idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
16,620 | haproxy | b4d05093bc89f71377230228007e69a1434c1a0c | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c | None | 0 | smp_fetch_url32(struct proxy *px, struct session *l4, void *l7, unsigned int opt,
const struct arg *args, struct sample *smp, const char *kw)
{
struct http_txn *txn = l7;
struct hdr_ctx ctx;
unsigned int hash = 0;
char *ptr, *beg, *end;
int len;
CHECK_HTTP_MESSAGE_FIRST();
ctx.idx = 0;
if (ht... | 205,679,095,756,904,200,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2014-6269 | Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read. | https://nvd.nist.gov/vuln/detail/CVE-2014-6269 |
16,621 | haproxy | b4d05093bc89f71377230228007e69a1434c1a0c | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c | None | 0 | smp_fetch_url32_src(struct proxy *px, struct session *l4, void *l7, unsigned int opt,
const struct arg *args, struct sample *smp, const char *kw)
{
struct chunk *temp;
struct connection *cli_conn = objt_conn(l4->si[0].end);
if (!smp_fetch_url32(px, l4, l7, opt, args, smp, kw))
return 0;
tem... | 90,136,889,296,629,160,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2014-6269 | Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read. | https://nvd.nist.gov/vuln/detail/CVE-2014-6269 |
16,622 | haproxy | b4d05093bc89f71377230228007e69a1434c1a0c | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c | None | 0 | smp_fetch_url_ip(struct proxy *px, struct session *l4, void *l7, unsigned int opt,
const struct arg *args, struct sample *smp, const char *kw)
{
struct http_txn *txn = l7;
struct sockaddr_storage addr;
CHECK_HTTP_MESSAGE_FIRST();
url2sa(txn->req.chn->buf->p + txn->req.sl.rq.u, txn->req.sl.rq.u_l,... | 277,613,824,858,638,300,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2014-6269 | Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read. | https://nvd.nist.gov/vuln/detail/CVE-2014-6269 |
16,623 | haproxy | b4d05093bc89f71377230228007e69a1434c1a0c | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c | None | 0 | smp_fetch_url_param(struct proxy *px, struct session *l4, void *l7, unsigned int opt,
const struct arg *args, struct sample *smp, const char *kw)
{
char delim = '?';
struct http_txn *txn = l7;
struct http_msg *msg = &txn->req;
if (!args || args[0].type != ARGT_STR ||
(args[1].type && args[... | 245,418,117,079,871,200,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2014-6269 | Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read. | https://nvd.nist.gov/vuln/detail/CVE-2014-6269 |
16,624 | haproxy | b4d05093bc89f71377230228007e69a1434c1a0c | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c | None | 0 | smp_fetch_url_param_val(struct proxy *px, struct session *l4, void *l7, unsigned int opt,
const struct arg *args, struct sample *smp, const char *kw)
{
int ret = smp_fetch_url_param(px, l4, l7, opt, args, smp, kw);
if (ret > 0) {
smp->type = SMP_T_UINT;
smp->data.uint = strl2ic(smp->data.str... | 49,680,327,280,110,970,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2014-6269 | Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read. | https://nvd.nist.gov/vuln/detail/CVE-2014-6269 |
16,625 | haproxy | b4d05093bc89f71377230228007e69a1434c1a0c | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c | None | 0 | smp_fetch_url_port(struct proxy *px, struct session *l4, void *l7, unsigned int opt,
const struct arg *args, struct sample *smp, const char *kw)
{
struct http_txn *txn = l7;
struct sockaddr_storage addr;
CHECK_HTTP_MESSAGE_FIRST();
url2sa(txn->req.chn->buf->p + txn->req.sl.rq.u, txn->req.sl.rq.... | 31,007,330,068,298,580,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2014-6269 | Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read. | https://nvd.nist.gov/vuln/detail/CVE-2014-6269 |
16,626 | haproxy | b4d05093bc89f71377230228007e69a1434c1a0c | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c | None | 0 | smp_prefetch_http(struct proxy *px, struct session *s, void *l7, unsigned int opt,
const struct arg *args, struct sample *smp, int req_vol)
{
struct http_txn *txn = l7;
struct http_msg *msg = &txn->req;
/* Note: hdr_idx.v cannot be NULL in this ACL because the ACL is tagged
* as a layer7 ACL, wh... | 14,568,597,337,753,424,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2014-6269 | Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read. | https://nvd.nist.gov/vuln/detail/CVE-2014-6269 |
16,627 | haproxy | b4d05093bc89f71377230228007e69a1434c1a0c | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c | None | 0 | static int val_hdr(struct arg *arg, char **err_msg)
{
if (arg && arg[1].type == ARGT_SINT && arg[1].data.sint < -MAX_HDR_HISTORY) {
memprintf(err_msg, "header occurrence must be >= %d", -MAX_HDR_HISTORY);
return 0;
}
return 1;
}
| 40,242,024,808,121,174,000,000,000,000,000,000,000 | proto_http.c | 303,284,703,978,098,730,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2014-6269 | Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read. | https://nvd.nist.gov/vuln/detail/CVE-2014-6269 |
16,628 | haproxy | b4d05093bc89f71377230228007e69a1434c1a0c | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c | None | 0 | int conn_si_send_proxy(struct connection *conn, unsigned int flag)
{
/* we might have been called just after an asynchronous shutw */
if (conn->flags & CO_FL_SOCK_WR_SH)
goto out_error;
if (!conn_ctrl_ready(conn))
goto out_error;
if (!fd_send_ready(conn->t.sock.fd))
goto out_wait;
/* If we have a PROXY li... | 248,947,085,375,008,350,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2014-6269 | Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read. | https://nvd.nist.gov/vuln/detail/CVE-2014-6269 |
16,629 | haproxy | b4d05093bc89f71377230228007e69a1434c1a0c | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c | None | 0 | static void si_conn_recv_cb(struct connection *conn)
{
struct stream_interface *si = conn->owner;
struct channel *chn = si->ib;
int ret, max, cur_read;
int read_poll = MAX_READ_POLL_LOOPS;
/* stop immediately on errors. Note that we DON'T want to stop on
* POLL_ERR, as the poller might report a write error whil... | 79,771,262,028,576,930,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2014-6269 | Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read. | https://nvd.nist.gov/vuln/detail/CVE-2014-6269 |
16,630 | haproxy | b4d05093bc89f71377230228007e69a1434c1a0c | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c | None | 0 | static void si_conn_send_cb(struct connection *conn)
{
struct stream_interface *si = conn->owner;
struct channel *chn = si->ob;
if (conn->flags & CO_FL_ERROR)
return;
if (conn->flags & CO_FL_HANDSHAKE)
/* a handshake was requested */
return;
/* we might have been called just after an asynchronous shutw */... | 261,820,388,320,953,330,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2014-6269 | Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read. | https://nvd.nist.gov/vuln/detail/CVE-2014-6269 |
16,631 | haproxy | b4d05093bc89f71377230228007e69a1434c1a0c | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c | None | 0 | static int si_conn_wake_cb(struct connection *conn)
{
struct stream_interface *si = conn->owner;
DPRINTF(stderr, "%s: si=%p, si->state=%d ib->flags=%08x ob->flags=%08x\n",
__FUNCTION__,
si, si->state, si->ib->flags, si->ob->flags);
if (conn->flags & CO_FL_ERROR)
si->flags |= SI_FL_ERR;
/* check for recent ... | 298,220,579,348,267,300,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2014-6269 | Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read. | https://nvd.nist.gov/vuln/detail/CVE-2014-6269 |
16,632 | haproxy | b4d05093bc89f71377230228007e69a1434c1a0c | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c | None | 0 | static void si_idle_conn_null_cb(struct connection *conn)
{
if (conn->flags & (CO_FL_ERROR | CO_FL_SOCK_RD_SH))
return;
if (fdtab[conn->t.sock.fd].ev & (FD_POLL_ERR|FD_POLL_HUP)) {
fdtab[conn->t.sock.fd].linger_risk = 0;
conn->flags |= CO_FL_SOCK_RD_SH;
}
else {
conn_drain(conn);
}
/* disable draining i... | 271,977,221,360,518,700,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2014-6269 | Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read. | https://nvd.nist.gov/vuln/detail/CVE-2014-6269 |
16,633 | haproxy | b4d05093bc89f71377230228007e69a1434c1a0c | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c | None | 0 | int stream_int_check_timeouts(struct stream_interface *si)
{
if (tick_is_expired(si->exp, now_ms)) {
si->flags |= SI_FL_EXP;
return 1;
}
return 0;
}
| 243,798,582,576,004,660,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2014-6269 | Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read. | https://nvd.nist.gov/vuln/detail/CVE-2014-6269 |
16,634 | haproxy | b4d05093bc89f71377230228007e69a1434c1a0c | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c | None | 0 | static void stream_int_chk_rcv(struct stream_interface *si)
{
struct channel *ib = si->ib;
DPRINTF(stderr, "%s: si=%p, si->state=%d ib->flags=%08x ob->flags=%08x\n",
__FUNCTION__,
si, si->state, si->ib->flags, si->ob->flags);
if (unlikely(si->state != SI_ST_EST || (ib->flags & (CF_SHUTR|CF_DONT_READ))))
retu... | 156,785,053,247,529,880,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2014-6269 | Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read. | https://nvd.nist.gov/vuln/detail/CVE-2014-6269 |
16,635 | haproxy | b4d05093bc89f71377230228007e69a1434c1a0c | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c | None | 0 | static void stream_int_chk_rcv_conn(struct stream_interface *si)
{
struct channel *ib = si->ib;
struct connection *conn = __objt_conn(si->end);
if (unlikely(si->state > SI_ST_EST || (ib->flags & CF_SHUTR)))
return;
conn_refresh_polling_flags(conn);
if ((ib->flags & CF_DONT_READ) || channel_full(ib)) {
/* st... | 261,472,872,092,206,860,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2014-6269 | Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read. | https://nvd.nist.gov/vuln/detail/CVE-2014-6269 |
16,636 | haproxy | b4d05093bc89f71377230228007e69a1434c1a0c | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c | None | 0 | static void stream_int_chk_snd(struct stream_interface *si)
{
struct channel *ob = si->ob;
DPRINTF(stderr, "%s: si=%p, si->state=%d ib->flags=%08x ob->flags=%08x\n",
__FUNCTION__,
si, si->state, si->ib->flags, si->ob->flags);
if (unlikely(si->state != SI_ST_EST || (si->ob->flags & CF_SHUTW)))
return;
if (!... | 178,268,301,692,853,160,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2014-6269 | Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read. | https://nvd.nist.gov/vuln/detail/CVE-2014-6269 |
16,637 | haproxy | b4d05093bc89f71377230228007e69a1434c1a0c | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c | None | 0 | static void stream_int_chk_snd_conn(struct stream_interface *si)
{
struct channel *ob = si->ob;
struct connection *conn = __objt_conn(si->end);
if (unlikely(si->state > SI_ST_EST || (ob->flags & CF_SHUTW)))
return;
if (unlikely(channel_is_empty(ob))) /* called with nothing to send ! */
return;
if (!ob->pip... | 8,558,186,338,250,673,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2014-6269 | Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read. | https://nvd.nist.gov/vuln/detail/CVE-2014-6269 |
16,638 | haproxy | b4d05093bc89f71377230228007e69a1434c1a0c | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c | None | 0 | struct appctx *stream_int_register_handler(struct stream_interface *si, struct si_applet *app)
{
struct appctx *appctx;
DPRINTF(stderr, "registering handler %p for si %p (was %p)\n", app, si, si->owner);
appctx = si_alloc_appctx(si);
if (!si)
return NULL;
appctx_set_applet(appctx, app);
si->flags |= SI_FL_WA... | 322,510,286,589,632,100,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2014-6269 | Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read. | https://nvd.nist.gov/vuln/detail/CVE-2014-6269 |
16,639 | haproxy | b4d05093bc89f71377230228007e69a1434c1a0c | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c | None | 0 | void stream_int_report_error(struct stream_interface *si)
{
if (!si->err_type)
si->err_type = SI_ET_DATA_ERR;
si->ob->flags |= CF_WRITE_ERROR;
si->ib->flags |= CF_READ_ERROR;
}
| 34,735,072,298,281,025,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2014-6269 | Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read. | https://nvd.nist.gov/vuln/detail/CVE-2014-6269 |
16,640 | haproxy | b4d05093bc89f71377230228007e69a1434c1a0c | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c | None | 0 | static void stream_int_shutr(struct stream_interface *si)
{
si->ib->flags &= ~CF_SHUTR_NOW;
if (si->ib->flags & CF_SHUTR)
return;
si->ib->flags |= CF_SHUTR;
si->ib->rex = TICK_ETERNITY;
si->flags &= ~SI_FL_WAIT_ROOM;
if (si->state != SI_ST_EST && si->state != SI_ST_CON)
return;
if (si->ob->flags & CF_SHUTW... | 317,441,180,397,121,300,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2014-6269 | Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read. | https://nvd.nist.gov/vuln/detail/CVE-2014-6269 |
16,641 | haproxy | b4d05093bc89f71377230228007e69a1434c1a0c | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c | None | 0 | static void stream_int_shutr_conn(struct stream_interface *si)
{
struct connection *conn = __objt_conn(si->end);
si->ib->flags &= ~CF_SHUTR_NOW;
if (si->ib->flags & CF_SHUTR)
return;
si->ib->flags |= CF_SHUTR;
si->ib->rex = TICK_ETERNITY;
si->flags &= ~SI_FL_WAIT_ROOM;
if (si->state != SI_ST_EST && si->state... | 49,890,463,138,424,330,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2014-6269 | Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read. | https://nvd.nist.gov/vuln/detail/CVE-2014-6269 |
16,642 | haproxy | b4d05093bc89f71377230228007e69a1434c1a0c | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c | None | 0 | static void stream_int_shutw(struct stream_interface *si)
{
si->ob->flags &= ~CF_SHUTW_NOW;
if (si->ob->flags & CF_SHUTW)
return;
si->ob->flags |= CF_SHUTW;
si->ob->wex = TICK_ETERNITY;
si->flags &= ~SI_FL_WAIT_DATA;
switch (si->state) {
case SI_ST_EST:
/* we have to shut before closing, otherwise some shor... | 168,866,335,188,442,830,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2014-6269 | Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read. | https://nvd.nist.gov/vuln/detail/CVE-2014-6269 |
16,643 | haproxy | b4d05093bc89f71377230228007e69a1434c1a0c | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c | None | 0 | static void stream_int_shutw_conn(struct stream_interface *si)
{
struct connection *conn = __objt_conn(si->end);
si->ob->flags &= ~CF_SHUTW_NOW;
if (si->ob->flags & CF_SHUTW)
return;
si->ob->flags |= CF_SHUTW;
si->ob->wex = TICK_ETERNITY;
si->flags &= ~SI_FL_WAIT_DATA;
switch (si->state) {
case SI_ST_EST:
... | 97,472,517,591,484,340,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2014-6269 | Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read. | https://nvd.nist.gov/vuln/detail/CVE-2014-6269 |
16,644 | haproxy | b4d05093bc89f71377230228007e69a1434c1a0c | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c | None | 0 | void stream_int_unregister_handler(struct stream_interface *si)
{
si_detach(si);
}
| 204,216,124,176,024,140,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2014-6269 | Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read. | https://nvd.nist.gov/vuln/detail/CVE-2014-6269 |
16,645 | haproxy | b4d05093bc89f71377230228007e69a1434c1a0c | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c | None | 0 | static void stream_int_update_embedded(struct stream_interface *si)
{
int old_flags = si->flags;
DPRINTF(stderr, "%s: si=%p, si->state=%d ib->flags=%08x ob->flags=%08x\n",
__FUNCTION__,
si, si->state, si->ib->flags, si->ob->flags);
if (si->state != SI_ST_EST)
return;
if ((si->ob->flags & (CF_SHUTW|CF_SHUTW... | 69,962,292,764,006,160,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2014-6269 | Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read. | https://nvd.nist.gov/vuln/detail/CVE-2014-6269 |
16,646 | haproxy | b4d05093bc89f71377230228007e69a1434c1a0c | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c | None | 0 | void stream_sock_read0(struct stream_interface *si)
{
struct connection *conn = __objt_conn(si->end);
si->ib->flags &= ~CF_SHUTR_NOW;
if (si->ib->flags & CF_SHUTR)
return;
si->ib->flags |= CF_SHUTR;
si->ib->rex = TICK_ETERNITY;
si->flags &= ~SI_FL_WAIT_ROOM;
if (si->state != SI_ST_EST && si->state != SI_ST_C... | 166,947,135,910,960,000,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2014-6269 | Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read. | https://nvd.nist.gov/vuln/detail/CVE-2014-6269 |
16,647 | kde | 82fdfd24d46966a117fa625b68784735a40f9065 | https://cgit.kde.org/konversation | https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065 | None | 0 | Part::Part(QWidget *parentWidget, QObject *parent, const QVariantList& args)
: KParts::ReadWritePart(parent),
m_splitter(Q_NULLPTR),
m_busy(false),
m_jobTracker(Q_NULLPTR)
{
Q_UNUSED(args)
KAboutData aboutData(QStringLiteral("ark"),
i18n("ArkPart"),... | 251,468,034,058,775,200,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2017-5330 | ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications. | https://nvd.nist.gov/vuln/detail/CVE-2017-5330 |
16,648 | kde | 82fdfd24d46966a117fa625b68784735a40f9065 | https://cgit.kde.org/konversation | https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065 | None | 0 | QModelIndexList Part::addChildren(const QModelIndexList &list) const
{
Q_ASSERT(m_model);
QModelIndexList ret = list;
for (int i = 0; i < ret.size(); ++i) {
QModelIndex index = ret.at(i);
for (int j = 0; j < m_model->rowCount(index); ++j) {
QModelIndex child = m_model->index(j... | 331,206,385,497,380,670,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2017-5330 | ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications. | https://nvd.nist.gov/vuln/detail/CVE-2017-5330 |
16,649 | kde | 82fdfd24d46966a117fa625b68784735a40f9065 | https://cgit.kde.org/konversation | https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065 | None | 0 | KConfigSkeleton *Part::config() const
{
return ArkSettings::self();
}
| 201,749,481,635,651,970,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2017-5330 | ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications. | https://nvd.nist.gov/vuln/detail/CVE-2017-5330 |
16,650 | kde | 82fdfd24d46966a117fa625b68784735a40f9065 | https://cgit.kde.org/konversation | https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065 | None | 0 | bool Part::confirmAndDelete(const QString &targetFile)
{
QFileInfo targetInfo(targetFile);
const auto buttonCode = KMessageBox::warningYesNo(widget(),
xi18nc("@info",
"The archive <filename>%1</fil... | 221,977,610,546,509,250,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2017-5330 | ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications. | https://nvd.nist.gov/vuln/detail/CVE-2017-5330 |
16,651 | kde | 82fdfd24d46966a117fa625b68784735a40f9065 | https://cgit.kde.org/konversation | https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065 | None | 0 | void Part::createArchive()
{
const QString fixedMimeType = arguments().metaData()[QStringLiteral("fixedMimeType")];
m_model->createEmptyArchive(localFilePath(), fixedMimeType, m_model);
if (arguments().metaData().contains(QStringLiteral("volumeSize"))) {
m_model->archive()->setMultiVolume(true);
... | 95,379,347,884,272,810,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2017-5330 | ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications. | https://nvd.nist.gov/vuln/detail/CVE-2017-5330 |
16,652 | kde | 82fdfd24d46966a117fa625b68784735a40f9065 | https://cgit.kde.org/konversation | https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065 | None | 0 | QString Part::detectSubfolder() const
{
if (!m_model) {
return QString();
}
return m_model->archive()->subfolderName();
}
| 134,109,075,615,103,600,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2017-5330 | ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications. | https://nvd.nist.gov/vuln/detail/CVE-2017-5330 |
16,653 | kde | 82fdfd24d46966a117fa625b68784735a40f9065 | https://cgit.kde.org/konversation | https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065 | None | 0 | void Part::displayMsgWidget(KMessageWidget::MessageType type, const QString& msg)
{
m_messageWidget->hide();
m_messageWidget->setText(msg);
m_messageWidget->setMessageType(type);
m_messageWidget->animatedShow();
}
| 202,055,690,159,534,500,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2017-5330 | ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications. | https://nvd.nist.gov/vuln/detail/CVE-2017-5330 |
16,654 | kde | 82fdfd24d46966a117fa625b68784735a40f9065 | https://cgit.kde.org/konversation | https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065 | None | 0 | void Part::extractSelectedFilesTo(const QString& localPath)
{
if (!m_model) {
return;
}
const QUrl url = QUrl::fromUserInput(localPath, QString());
KIO::StatJob* statJob = nullptr;
if (!url.isLocalFile() && !url.scheme().isEmpty()) {
statJob = KIO::mostLocalUrl(url);
if (!... | 337,326,601,073,562,330,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2017-5330 | ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications. | https://nvd.nist.gov/vuln/detail/CVE-2017-5330 |
16,655 | kde | 82fdfd24d46966a117fa625b68784735a40f9065 | https://cgit.kde.org/konversation | https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065 | None | 0 | QVector<Kerfuffle::Archive::Entry*> Part::filesAndRootNodesForIndexes(const QModelIndexList& list) const
{
QVector<Kerfuffle::Archive::Entry*> fileList;
QStringList fullPathsList;
foreach (const QModelIndex& index, list) {
QModelIndex selectionRoot = index.parent();
while (m_view->selectio... | 124,645,271,099,178,350,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2017-5330 | ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications. | https://nvd.nist.gov/vuln/detail/CVE-2017-5330 |
16,656 | kde | 82fdfd24d46966a117fa625b68784735a40f9065 | https://cgit.kde.org/konversation | https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065 | None | 0 | QVector<Archive::Entry*> Part::filesForIndexes(const QModelIndexList& list) const
{
QVector<Archive::Entry*> ret;
foreach(const QModelIndex& index, list) {
ret << m_model->entryForIndex(index);
}
return ret;
}
| 3,194,488,017,731,979,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2017-5330 | ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications. | https://nvd.nist.gov/vuln/detail/CVE-2017-5330 |
16,657 | kde | 82fdfd24d46966a117fa625b68784735a40f9065 | https://cgit.kde.org/konversation | https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065 | None | 0 | void Part::guiActivateEvent(KParts::GUIActivateEvent *event)
{
Q_UNUSED(event)
}
| 268,184,291,205,119,250,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2017-5330 | ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications. | https://nvd.nist.gov/vuln/detail/CVE-2017-5330 |
16,658 | kde | 82fdfd24d46966a117fa625b68784735a40f9065 | https://cgit.kde.org/konversation | https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065 | None | 0 | bool Part::isBusy() const
{
return m_busy;
}
| 232,151,582,637,560,430,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2017-5330 | ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications. | https://nvd.nist.gov/vuln/detail/CVE-2017-5330 |
16,659 | kde | 82fdfd24d46966a117fa625b68784735a40f9065 | https://cgit.kde.org/konversation | https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065 | None | 0 | bool Part::isLocalFileValid()
{
const QString localFile = localFilePath();
const QFileInfo localFileInfo(localFile);
const bool creatingNewArchive = arguments().metaData()[QStringLiteral("createNewArchive")] == QLatin1String("true");
if (localFileInfo.isDir()) {
displayMsgWidget(KMessageWidget:... | 122,623,617,478,436,060,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2017-5330 | ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications. | https://nvd.nist.gov/vuln/detail/CVE-2017-5330 |
16,660 | kde | 82fdfd24d46966a117fa625b68784735a40f9065 | https://cgit.kde.org/konversation | https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065 | None | 0 | bool Part::isSingleFolderArchive() const
{
return m_model->archive()->isSingleFolder();
}
| 255,153,970,750,368,730,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2017-5330 | ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications. | https://nvd.nist.gov/vuln/detail/CVE-2017-5330 |
16,661 | kde | 82fdfd24d46966a117fa625b68784735a40f9065 | https://cgit.kde.org/konversation | https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065 | None | 0 | void Part::loadArchive()
{
const QString fixedMimeType = arguments().metaData()[QStringLiteral("fixedMimeType")];
auto job = m_model->loadArchive(localFilePath(), fixedMimeType, m_model);
if (job) {
registerJob(job);
job->start();
} else {
updateActions();
}
}
| 337,187,212,192,758,450,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2017-5330 | ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications. | https://nvd.nist.gov/vuln/detail/CVE-2017-5330 |
16,662 | kde | 82fdfd24d46966a117fa625b68784735a40f9065 | https://cgit.kde.org/konversation | https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065 | None | 0 | bool Part::openFile()
{
qCDebug(ARK) << "Attempting to open archive" << localFilePath();
resetGui();
if (!isLocalFileValid()) {
return false;
}
const bool creatingNewArchive = arguments().metaData()[QStringLiteral("createNewArchive")] == QLatin1String("true");
if (creatingNewArchive)... | 76,369,592,583,999,330,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2017-5330 | ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications. | https://nvd.nist.gov/vuln/detail/CVE-2017-5330 |
16,663 | kde | 82fdfd24d46966a117fa625b68784735a40f9065 | https://cgit.kde.org/konversation | https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065 | None | 0 | void Part::registerJob(KJob* job)
{
if (!m_jobTracker) {
m_jobTracker = new JobTracker(widget());
m_statusBarExtension->addStatusBarItem(m_jobTracker->widget(0), 0, true);
m_jobTracker->widget(job)->show();
}
m_jobTracker->registerJob(job);
emit busy();
connect(job, &KJob::r... | 337,785,651,142,644,550,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2017-5330 | ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications. | https://nvd.nist.gov/vuln/detail/CVE-2017-5330 |
16,664 | kde | 82fdfd24d46966a117fa625b68784735a40f9065 | https://cgit.kde.org/konversation | https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065 | None | 0 | void Part::resetGui()
{
m_messageWidget->hide();
m_commentView->clear();
m_commentBox->hide();
m_infoPanel->setIndex(QModelIndex());
m_compressionOptions = CompressionOptions();
}
| 39,020,248,617,986,065,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2017-5330 | ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications. | https://nvd.nist.gov/vuln/detail/CVE-2017-5330 |
16,665 | kde | 82fdfd24d46966a117fa625b68784735a40f9065 | https://cgit.kde.org/konversation | https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065 | None | 0 | bool Part::saveFile()
{
return true;
}
| 295,245,351,582,778,440,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2017-5330 | ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications. | https://nvd.nist.gov/vuln/detail/CVE-2017-5330 |
16,666 | kde | 82fdfd24d46966a117fa625b68784735a40f9065 | https://cgit.kde.org/konversation | https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065 | None | 0 | void Part::selectionChanged()
{
m_infoPanel->setIndexes(m_view->selectionModel()->selectedRows());
}
| 58,485,768,481,358,750,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2017-5330 | ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications. | https://nvd.nist.gov/vuln/detail/CVE-2017-5330 |
16,667 | kde | 82fdfd24d46966a117fa625b68784735a40f9065 | https://cgit.kde.org/konversation | https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065 | None | 0 | void Part::setFileNameFromArchive()
{
const QString prettyName = url().fileName();
m_infoPanel->setPrettyFileName(prettyName);
m_infoPanel->updateWithDefaults();
emit setWindowCaption(prettyName);
}
| 93,654,102,534,329,160,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2017-5330 | ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications. | https://nvd.nist.gov/vuln/detail/CVE-2017-5330 |
16,668 | kde | 82fdfd24d46966a117fa625b68784735a40f9065 | https://cgit.kde.org/konversation | https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065 | None | 0 | void Part::setReadyGui()
{
QApplication::restoreOverrideCursor();
m_busy = false;
if (m_statusBarExtension->statusBar()) {
m_statusBarExtension->statusBar()->hide();
}
m_view->setEnabled(true);
updateActions();
}
| 249,884,088,607,259,020,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2017-5330 | ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications. | https://nvd.nist.gov/vuln/detail/CVE-2017-5330 |
16,669 | kde | 82fdfd24d46966a117fa625b68784735a40f9065 | https://cgit.kde.org/konversation | https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065 | None | 0 | QList<Kerfuffle::SettingsPage*> Part::settingsPages(QWidget *parent) const
{
QList<SettingsPage*> pages;
pages.append(new GeneralSettingsPage(parent, i18nc("@title:tab", "General Settings"), QStringLiteral("go-home")));
pages.append(new ExtractionSettingsPage(parent, i18nc("@title:tab", "Extraction Settings... | 20,244,579,530,741,860,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2017-5330 | ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications. | https://nvd.nist.gov/vuln/detail/CVE-2017-5330 |
16,670 | kde | 82fdfd24d46966a117fa625b68784735a40f9065 | https://cgit.kde.org/konversation | https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065 | None | 0 | void Part::setupActions()
{
m_signalMapper = new QSignalMapper(this);
m_showInfoPanelAction = new KToggleAction(i18nc("@action:inmenu", "Show Information Panel"), this);
actionCollection()->addAction(QStringLiteral( "show-infopanel" ), m_showInfoPanelAction);
m_showInfoPanelAction->setChecked(ArkSettin... | 205,920,556,013,402,330,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2017-5330 | ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications. | https://nvd.nist.gov/vuln/detail/CVE-2017-5330 |
16,671 | kde | 82fdfd24d46966a117fa625b68784735a40f9065 | https://cgit.kde.org/konversation | https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065 | None | 0 | void Part::setupView()
{
m_view->setContextMenuPolicy(Qt::CustomContextMenu);
m_view->setModel(m_model);
connect(m_view->selectionModel(), &QItemSelectionModel::selectionChanged,
this, &Part::updateActions);
connect(m_view->selectionModel(), &QItemSelectionModel::selectionChanged,
... | 273,822,624,414,863,560,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2017-5330 | ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications. | https://nvd.nist.gov/vuln/detail/CVE-2017-5330 |
16,672 | kde | 82fdfd24d46966a117fa625b68784735a40f9065 | https://cgit.kde.org/konversation | https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065 | None | 0 | void Part::slotActivated(const QModelIndex &index)
{
Q_UNUSED(index)
if (QGuiApplication::keyboardModifiers() != Qt::ShiftModifier &&
QGuiApplication::keyboardModifiers() != Qt::ControlModifier) {
ArkSettings::defaultOpenAction() == ArkSettings::EnumDefaultOpenAction::Preview ? slotOpenEntry(Pr... | 85,342,590,545,574,100,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2017-5330 | ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications. | https://nvd.nist.gov/vuln/detail/CVE-2017-5330 |
16,673 | kde | 82fdfd24d46966a117fa625b68784735a40f9065 | https://cgit.kde.org/konversation | https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065 | None | 0 | void Part::slotAddComment()
{
CommentJob *job = m_model->archive()->addComment(m_commentView->toPlainText());
if (!job) {
return;
}
registerJob(job);
job->start();
m_commentMsgWidget->hide();
if (m_commentView->toPlainText().isEmpty()) {
m_commentBox->hide();
}
}
| 150,078,216,208,209,500,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2017-5330 | ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications. | https://nvd.nist.gov/vuln/detail/CVE-2017-5330 |
16,674 | kde | 82fdfd24d46966a117fa625b68784735a40f9065 | https://cgit.kde.org/konversation | https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065 | None | 0 | void Part::slotAddFiles(const QStringList& filesToAdd, const Archive::Entry *destination, const QString &relPath)
{
if (!m_model->archive() || filesToAdd.isEmpty()) {
return;
}
QStringList withChildPaths;
foreach (const QString& file, filesToAdd) {
m_jobTempEntries.push_back(new Archive... | 189,379,588,791,022,600,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2017-5330 | ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications. | https://nvd.nist.gov/vuln/detail/CVE-2017-5330 |
16,675 | kde | 82fdfd24d46966a117fa625b68784735a40f9065 | https://cgit.kde.org/konversation | https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065 | None | 0 | void Part::slotAddFilesDone(KJob* job)
{
qDeleteAll(m_jobTempEntries);
m_jobTempEntries.clear();
if (job->error() && job->error() != KJob::KilledJobError) {
KMessageBox::error(widget(), job->errorString());
} else {
m_messageWidget->hide();
if (m_model->archive()->isMultiVolume(... | 236,183,445,773,499,000,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2017-5330 | ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications. | https://nvd.nist.gov/vuln/detail/CVE-2017-5330 |
16,676 | kde | 82fdfd24d46966a117fa625b68784735a40f9065 | https://cgit.kde.org/konversation | https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065 | None | 0 | void Part::slotCommentChanged()
{
if (!m_model->archive()) {
return;
}
if (m_commentMsgWidget->isHidden() && m_commentView->toPlainText() != m_model->archive()->comment()) {
m_commentMsgWidget->animatedShow();
} else if (m_commentMsgWidget->isVisible() && m_commentView->toPlainText() ==... | 210,766,502,926,358,400,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2017-5330 | ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications. | https://nvd.nist.gov/vuln/detail/CVE-2017-5330 |
16,677 | kde | 82fdfd24d46966a117fa625b68784735a40f9065 | https://cgit.kde.org/konversation | https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065 | None | 0 | void Part::slotCopyFiles()
{
m_model->filesToCopy = ArchiveModel::entryMap(filesForIndexes(addChildren(m_view->selectionModel()->selectedRows())));
qCDebug(ARK) << "Entries marked to copy:" << m_model->filesToCopy.values();
foreach (const QModelIndex &row, m_cutIndexes) {
m_view->dataChanged(row, ro... | 331,015,044,188,167,800,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2017-5330 | ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications. | https://nvd.nist.gov/vuln/detail/CVE-2017-5330 |
16,678 | kde | 82fdfd24d46966a117fa625b68784735a40f9065 | https://cgit.kde.org/konversation | https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065 | None | 0 | void Part::slotDeleteFiles()
{
const int selectionsCount = m_view->selectionModel()->selectedRows().count();
const auto reallyDelete =
KMessageBox::questionYesNo(widget(),
i18ncp("@info",
"Deleting this file is not undoable. Ar... | 206,718,776,533,498,500,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2017-5330 | ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications. | https://nvd.nist.gov/vuln/detail/CVE-2017-5330 |
16,679 | kde | 82fdfd24d46966a117fa625b68784735a40f9065 | https://cgit.kde.org/konversation | https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065 | None | 0 | void Part::slotDeleteFilesDone(KJob* job)
{
if (job->error() && job->error() != KJob::KilledJobError) {
KMessageBox::error(widget(), job->errorString());
}
m_cutIndexes.clear();
m_model->filesToMove.clear();
m_model->filesToCopy.clear();
}
| 306,607,895,263,864,700,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2017-5330 | ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications. | https://nvd.nist.gov/vuln/detail/CVE-2017-5330 |
16,680 | kde | 82fdfd24d46966a117fa625b68784735a40f9065 | https://cgit.kde.org/konversation | https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065 | None | 0 | void Part::slotEditFileName()
{
QModelIndex currentIndex = m_view->selectionModel()->currentIndex();
currentIndex = (currentIndex.parent().isValid())
? currentIndex.parent().child(currentIndex.row(), 0)
: m_model->index(currentIndex.row(), 0);
m_view->openEntryEditor(cu... | 219,412,717,134,371,000,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2017-5330 | ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications. | https://nvd.nist.gov/vuln/detail/CVE-2017-5330 |
16,681 | kde | 82fdfd24d46966a117fa625b68784735a40f9065 | https://cgit.kde.org/konversation | https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065 | None | 0 | void Part::slotError(const QString& errorMessage, const QString& details)
{
if (details.isEmpty()) {
KMessageBox::error(widget(), errorMessage);
} else {
KMessageBox::detailedError(widget(), errorMessage, details);
}
}
| 236,236,345,399,879,340,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2017-5330 | ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications. | https://nvd.nist.gov/vuln/detail/CVE-2017-5330 |
16,682 | kde | 82fdfd24d46966a117fa625b68784735a40f9065 | https://cgit.kde.org/konversation | https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065 | None | 0 | void Part::slotExtractArchive()
{
if (m_view->selectionModel()->selectedRows().count() > 0) {
m_view->selectionModel()->clear();
}
slotShowExtractionDialog();
}
| 116,875,489,443,600,600,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2017-5330 | ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications. | https://nvd.nist.gov/vuln/detail/CVE-2017-5330 |
16,683 | kde | 82fdfd24d46966a117fa625b68784735a40f9065 | https://cgit.kde.org/konversation | https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065 | None | 0 | void Part::slotLoadingFinished(KJob *job)
{
if (job->error()) {
if (arguments().metaData()[QStringLiteral("createNewArchive")] != QLatin1String("true")) {
if (job->error() != KJob::KilledJobError) {
displayMsgWidget(KMessageWidget::Error, xi18nc("@info", "Loading the archive <fil... | 65,180,666,147,236,510,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2017-5330 | ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications. | https://nvd.nist.gov/vuln/detail/CVE-2017-5330 |
16,684 | kde | 82fdfd24d46966a117fa625b68784735a40f9065 | https://cgit.kde.org/konversation | https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065 | None | 0 | void Part::slotLoadingStarted()
{
m_model->filesToMove.clear();
m_model->filesToCopy.clear();
}
| 294,968,719,249,401,640,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2017-5330 | ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications. | https://nvd.nist.gov/vuln/detail/CVE-2017-5330 |
16,685 | kde | 82fdfd24d46966a117fa625b68784735a40f9065 | https://cgit.kde.org/konversation | https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065 | None | 0 | void Part::slotOpenEntry(int mode)
{
qCDebug(ARK) << "Opening with mode" << mode;
QModelIndex index = m_view->selectionModel()->currentIndex();
Archive::Entry *entry = m_model->entryForIndex(index);
if (entry->isDir()) {
return;
}
if (!entry->property("link").toString().isEmpty()) {
... | 313,611,442,854,563,000,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2017-5330 | ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications. | https://nvd.nist.gov/vuln/detail/CVE-2017-5330 |
16,686 | kde | 82fdfd24d46966a117fa625b68784735a40f9065 | https://cgit.kde.org/konversation | https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065 | None | 0 | void Part::slotPasteFiles()
{
m_destination = (m_view->selectionModel()->selectedRows().count() > 0)
? m_model->entryForIndex(m_view->selectionModel()->currentIndex())
: Q_NULLPTR;
if (m_destination == Q_NULLPTR) {
m_destination = new Archive::Entry(Q_NULLPTR, QSt... | 70,927,575,475,231,610,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2017-5330 | ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications. | https://nvd.nist.gov/vuln/detail/CVE-2017-5330 |
16,687 | kde | 82fdfd24d46966a117fa625b68784735a40f9065 | https://cgit.kde.org/konversation | https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065 | None | 0 | void Part::slotPasteFiles(QVector<Kerfuffle::Archive::Entry*> &files, Kerfuffle::Archive::Entry *destination, int entriesWithoutChildren)
{
if (files.isEmpty()) {
delete m_destination;
return;
}
QStringList filesPaths = ReadOnlyArchiveInterface::entryFullPaths(files);
QStringList newPat... | 91,346,977,806,768,370,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2017-5330 | ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications. | https://nvd.nist.gov/vuln/detail/CVE-2017-5330 |
16,688 | kde | 82fdfd24d46966a117fa625b68784735a40f9065 | https://cgit.kde.org/konversation | https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065 | None | 0 | void Part::slotPasteFilesDone(KJob *job)
{
if (job->error() && job->error() != KJob::KilledJobError) {
KMessageBox::error(widget(), job->errorString());
}
m_cutIndexes.clear();
m_model->filesToMove.clear();
m_model->filesToCopy.clear();
}
| 120,536,190,608,235,740,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2017-5330 | ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications. | https://nvd.nist.gov/vuln/detail/CVE-2017-5330 |
16,689 | kde | 82fdfd24d46966a117fa625b68784735a40f9065 | https://cgit.kde.org/konversation | https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065 | None | 0 | void Part::slotPreviewExtractedEntry(KJob *job)
{
if (!job->error()) {
PreviewJob *previewJob = qobject_cast<PreviewJob*>(job);
Q_ASSERT(previewJob);
m_tmpExtractDirList << previewJob->tempDir();
ArkViewer::view(previewJob->validatedFilePath());
} else if (job->error() != KJob:... | 33,678,586,226,890,667,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2017-5330 | ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications. | https://nvd.nist.gov/vuln/detail/CVE-2017-5330 |
16,690 | kde | 82fdfd24d46966a117fa625b68784735a40f9065 | https://cgit.kde.org/konversation | https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065 | None | 0 | void Part::slotQuickExtractFiles(QAction *triggeredAction)
{
if (!triggeredAction->data().isNull()) {
QString userDestination = triggeredAction->data().toString();
QString finalDestinationDirectory;
const QString detectedSubfolder = detectSubfolder();
qCDebug(ARK) << "Detected subfol... | 84,042,918,451,698,745,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2017-5330 | ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications. | https://nvd.nist.gov/vuln/detail/CVE-2017-5330 |
16,691 | kde | 82fdfd24d46966a117fa625b68784735a40f9065 | https://cgit.kde.org/konversation | https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065 | None | 0 | void Part::slotRenameFile(const QString &name)
{
if (name == QLatin1String(".") || name == QLatin1String("..") || name.contains(QLatin1Char('/'))) {
displayMsgWidget(KMessageWidget::Error, i18n("Filename can't contain slashes and can't be equal to \".\" or \"..\""));
return;
}
const Archive:... | 29,103,770,260,471,560,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2017-5330 | ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications. | https://nvd.nist.gov/vuln/detail/CVE-2017-5330 |
16,692 | kde | 82fdfd24d46966a117fa625b68784735a40f9065 | https://cgit.kde.org/konversation | https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065 | None | 0 | void Part::slotSaveAs()
{
QUrl saveUrl = QFileDialog::getSaveFileUrl(widget(), i18nc("@title:window", "Save Archive As"), url());
if ((saveUrl.isValid()) && (!saveUrl.isEmpty())) {
auto statJob = KIO::stat(saveUrl, KIO::StatJob::DestinationSide, 0);
KJobWidgets::setWindow(statJob, widget());
... | 107,869,376,159,393,560,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2017-5330 | ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications. | https://nvd.nist.gov/vuln/detail/CVE-2017-5330 |
16,693 | kde | 82fdfd24d46966a117fa625b68784735a40f9065 | https://cgit.kde.org/konversation | https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065 | None | 0 | void Part::slotShowContextMenu()
{
if (!factory()) {
return;
}
QMenu *popup = static_cast<QMenu *>(factory()->container(QStringLiteral("context_menu"), this));
popup->popup(QCursor::pos());
}
| 158,993,356,255,057,300,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2017-5330 | ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications. | https://nvd.nist.gov/vuln/detail/CVE-2017-5330 |
16,694 | kde | 82fdfd24d46966a117fa625b68784735a40f9065 | https://cgit.kde.org/konversation | https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065 | None | 0 | void Part::slotShowExtractionDialog()
{
if (!m_model) {
return;
}
QPointer<Kerfuffle::ExtractionDialog> dialog(new Kerfuffle::ExtractionDialog);
dialog.data()->setModal(true);
if (m_view->selectionModel()->selectedRows().count() > 0) {
dialog.data()->setShowSelectedFiles(true);
... | 246,745,807,302,693,100,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2017-5330 | ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications. | https://nvd.nist.gov/vuln/detail/CVE-2017-5330 |
16,695 | kde | 82fdfd24d46966a117fa625b68784735a40f9065 | https://cgit.kde.org/konversation | https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065 | None | 0 | void Part::slotTestingDone(KJob* job)
{
if (job->error() && job->error() != KJob::KilledJobError) {
KMessageBox::error(widget(), job->errorString());
} else if (static_cast<TestJob*>(job)->testSucceeded()) {
KMessageBox::information(widget(), i18n("The archive passed the integrity test."), i18n(... | 135,006,033,156,209,340,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2017-5330 | ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications. | https://nvd.nist.gov/vuln/detail/CVE-2017-5330 |
16,696 | kde | 82fdfd24d46966a117fa625b68784735a40f9065 | https://cgit.kde.org/konversation | https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065 | None | 0 | void Part::slotToggleInfoPanel(bool visible)
{
if (visible) {
m_splitter->setSizes(ArkSettings::splitterSizes());
m_infoPanel->show();
} else {
ArkSettings::setSplitterSizes(m_splitter->sizes());
m_infoPanel->hide();
}
}
| 48,169,798,124,784,170,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2017-5330 | ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications. | https://nvd.nist.gov/vuln/detail/CVE-2017-5330 |
16,697 | kde | 82fdfd24d46966a117fa625b68784735a40f9065 | https://cgit.kde.org/konversation | https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065 | None | 0 | void Part::slotWatchedFileModified(const QString& file)
{
qCDebug(ARK) << "Watched file modified:" << file;
QString relPath = file;
foreach (QTemporaryDir *tmpDir, m_tmpExtractDirList) {
relPath.remove(tmpDir->path()); //Remove tmpDir.
}
relPath = relPath.mid(1); //Remove leading slash.
... | 146,675,568,808,700,330,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2017-5330 | ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications. | https://nvd.nist.gov/vuln/detail/CVE-2017-5330 |
16,698 | kde | 82fdfd24d46966a117fa625b68784735a40f9065 | https://cgit.kde.org/konversation | https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065 | None | 0 | void Part::updateActions()
{
bool isWritable = m_model->archive() && !m_model->archive()->isReadOnly();
const Archive::Entry *entry = m_model->entryForIndex(m_view->selectionModel()->currentIndex());
int selectedEntriesCount = m_view->selectionModel()->selectedRows().count();
const bool isEncryptedButU... | 283,531,091,775,457,200,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2017-5330 | ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications. | https://nvd.nist.gov/vuln/detail/CVE-2017-5330 |
16,699 | kde | 82fdfd24d46966a117fa625b68784735a40f9065 | https://cgit.kde.org/konversation | https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065 | None | 0 | void Part::updateQuickExtractMenu(QAction *extractAction)
{
if (!extractAction) {
return;
}
QMenu *menu = extractAction->menu();
if (!menu) {
menu = new QMenu();
extractAction->setMenu(menu);
connect(menu, &QMenu::triggered,
this, &Part::slotQuickExtract... | 240,874,699,117,064,250,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2017-5330 | ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications. | https://nvd.nist.gov/vuln/detail/CVE-2017-5330 |
16,700 | kde | 82fdfd24d46966a117fa625b68784735a40f9065 | https://cgit.kde.org/konversation | https://cgit.kde.org/ark.git/commit/?id=82fdfd24d46966a117fa625b68784735a40f9065 | None | 0 | Part::~Part()
{
qDeleteAll(m_tmpExtractDirList);
if (m_showInfoPanelAction->isChecked()) {
ArkSettings::setSplitterSizes(m_splitter->sizes());
}
ArkSettings::setShowInfoPanel(m_showInfoPanelAction->isChecked());
ArkSettings::self()->save();
m_extractArchiveAction->menu()->deleteLater()... | 118,849,620,974,151,510,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2017-5330 | ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications. | https://nvd.nist.gov/vuln/detail/CVE-2017-5330 |
16,772 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Compute_Funcs( EXEC_OP )
{
#ifdef TT_CONFIG_OPTION_UNPATENTED_HINTING
if ( CUR.face->unpatented_hinting )
{
/* If both vectors point rightwards along the x axis, set */
/* `both-x-axis' true, otherwise set it false. The x values only */
/* need be tested because the vector... | 147,774,501,879,270,560,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,773 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Compute_Point_Displacement( EXEC_OP_ FT_F26Dot6* x,
FT_F26Dot6* y,
TT_GlyphZone zone,
FT_UShort* refp )
{
TT_GlyphZoneRec zp;
FT_UShort p;
FT_F26Dot6 d;
if ( C... | 69,573,323,490,834,910,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,774 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Compute_Round( EXEC_OP_ FT_Byte round_mode )
{
switch ( round_mode )
{
case TT_Round_Off:
CUR.func_round = (TT_Round_Func)Round_None;
break;
case TT_Round_To_Grid:
CUR.func_round = (TT_Round_Func)Round_To_Grid;
break;
case TT_Round_Up_To_Grid:
CUR.func_round = (T... | 118,887,187,068,887,480,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,775 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Current_Ppem( EXEC_OP )
{
return TT_MULFIX( CUR.tt_metrics.ppem, CURRENT_Ratio() );
}
| 234,450,057,747,079,660,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,776 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Direct_Move( EXEC_OP_ TT_GlyphZone zone,
FT_UShort point,
FT_F26Dot6 distance )
{
FT_F26Dot6 v;
#ifdef TT_CONFIG_OPTION_UNPATENTED_HINTING
FT_ASSERT( !CUR.face->unpatented_hinting );
#endif
v = CUR.GS.freeVector.x;
if ( v != 0 )
{
... | 173,075,100,007,308,230,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,777 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Direct_Move_Orig( EXEC_OP_ TT_GlyphZone zone,
FT_UShort point,
FT_F26Dot6 distance )
{
FT_F26Dot6 v;
#ifdef TT_CONFIG_OPTION_UNPATENTED_HINTING
FT_ASSERT( !CUR.face->unpatented_hinting );
#endif
v = CUR.GS.freeVector.x;
if ( v !=... | 115,328,060,235,239,450,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,778 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Direct_Move_Orig_X( EXEC_OP_ TT_GlyphZone zone,
FT_UShort point,
FT_F26Dot6 distance )
{
FT_UNUSED_EXEC;
zone->org[point].x += distance;
}
| 149,890,833,964,219,740,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,779 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Direct_Move_Orig_Y( EXEC_OP_ TT_GlyphZone zone,
FT_UShort point,
FT_F26Dot6 distance )
{
FT_UNUSED_EXEC;
zone->org[point].y += distance;
}
| 202,693,659,171,452,450,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,780 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Direct_Move_Y( EXEC_OP_ TT_GlyphZone zone,
FT_UShort point,
FT_F26Dot6 distance )
{
FT_UNUSED_EXEC;
zone->cur[point].y += distance;
zone->tags[point] |= FT_CURVE_TAG_TOUCH_Y;
}
| 138,549,412,100,293,140,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,781 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Dual_Project( EXEC_OP_ FT_Pos dx,
FT_Pos dy )
{
return TT_DotFix14( (FT_UInt32)dx, (FT_UInt32)dy,
CUR.GS.dualVector.x,
CUR.GS.dualVector.y );
}
| 253,557,196,161,345,540,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,782 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | GetShortIns( EXEC_OP )
{
/* Reading a byte stream so there is no endianess (DaveP) */
CUR.IP += 2;
return (FT_Short)( ( CUR.code[CUR.IP - 2] << 8 ) +
CUR.code[CUR.IP - 1] );
}
| 54,436,406,764,873,560,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,783 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_ABS( INS_ARG )
{
DO_ABS
}
| 3,152,149,191,227,371,300,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,784 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_ADD( INS_ARG )
{
DO_ADD
}
| 180,646,341,201,924,170,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,785 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_ALIGNPTS( INS_ARG )
{
FT_UShort p1, p2;
FT_F26Dot6 distance;
p1 = (FT_UShort)args[0];
p2 = (FT_UShort)args[1];
if ( BOUNDS( args[0], CUR.zp1.n_points ) ||
BOUNDS( args[1], CUR.zp0.n_points ) )
{
if ( CUR.pedantic_hinting )
CUR.error = TT_Err_Invalid_Reference... | 235,056,026,014,116,520,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,786 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_ALIGNRP( INS_ARG )
{
FT_UShort point;
FT_F26Dot6 distance;
FT_UNUSED_ARG;
if ( CUR.top < CUR.GS.loop ||
BOUNDS( CUR.GS.rp0, CUR.zp0.n_points ) )
{
if ( CUR.pedantic_hinting )
CUR.error = TT_Err_Invalid_Reference;
return;
}
while ( CUR.GS.loop > 0 )... | 118,441,631,930,269,970,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,787 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_AND( INS_ARG )
{
DO_AND
}
| 43,636,974,186,518,350,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,788 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_CALL( INS_ARG )
{
FT_ULong F;
TT_CallRec* pCrec;
TT_DefRecord* def;
/* first of all, check the index */
F = args[0];
if ( BOUNDS( F, CUR.maxFunc + 1 ) )
goto Fail;
/* Except for some old Apple fonts, all functions in a TrueType */
/* font are defined in increa... | 163,954,103,415,549,830,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,789 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_CEILING( INS_ARG )
{
DO_CEILING
}
| 275,651,053,594,954,060,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
16,790 | savannah | 888cd1843e935fe675cf2ac303116d4ed5b9d54b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b | None | 0 | Ins_CINDEX( INS_ARG )
{
DO_CINDEX
}
| 47,694,059,742,221,440,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2010-2520 | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2010-2520 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.