idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
16,620
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
smp_fetch_url32(struct proxy *px, struct session *l4, void *l7, unsigned int opt, const struct arg *args, struct sample *smp, const char *kw) { struct http_txn *txn = l7; struct hdr_ctx ctx; unsigned int hash = 0; char *ptr, *beg, *end; int len; CHECK_HTTP_MESSAGE_FIRST(); ctx.idx = 0; if (ht...
205,679,095,756,904,200,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,621
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
smp_fetch_url32_src(struct proxy *px, struct session *l4, void *l7, unsigned int opt, const struct arg *args, struct sample *smp, const char *kw) { struct chunk *temp; struct connection *cli_conn = objt_conn(l4->si[0].end); if (!smp_fetch_url32(px, l4, l7, opt, args, smp, kw)) return 0; tem...
90,136,889,296,629,160,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,622
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
smp_fetch_url_ip(struct proxy *px, struct session *l4, void *l7, unsigned int opt, const struct arg *args, struct sample *smp, const char *kw) { struct http_txn *txn = l7; struct sockaddr_storage addr; CHECK_HTTP_MESSAGE_FIRST(); url2sa(txn->req.chn->buf->p + txn->req.sl.rq.u, txn->req.sl.rq.u_l,...
277,613,824,858,638,300,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,623
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
smp_fetch_url_param(struct proxy *px, struct session *l4, void *l7, unsigned int opt, const struct arg *args, struct sample *smp, const char *kw) { char delim = '?'; struct http_txn *txn = l7; struct http_msg *msg = &txn->req; if (!args || args[0].type != ARGT_STR || (args[1].type && args[...
245,418,117,079,871,200,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,624
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
smp_fetch_url_param_val(struct proxy *px, struct session *l4, void *l7, unsigned int opt, const struct arg *args, struct sample *smp, const char *kw) { int ret = smp_fetch_url_param(px, l4, l7, opt, args, smp, kw); if (ret > 0) { smp->type = SMP_T_UINT; smp->data.uint = strl2ic(smp->data.str...
49,680,327,280,110,970,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,625
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
smp_fetch_url_port(struct proxy *px, struct session *l4, void *l7, unsigned int opt, const struct arg *args, struct sample *smp, const char *kw) { struct http_txn *txn = l7; struct sockaddr_storage addr; CHECK_HTTP_MESSAGE_FIRST(); url2sa(txn->req.chn->buf->p + txn->req.sl.rq.u, txn->req.sl.rq....
31,007,330,068,298,580,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,626
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
smp_prefetch_http(struct proxy *px, struct session *s, void *l7, unsigned int opt, const struct arg *args, struct sample *smp, int req_vol) { struct http_txn *txn = l7; struct http_msg *msg = &txn->req; /* Note: hdr_idx.v cannot be NULL in this ACL because the ACL is tagged * as a layer7 ACL, wh...
14,568,597,337,753,424,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,627
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
static int val_hdr(struct arg *arg, char **err_msg) { if (arg && arg[1].type == ARGT_SINT && arg[1].data.sint < -MAX_HDR_HISTORY) { memprintf(err_msg, "header occurrence must be >= %d", -MAX_HDR_HISTORY); return 0; } return 1; }
40,242,024,808,121,174,000,000,000,000,000,000,000
proto_http.c
303,284,703,978,098,730,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,628
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
int conn_si_send_proxy(struct connection *conn, unsigned int flag) { /* we might have been called just after an asynchronous shutw */ if (conn->flags & CO_FL_SOCK_WR_SH) goto out_error; if (!conn_ctrl_ready(conn)) goto out_error; if (!fd_send_ready(conn->t.sock.fd)) goto out_wait; /* If we have a PROXY li...
248,947,085,375,008,350,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,629
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
static void si_conn_recv_cb(struct connection *conn) { struct stream_interface *si = conn->owner; struct channel *chn = si->ib; int ret, max, cur_read; int read_poll = MAX_READ_POLL_LOOPS; /* stop immediately on errors. Note that we DON'T want to stop on * POLL_ERR, as the poller might report a write error whil...
79,771,262,028,576,930,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,630
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
static void si_conn_send_cb(struct connection *conn) { struct stream_interface *si = conn->owner; struct channel *chn = si->ob; if (conn->flags & CO_FL_ERROR) return; if (conn->flags & CO_FL_HANDSHAKE) /* a handshake was requested */ return; /* we might have been called just after an asynchronous shutw */...
261,820,388,320,953,330,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,631
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
static int si_conn_wake_cb(struct connection *conn) { struct stream_interface *si = conn->owner; DPRINTF(stderr, "%s: si=%p, si->state=%d ib->flags=%08x ob->flags=%08x\n", __FUNCTION__, si, si->state, si->ib->flags, si->ob->flags); if (conn->flags & CO_FL_ERROR) si->flags |= SI_FL_ERR; /* check for recent ...
298,220,579,348,267,300,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,632
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
static void si_idle_conn_null_cb(struct connection *conn) { if (conn->flags & (CO_FL_ERROR | CO_FL_SOCK_RD_SH)) return; if (fdtab[conn->t.sock.fd].ev & (FD_POLL_ERR|FD_POLL_HUP)) { fdtab[conn->t.sock.fd].linger_risk = 0; conn->flags |= CO_FL_SOCK_RD_SH; } else { conn_drain(conn); } /* disable draining i...
271,977,221,360,518,700,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,633
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
int stream_int_check_timeouts(struct stream_interface *si) { if (tick_is_expired(si->exp, now_ms)) { si->flags |= SI_FL_EXP; return 1; } return 0; }
243,798,582,576,004,660,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,634
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
static void stream_int_chk_rcv(struct stream_interface *si) { struct channel *ib = si->ib; DPRINTF(stderr, "%s: si=%p, si->state=%d ib->flags=%08x ob->flags=%08x\n", __FUNCTION__, si, si->state, si->ib->flags, si->ob->flags); if (unlikely(si->state != SI_ST_EST || (ib->flags & (CF_SHUTR|CF_DONT_READ)))) retu...
156,785,053,247,529,880,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,635
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
static void stream_int_chk_rcv_conn(struct stream_interface *si) { struct channel *ib = si->ib; struct connection *conn = __objt_conn(si->end); if (unlikely(si->state > SI_ST_EST || (ib->flags & CF_SHUTR))) return; conn_refresh_polling_flags(conn); if ((ib->flags & CF_DONT_READ) || channel_full(ib)) { /* st...
261,472,872,092,206,860,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,636
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
static void stream_int_chk_snd(struct stream_interface *si) { struct channel *ob = si->ob; DPRINTF(stderr, "%s: si=%p, si->state=%d ib->flags=%08x ob->flags=%08x\n", __FUNCTION__, si, si->state, si->ib->flags, si->ob->flags); if (unlikely(si->state != SI_ST_EST || (si->ob->flags & CF_SHUTW))) return; if (!...
178,268,301,692,853,160,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,637
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
static void stream_int_chk_snd_conn(struct stream_interface *si) { struct channel *ob = si->ob; struct connection *conn = __objt_conn(si->end); if (unlikely(si->state > SI_ST_EST || (ob->flags & CF_SHUTW))) return; if (unlikely(channel_is_empty(ob))) /* called with nothing to send ! */ return; if (!ob->pip...
8,558,186,338,250,673,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,638
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
struct appctx *stream_int_register_handler(struct stream_interface *si, struct si_applet *app) { struct appctx *appctx; DPRINTF(stderr, "registering handler %p for si %p (was %p)\n", app, si, si->owner); appctx = si_alloc_appctx(si); if (!si) return NULL; appctx_set_applet(appctx, app); si->flags |= SI_FL_WA...
322,510,286,589,632,100,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,639
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
void stream_int_report_error(struct stream_interface *si) { if (!si->err_type) si->err_type = SI_ET_DATA_ERR; si->ob->flags |= CF_WRITE_ERROR; si->ib->flags |= CF_READ_ERROR; }
34,735,072,298,281,025,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,640
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
static void stream_int_shutr(struct stream_interface *si) { si->ib->flags &= ~CF_SHUTR_NOW; if (si->ib->flags & CF_SHUTR) return; si->ib->flags |= CF_SHUTR; si->ib->rex = TICK_ETERNITY; si->flags &= ~SI_FL_WAIT_ROOM; if (si->state != SI_ST_EST && si->state != SI_ST_CON) return; if (si->ob->flags & CF_SHUTW...
317,441,180,397,121,300,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,641
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
static void stream_int_shutr_conn(struct stream_interface *si) { struct connection *conn = __objt_conn(si->end); si->ib->flags &= ~CF_SHUTR_NOW; if (si->ib->flags & CF_SHUTR) return; si->ib->flags |= CF_SHUTR; si->ib->rex = TICK_ETERNITY; si->flags &= ~SI_FL_WAIT_ROOM; if (si->state != SI_ST_EST && si->state...
49,890,463,138,424,330,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,642
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
static void stream_int_shutw(struct stream_interface *si) { si->ob->flags &= ~CF_SHUTW_NOW; if (si->ob->flags & CF_SHUTW) return; si->ob->flags |= CF_SHUTW; si->ob->wex = TICK_ETERNITY; si->flags &= ~SI_FL_WAIT_DATA; switch (si->state) { case SI_ST_EST: /* we have to shut before closing, otherwise some shor...
168,866,335,188,442,830,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,643
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
static void stream_int_shutw_conn(struct stream_interface *si) { struct connection *conn = __objt_conn(si->end); si->ob->flags &= ~CF_SHUTW_NOW; if (si->ob->flags & CF_SHUTW) return; si->ob->flags |= CF_SHUTW; si->ob->wex = TICK_ETERNITY; si->flags &= ~SI_FL_WAIT_DATA; switch (si->state) { case SI_ST_EST: ...
97,472,517,591,484,340,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,644
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
void stream_int_unregister_handler(struct stream_interface *si) { si_detach(si); }
204,216,124,176,024,140,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,645
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
static void stream_int_update_embedded(struct stream_interface *si) { int old_flags = si->flags; DPRINTF(stderr, "%s: si=%p, si->state=%d ib->flags=%08x ob->flags=%08x\n", __FUNCTION__, si, si->state, si->ib->flags, si->ob->flags); if (si->state != SI_ST_EST) return; if ((si->ob->flags & (CF_SHUTW|CF_SHUTW...
69,962,292,764,006,160,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,646
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
void stream_sock_read0(struct stream_interface *si) { struct connection *conn = __objt_conn(si->end); si->ib->flags &= ~CF_SHUTR_NOW; if (si->ib->flags & CF_SHUTR) return; si->ib->flags |= CF_SHUTR; si->ib->rex = TICK_ETERNITY; si->flags &= ~SI_FL_WAIT_ROOM; if (si->state != SI_ST_EST && si->state != SI_ST_C...
166,947,135,910,960,000,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,647
kde
82fdfd24d46966a117fa625b68784735a40f9065
https://cgit.kde.org/konversation
https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065
None
0
Part::Part(QWidget *parentWidget, QObject *parent, const QVariantList& args) : KParts::ReadWritePart(parent), m_splitter(Q_NULLPTR), m_busy(false), m_jobTracker(Q_NULLPTR) { Q_UNUSED(args) KAboutData aboutData(QStringLiteral("ark"), i18n("ArkPart"),...
251,468,034,058,775,200,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2017-5330
ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications.
https://nvd.nist.gov/vuln/detail/CVE-2017-5330
16,648
kde
82fdfd24d46966a117fa625b68784735a40f9065
https://cgit.kde.org/konversation
https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065
None
0
QModelIndexList Part::addChildren(const QModelIndexList &list) const { Q_ASSERT(m_model); QModelIndexList ret = list; for (int i = 0; i < ret.size(); ++i) { QModelIndex index = ret.at(i); for (int j = 0; j < m_model->rowCount(index); ++j) { QModelIndex child = m_model->index(j...
331,206,385,497,380,670,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2017-5330
ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications.
https://nvd.nist.gov/vuln/detail/CVE-2017-5330
16,649
kde
82fdfd24d46966a117fa625b68784735a40f9065
https://cgit.kde.org/konversation
https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065
None
0
KConfigSkeleton *Part::config() const { return ArkSettings::self(); }
201,749,481,635,651,970,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2017-5330
ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications.
https://nvd.nist.gov/vuln/detail/CVE-2017-5330
16,650
kde
82fdfd24d46966a117fa625b68784735a40f9065
https://cgit.kde.org/konversation
https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065
None
0
bool Part::confirmAndDelete(const QString &targetFile) { QFileInfo targetInfo(targetFile); const auto buttonCode = KMessageBox::warningYesNo(widget(), xi18nc("@info", "The archive <filename>%1</fil...
221,977,610,546,509,250,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2017-5330
ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications.
https://nvd.nist.gov/vuln/detail/CVE-2017-5330
16,651
kde
82fdfd24d46966a117fa625b68784735a40f9065
https://cgit.kde.org/konversation
https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065
None
0
void Part::createArchive() { const QString fixedMimeType = arguments().metaData()[QStringLiteral("fixedMimeType")]; m_model->createEmptyArchive(localFilePath(), fixedMimeType, m_model); if (arguments().metaData().contains(QStringLiteral("volumeSize"))) { m_model->archive()->setMultiVolume(true); ...
95,379,347,884,272,810,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2017-5330
ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications.
https://nvd.nist.gov/vuln/detail/CVE-2017-5330
16,652
kde
82fdfd24d46966a117fa625b68784735a40f9065
https://cgit.kde.org/konversation
https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065
None
0
QString Part::detectSubfolder() const { if (!m_model) { return QString(); } return m_model->archive()->subfolderName(); }
134,109,075,615,103,600,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2017-5330
ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications.
https://nvd.nist.gov/vuln/detail/CVE-2017-5330
16,653
kde
82fdfd24d46966a117fa625b68784735a40f9065
https://cgit.kde.org/konversation
https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065
None
0
void Part::displayMsgWidget(KMessageWidget::MessageType type, const QString& msg) { m_messageWidget->hide(); m_messageWidget->setText(msg); m_messageWidget->setMessageType(type); m_messageWidget->animatedShow(); }
202,055,690,159,534,500,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2017-5330
ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications.
https://nvd.nist.gov/vuln/detail/CVE-2017-5330
16,654
kde
82fdfd24d46966a117fa625b68784735a40f9065
https://cgit.kde.org/konversation
https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065
None
0
void Part::extractSelectedFilesTo(const QString& localPath) { if (!m_model) { return; } const QUrl url = QUrl::fromUserInput(localPath, QString()); KIO::StatJob* statJob = nullptr; if (!url.isLocalFile() && !url.scheme().isEmpty()) { statJob = KIO::mostLocalUrl(url); if (!...
337,326,601,073,562,330,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2017-5330
ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications.
https://nvd.nist.gov/vuln/detail/CVE-2017-5330
16,655
kde
82fdfd24d46966a117fa625b68784735a40f9065
https://cgit.kde.org/konversation
https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065
None
0
QVector<Kerfuffle::Archive::Entry*> Part::filesAndRootNodesForIndexes(const QModelIndexList& list) const { QVector<Kerfuffle::Archive::Entry*> fileList; QStringList fullPathsList; foreach (const QModelIndex& index, list) { QModelIndex selectionRoot = index.parent(); while (m_view->selectio...
124,645,271,099,178,350,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2017-5330
ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications.
https://nvd.nist.gov/vuln/detail/CVE-2017-5330
16,656
kde
82fdfd24d46966a117fa625b68784735a40f9065
https://cgit.kde.org/konversation
https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065
None
0
QVector<Archive::Entry*> Part::filesForIndexes(const QModelIndexList& list) const { QVector<Archive::Entry*> ret; foreach(const QModelIndex& index, list) { ret << m_model->entryForIndex(index); } return ret; }
3,194,488,017,731,979,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2017-5330
ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications.
https://nvd.nist.gov/vuln/detail/CVE-2017-5330
16,657
kde
82fdfd24d46966a117fa625b68784735a40f9065
https://cgit.kde.org/konversation
https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065
None
0
void Part::guiActivateEvent(KParts::GUIActivateEvent *event) { Q_UNUSED(event) }
268,184,291,205,119,250,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2017-5330
ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications.
https://nvd.nist.gov/vuln/detail/CVE-2017-5330
16,658
kde
82fdfd24d46966a117fa625b68784735a40f9065
https://cgit.kde.org/konversation
https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065
None
0
bool Part::isBusy() const { return m_busy; }
232,151,582,637,560,430,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2017-5330
ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications.
https://nvd.nist.gov/vuln/detail/CVE-2017-5330
16,659
kde
82fdfd24d46966a117fa625b68784735a40f9065
https://cgit.kde.org/konversation
https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065
None
0
bool Part::isLocalFileValid() { const QString localFile = localFilePath(); const QFileInfo localFileInfo(localFile); const bool creatingNewArchive = arguments().metaData()[QStringLiteral("createNewArchive")] == QLatin1String("true"); if (localFileInfo.isDir()) { displayMsgWidget(KMessageWidget:...
122,623,617,478,436,060,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2017-5330
ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications.
https://nvd.nist.gov/vuln/detail/CVE-2017-5330
16,660
kde
82fdfd24d46966a117fa625b68784735a40f9065
https://cgit.kde.org/konversation
https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065
None
0
bool Part::isSingleFolderArchive() const { return m_model->archive()->isSingleFolder(); }
255,153,970,750,368,730,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2017-5330
ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications.
https://nvd.nist.gov/vuln/detail/CVE-2017-5330
16,661
kde
82fdfd24d46966a117fa625b68784735a40f9065
https://cgit.kde.org/konversation
https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065
None
0
void Part::loadArchive() { const QString fixedMimeType = arguments().metaData()[QStringLiteral("fixedMimeType")]; auto job = m_model->loadArchive(localFilePath(), fixedMimeType, m_model); if (job) { registerJob(job); job->start(); } else { updateActions(); } }
337,187,212,192,758,450,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2017-5330
ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications.
https://nvd.nist.gov/vuln/detail/CVE-2017-5330
16,662
kde
82fdfd24d46966a117fa625b68784735a40f9065
https://cgit.kde.org/konversation
https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065
None
0
bool Part::openFile() { qCDebug(ARK) << "Attempting to open archive" << localFilePath(); resetGui(); if (!isLocalFileValid()) { return false; } const bool creatingNewArchive = arguments().metaData()[QStringLiteral("createNewArchive")] == QLatin1String("true"); if (creatingNewArchive)...
76,369,592,583,999,330,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2017-5330
ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications.
https://nvd.nist.gov/vuln/detail/CVE-2017-5330
16,663
kde
82fdfd24d46966a117fa625b68784735a40f9065
https://cgit.kde.org/konversation
https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065
None
0
void Part::registerJob(KJob* job) { if (!m_jobTracker) { m_jobTracker = new JobTracker(widget()); m_statusBarExtension->addStatusBarItem(m_jobTracker->widget(0), 0, true); m_jobTracker->widget(job)->show(); } m_jobTracker->registerJob(job); emit busy(); connect(job, &KJob::r...
337,785,651,142,644,550,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2017-5330
ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications.
https://nvd.nist.gov/vuln/detail/CVE-2017-5330
16,664
kde
82fdfd24d46966a117fa625b68784735a40f9065
https://cgit.kde.org/konversation
https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065
None
0
void Part::resetGui() { m_messageWidget->hide(); m_commentView->clear(); m_commentBox->hide(); m_infoPanel->setIndex(QModelIndex()); m_compressionOptions = CompressionOptions(); }
39,020,248,617,986,065,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2017-5330
ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications.
https://nvd.nist.gov/vuln/detail/CVE-2017-5330
16,665
kde
82fdfd24d46966a117fa625b68784735a40f9065
https://cgit.kde.org/konversation
https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065
None
0
bool Part::saveFile() { return true; }
295,245,351,582,778,440,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2017-5330
ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications.
https://nvd.nist.gov/vuln/detail/CVE-2017-5330
16,666
kde
82fdfd24d46966a117fa625b68784735a40f9065
https://cgit.kde.org/konversation
https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065
None
0
void Part::selectionChanged() { m_infoPanel->setIndexes(m_view->selectionModel()->selectedRows()); }
58,485,768,481,358,750,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2017-5330
ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications.
https://nvd.nist.gov/vuln/detail/CVE-2017-5330
16,667
kde
82fdfd24d46966a117fa625b68784735a40f9065
https://cgit.kde.org/konversation
https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065
None
0
void Part::setFileNameFromArchive() { const QString prettyName = url().fileName(); m_infoPanel->setPrettyFileName(prettyName); m_infoPanel->updateWithDefaults(); emit setWindowCaption(prettyName); }
93,654,102,534,329,160,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2017-5330
ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications.
https://nvd.nist.gov/vuln/detail/CVE-2017-5330
16,668
kde
82fdfd24d46966a117fa625b68784735a40f9065
https://cgit.kde.org/konversation
https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065
None
0
void Part::setReadyGui() { QApplication::restoreOverrideCursor(); m_busy = false; if (m_statusBarExtension->statusBar()) { m_statusBarExtension->statusBar()->hide(); } m_view->setEnabled(true); updateActions(); }
249,884,088,607,259,020,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2017-5330
ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications.
https://nvd.nist.gov/vuln/detail/CVE-2017-5330
16,669
kde
82fdfd24d46966a117fa625b68784735a40f9065
https://cgit.kde.org/konversation
https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065
None
0
QList<Kerfuffle::SettingsPage*> Part::settingsPages(QWidget *parent) const { QList<SettingsPage*> pages; pages.append(new GeneralSettingsPage(parent, i18nc("@title:tab", "General Settings"), QStringLiteral("go-home"))); pages.append(new ExtractionSettingsPage(parent, i18nc("@title:tab", "Extraction Settings...
20,244,579,530,741,860,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2017-5330
ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications.
https://nvd.nist.gov/vuln/detail/CVE-2017-5330
16,670
kde
82fdfd24d46966a117fa625b68784735a40f9065
https://cgit.kde.org/konversation
https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065
None
0
void Part::setupActions() { m_signalMapper = new QSignalMapper(this); m_showInfoPanelAction = new KToggleAction(i18nc("@action:inmenu", "Show Information Panel"), this); actionCollection()->addAction(QStringLiteral( "show-infopanel" ), m_showInfoPanelAction); m_showInfoPanelAction->setChecked(ArkSettin...
205,920,556,013,402,330,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2017-5330
ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications.
https://nvd.nist.gov/vuln/detail/CVE-2017-5330
16,671
kde
82fdfd24d46966a117fa625b68784735a40f9065
https://cgit.kde.org/konversation
https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065
None
0
void Part::setupView() { m_view->setContextMenuPolicy(Qt::CustomContextMenu); m_view->setModel(m_model); connect(m_view->selectionModel(), &QItemSelectionModel::selectionChanged, this, &Part::updateActions); connect(m_view->selectionModel(), &QItemSelectionModel::selectionChanged, ...
273,822,624,414,863,560,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2017-5330
ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications.
https://nvd.nist.gov/vuln/detail/CVE-2017-5330
16,672
kde
82fdfd24d46966a117fa625b68784735a40f9065
https://cgit.kde.org/konversation
https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065
None
0
void Part::slotActivated(const QModelIndex &index) { Q_UNUSED(index) if (QGuiApplication::keyboardModifiers() != Qt::ShiftModifier && QGuiApplication::keyboardModifiers() != Qt::ControlModifier) { ArkSettings::defaultOpenAction() == ArkSettings::EnumDefaultOpenAction::Preview ? slotOpenEntry(Pr...
85,342,590,545,574,100,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2017-5330
ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications.
https://nvd.nist.gov/vuln/detail/CVE-2017-5330
16,673
kde
82fdfd24d46966a117fa625b68784735a40f9065
https://cgit.kde.org/konversation
https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065
None
0
void Part::slotAddComment() { CommentJob *job = m_model->archive()->addComment(m_commentView->toPlainText()); if (!job) { return; } registerJob(job); job->start(); m_commentMsgWidget->hide(); if (m_commentView->toPlainText().isEmpty()) { m_commentBox->hide(); } }
150,078,216,208,209,500,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2017-5330
ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications.
https://nvd.nist.gov/vuln/detail/CVE-2017-5330
16,674
kde
82fdfd24d46966a117fa625b68784735a40f9065
https://cgit.kde.org/konversation
https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065
None
0
void Part::slotAddFiles(const QStringList& filesToAdd, const Archive::Entry *destination, const QString &relPath) { if (!m_model->archive() || filesToAdd.isEmpty()) { return; } QStringList withChildPaths; foreach (const QString& file, filesToAdd) { m_jobTempEntries.push_back(new Archive...
189,379,588,791,022,600,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2017-5330
ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications.
https://nvd.nist.gov/vuln/detail/CVE-2017-5330
16,675
kde
82fdfd24d46966a117fa625b68784735a40f9065
https://cgit.kde.org/konversation
https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065
None
0
void Part::slotAddFilesDone(KJob* job) { qDeleteAll(m_jobTempEntries); m_jobTempEntries.clear(); if (job->error() && job->error() != KJob::KilledJobError) { KMessageBox::error(widget(), job->errorString()); } else { m_messageWidget->hide(); if (m_model->archive()->isMultiVolume(...
236,183,445,773,499,000,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2017-5330
ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications.
https://nvd.nist.gov/vuln/detail/CVE-2017-5330
16,676
kde
82fdfd24d46966a117fa625b68784735a40f9065
https://cgit.kde.org/konversation
https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065
None
0
void Part::slotCommentChanged() { if (!m_model->archive()) { return; } if (m_commentMsgWidget->isHidden() && m_commentView->toPlainText() != m_model->archive()->comment()) { m_commentMsgWidget->animatedShow(); } else if (m_commentMsgWidget->isVisible() && m_commentView->toPlainText() ==...
210,766,502,926,358,400,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2017-5330
ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications.
https://nvd.nist.gov/vuln/detail/CVE-2017-5330
16,677
kde
82fdfd24d46966a117fa625b68784735a40f9065
https://cgit.kde.org/konversation
https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065
None
0
void Part::slotCopyFiles() { m_model->filesToCopy = ArchiveModel::entryMap(filesForIndexes(addChildren(m_view->selectionModel()->selectedRows()))); qCDebug(ARK) << "Entries marked to copy:" << m_model->filesToCopy.values(); foreach (const QModelIndex &row, m_cutIndexes) { m_view->dataChanged(row, ro...
331,015,044,188,167,800,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2017-5330
ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications.
https://nvd.nist.gov/vuln/detail/CVE-2017-5330
16,678
kde
82fdfd24d46966a117fa625b68784735a40f9065
https://cgit.kde.org/konversation
https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065
None
0
void Part::slotDeleteFiles() { const int selectionsCount = m_view->selectionModel()->selectedRows().count(); const auto reallyDelete = KMessageBox::questionYesNo(widget(), i18ncp("@info", "Deleting this file is not undoable. Ar...
206,718,776,533,498,500,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2017-5330
ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications.
https://nvd.nist.gov/vuln/detail/CVE-2017-5330
16,679
kde
82fdfd24d46966a117fa625b68784735a40f9065
https://cgit.kde.org/konversation
https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065
None
0
void Part::slotDeleteFilesDone(KJob* job) { if (job->error() && job->error() != KJob::KilledJobError) { KMessageBox::error(widget(), job->errorString()); } m_cutIndexes.clear(); m_model->filesToMove.clear(); m_model->filesToCopy.clear(); }
306,607,895,263,864,700,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2017-5330
ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications.
https://nvd.nist.gov/vuln/detail/CVE-2017-5330
16,680
kde
82fdfd24d46966a117fa625b68784735a40f9065
https://cgit.kde.org/konversation
https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065
None
0
void Part::slotEditFileName() { QModelIndex currentIndex = m_view->selectionModel()->currentIndex(); currentIndex = (currentIndex.parent().isValid()) ? currentIndex.parent().child(currentIndex.row(), 0) : m_model->index(currentIndex.row(), 0); m_view->openEntryEditor(cu...
219,412,717,134,371,000,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2017-5330
ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications.
https://nvd.nist.gov/vuln/detail/CVE-2017-5330
16,681
kde
82fdfd24d46966a117fa625b68784735a40f9065
https://cgit.kde.org/konversation
https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065
None
0
void Part::slotError(const QString& errorMessage, const QString& details) { if (details.isEmpty()) { KMessageBox::error(widget(), errorMessage); } else { KMessageBox::detailedError(widget(), errorMessage, details); } }
236,236,345,399,879,340,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2017-5330
ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications.
https://nvd.nist.gov/vuln/detail/CVE-2017-5330
16,682
kde
82fdfd24d46966a117fa625b68784735a40f9065
https://cgit.kde.org/konversation
https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065
None
0
void Part::slotExtractArchive() { if (m_view->selectionModel()->selectedRows().count() > 0) { m_view->selectionModel()->clear(); } slotShowExtractionDialog(); }
116,875,489,443,600,600,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2017-5330
ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications.
https://nvd.nist.gov/vuln/detail/CVE-2017-5330
16,683
kde
82fdfd24d46966a117fa625b68784735a40f9065
https://cgit.kde.org/konversation
https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065
None
0
void Part::slotLoadingFinished(KJob *job) { if (job->error()) { if (arguments().metaData()[QStringLiteral("createNewArchive")] != QLatin1String("true")) { if (job->error() != KJob::KilledJobError) { displayMsgWidget(KMessageWidget::Error, xi18nc("@info", "Loading the archive <fil...
65,180,666,147,236,510,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2017-5330
ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications.
https://nvd.nist.gov/vuln/detail/CVE-2017-5330
16,684
kde
82fdfd24d46966a117fa625b68784735a40f9065
https://cgit.kde.org/konversation
https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065
None
0
void Part::slotLoadingStarted() { m_model->filesToMove.clear(); m_model->filesToCopy.clear(); }
294,968,719,249,401,640,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2017-5330
ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications.
https://nvd.nist.gov/vuln/detail/CVE-2017-5330
16,685
kde
82fdfd24d46966a117fa625b68784735a40f9065
https://cgit.kde.org/konversation
https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065
None
0
void Part::slotOpenEntry(int mode) { qCDebug(ARK) << "Opening with mode" << mode; QModelIndex index = m_view->selectionModel()->currentIndex(); Archive::Entry *entry = m_model->entryForIndex(index); if (entry->isDir()) { return; } if (!entry->property("link").toString().isEmpty()) { ...
313,611,442,854,563,000,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2017-5330
ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications.
https://nvd.nist.gov/vuln/detail/CVE-2017-5330
16,686
kde
82fdfd24d46966a117fa625b68784735a40f9065
https://cgit.kde.org/konversation
https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065
None
0
void Part::slotPasteFiles() { m_destination = (m_view->selectionModel()->selectedRows().count() > 0) ? m_model->entryForIndex(m_view->selectionModel()->currentIndex()) : Q_NULLPTR; if (m_destination == Q_NULLPTR) { m_destination = new Archive::Entry(Q_NULLPTR, QSt...
70,927,575,475,231,610,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2017-5330
ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications.
https://nvd.nist.gov/vuln/detail/CVE-2017-5330
16,687
kde
82fdfd24d46966a117fa625b68784735a40f9065
https://cgit.kde.org/konversation
https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065
None
0
void Part::slotPasteFiles(QVector<Kerfuffle::Archive::Entry*> &files, Kerfuffle::Archive::Entry *destination, int entriesWithoutChildren) { if (files.isEmpty()) { delete m_destination; return; } QStringList filesPaths = ReadOnlyArchiveInterface::entryFullPaths(files); QStringList newPat...
91,346,977,806,768,370,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2017-5330
ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications.
https://nvd.nist.gov/vuln/detail/CVE-2017-5330
16,688
kde
82fdfd24d46966a117fa625b68784735a40f9065
https://cgit.kde.org/konversation
https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065
None
0
void Part::slotPasteFilesDone(KJob *job) { if (job->error() && job->error() != KJob::KilledJobError) { KMessageBox::error(widget(), job->errorString()); } m_cutIndexes.clear(); m_model->filesToMove.clear(); m_model->filesToCopy.clear(); }
120,536,190,608,235,740,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2017-5330
ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications.
https://nvd.nist.gov/vuln/detail/CVE-2017-5330
16,689
kde
82fdfd24d46966a117fa625b68784735a40f9065
https://cgit.kde.org/konversation
https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065
None
0
void Part::slotPreviewExtractedEntry(KJob *job) { if (!job->error()) { PreviewJob *previewJob = qobject_cast<PreviewJob*>(job); Q_ASSERT(previewJob); m_tmpExtractDirList << previewJob->tempDir(); ArkViewer::view(previewJob->validatedFilePath()); } else if (job->error() != KJob:...
33,678,586,226,890,667,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2017-5330
ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications.
https://nvd.nist.gov/vuln/detail/CVE-2017-5330
16,690
kde
82fdfd24d46966a117fa625b68784735a40f9065
https://cgit.kde.org/konversation
https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065
None
0
void Part::slotQuickExtractFiles(QAction *triggeredAction) { if (!triggeredAction->data().isNull()) { QString userDestination = triggeredAction->data().toString(); QString finalDestinationDirectory; const QString detectedSubfolder = detectSubfolder(); qCDebug(ARK) << "Detected subfol...
84,042,918,451,698,745,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2017-5330
ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications.
https://nvd.nist.gov/vuln/detail/CVE-2017-5330
16,691
kde
82fdfd24d46966a117fa625b68784735a40f9065
https://cgit.kde.org/konversation
https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065
None
0
void Part::slotRenameFile(const QString &name) { if (name == QLatin1String(".") || name == QLatin1String("..") || name.contains(QLatin1Char('/'))) { displayMsgWidget(KMessageWidget::Error, i18n("Filename can't contain slashes and can't be equal to \".\" or \"..\"")); return; } const Archive:...
29,103,770,260,471,560,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2017-5330
ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications.
https://nvd.nist.gov/vuln/detail/CVE-2017-5330
16,692
kde
82fdfd24d46966a117fa625b68784735a40f9065
https://cgit.kde.org/konversation
https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065
None
0
void Part::slotSaveAs() { QUrl saveUrl = QFileDialog::getSaveFileUrl(widget(), i18nc("@title:window", "Save Archive As"), url()); if ((saveUrl.isValid()) && (!saveUrl.isEmpty())) { auto statJob = KIO::stat(saveUrl, KIO::StatJob::DestinationSide, 0); KJobWidgets::setWindow(statJob, widget()); ...
107,869,376,159,393,560,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2017-5330
ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications.
https://nvd.nist.gov/vuln/detail/CVE-2017-5330
16,693
kde
82fdfd24d46966a117fa625b68784735a40f9065
https://cgit.kde.org/konversation
https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065
None
0
void Part::slotShowContextMenu() { if (!factory()) { return; } QMenu *popup = static_cast<QMenu *>(factory()->container(QStringLiteral("context_menu"), this)); popup->popup(QCursor::pos()); }
158,993,356,255,057,300,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2017-5330
ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications.
https://nvd.nist.gov/vuln/detail/CVE-2017-5330
16,694
kde
82fdfd24d46966a117fa625b68784735a40f9065
https://cgit.kde.org/konversation
https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065
None
0
void Part::slotShowExtractionDialog() { if (!m_model) { return; } QPointer<Kerfuffle::ExtractionDialog> dialog(new Kerfuffle::ExtractionDialog); dialog.data()->setModal(true); if (m_view->selectionModel()->selectedRows().count() > 0) { dialog.data()->setShowSelectedFiles(true); ...
246,745,807,302,693,100,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2017-5330
ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications.
https://nvd.nist.gov/vuln/detail/CVE-2017-5330
16,695
kde
82fdfd24d46966a117fa625b68784735a40f9065
https://cgit.kde.org/konversation
https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065
None
0
void Part::slotTestingDone(KJob* job) { if (job->error() && job->error() != KJob::KilledJobError) { KMessageBox::error(widget(), job->errorString()); } else if (static_cast<TestJob*>(job)->testSucceeded()) { KMessageBox::information(widget(), i18n("The archive passed the integrity test."), i18n(...
135,006,033,156,209,340,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2017-5330
ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications.
https://nvd.nist.gov/vuln/detail/CVE-2017-5330
16,696
kde
82fdfd24d46966a117fa625b68784735a40f9065
https://cgit.kde.org/konversation
https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065
None
0
void Part::slotToggleInfoPanel(bool visible) { if (visible) { m_splitter->setSizes(ArkSettings::splitterSizes()); m_infoPanel->show(); } else { ArkSettings::setSplitterSizes(m_splitter->sizes()); m_infoPanel->hide(); } }
48,169,798,124,784,170,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2017-5330
ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications.
https://nvd.nist.gov/vuln/detail/CVE-2017-5330
16,697
kde
82fdfd24d46966a117fa625b68784735a40f9065
https://cgit.kde.org/konversation
https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065
None
0
void Part::slotWatchedFileModified(const QString& file) { qCDebug(ARK) << "Watched file modified:" << file; QString relPath = file; foreach (QTemporaryDir *tmpDir, m_tmpExtractDirList) { relPath.remove(tmpDir->path()); //Remove tmpDir. } relPath = relPath.mid(1); //Remove leading slash. ...
146,675,568,808,700,330,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2017-5330
ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications.
https://nvd.nist.gov/vuln/detail/CVE-2017-5330
16,698
kde
82fdfd24d46966a117fa625b68784735a40f9065
https://cgit.kde.org/konversation
https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065
None
0
void Part::updateActions() { bool isWritable = m_model->archive() && !m_model->archive()->isReadOnly(); const Archive::Entry *entry = m_model->entryForIndex(m_view->selectionModel()->currentIndex()); int selectedEntriesCount = m_view->selectionModel()->selectedRows().count(); const bool isEncryptedButU...
283,531,091,775,457,200,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2017-5330
ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications.
https://nvd.nist.gov/vuln/detail/CVE-2017-5330
16,699
kde
82fdfd24d46966a117fa625b68784735a40f9065
https://cgit.kde.org/konversation
https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065
None
0
void Part::updateQuickExtractMenu(QAction *extractAction) { if (!extractAction) { return; } QMenu *menu = extractAction->menu(); if (!menu) { menu = new QMenu(); extractAction->setMenu(menu); connect(menu, &QMenu::triggered, this, &Part::slotQuickExtract...
240,874,699,117,064,250,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2017-5330
ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications.
https://nvd.nist.gov/vuln/detail/CVE-2017-5330
16,700
kde
82fdfd24d46966a117fa625b68784735a40f9065
https://cgit.kde.org/konversation
https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065
None
0
Part::~Part() { qDeleteAll(m_tmpExtractDirList); if (m_showInfoPanelAction->isChecked()) { ArkSettings::setSplitterSizes(m_splitter->sizes()); } ArkSettings::setShowInfoPanel(m_showInfoPanelAction->isChecked()); ArkSettings::self()->save(); m_extractArchiveAction->menu()->deleteLater()...
118,849,620,974,151,510,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2017-5330
ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications.
https://nvd.nist.gov/vuln/detail/CVE-2017-5330
16,772
savannah
888cd1843e935fe675cf2ac303116d4ed5b9d54b
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b
None
0
Compute_Funcs( EXEC_OP ) { #ifdef TT_CONFIG_OPTION_UNPATENTED_HINTING if ( CUR.face->unpatented_hinting ) { /* If both vectors point rightwards along the x axis, set */ /* `both-x-axis' true, otherwise set it false. The x values only */ /* need be tested because the vector...
147,774,501,879,270,560,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2010-2520
Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2010-2520
16,773
savannah
888cd1843e935fe675cf2ac303116d4ed5b9d54b
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b
None
0
Compute_Point_Displacement( EXEC_OP_ FT_F26Dot6* x, FT_F26Dot6* y, TT_GlyphZone zone, FT_UShort* refp ) { TT_GlyphZoneRec zp; FT_UShort p; FT_F26Dot6 d; if ( C...
69,573,323,490,834,910,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2010-2520
Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2010-2520
16,774
savannah
888cd1843e935fe675cf2ac303116d4ed5b9d54b
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b
None
0
Compute_Round( EXEC_OP_ FT_Byte round_mode ) { switch ( round_mode ) { case TT_Round_Off: CUR.func_round = (TT_Round_Func)Round_None; break; case TT_Round_To_Grid: CUR.func_round = (TT_Round_Func)Round_To_Grid; break; case TT_Round_Up_To_Grid: CUR.func_round = (T...
118,887,187,068,887,480,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2010-2520
Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2010-2520
16,775
savannah
888cd1843e935fe675cf2ac303116d4ed5b9d54b
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b
None
0
Current_Ppem( EXEC_OP ) { return TT_MULFIX( CUR.tt_metrics.ppem, CURRENT_Ratio() ); }
234,450,057,747,079,660,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2010-2520
Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2010-2520
16,776
savannah
888cd1843e935fe675cf2ac303116d4ed5b9d54b
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b
None
0
Direct_Move( EXEC_OP_ TT_GlyphZone zone, FT_UShort point, FT_F26Dot6 distance ) { FT_F26Dot6 v; #ifdef TT_CONFIG_OPTION_UNPATENTED_HINTING FT_ASSERT( !CUR.face->unpatented_hinting ); #endif v = CUR.GS.freeVector.x; if ( v != 0 ) { ...
173,075,100,007,308,230,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2010-2520
Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2010-2520
16,777
savannah
888cd1843e935fe675cf2ac303116d4ed5b9d54b
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b
None
0
Direct_Move_Orig( EXEC_OP_ TT_GlyphZone zone, FT_UShort point, FT_F26Dot6 distance ) { FT_F26Dot6 v; #ifdef TT_CONFIG_OPTION_UNPATENTED_HINTING FT_ASSERT( !CUR.face->unpatented_hinting ); #endif v = CUR.GS.freeVector.x; if ( v !=...
115,328,060,235,239,450,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2010-2520
Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2010-2520
16,778
savannah
888cd1843e935fe675cf2ac303116d4ed5b9d54b
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b
None
0
Direct_Move_Orig_X( EXEC_OP_ TT_GlyphZone zone, FT_UShort point, FT_F26Dot6 distance ) { FT_UNUSED_EXEC; zone->org[point].x += distance; }
149,890,833,964,219,740,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2010-2520
Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2010-2520
16,779
savannah
888cd1843e935fe675cf2ac303116d4ed5b9d54b
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b
None
0
Direct_Move_Orig_Y( EXEC_OP_ TT_GlyphZone zone, FT_UShort point, FT_F26Dot6 distance ) { FT_UNUSED_EXEC; zone->org[point].y += distance; }
202,693,659,171,452,450,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2010-2520
Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2010-2520
16,780
savannah
888cd1843e935fe675cf2ac303116d4ed5b9d54b
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b
None
0
Direct_Move_Y( EXEC_OP_ TT_GlyphZone zone, FT_UShort point, FT_F26Dot6 distance ) { FT_UNUSED_EXEC; zone->cur[point].y += distance; zone->tags[point] |= FT_CURVE_TAG_TOUCH_Y; }
138,549,412,100,293,140,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2010-2520
Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2010-2520
16,781
savannah
888cd1843e935fe675cf2ac303116d4ed5b9d54b
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b
None
0
Dual_Project( EXEC_OP_ FT_Pos dx, FT_Pos dy ) { return TT_DotFix14( (FT_UInt32)dx, (FT_UInt32)dy, CUR.GS.dualVector.x, CUR.GS.dualVector.y ); }
253,557,196,161,345,540,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2010-2520
Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2010-2520
16,782
savannah
888cd1843e935fe675cf2ac303116d4ed5b9d54b
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b
None
0
GetShortIns( EXEC_OP ) { /* Reading a byte stream so there is no endianess (DaveP) */ CUR.IP += 2; return (FT_Short)( ( CUR.code[CUR.IP - 2] << 8 ) + CUR.code[CUR.IP - 1] ); }
54,436,406,764,873,560,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2010-2520
Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2010-2520
16,783
savannah
888cd1843e935fe675cf2ac303116d4ed5b9d54b
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b
None
0
Ins_ABS( INS_ARG ) { DO_ABS }
3,152,149,191,227,371,300,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2010-2520
Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2010-2520
16,784
savannah
888cd1843e935fe675cf2ac303116d4ed5b9d54b
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b
None
0
Ins_ADD( INS_ARG ) { DO_ADD }
180,646,341,201,924,170,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2010-2520
Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2010-2520
16,785
savannah
888cd1843e935fe675cf2ac303116d4ed5b9d54b
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b
None
0
Ins_ALIGNPTS( INS_ARG ) { FT_UShort p1, p2; FT_F26Dot6 distance; p1 = (FT_UShort)args[0]; p2 = (FT_UShort)args[1]; if ( BOUNDS( args[0], CUR.zp1.n_points ) || BOUNDS( args[1], CUR.zp0.n_points ) ) { if ( CUR.pedantic_hinting ) CUR.error = TT_Err_Invalid_Reference...
235,056,026,014,116,520,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2010-2520
Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2010-2520
16,786
savannah
888cd1843e935fe675cf2ac303116d4ed5b9d54b
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b
None
0
Ins_ALIGNRP( INS_ARG ) { FT_UShort point; FT_F26Dot6 distance; FT_UNUSED_ARG; if ( CUR.top < CUR.GS.loop || BOUNDS( CUR.GS.rp0, CUR.zp0.n_points ) ) { if ( CUR.pedantic_hinting ) CUR.error = TT_Err_Invalid_Reference; return; } while ( CUR.GS.loop > 0 )...
118,441,631,930,269,970,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2010-2520
Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2010-2520
16,787
savannah
888cd1843e935fe675cf2ac303116d4ed5b9d54b
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b
None
0
Ins_AND( INS_ARG ) { DO_AND }
43,636,974,186,518,350,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2010-2520
Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2010-2520
16,788
savannah
888cd1843e935fe675cf2ac303116d4ed5b9d54b
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b
None
0
Ins_CALL( INS_ARG ) { FT_ULong F; TT_CallRec* pCrec; TT_DefRecord* def; /* first of all, check the index */ F = args[0]; if ( BOUNDS( F, CUR.maxFunc + 1 ) ) goto Fail; /* Except for some old Apple fonts, all functions in a TrueType */ /* font are defined in increa...
163,954,103,415,549,830,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2010-2520
Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2010-2520
16,789
savannah
888cd1843e935fe675cf2ac303116d4ed5b9d54b
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b
None
0
Ins_CEILING( INS_ARG ) { DO_CEILING }
275,651,053,594,954,060,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2010-2520
Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2010-2520
16,790
savannah
888cd1843e935fe675cf2ac303116d4ed5b9d54b
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b
None
0
Ins_CINDEX( INS_ARG ) { DO_CINDEX }
47,694,059,742,221,440,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2010-2520
Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2010-2520