 | savannah | 7f2e4f4f553f6836be7683f66226afac3fa979b8 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7f2e4f4f553f6836be7683f66226afac3fa979b8 | None | 0 | bdf_get_property( char* name,
bdf_font_t* font )
{
hashnode hn;
size_t propid;
if ( name == 0 || *name == 0 )
return 0;
if ( ( hn = hash_lookup( name, &(font->proptbl) ) ) == 0 )
return 0;
propid = hn->data;
if ( propid >= _num_bdf_properties )... | 177,826,559,973,479,400,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2012-5670 | The _bdf_parse_glyphs function in FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) via vectors related to BDF fonts and an ENCODING field with a negative value. | https://nvd.nist.gov/vuln/detail/CVE-2012-5670 |
14,915 | savannah | 7f2e4f4f553f6836be7683f66226afac3fa979b8 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7f2e4f4f553f6836be7683f66226afac3fa979b8 | None | 0 | bdf_load_font( FT_Stream stream,
FT_Memory extmemory,
bdf_options_t* opts,
bdf_font_t* *font )
{
unsigned long lineno = 0; /* make compiler happy */
_bdf_parse_t *p = NULL;
FT_Memory memory = extmemory;
FT_Error er... | 193,496,153,099,539,400,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2012-5670 | The _bdf_parse_glyphs function in FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) via vectors related to BDF fonts and an ENCODING field with a negative value. | https://nvd.nist.gov/vuln/detail/CVE-2012-5670 |
14,916 | savannah | 7f2e4f4f553f6836be7683f66226afac3fa979b8 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7f2e4f4f553f6836be7683f66226afac3fa979b8 | None | 0 | by_encoding( const void* a,
const void* b )
{
bdf_glyph_t *c1, *c2;
c1 = (bdf_glyph_t *)a;
c2 = (bdf_glyph_t *)b;
if ( c1->encoding < c2->encoding )
return -1;
if ( c1->encoding > c2->encoding )
return 1;
return 0;
}
| 52,403,353,390,518,970,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2012-5670 | The _bdf_parse_glyphs function in FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) via vectors related to BDF fonts and an ENCODING field with a negative value. | https://nvd.nist.gov/vuln/detail/CVE-2012-5670 |
14,917 | savannah | 7f2e4f4f553f6836be7683f66226afac3fa979b8 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7f2e4f4f553f6836be7683f66226afac3fa979b8 | None | 0 | hash_bucket( const char* key,
hashtable* ht )
{
const char* kp = key;
unsigned long res = 0;
hashnode* bp = ht->table, *ndp;
/* Mocklisp hash function. */
while ( *kp )
res = ( res << 5 ) - res + *kp++;
ndp = bp + ( res % ht->size );
while ( *ndp )
... | 21,205,221,549,940,090,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2012-5670 | The _bdf_parse_glyphs function in FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) via vectors related to BDF fonts and an ENCODING field with a negative value. | https://nvd.nist.gov/vuln/detail/CVE-2012-5670 |
14,918 | savannah | 7f2e4f4f553f6836be7683f66226afac3fa979b8 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7f2e4f4f553f6836be7683f66226afac3fa979b8 | None | 0 | hash_init( hashtable* ht,
FT_Memory memory )
{
int sz = INITIAL_HT_SIZE;
FT_Error error = BDF_Err_Ok;
ht->size = sz;
ht->limit = sz / 3;
ht->used = 0;
if ( FT_NEW_ARRAY( ht->table, sz ) )
goto Exit;
Exit:
return error;
}
| 185,106,914,343,496,980,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2012-5670 | The _bdf_parse_glyphs function in FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) via vectors related to BDF fonts and an ENCODING field with a negative value. | https://nvd.nist.gov/vuln/detail/CVE-2012-5670 |
14,919 | savannah | 7f2e4f4f553f6836be7683f66226afac3fa979b8 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7f2e4f4f553f6836be7683f66226afac3fa979b8 | None | 0 | hash_insert( char* key,
size_t data,
hashtable* ht,
FT_Memory memory )
{
hashnode nn, *bp = hash_bucket( key, ht );
FT_Error error = BDF_Err_Ok;
nn = *bp;
if ( !nn )
{
if ( FT_NEW( nn ) )
goto Exit;
*bp = nn;
... | 255,041,518,469,385,240,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2012-5670 | The _bdf_parse_glyphs function in FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) via vectors related to BDF fonts and an ENCODING field with a negative value. | https://nvd.nist.gov/vuln/detail/CVE-2012-5670 |
14,920 | savannah | 7f2e4f4f553f6836be7683f66226afac3fa979b8 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7f2e4f4f553f6836be7683f66226afac3fa979b8 | None | 0 | hash_lookup( const char* key,
hashtable* ht )
{
hashnode *np = hash_bucket( key, ht );
return *np;
}
| 323,874,323,324,099,100,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2012-5670 | The _bdf_parse_glyphs function in FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) via vectors related to BDF fonts and an ENCODING field with a negative value. | https://nvd.nist.gov/vuln/detail/CVE-2012-5670 |
14,921 | savannah | 7f2e4f4f553f6836be7683f66226afac3fa979b8 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7f2e4f4f553f6836be7683f66226afac3fa979b8 | None | 0 | hash_rehash( hashtable* ht,
FT_Memory memory )
{
hashnode* obp = ht->table, *bp, *nbp;
int i, sz = ht->size;
FT_Error error = BDF_Err_Ok;
ht->size <<= 1;
ht->limit = ht->size / 3;
if ( FT_NEW_ARRAY( ht->table, ht->size ) )
goto Exit;
for ( i = 0, bp... | 32,250,450,914,333,760,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2012-5670 | The _bdf_parse_glyphs function in FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) via vectors related to BDF fonts and an ENCODING field with a negative value. | https://nvd.nist.gov/vuln/detail/CVE-2012-5670 |
14,932 | savannah | 8fcf61523644df42e1905c81bed26838e0b04f91 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/grep.git/commit/?id=8fcf61523644df42e1905c81bed26838e0b04f91 | None | 0 | clean_up_stdout (void)
{
if (! write_error_seen)
close_stdout ();
close_stdout ();
}
| 132,634,513,834,645,370,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-5667 | Multiple integer overflows in GNU Grep before 2.11 might allow context-dependent attackers to execute arbitrary code via vectors involving a long input line that triggers a heap-based buffer overflow. | https://nvd.nist.gov/vuln/detail/CVE-2012-5667 |
14,933 | savannah | 8fcf61523644df42e1905c81bed26838e0b04f91 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/grep.git/commit/?id=8fcf61523644df42e1905c81bed26838e0b04f91 | None | 0 | color_cap_mt_fct (void)
{
/* Our caller just set selected_match_color. */
context_match_color = selected_match_color;
}
| 253,386,071,307,148,160,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-5667 | Multiple integer overflows in GNU Grep before 2.11 might allow context-dependent attackers to execute arbitrary code via vectors involving a long input line that triggers a heap-based buffer overflow. | https://nvd.nist.gov/vuln/detail/CVE-2012-5667 |
14,934 | savannah | 8fcf61523644df42e1905c81bed26838e0b04f91 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/grep.git/commit/?id=8fcf61523644df42e1905c81bed26838e0b04f91 | None | 0 | color_cap_rv_fct (void)
{
/* By this point, it was 1 (or already -1). */
color_option = -1; /* That's still != 0. */
}
| 156,779,631,654,124,800,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-5667 | Multiple integer overflows in GNU Grep before 2.11 might allow context-dependent attackers to execute arbitrary code via vectors involving a long input line that triggers a heap-based buffer overflow. | https://nvd.nist.gov/vuln/detail/CVE-2012-5667 |
14,935 | savannah | 8fcf61523644df42e1905c81bed26838e0b04f91 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/grep.git/commit/?id=8fcf61523644df42e1905c81bed26838e0b04f91 | None | 0 | pr_sgr_end (char const *s)
{
if (*s)
print_end_colorize (sgr_end);
}
| 45,027,698,786,525,800,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-5667 | Multiple integer overflows in GNU Grep before 2.11 might allow context-dependent attackers to execute arbitrary code via vectors involving a long input line that triggers a heap-based buffer overflow. | https://nvd.nist.gov/vuln/detail/CVE-2012-5667 |
14,936 | savannah | 8fcf61523644df42e1905c81bed26838e0b04f91 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/grep.git/commit/?id=8fcf61523644df42e1905c81bed26838e0b04f91 | None | 0 | pr_sgr_end_if (char const *s)
{
if (color_option)
pr_sgr_end (s);
}
| 89,011,712,709,266,240,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-5667 | Multiple integer overflows in GNU Grep before 2.11 might allow context-dependent attackers to execute arbitrary code via vectors involving a long input line that triggers a heap-based buffer overflow. | https://nvd.nist.gov/vuln/detail/CVE-2012-5667 |
14,937 | savannah | 8fcf61523644df42e1905c81bed26838e0b04f91 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/grep.git/commit/?id=8fcf61523644df42e1905c81bed26838e0b04f91 | None | 0 | pr_sgr_start (char const *s)
{
if (*s)
print_start_colorize (sgr_start, s);
}
| 281,615,131,643,818,800,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-5667 | Multiple integer overflows in GNU Grep before 2.11 might allow context-dependent attackers to execute arbitrary code via vectors involving a long input line that triggers a heap-based buffer overflow. | https://nvd.nist.gov/vuln/detail/CVE-2012-5667 |
14,938 | savannah | 8fcf61523644df42e1905c81bed26838e0b04f91 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/grep.git/commit/?id=8fcf61523644df42e1905c81bed26838e0b04f91 | None | 0 | pr_sgr_start_if (char const *s)
{
if (color_option)
pr_sgr_start (s);
}
| 223,712,926,835,811,230,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-5667 | Multiple integer overflows in GNU Grep before 2.11 might allow context-dependent attackers to execute arbitrary code via vectors involving a long input line that triggers a heap-based buffer overflow. | https://nvd.nist.gov/vuln/detail/CVE-2012-5667 |
14,939 | savannah | 8fcf61523644df42e1905c81bed26838e0b04f91 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/grep.git/commit/?id=8fcf61523644df42e1905c81bed26838e0b04f91 | None | 0 | suppressible_error (char const *mesg, int errnum)
{
if (! suppress_errors)
error (0, errnum, "%s", mesg);
errseen = 1;
}
| 138,096,839,284,279,440,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-5667 | Multiple integer overflows in GNU Grep before 2.11 might allow context-dependent attackers to execute arbitrary code via vectors involving a long input line that triggers a heap-based buffer overflow. | https://nvd.nist.gov/vuln/detail/CVE-2012-5667 |
14,974 | kde | a90289b0962663bc1d247bbbd31b9e65b2ca000e | https://cgit.kde.org/konversation | https://cgit.kde.org/smb4k.git/commit/?id=a90289b0962663bc1d247bbbd31b9e65b2ca000e | None | 0 | bool Smb4KGlobal::addMountedShare(Smb4KShare *share)
{
Q_ASSERT(share);
bool added = false;
if (share)
{
mutex.lock();
if (!findShareByPath(share->path()))
{
p->mountedSharesList.append(share);
added = true;
p->onlyForeignShares = true;
for (Smb4KShare *s : p->mounte... | 93,985,563,280,098,740,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-8849 | smb4k before 2.0.1 allows local users to gain root privileges by leveraging failure to verify arguments to the mount helper DBUS service. | https://nvd.nist.gov/vuln/detail/CVE-2017-8849 |
14,975 | kde | a90289b0962663bc1d247bbbd31b9e65b2ca000e | https://cgit.kde.org/konversation | https://cgit.kde.org/smb4k.git/commit/?id=a90289b0962663bc1d247bbbd31b9e65b2ca000e | None | 0 | bool Smb4KGlobal::addShare(Smb4KShare *share)
{
Q_ASSERT(share);
bool added = false;
if (share)
{
mutex.lock();
if (!findShare(share->unc(), share->workgroupName()))
{
p->sharesList.append(share);
added = true;
}
else
{
}
}
else
{
}
mutex.unlock();
retu... | 253,812,826,845,781,240,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-8849 | smb4k before 2.0.1 allows local users to gain root privileges by leveraging failure to verify arguments to the mount helper DBUS service. | https://nvd.nist.gov/vuln/detail/CVE-2017-8849 |
14,976 | kde | a90289b0962663bc1d247bbbd31b9e65b2ca000e | https://cgit.kde.org/konversation | https://cgit.kde.org/smb4k.git/commit/?id=a90289b0962663bc1d247bbbd31b9e65b2ca000e | None | 0 | bool Smb4KGlobal::addWorkgroup(Smb4KWorkgroup *workgroup)
{
Q_ASSERT(workgroup);
bool added = false;
mutex.lock();
if (!findWorkgroup(workgroup->workgroupName()))
{
p->workgroupsList.append(workgroup);
added = true;
}
else
{
}
mutex.unlock();
return added;
}
| 89,190,517,553,389,300,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-8849 | smb4k before 2.0.1 allows local users to gain root privileges by leveraging failure to verify arguments to the mount helper DBUS service. | https://nvd.nist.gov/vuln/detail/CVE-2017-8849 |
14,977 | kde | a90289b0962663bc1d247bbbd31b9e65b2ca000e | https://cgit.kde.org/konversation | https://cgit.kde.org/smb4k.git/commit/?id=a90289b0962663bc1d247bbbd31b9e65b2ca000e | None | 0 | void Smb4KGlobal::clearSharesList()
{
mutex.lock();
while (!p->sharesList.isEmpty())
{
delete p->sharesList.takeFirst();
}
mutex.unlock();
}
| 71,861,335,382,434,470,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-8849 | smb4k before 2.0.1 allows local users to gain root privileges by leveraging failure to verify arguments to the mount helper DBUS service. | https://nvd.nist.gov/vuln/detail/CVE-2017-8849 |
14,978 | kde | a90289b0962663bc1d247bbbd31b9e65b2ca000e | https://cgit.kde.org/konversation | https://cgit.kde.org/smb4k.git/commit/?id=a90289b0962663bc1d247bbbd31b9e65b2ca000e | None | 0 | QList<Smb4KShare*> Smb4KGlobal::findInaccessibleShares()
{
QList<Smb4KShare *> inaccessibleShares;
mutex.lock();
for (Smb4KShare *s : p->mountedSharesList)
{
if (s->isInaccessible())
{
inaccessibleShares += s;
}
else
{
}
}
mutex.unlock();
return inaccessibleShares;
}
| 207,253,593,853,782,700,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-8849 | smb4k before 2.0.1 allows local users to gain root privileges by leveraging failure to verify arguments to the mount helper DBUS service. | https://nvd.nist.gov/vuln/detail/CVE-2017-8849 |
14,979 | kde | a90289b0962663bc1d247bbbd31b9e65b2ca000e | https://cgit.kde.org/konversation | https://cgit.kde.org/smb4k.git/commit/?id=a90289b0962663bc1d247bbbd31b9e65b2ca000e | None | 0 | Smb4KShare *Smb4KGlobal::findShare(const QString& unc, const QString& workgroup)
{
Smb4KShare *share = 0;
mutex.lock();
for (Smb4KShare *s : p->sharesList)
{
if (QString::compare(s->unc(), unc, Qt::CaseInsensitive) == 0 &&
(workgroup.isEmpty() || QString::compare(s->workgroupName(), workgroup, Q... | 125,501,319,450,043,310,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-8849 | smb4k before 2.0.1 allows local users to gain root privileges by leveraging failure to verify arguments to the mount helper DBUS service. | https://nvd.nist.gov/vuln/detail/CVE-2017-8849 |
14,980 | kde | a90289b0962663bc1d247bbbd31b9e65b2ca000e | https://cgit.kde.org/konversation | https://cgit.kde.org/smb4k.git/commit/?id=a90289b0962663bc1d247bbbd31b9e65b2ca000e | None | 0 | Smb4KShare* Smb4KGlobal::findShareByPath(const QString &path)
{
Smb4KShare *share = 0;
mutex.lock();
if (!path.isEmpty() && !p->mountedSharesList.isEmpty())
{
for (Smb4KShare *s : p->mountedSharesList)
{
if (QString::compare(s->path(), path, Qt::CaseInsensitive) == 0 ||
QString::compar... | 275,643,678,662,584,530,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-8849 | smb4k before 2.0.1 allows local users to gain root privileges by leveraging failure to verify arguments to the mount helper DBUS service. | https://nvd.nist.gov/vuln/detail/CVE-2017-8849 |
14,981 | kde | a90289b0962663bc1d247bbbd31b9e65b2ca000e | https://cgit.kde.org/konversation | https://cgit.kde.org/smb4k.git/commit/?id=a90289b0962663bc1d247bbbd31b9e65b2ca000e | None | 0 | QList<Smb4KShare *> Smb4KGlobal::findShareByUNC(const QString &unc)
{
QList<Smb4KShare *> shares;
mutex.lock();
if (!unc.isEmpty() && !p->mountedSharesList.isEmpty())
{
for (Smb4KShare *s : p->mountedSharesList)
{
if (QString::compare(s->unc(), unc, Qt::CaseInsensitive) == 0)
{
sha... | 117,356,764,085,892,500,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-8849 | smb4k before 2.0.1 allows local users to gain root privileges by leveraging failure to verify arguments to the mount helper DBUS service. | https://nvd.nist.gov/vuln/detail/CVE-2017-8849 |
14,982 | kde | a90289b0962663bc1d247bbbd31b9e65b2ca000e | https://cgit.kde.org/konversation | https://cgit.kde.org/smb4k.git/commit/?id=a90289b0962663bc1d247bbbd31b9e65b2ca000e | None | 0 | void Smb4KGlobal::openShare(Smb4KShare *share, OpenWith openWith)
{
if (!share || share->isInaccessible())
{
return;
}
switch (openWith)
{
case FileManager:
{
QUrl url = QUrl::fromLocalFile(share->canonicalPath());
(void) new KRun(url, 0);
break;
}
case Konsole:
{
... | 35,369,758,559,161,976,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-8849 | smb4k before 2.0.1 allows local users to gain root privileges by leveraging failure to verify arguments to the mount helper DBUS service. | https://nvd.nist.gov/vuln/detail/CVE-2017-8849 |
14,983 | kde | a90289b0962663bc1d247bbbd31b9e65b2ca000e | https://cgit.kde.org/konversation | https://cgit.kde.org/smb4k.git/commit/?id=a90289b0962663bc1d247bbbd31b9e65b2ca000e | None | 0 | bool Smb4KGlobal::removeMountedShare(Smb4KShare *share)
{
Q_ASSERT(share);
bool removed = false;
if (share)
{
mutex.lock();
QMutableListIterator<Smb4KShare *> it(p->mountedSharesList);
while (it.hasNext())
{
Smb4KShare *s = it.next();
if (QString::compare(s->path()... | 264,058,344,729,509,770,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-8849 | smb4k before 2.0.1 allows local users to gain root privileges by leveraging failure to verify arguments to the mount helper DBUS service. | https://nvd.nist.gov/vuln/detail/CVE-2017-8849 |
14,984 | kde | a90289b0962663bc1d247bbbd31b9e65b2ca000e | https://cgit.kde.org/konversation | https://cgit.kde.org/smb4k.git/commit/?id=a90289b0962663bc1d247bbbd31b9e65b2ca000e | None | 0 | bool Smb4KGlobal::removeShare(Smb4KShare *share)
{
Q_ASSERT(share);
bool removed = false;
if (share)
{
mutex.lock();
int index = p->sharesList.indexOf(share);
if (index != -1)
{
delete p->sharesList.takeAt(index);
removed = true;
}
else
{
Smb4KShare *s = findS... | 196,118,442,381,516,000,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-8849 | smb4k before 2.0.1 allows local users to gain root privileges by leveraging failure to verify arguments to the mount helper DBUS service. | https://nvd.nist.gov/vuln/detail/CVE-2017-8849 |
14,985 | kde | a90289b0962663bc1d247bbbd31b9e65b2ca000e | https://cgit.kde.org/konversation | https://cgit.kde.org/smb4k.git/commit/?id=a90289b0962663bc1d247bbbd31b9e65b2ca000e | None | 0 | bool Smb4KGlobal::removeWorkgroup(Smb4KWorkgroup *workgroup)
{
Q_ASSERT(workgroup);
bool removed = false;
mutex.lock();
int index = p->workgroupsList.indexOf(workgroup);
if (index != -1)
{
delete p->workgroupsList.takeAt(index);
removed = true;
}
else
{
Smb4KWorkgroup *wg = findWorkgro... | 171,659,747,544,462,630,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-8849 | smb4k before 2.0.1 allows local users to gain root privileges by leveraging failure to verify arguments to the mount helper DBUS service. | https://nvd.nist.gov/vuln/detail/CVE-2017-8849 |
14,986 | kde | a90289b0962663bc1d247bbbd31b9e65b2ca000e | https://cgit.kde.org/konversation | https://cgit.kde.org/smb4k.git/commit/?id=a90289b0962663bc1d247bbbd31b9e65b2ca000e | None | 0 | QList<Smb4KShare *> Smb4KGlobal::sharedResources(Smb4KHost *host)
{
QList<Smb4KShare *> shares;
mutex.lock();
for (Smb4KShare *s : p->sharesList)
{
if (QString::compare(s->hostName(), host->hostName(), Qt::CaseInsensitive) == 0 &&
QString::compare(s->workgroupName(), host->workgroupName(), Qt::C... | 186,421,230,871,593,200,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-8849 | smb4k before 2.0.1 allows local users to gain root privileges by leveraging failure to verify arguments to the mount helper DBUS service. | https://nvd.nist.gov/vuln/detail/CVE-2017-8849 |
14,987 | kde | a90289b0962663bc1d247bbbd31b9e65b2ca000e | https://cgit.kde.org/konversation | https://cgit.kde.org/smb4k.git/commit/?id=a90289b0962663bc1d247bbbd31b9e65b2ca000e | None | 0 | QList<Smb4KHost *> Smb4KGlobal::workgroupMembers(Smb4KWorkgroup *workgroup)
{
QList<Smb4KHost *> hosts;
mutex.lock();
for (Smb4KHost *h : p->hostsList)
{
if (QString::compare(h->workgroupName(), workgroup->workgroupName(), Qt::CaseInsensitive) == 0)
{
hosts += h;
}
else
{
}
}... | 46,044,036,347,644,590,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-8849 | smb4k before 2.0.1 allows local users to gain root privileges by leveraging failure to verify arguments to the mount helper DBUS service. | https://nvd.nist.gov/vuln/detail/CVE-2017-8849 |
14,988 | kde | a90289b0962663bc1d247bbbd31b9e65b2ca000e | https://cgit.kde.org/konversation | https://cgit.kde.org/smb4k.git/commit/?id=a90289b0962663bc1d247bbbd31b9e65b2ca000e | None | 0 | void Smb4KMounter::abortAll()
{
if (!QCoreApplication::closingDown())
{
QListIterator<KJob *> it(subjobs());
while (it.hasNext())
{
it.next()->kill(KJob::EmitResult);
}
}
else
{
}
}
| 242,019,033,904,363,100,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-8849 | smb4k before 2.0.1 allows local users to gain root privileges by leveraging failure to verify arguments to the mount helper DBUS service. | https://nvd.nist.gov/vuln/detail/CVE-2017-8849 |
15,021 | savannah | df14e6c0b9592cbb24d5381dfc6106b14f915e75 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=df14e6c0b9592cbb24d5381dfc6106b14f915e75 | None | 0 | T1_Done_Blend( T1_Face face )
{
FT_Memory memory = face->root.memory;
PS_Blend blend = face->blend;
if ( blend )
{
FT_UInt num_designs = blend->num_designs;
FT_UInt num_axis = blend->num_axis;
FT_UInt n;
/* release design pos table */
FT_FREE( blend->desi... | 21,490,475,045,498,910,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2014-9745 | The parse_encoding function in type1/t1load.c in FreeType before 2.5.3 allows remote attackers to cause a denial of service (infinite loop) via a "broken number-with-base" in a Postscript stream, as demonstrated by 8#garbage. | https://nvd.nist.gov/vuln/detail/CVE-2014-9745 |
15,022 | savannah | df14e6c0b9592cbb24d5381dfc6106b14f915e75 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=df14e6c0b9592cbb24d5381dfc6106b14f915e75 | None | 0 | T1_Get_MM_Var( T1_Face face,
FT_MM_Var* *master )
{
FT_Memory memory = face->root.memory;
FT_MM_Var *mmvar = NULL;
FT_Multi_Master mmaster;
FT_Error error;
FT_UInt i;
FT_Fixed axiscoords[T1_MAX_MM_AXIS];
PS_Blend blend... | 2,842,027,867,262,882,700,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2014-9745 | The parse_encoding function in type1/t1load.c in FreeType before 2.5.3 allows remote attackers to cause a denial of service (infinite loop) via a "broken number-with-base" in a Postscript stream, as demonstrated by 8#garbage. | https://nvd.nist.gov/vuln/detail/CVE-2014-9745 |
15,023 | savannah | df14e6c0b9592cbb24d5381dfc6106b14f915e75 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=df14e6c0b9592cbb24d5381dfc6106b14f915e75 | None | 0 | T1_Get_Multi_Master( T1_Face face,
FT_Multi_Master* master )
{
PS_Blend blend = face->blend;
FT_UInt n;
FT_Error error;
error = FT_THROW( Invalid_Argument );
if ( blend )
{
master->num_axis = blend->num_axis;
master->num_designs = blend... | 270,069,423,638,040,700,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2014-9745 | The parse_encoding function in type1/t1load.c in FreeType before 2.5.3 allows remote attackers to cause a denial of service (infinite loop) via a "broken number-with-base" in a Postscript stream, as demonstrated by 8#garbage. | https://nvd.nist.gov/vuln/detail/CVE-2014-9745 |
15,024 | savannah | df14e6c0b9592cbb24d5381dfc6106b14f915e75 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=df14e6c0b9592cbb24d5381dfc6106b14f915e75 | None | 0 | T1_Set_Var_Design( T1_Face face,
FT_UInt num_coords,
FT_Fixed* coords )
{
FT_Long lcoords[4]; /* maximum axis count is 4 */
FT_UInt i;
FT_Error error;
error = FT_ERR( Invalid_Argument );
if ( num_coords <= 4 && num_coords > 0 ... | 128,665,001,610,397,300,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2014-9745 | The parse_encoding function in type1/t1load.c in FreeType before 2.5.3 allows remote attackers to cause a denial of service (infinite loop) via a "broken number-with-base" in a Postscript stream, as demonstrated by 8#garbage. | https://nvd.nist.gov/vuln/detail/CVE-2014-9745 |
15,025 | savannah | df14e6c0b9592cbb24d5381dfc6106b14f915e75 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=df14e6c0b9592cbb24d5381dfc6106b14f915e75 | None | 0 | mm_weights_unmap( FT_Fixed* weights,
FT_Fixed* axiscoords,
FT_UInt axis_count )
{
FT_ASSERT( axis_count <= T1_MAX_MM_AXIS );
if ( axis_count == 1 )
axiscoords[0] = weights[1];
else if ( axis_count == 2 )
{
axiscoords[0] = weights[3] + weight... | 121,263,882,194,033,950,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2014-9745 | The parse_encoding function in type1/t1load.c in FreeType before 2.5.3 allows remote attackers to cause a denial of service (infinite loop) via a "broken number-with-base" in a Postscript stream, as demonstrated by 8#garbage. | https://nvd.nist.gov/vuln/detail/CVE-2014-9745 |
15,026 | savannah | df14e6c0b9592cbb24d5381dfc6106b14f915e75 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=df14e6c0b9592cbb24d5381dfc6106b14f915e75 | None | 0 | parse_blend_axis_types( T1_Face face,
T1_Loader loader )
{
T1_TokenRec axis_tokens[T1_MAX_MM_AXIS];
FT_Int n, num_axis;
FT_Error error = FT_Err_Ok;
PS_Blend blend;
FT_Memory memory;
/* take an array of objects */
T1_ToTokenArray( &loader-... | 239,593,505,326,708,240,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2014-9745 | The parse_encoding function in type1/t1load.c in FreeType before 2.5.3 allows remote attackers to cause a denial of service (infinite loop) via a "broken number-with-base" in a Postscript stream, as demonstrated by 8#garbage. | https://nvd.nist.gov/vuln/detail/CVE-2014-9745 |
15,027 | savannah | df14e6c0b9592cbb24d5381dfc6106b14f915e75 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=df14e6c0b9592cbb24d5381dfc6106b14f915e75 | None | 0 | parse_blend_design_map( T1_Face face,
T1_Loader loader )
{
FT_Error error = FT_Err_Ok;
T1_Parser parser = &loader->parser;
PS_Blend blend;
T1_TokenRec axis_tokens[T1_MAX_MM_AXIS];
FT_Int n, num_axis;
FT_Byte* old_cursor;
FT_Byte* o... | 242,351,288,979,242,560,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2014-9745 | The parse_encoding function in type1/t1load.c in FreeType before 2.5.3 allows remote attackers to cause a denial of service (infinite loop) via a "broken number-with-base" in a Postscript stream, as demonstrated by 8#garbage. | https://nvd.nist.gov/vuln/detail/CVE-2014-9745 |
15,028 | savannah | df14e6c0b9592cbb24d5381dfc6106b14f915e75 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=df14e6c0b9592cbb24d5381dfc6106b14f915e75 | None | 0 | parse_blend_design_positions( T1_Face face,
T1_Loader loader )
{
T1_TokenRec design_tokens[T1_MAX_MM_DESIGNS];
FT_Int num_designs;
FT_Int num_axis;
T1_Parser parser = &loader->parser;
FT_Error error = FT_Err_Ok;
PS_Blend blend;
... | 257,776,473,922,649,470,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2014-9745 | The parse_encoding function in type1/t1load.c in FreeType before 2.5.3 allows remote attackers to cause a denial of service (infinite loop) via a "broken number-with-base" in a Postscript stream, as demonstrated by 8#garbage. | https://nvd.nist.gov/vuln/detail/CVE-2014-9745 |
15,029 | savannah | df14e6c0b9592cbb24d5381dfc6106b14f915e75 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=df14e6c0b9592cbb24d5381dfc6106b14f915e75 | None | 0 | parse_buildchar( T1_Face face,
T1_Loader loader )
{
face->len_buildchar = T1_ToFixedArray( &loader->parser, 0, NULL, 0 );
return;
}
| 178,303,617,151,332,500,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2014-9745 | The parse_encoding function in type1/t1load.c in FreeType before 2.5.3 allows remote attackers to cause a denial of service (infinite loop) via a "broken number-with-base" in a Postscript stream, as demonstrated by 8#garbage. | https://nvd.nist.gov/vuln/detail/CVE-2014-9745 |
15,030 | savannah | df14e6c0b9592cbb24d5381dfc6106b14f915e75 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=df14e6c0b9592cbb24d5381dfc6106b14f915e75 | None | 0 | parse_private( T1_Face face,
T1_Loader loader )
{
FT_UNUSED( face );
loader->keywords_encountered |= T1_PRIVATE;
}
| 126,864,828,796,635,240,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2014-9745 | The parse_encoding function in type1/t1load.c in FreeType before 2.5.3 allows remote attackers to cause a denial of service (infinite loop) via a "broken number-with-base" in a Postscript stream, as demonstrated by 8#garbage. | https://nvd.nist.gov/vuln/detail/CVE-2014-9745 |
15,031 | savannah | df14e6c0b9592cbb24d5381dfc6106b14f915e75 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=df14e6c0b9592cbb24d5381dfc6106b14f915e75 | None | 0 | parse_weight_vector( T1_Face face,
T1_Loader loader )
{
T1_TokenRec design_tokens[T1_MAX_MM_DESIGNS];
FT_Int num_designs;
FT_Error error = FT_Err_Ok;
T1_Parser parser = &loader->parser;
PS_Blend blend = face->blend;
T1_Token token;
FT_In... | 117,070,451,376,203,480,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2014-9745 | The parse_encoding function in type1/t1load.c in FreeType before 2.5.3 allows remote attackers to cause a denial of service (infinite loop) via a "broken number-with-base" in a Postscript stream, as demonstrated by 8#garbage. | https://nvd.nist.gov/vuln/detail/CVE-2014-9745 |
15,032 | savannah | df14e6c0b9592cbb24d5381dfc6106b14f915e75 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=df14e6c0b9592cbb24d5381dfc6106b14f915e75 | None | 0 | read_binary_data( T1_Parser parser,
FT_Long* size,
FT_Byte** base,
FT_Bool incremental )
{
FT_Byte* cur;
FT_Byte* limit = parser->root.limit;
/* the binary data has one of the following formats */
/* ... | 139,237,799,842,348,400,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2014-9745 | The parse_encoding function in type1/t1load.c in FreeType before 2.5.3 allows remote attackers to cause a denial of service (infinite loop) via a "broken number-with-base" in a Postscript stream, as demonstrated by 8#garbage. | https://nvd.nist.gov/vuln/detail/CVE-2014-9745 |
15,034 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | static void __http_protocol_init(void)
{
acl_register_keywords(&acl_kws);
sample_register_fetches(&sample_fetch_keywords);
sample_register_convs(&sample_conv_kws);
http_req_keywords_register(&http_req_actions);
http_res_keywords_register(&http_res_actions);
cli_register_kw(&cli_kws);
}
| 195,241,065,913,255,860,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,035 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | struct action_kw *action_http_req_custom(const char *kw)
{
return action_lookup(&http_req_keywords.list, kw);
}
| 328,699,117,525,423,830,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,036 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | struct action_kw *action_http_res_custom(const char *kw)
{
return action_lookup(&http_res_keywords.list, kw);
}
| 156,535,480,136,449,730,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,037 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | enum act_return action_http_set_status(struct act_rule *rule, struct proxy *px,
struct session *sess, struct stream *s, int flags)
{
http_set_status(rule->arg.status.code, rule->arg.status.reason, s);
return ACT_RET_CONT;
}
| 44,457,810,946,535,050,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,038 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | int apply_filter_to_req_line(struct stream *s, struct channel *req, struct hdr_exp *exp)
{
char *cur_ptr, *cur_end;
int done;
struct http_txn *txn = s->txn;
int delta;
if (unlikely(txn->flags & (TX_CLDENY | TX_CLTARPIT)))
return 1;
else if (unlikely(txn->flags & TX_CLALLOW) &&
(exp->action == ACT_ALLOW ||
... | 138,269,546,679,631,230,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,039 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | int apply_filter_to_resp_headers(struct stream *s, struct channel *rtr, struct hdr_exp *exp)
{
char *cur_ptr, *cur_end, *cur_next;
int cur_idx, old_idx, last_hdr;
struct http_txn *txn = s->txn;
struct hdr_idx_elem *cur_hdr;
int delta;
last_hdr = 0;
cur_next = rtr->buf->p + hdr_idx_first_pos(&txn->hdr_idx);
ol... | 180,776,059,794,866,600,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,040 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | int apply_filter_to_sts_line(struct stream *s, struct channel *rtr, struct hdr_exp *exp)
{
char *cur_ptr, *cur_end;
int done;
struct http_txn *txn = s->txn;
int delta;
if (unlikely(txn->flags & TX_SVDENY))
return 1;
else if (unlikely(txn->flags & TX_SVALLOW) &&
(exp->action == ACT_ALLOW ||
exp->action ... | 325,999,339,057,921,450,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,041 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | int apply_filters_to_request(struct stream *s, struct channel *req, struct proxy *px)
{
struct session *sess = s->sess;
struct http_txn *txn = s->txn;
struct hdr_exp *exp;
for (exp = px->req_exp; exp; exp = exp->next) {
int ret;
/*
* The interleaving of transformations and verdicts
* makes it difficult ... | 211,163,005,605,842,470,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,042 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | int apply_filters_to_response(struct stream *s, struct channel *rtr, struct proxy *px)
{
struct session *sess = s->sess;
struct http_txn *txn = s->txn;
struct hdr_exp *exp;
for (exp = px->rsp_exp; exp; exp = exp->next) {
int ret;
/*
* The interleaving of transformations and verdicts
* makes it difficult... | 81,131,791,987,331,700,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,043 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | void capture_headers(char *som, struct hdr_idx *idx,
char **cap, struct cap_hdr *cap_hdr)
{
char *eol, *sol, *col, *sov;
int cur_idx;
struct cap_hdr *h;
int len;
sol = som + hdr_idx_first_pos(idx);
cur_idx = hdr_idx_first_idx(idx);
while (cur_idx) {
eol = sol + idx->v[cur_idx].len;
col = sol;
whi... | 182,795,259,851,491,500,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,044 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | int check_http_res_capture(struct act_rule *rule, struct proxy *px, char **err)
{
if (rule->action_ptr != http_action_res_capture_by_id)
return 1;
if (rule->arg.capid.idx >= px->nb_rsp_cap) {
memprintf(err, "unable to find capture id '%d' referenced by http-response capture rule",
rule->arg.capid.idx);
re... | 167,199,778,828,526,760,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,045 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | void check_response_for_cacheability(struct stream *s, struct channel *rtr)
{
struct http_txn *txn = s->txn;
char *p1, *p2;
char *cur_ptr, *cur_end, *cur_next;
int cur_idx;
if (txn->status < 200) {
/* do not try to cache interim responses! */
txn->flags &= ~TX_CACHEABLE & ~TX_CACHE_COOK;
return;
}
/* It... | 92,332,580,689,782,970,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,046 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | static int cli_io_handler_show_errors(struct appctx *appctx)
{
struct stream_interface *si = appctx->owner;
extern const char *monthname[12];
if (unlikely(si_ic(si)->flags & (CF_WRITE_ERROR|CF_SHUTW)))
return 1;
chunk_reset(&trash);
if (!appctx->ctx.errors.px) {
/* the function had not been called yet, let'... | 150,388,449,049,083,700,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,047 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | static int cli_parse_show_errors(char **args, struct appctx *appctx, void *private)
{
if (!cli_has_level(appctx, ACCESS_LVL_OPER))
return 1;
if (*args[2]) {
struct proxy *px;
px = proxy_find_by_name(args[2], 0, 0);
if (px)
appctx->ctx.errors.iid = px->uuid;
else
appctx->ctx.errors.iid = atoi(args[2]... | 170,853,061,042,486,200,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,048 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | void debug_hdr(const char *dir, struct stream *s, const char *start, const char *end)
{
struct session *sess = strm_sess(s);
int max;
chunk_printf(&trash, "%08x:%s.%s[%04x:%04x]: ", s->uniq_id, s->be->id,
dir,
objt_conn(sess->origin) ? (unsigned short)objt_conn(sess->origin)->handle.fd : -1,
o... | 333,837,843,425,412,250,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,049 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | int del_hdr_value(struct buffer *buf, char **from, char *next)
{
char *prev = *from;
if (*prev == ':') {
/* We're removing the first value, preserve the colon and add a
* space if possible.
*/
if (!HTTP_IS_CRLF(*next))
next++;
prev++;
if (prev < next)
*prev++ = ' ';
while (HTTP_IS_SPHT(*next))... | 162,268,723,669,375,740,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,050 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | extract_cookie_value(char *hdr, const char *hdr_end,
char *cookie_name, size_t cookie_name_l, int list,
char **value, int *value_l)
{
char *equal, *att_end, *att_beg, *val_beg, *val_end;
char *next;
/* we search at least a cookie name followed by an equal, and more
* generally something like this :
* Co... | 295,798,792,550,227,700,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,051 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | char *find_hdr_value_end(char *s, const char *e)
{
int quoted, qdpair;
quoted = qdpair = 0;
#if defined(__x86_64__) || \
defined(__i386__) || defined(__i486__) || defined(__i586__) || defined(__i686__) || \
defined(__ARM_ARCH_7A__)
/* speedup: skip everything not a comma nor a double quote */
for (; ... | 12,597,157,124,595,968,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,052 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | enum http_meth_t find_http_meth(const char *str, const int len)
{
unsigned char m;
const struct http_method_desc *h;
m = ((unsigned)*str - 'A');
if (m < 26) {
for (h = http_methods[m]; h->len > 0; h++) {
if (unlikely(h->len != len))
continue;
if (likely(memcmp(str, h->text, h->len) == 0))
return h... | 10,182,886,481,391,848,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,053 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | static inline char *find_param_list(char *path, size_t path_l, char delim)
{
char *p;
p = memchr(path, delim, path_l);
return p ? p + 1 : NULL;
}
| 255,767,243,097,592,140,000,000,000,000,000,000,000 | proto_http.c | 303,284,703,978,098,730,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,054 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | find_url_param_pos(const char **chunks,
const char* url_param_name, size_t url_param_name_l,
char delim)
{
const char *pos, *last, *equal;
const char **bufs = chunks;
int l1, l2;
pos = bufs[0];
last = bufs[1];
while (pos < last) {
/* Check the equal. */
equal = pos + u... | 270,302,425,006,512,660,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,055 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | static inline int fix_pointer_if_wrap(const char **chunks, const char **ptr)
{
if (*ptr < chunks[1])
return 0;
if (!chunks[2])
return 0;
*ptr = chunks[2] + ( *ptr - chunks[1] );
return 1;
}
| 169,647,373,589,215,030,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,056 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | void free_http_req_rules(struct list *r)
{
struct act_rule *tr, *pr;
list_for_each_entry_safe(pr, tr, r, list) {
LIST_DEL(&pr->list);
if (pr->action == ACT_HTTP_REQ_AUTH)
free(pr->arg.auth.realm);
regex_free(&pr->arg.hdr_add.re);
free(pr);
}
}
| 173,910,951,655,223,760,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,057 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | void free_http_res_rules(struct list *r)
{
struct act_rule *tr, *pr;
list_for_each_entry_safe(pr, tr, r, list) {
LIST_DEL(&pr->list);
regex_free(&pr->arg.hdr_add.re);
free(pr);
}
}
| 46,502,125,898,370,790,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,058 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | const char *get_reason(unsigned int status)
{
switch (status) {
case 100: return "Continue";
case 101: return "Switching Protocols";
case 102: return "Processing";
case 200: return "OK";
case 201: return "Created";
case 202: return "Accepted";
case 203: return "Non-Authoritative Information";
case 204: return ... | 39,780,823,657,068,320,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,059 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | enum act_return http_action_reject(struct act_rule *rule, struct proxy *px,
struct session *sess, struct stream *s, int flags)
{
channel_abort(&s->req);
channel_abort(&s->res);
s->req.analysers = 0;
s->res.analysers = 0;
HA_ATOMIC_ADD(&s->be->be_counters.denied_req, 1);
HA_ATOM... | 322,037,278,619,453,700,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,060 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | enum act_return http_action_req_capture(struct act_rule *rule, struct proxy *px,
struct session *sess, struct stream *s, int flags)
{
struct sample *key;
struct cap_hdr *h = rule->arg.cap.hdr;
char **cap = s->req_cap;
int len;
key = sample_fetch_as_type(s->be, sess, s, SMP_... | 32,396,962,920,387,456,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,061 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | enum act_return http_action_req_capture_by_id(struct act_rule *rule, struct proxy *px,
struct session *sess, struct stream *s, int flags)
{
struct sample *key;
struct cap_hdr *h;
char **cap = s->req_cap;
struct proxy *fe = strm_fe(s);
int len;
int i;
/* Look for the... | 146,140,563,482,517,860,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,062 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | enum act_return http_action_res_capture_by_id(struct act_rule *rule, struct proxy *px,
struct session *sess, struct stream *s, int flags)
{
struct sample *key;
struct cap_hdr *h;
char **cap = s->res_cap;
struct proxy *fe = strm_fe(s);
int len;
int i;
/* Look for the... | 197,847,233,984,926,870,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,063 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | enum act_return http_action_set_req_line(struct act_rule *rule, struct proxy *px,
struct session *sess, struct stream *s, int flags)
{
struct chunk *replace;
enum act_return ret = ACT_RET_ERR;
replace = alloc_trash_chunk();
if (!replace)
goto leave;
/* If we have to cre... | 9,503,962,735,727,992,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,064 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | void http_adjust_conn_mode(struct stream *s, struct http_txn *txn, struct http_msg *msg)
{
struct proxy *fe = strm_fe(s);
int tmp = TX_CON_WANT_KAL;
if (!((fe->options2|s->be->options2) & PR_O2_FAKE_KA)) {
if ((fe->options & PR_O_HTTP_MODE) == PR_O_HTTP_TUN ||
(s->be->options & PR_O_HTTP_MODE) == PR_O_HTTP_... | 301,478,221,094,158,640,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,065 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | struct http_txn *http_alloc_txn(struct stream *s)
{
struct http_txn *txn = s->txn;
if (txn)
return txn;
txn = pool_alloc(pool_head_http_txn);
if (!txn)
return txn;
txn->hdr_idx.size = global.tune.max_http_hdr;
txn->hdr_idx.v = pool_alloc(pool_head_hdr_idx);
if (!txn->hdr_idx.v) {
pool_free(pool_head_... | 183,309,505,891,001,600,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,066 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | static int http_apply_redirect_rule(struct redirect_rule *rule, struct stream *s, struct http_txn *txn)
{
struct http_msg *req = &txn->req;
struct http_msg *res = &txn->rsp;
const char *msg_fmt;
struct chunk *chunk;
int ret = 0;
chunk = alloc_trash_chunk();
if (!chunk)
goto leave;
/* build redirect message ... | 104,480,225,191,529,080,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,067 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | void http_capture_bad_message(struct proxy *proxy, struct error_snapshot *es, struct stream *s,
struct http_msg *msg,
enum h1_state state, struct proxy *other_end)
{
struct session *sess = strm_sess(s);
struct channel *chn = msg->chn;
int len1, len2;
HA_SPIN_LOCK(PROXY_LOCK, ... | 5,947,119,158,805,257,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,068 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | void http_change_connection_header(struct http_txn *txn, struct http_msg *msg, int wanted)
{
struct hdr_ctx ctx;
const char *hdr_val = "Connection";
int hdr_len = 10;
ctx.idx = 0;
if (unlikely(txn->flags & TX_USE_PX_CONN)) {
hdr_val = "Proxy-Connection";
hdr_len = 16;
}
txn->flags &= ~(TX_CON_CLO_SET | T... | 225,612,205,013,002,400,000,000,000,000,000,000,000 | proto_http.c | 303,284,703,978,098,730,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,069 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | void http_end_txn(struct stream *s)
{
struct http_txn *txn = s->txn;
struct proxy *fe = strm_fe(s);
/* these ones will have been dynamically allocated */
pool_free(pool_head_requri, txn->uri);
pool_free(pool_head_capture, txn->cli_cookie);
pool_free(pool_head_capture, txn->srv_cookie);
pool_free(pool_head_uniqu... | 131,585,145,308,538,400,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,070 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | void http_end_txn_clean_session(struct stream *s)
{
int prev_status = s->txn->status;
struct proxy *fe = strm_fe(s);
struct proxy *be = s->be;
struct conn_stream *cs;
struct connection *srv_conn;
struct server *srv;
unsigned int prev_flags = s->txn->flags;
/* FIXME: We need a more portable way of releasing a b... | 11,244,401,457,962,764,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,071 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | int http_find_full_header2(const char *name, int len,
char *sol, struct hdr_idx *idx,
struct hdr_ctx *ctx)
{
char *eol, *sov;
int cur_idx, old_idx;
cur_idx = ctx->idx;
if (cur_idx) {
/* We have previously returned a header, let's search another one */
sol =... | 201,693,680,599,081,940,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,072 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | int http_find_header(const char *name,
char *sol, struct hdr_idx *idx,
struct hdr_ctx *ctx)
{
return http_find_header2(name, strlen(name), sol, idx, ctx);
}
| 20,222,144,593,902,206,000,000,000,000,000,000,000 | proto_http.c | 303,284,703,978,098,730,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,073 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | int http_find_header2(const char *name, int len,
char *sol, struct hdr_idx *idx,
struct hdr_ctx *ctx)
{
char *eol, *sov;
int cur_idx, old_idx;
cur_idx = ctx->idx;
if (cur_idx) {
/* We have previously returned a value, let's search
* another one on the same line.
*/
sol = ctx->line;
ctx-... | 90,203,286,400,939,450,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,074 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | int http_find_next_header(char *sol, struct hdr_idx *idx, struct hdr_ctx *ctx)
{
char *eol, *sov;
int cur_idx, old_idx;
int len;
cur_idx = ctx->idx;
if (cur_idx) {
/* We have previously returned a header, let's search another one */
sol = ctx->line;
eol = sol + idx->v[cur_idx].len;
goto next_hdr;
}
/* ... | 3,387,830,111,791,831,700,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,075 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | unsigned int http_get_fhdr(const struct http_msg *msg, const char *hname, int hlen,
struct hdr_idx *idx, int occ,
struct hdr_ctx *ctx, char **vptr, int *vlen)
{
struct hdr_ctx local_ctx;
char *ptr_hist[MAX_HDR_HISTORY];
int len_hist[MAX_HDR_HISTORY];
unsigned int hist_ptr;
int found;
if (!ctx) {
lo... | 39,618,821,478,038,054,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,076 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | unsigned int http_get_hdr(const struct http_msg *msg, const char *hname, int hlen,
struct hdr_idx *idx, int occ,
struct hdr_ctx *ctx, char **vptr, int *vlen)
{
struct hdr_ctx local_ctx;
char *ptr_hist[MAX_HDR_HISTORY];
int len_hist[MAX_HDR_HISTORY];
unsigned int hist_ptr;
int found;
if (!ctx) {
local... | 94,449,097,079,872,300,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,077 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | char *http_get_path(struct http_txn *txn)
{
char *ptr, *end;
ptr = txn->req.chn->buf->p + txn->req.sl.rq.u;
end = ptr + txn->req.sl.rq.u_l;
if (ptr >= end)
return NULL;
/* RFC7230, par. 2.7 :
* Request-URI = "*" | absuri | abspath | authority
*/
if (*ptr == '*')
return NULL;
if (isalpha((unsigned ch... | 196,652,537,585,071,660,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,078 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | http_get_path_from_string(char *str)
{
char *ptr = str;
/* RFC2616, par. 5.1.2 :
* Request-URI = "*" | absuri | abspath | authority
*/
if (*ptr == '*')
return NULL;
if (isalpha((unsigned char)*ptr)) {
/* this is a scheme as described by RFC3986, par. 3.1 */
ptr++;
while (isalnum((unsigned char)*ptr) ... | 229,444,230,795,946,840,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,079 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | static const int http_get_status_idx(unsigned int status)
{
switch (status) {
case 200: return HTTP_ERR_200;
case 400: return HTTP_ERR_400;
case 403: return HTTP_ERR_403;
case 405: return HTTP_ERR_405;
case 408: return HTTP_ERR_408;
case 425: return HTTP_ERR_425;
case 429: return HTTP_ERR_429;
case 500: return... | 10,831,206,232,386,120,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,080 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | int http_handle_stats(struct stream *s, struct channel *req)
{
struct stats_admin_rule *stats_admin_rule;
struct stream_interface *si = &s->si[1];
struct session *sess = s->sess;
struct http_txn *txn = s->txn;
struct http_msg *msg = &txn->req;
struct uri_auth *uri_auth = s->be->uri_auth;
const char *uri, *h, *lo... | 19,462,455,139,814,292,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,081 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | int http_header_add_tail(struct http_msg *msg, struct hdr_idx *hdr_idx, const char *text)
{
int bytes, len;
len = strlen(text);
bytes = buffer_insert_line2(msg->chn->buf, msg->chn->buf->p + msg->eoh, text, len);
if (!bytes)
return -1;
http_msg_move_end(msg, bytes);
return hdr_idx_add(len, 1, hdr_idx, hdr_idx->... | 146,120,320,198,028,960,000,000,000,000,000,000,000 | proto_http.c | 303,284,703,978,098,730,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
15,082 | haproxy | 17514045e5d934dede62116216c1b016fe23dd06 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=17514045e5d934dede62116216c1b016fe23dd06 | None | 0 | int http_header_add_tail2(struct http_msg *msg,
struct hdr_idx *hdr_idx, const char *text, int len)
{
int bytes;
bytes = buffer_insert_line2(msg->chn->buf, msg->chn->buf->p + msg->eoh, text, len);
if (!bytes)
return -1;
http_msg_move_end(msg, bytes);
return hdr_idx_add(len, 1, hdr_idx,... | 102,463,366,260,821,750,000,000,000,000,000,000,000 | proto_http.c | 303,284,703,978,098,730,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-11469 | Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function. | https://nvd.nist.gov/vuln/detail/CVE-2018-11469 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.