idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
21,384 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | assert_str_beginswith(GString *expected, gchar *actual) {
gchar *actual_beginning = g_strndup(actual, expected->len);
g_assert_cmpstr(expected->str, ==, actual_beginning);
g_free(actual_beginning);
/* return the part of the actual string that hasn't been compared yet */
return &actual[expected->len... | 198,868,956,604,429,700,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,385 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | assert_sync_beginswith_stdarg() {
GString *stdargs = g_string_new("");
g_string_append_printf(stdargs, "%s %d %d ", uzbl.state.config_file, getpid(), (int)uzbl.xwin);
g_string_append_printf(stdargs, "%s %s ", uzbl.comm.fifo_path, uzbl.comm.socket_path);
g_string_append_printf(stdargs, "%s %s ", uzbl.st... | 5,440,392,596,711,162,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,386 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | event_fixture_setup(struct EventFixture *ef, const void* data)
{
(void) data;
int socks[2];
/* make some sockets, fresh for every test */
if(socketpair(AF_UNIX, SOCK_STREAM, 0, socks) == -1)
{
perror("socketpair() failed");
g_assert(0);
}
ef->uzbl_sock = socks[0];
ef->test... | 104,458,899,986,589,030,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,387 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | event_fixture_teardown(struct EventFixture *ef, const void *data)
{
(void) data;
/* there should be no events left waiting */
assert_no_event(ef);
/* clean up the io channel we opened for uzbl */
GIOChannel *iochan = g_ptr_array_index(uzbl.comm.client_chan, 0);
remove_socket_from_array(iochan)... | 238,293,674,935,444,150,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,388 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | main (int argc, char *argv[]) {
/* set up tests */
g_type_init();
g_test_init(&argc, &argv, NULL);
g_test_add("/test-command/set-variable", struct EventFixture, NULL, event_fixture_setup, test_set_variable, event_fixture_teardown);
g_test_add("/test-command/event", struct EventFixture, N... | 155,859,331,077,409,160,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,389 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | read_event (struct EventFixture *ef) {
int r = read(ef->test_sock, ef->event_buffer, 1023); \
ef->event_buffer[r] = 0;
}
| 336,945,057,909,104,900,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,390 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | test_print (void) {
GString *result = g_string_new("");
/* a simple message can be returned as a result */
parse_cmd_line("print A simple test", result);
g_assert_cmpstr("A simple test", ==, result->str);
/* arguments to print should be expanded */
parse_cmd_line("print A simple @(echo expansi... | 331,713,238,766,937,360,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,391 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | test_run_handler_expand (void) {
uzbl.net.useragent = "Test uzbl uzr agent";
run_handler("sync_spawn echo @useragent", "result:");
assert(uzbl.comm.sync_stdout);
/* the result should begin with the standard handler arguments */
gchar *rest = assert_sync_beginswith_stdarg();
/* the rest of the... | 12,992,902,234,819,931,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,392 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | test_scroll (void) {
uzbl.gui.scbar_v = (GtkScrollbar*) gtk_vscrollbar_new (NULL);
uzbl.gui.bar_v = gtk_range_get_adjustment((GtkRange*) uzbl.gui.scbar_v);
gtk_adjustment_set_lower(uzbl.gui.bar_v, 0);
gtk_adjustment_set_upper(uzbl.gui.bar_v, 100);
gtk_adjustment_set_page_size(uzbl.gui.bar_v, 5);
... | 101,450,160,069,348,410,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,393 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | test_set_variable (struct EventFixture *ef, const void *data) {
(void) data;
/* set a string */
parse_cmd_line("set useragent = Uzbl browser kthxbye!", NULL);
ASSERT_EVENT(ef, "VARIABLE_SET useragent str Uzbl browser kthxbye!");
g_assert_cmpstr("Uzbl browser kthxbye!", ==, uzbl.net.useragent);
... | 120,347,726,677,872,230,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,394 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | test_sync_sh (void) {
parse_cmd_line("sync_sh 'echo Test echo.'", NULL);
g_assert_cmpstr("Test echo.\n", ==, uzbl.comm.sync_stdout);
/* clean up after ourselves */
uzbl.comm.sync_stdout = strfree(uzbl.comm.sync_stdout);
}
| 57,998,304,353,908,310,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,395 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | test_toggle_status (void) {
g_assert(!uzbl.behave.show_status);
/* status bar can be toggled on */
parse_cmd_line("toggle_status", NULL);
g_assert(uzbl.behave.show_status);
/* status bar can be toggled back off */
parse_cmd_line("toggle_status", NULL);
g_assert(!uzbl.behave.show_status);
}... | 311,281,426,372,339,720,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,396 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | VIEWFUNC(reload)
VIEWFUNC(reload_bypass_cache)
VIEWFUNC(stop_loading)
VIEWFUNC(zoom_in)
VIEWFUNC(zoom_out)
VIEWFUNC(go_back)
VIEWFUNC(go_forward)
#undef VIEWFUNC
/* -- command to callback/function map for things we cannot attach to any signals */
struct {const char *key; CommandInfo value;} cmdlist[] =
| 141,266,753,788,176,140,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,397 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | act_dump_config() {
dump_config();
}
| 107,896,874,318,477,810,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,398 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | act_dump_config_as_events() {
dump_config_as_events();
}
| 40,955,654,209,046,320,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,399 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | add_separator_to_menu(GArray *argv, guint context) {
GUI *g = &uzbl.gui;
MenuItem *m;
gchar *sep_name;
if(!g->menu_items)
g->menu_items = g_ptr_array_new();
if(!argv_idx(argv, 0))
return;
else
sep_name = argv_idx(argv, 0);
m = malloc(sizeof(MenuItem));
m->name ... | 51,544,727,131,188,790,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,400 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | add_to_menu(GArray *argv, guint context) {
GUI *g = &uzbl.gui;
MenuItem *m;
gchar *item_cmd = NULL;
if(!argv_idx(argv, 0))
return;
gchar **split = g_strsplit(argv_idx(argv, 0), "=", 2);
if(!g->menu_items)
g->menu_items = g_ptr_array_new();
if(split[1])
item_cmd = g... | 31,042,685,447,663,634,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,401 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | argv_idx(const GArray *a, const guint idx) { return g_array_index(a, gchar*, idx); }
| 38,967,230,478,454,190,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,402 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | builtins() {
unsigned int i,
len = LENGTH(cmdlist);
GString *command_list = g_string_new("");
for (i = 0; i < len; i++) {
g_string_append(command_list, cmdlist[i].key);
g_string_append_c(command_list, ' ');
}
send_event(BUILTINS, command_list->str, NULL);
g_string_... | 119,480,700,024,272,980,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,403 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | catch_signal(int s) {
if(s == SIGTERM ||
s == SIGINT ||
s == SIGILL ||
s == SIGFPE ||
s == SIGQUIT) {
clean_up();
exit(EXIT_SUCCESS);
}
else if(s == SIGSEGV) {
clean_up();
fprintf(stderr, "Program aborted, segmentation fault!\nAttempting to clea... | 170,426,633,228,074,700,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,404 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | chain (WebKitWebView *page, GArray *argv, GString *result) {
(void) page; (void) result;
gchar *a = NULL;
gchar **parts = NULL;
guint i = 0;
while ((a = argv_idx(argv, i++))) {
parts = g_strsplit (a, " ", 2);
if (parts[0])
parse_command(parts[0], parts[1], result);
... | 108,629,489,545,027,600,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,405 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | clean_up(void) {
send_event(INSTANCE_EXIT, uzbl.info.pid_str, NULL);
g_free(uzbl.info.pid_str);
g_free(uzbl.state.executable_path);
g_hash_table_destroy(uzbl.behave.commands);
if(uzbl.state.event_buffer)
g_ptr_array_free(uzbl.state.event_buffer, TRUE);
if (uzbl.behave.fifo_dir)
... | 151,464,749,962,387,020,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,406 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | close_uzbl (WebKitWebView *page, GArray *argv, GString *result) {
(void)page;
(void)argv;
(void)result;
gtk_main_quit ();
}
| 295,005,352,476,413,960,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,407 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | commands_hash(void)
{
unsigned int i;
uzbl.behave.commands = g_hash_table_new(g_str_hash, g_str_equal);
for (i = 0; i < LENGTH(cmdlist); i++)
g_hash_table_insert(uzbl.behave.commands, (gpointer) cmdlist[i].key, &cmdlist[i].value);
}
| 49,594,052,316,006,320,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,408 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | control_client_socket(GIOChannel *clientchan) {
char *ctl_line;
GString *result = g_string_new("");
GError *error = NULL;
GIOStatus ret;
gsize len;
ret = g_io_channel_read_line(clientchan, &ctl_line, &len, NULL, &error);
if (ret == G_IO_STATUS_ERROR) {
g_warning ("Error reading: %s\... | 190,854,985,028,023,600,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,409 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | control_fifo(GIOChannel *gio, GIOCondition condition) {
if (uzbl.state.verbose)
printf("triggered\n");
gchar *ctl_line;
GIOStatus ret;
GError *err = NULL;
if (condition & G_IO_HUP)
g_error ("Fifo: Read end of pipe died!\n");
if(!gio)
g_error ("Fifo: GIOChannel broke\n");... | 249,284,965,969,446,040,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,410 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | control_socket(GIOChannel *chan) {
struct sockaddr_un remote;
unsigned int t = sizeof(remote);
GIOChannel *iochan;
int clientsock;
clientsock = accept (g_io_channel_unix_get_fd(chan),
(struct sockaddr *) &remote, &t);
if(!uzbl.comm.client_chan)
uzbl.comm.client... | 327,568,550,940,271,300,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,411 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | control_stdin(GIOChannel *gio, GIOCondition condition) {
(void) condition;
gchar *ctl_line = NULL;
GIOStatus ret;
ret = g_io_channel_read_line(gio, &ctl_line, NULL, NULL, NULL);
if ( (ret == G_IO_STATUS_ERROR) || (ret == G_IO_STATUS_EOF) )
return FALSE;
parse_cmd_line(ctl_line, NULL);
... | 65,610,414,798,185,225,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,412 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | create_browser () {
GUI *g = &uzbl.gui;
g->web_view = WEBKIT_WEB_VIEW (webkit_web_view_new ());
g_object_connect((GObject*)g->web_view,
"signal::key-press-event", (GCallback)key_press_cb, NULL,
"signal::key-release-event", (GCallback)key_relea... | 131,732,547,865,686,700,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,413 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | create_plug () {
GtkPlug* plug = GTK_PLUG (gtk_plug_new (uzbl.state.socket_id));
g_signal_connect (G_OBJECT (plug), "destroy", G_CALLBACK (destroy_cb), NULL);
g_signal_connect (G_OBJECT (plug), "key-press-event", G_CALLBACK (key_press_cb), NULL);
g_signal_connect (G_OBJECT (plug), "key-release-event", G... | 98,720,553,230,558,750,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,414 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | create_stdin () {
GIOChannel *chan = NULL;
GError *error = NULL;
chan = g_io_channel_unix_new(fileno(stdin));
if (chan) {
if (!g_io_add_watch(chan, G_IO_IN|G_IO_HUP, (GIOFunc) control_stdin, NULL)) {
g_error ("Stdin: could not add watch\n");
} else {
if (uzbl.sta... | 159,990,129,504,230,970,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,415 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | create_var_to_name_hash() {
const struct var_name_to_ptr_t *n2v_p = var_name_to_ptr;
uzbl.comm.proto_var = g_hash_table_new(g_str_hash, g_str_equal);
while(n2v_p->name) {
g_hash_table_insert(uzbl.comm.proto_var,
(gpointer) n2v_p->name,
(gpointer) &n2v_p->cp);
... | 227,065,565,720,475,460,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,416 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | create_window () {
GtkWidget* window = gtk_window_new (GTK_WINDOW_TOPLEVEL);
gtk_window_set_default_size (GTK_WINDOW (window), 800, 600);
gtk_widget_set_name (window, "Uzbl browser");
g_signal_connect (G_OBJECT (window), "destroy", G_CALLBACK (destroy_cb), NULL);
g_signal_connect (... | 16,365,119,340,823,278,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,417 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | dehilight (WebKitWebView *page, GArray *argv, GString *result) {
(void) argv; (void) result;
webkit_web_view_set_highlight_text_matches (page, FALSE);
}
| 41,870,148,003,001,870,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,418 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | dump_config() {
g_hash_table_foreach(uzbl.comm.proto_var, dump_var_hash, NULL);
}
| 213,506,114,974,275,140,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,419 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | dump_config_as_events() {
g_hash_table_foreach(uzbl.comm.proto_var, dump_var_hash_as_event, NULL);
}
| 64,126,509,068,238,790,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,420 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | dump_var_hash(gpointer k, gpointer v, gpointer ud) {
(void) ud;
uzbl_cmdprop *c = v;
if(!c->dump)
return;
if(c->type == TYPE_STR)
printf("set %s = %s\n", (char *)k, *c->ptr.s ? *c->ptr.s : " ");
else if(c->type == TYPE_INT)
printf("set %s = %d\n", (char *)k, *c->ptr.i);
... | 2,945,923,598,633,143,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,421 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | dump_var_hash_as_event(gpointer k, gpointer v, gpointer ud) {
(void) ud;
uzbl_cmdprop *c = v;
GString *msg;
if(!c->dump)
return;
/* check for the variable type */
msg = g_string_new((char *)k);
if (c->type == TYPE_STR) {
g_string_append_printf(msg, " str %s", *c->ptr.s ? *c... | 173,302,250,711,654,700,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,422 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | event(WebKitWebView *page, GArray *argv, GString *result) {
(void) page; (void) result;
GString *event_name;
gchar **split = NULL;
if(!argv_idx(argv, 0))
return;
split = g_strsplit(argv_idx(argv, 0), " ", 2);
if(split[0])
event_name = g_string_ascii_up(g_string_new(split[0]));
... | 29,299,261,477,115,460,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,423 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | expand(const char *s, guint recurse) {
uzbl_cmdprop *c;
enum exp_type etype;
char *end_simple_var = "^°!\"§$%&/()=?'`'+~*'#-.:,;@<>| \\{}[]¹²³¼½";
char *ret = NULL;
char *vend = NULL;
GError *err = NULL;
gchar *cmd_stdout = NULL;
gchar *mycmd = NULL;
GString *buf = g_string_new("");
... | 40,399,665,145,117,643,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,424 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | file_exists (const char * filename) {
return (access(filename, F_OK) == 0);
}
| 171,152,261,195,070,180,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,425 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | find_existing_file(gchar* path_list) {
int i=0;
int cnt;
gchar **split;
gchar *tmp = NULL;
gchar *executable;
if(!path_list)
return NULL;
split = g_strsplit(path_list, ":", 0);
while(split[i])
i++;
if(i<=1) {
tmp = g_strdup(split[0]);
g_strfreev(spl... | 59,007,068,752,776,950,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,426 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | find_xdg_file (int xdg_type, const char* filename) {
/* xdg_type = 0 => config
xdg_type = 1 => data
xdg_type = 2 => cache*/
gchar* xdgv = get_xdg_var (XDG[xdg_type]);
gchar* temporary_file = g_strconcat (xdgv, filename, NULL);
g_free (xdgv);
gchar* temporary_string;
char* savept... | 259,600,533,589,671,660,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,427 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | get_click_context() {
GUI *g = &uzbl.gui;
WebKitHitTestResult *ht;
guint context;
if(!uzbl.state.last_button)
return -1;
ht = webkit_web_view_get_hit_test_result(g->web_view, uzbl.state.last_button);
g_object_get(ht, "context", &context, NULL);
return (gint)context;
}
| 302,942,419,362,876,160,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,428 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | get_exp_type(const gchar *s) {
/* variables */
if(*(s+1) == '(')
return EXP_EXPR;
else if(*(s+1) == '{')
return EXP_BRACED_VAR;
else if(*(s+1) == '<')
return EXP_JS;
else if(*(s+1) == '[')
return EXP_ESCAPE;
else
return EXP_SIMPLE_VAR;
/*@notreached@*... | 26,960,990,085,412,967,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,429 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | get_xdg_var (XDG_Var xdg) {
const gchar* actual_value = getenv (xdg.environmental);
const gchar* home = getenv ("HOME");
gchar* return_value;
if (! actual_value || strcmp (actual_value, "") == 0) {
if (xdg.default_value) {
return_value = str_replace ("~", home, xdg.default_v... | 196,859,891,302,915,360,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,430 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | void handle_cookies (SoupSession *session, SoupMessage *msg, gpointer user_data){
(void) session;
(void) user_data;
soup_message_add_header_handler(msg, "got-headers", "Set-Cookie", G_CALLBACK(save_cookies), NULL);
GString *s = g_string_new ("");
SoupURI * soup_uri = soup_message_get_uri(msg);
... | 252,481,316,485,693,100,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,431 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | hardcopy(WebKitWebView *page, GArray *argv, GString *result) {
(void) argv;
(void) result;
webkit_web_frame_print(webkit_web_view_get_main_frame(page));
}
| 266,935,294,598,439,320,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,432 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | include(WebKitWebView *page, GArray *argv, GString *result) {
(void) page;
(void) result;
gchar *pe = NULL,
*path = NULL,
*line;
int i=0;
if(!argv_idx(argv, 0))
return;
pe = parseenv(argv_idx(argv, 0));
if((path = find_existing_file(pe))) {
GArray* lin... | 112,022,903,807,234,830,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,433 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | init_connect_socket() {
int sockfd, replay = 0;
struct sockaddr_un local;
GIOChannel *chan;
gchar **name = NULL;
if(!uzbl.comm.connect_chan)
uzbl.comm.connect_chan = g_ptr_array_new();
name = uzbl.state.connect_socket_names;
while(name && *name) {
sockfd = socket (AF_UNIX,... | 59,660,035,308,318,180,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,434 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | init_fifo(gchar *dir) { /* return dir or, on error, free dir and return NULL */
if (uzbl.comm.fifo_path) { /* get rid of the old fifo if one exists */
if (unlink(uzbl.comm.fifo_path) == -1)
g_warning ("Fifo: Can't unlink old fifo at %s\n", uzbl.comm.fifo_path);
g_free(uzbl.comm.fifo_path... | 279,805,859,489,930,380,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,435 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | inject_handler_args(const gchar *actname, const gchar *origargs, const gchar *newargs) {
/*
If actname is one that calls an external command, this function will inject
newargs in front of the user-provided args in that command line. They will
come become after the body of the script (in sh) or af... | 178,634,023,395,439,700,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,436 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | js_init() {
/* This function creates the class and its definition, only once */
if (!uzbl.js.initialized) {
/* it would be pretty cool to make this dynamic */
uzbl.js.classdef = kJSClassDefinitionEmpty;
uzbl.js.classdef.staticFunctions = js_static_functions;
uzbl.js.classref = J... | 184,750,829,860,543,870,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,437 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | js_run_command (JSContextRef ctx, JSObjectRef function, JSObjectRef thisObject,
size_t argumentCount, const JSValueRef arguments[],
JSValueRef* exception) {
(void) function;
(void) thisObject;
(void) exception;
JSStringRef js_result_string;
GString *result = g_string... | 90,843,150,312,872,840,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,438 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | load_uri (WebKitWebView *web_view, GArray *argv, GString *result) {
(void) web_view; (void) result;
load_uri_imp (argv_idx (argv, 0));
}
| 68,067,530,271,822,870,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,439 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | load_uri_imp(gchar *uri) {
GString* newuri;
if (g_strstr_len (uri, 11, "javascript:") != NULL) {
eval_js(uzbl.gui.web_view, uri, NULL);
return;
}
newuri = g_string_new (uri);
if (!soup_uri_new(uri)) {
GString* fullpath = g_string_new ("");
if (g_path_is_absolute (newu... | 11,846,530,883,422,717,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,440 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | main (int argc, char* argv[]) {
initialize(argc, argv);
uzbl.gui.scrolled_win = gtk_scrolled_window_new (NULL, NULL);
gtk_scrolled_window_set_policy (GTK_SCROLLED_WINDOW (uzbl.gui.scrolled_win),
GTK_POLICY_NEVER, GTK_POLICY_NEVER);
gtk_container_add (GTK_CONTAINER (uzbl.gui.scrolled_win),
... | 106,130,466,415,938,900,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,441 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | menu_add(WebKitWebView *page, GArray *argv, GString *result) {
(void) page;
(void) result;
add_to_menu(argv, WEBKIT_HIT_TEST_RESULT_CONTEXT_DOCUMENT);
}
| 229,595,177,744,306,580,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,442 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | menu_add_edit(WebKitWebView *page, GArray *argv, GString *result) {
(void) page;
(void) result;
add_to_menu(argv, WEBKIT_HIT_TEST_RESULT_CONTEXT_EDITABLE);
}
| 325,379,340,187,181,800,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,443 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | menu_add_image(WebKitWebView *page, GArray *argv, GString *result) {
(void) page;
(void) result;
add_to_menu(argv, WEBKIT_HIT_TEST_RESULT_CONTEXT_IMAGE);
}
| 330,050,391,338,229,320,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,444 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | menu_add_link(WebKitWebView *page, GArray *argv, GString *result) {
(void) page;
(void) result;
add_to_menu(argv, WEBKIT_HIT_TEST_RESULT_CONTEXT_LINK);
}
| 10,104,491,348,074,114,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,445 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | menu_add_separator(WebKitWebView *page, GArray *argv, GString *result) {
(void) page;
(void) result;
add_separator_to_menu(argv, WEBKIT_HIT_TEST_RESULT_CONTEXT_DOCUMENT);
}
| 49,758,041,452,376,400,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,446 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | menu_add_separator_edit(WebKitWebView *page, GArray *argv, GString *result) {
(void) page;
(void) result;
add_separator_to_menu(argv, WEBKIT_HIT_TEST_RESULT_CONTEXT_EDITABLE);
}
| 260,008,577,779,809,970,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,447 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | menu_add_separator_image(WebKitWebView *page, GArray *argv, GString *result) {
(void) page;
(void) result;
add_separator_to_menu(argv, WEBKIT_HIT_TEST_RESULT_CONTEXT_IMAGE);
}
| 121,715,658,128,232,010,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,448 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | menu_add_separator_link(WebKitWebView *page, GArray *argv, GString *result) {
(void) page;
(void) result;
add_separator_to_menu(argv, WEBKIT_HIT_TEST_RESULT_CONTEXT_LINK);
}
| 308,736,478,021,507,350,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,449 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | menu_remove(WebKitWebView *page, GArray *argv, GString *result) {
(void) page;
(void) result;
remove_from_menu(argv, WEBKIT_HIT_TEST_RESULT_CONTEXT_DOCUMENT);
}
| 309,604,153,815,410,500,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,450 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | menu_remove_edit(WebKitWebView *page, GArray *argv, GString *result) {
(void) page;
(void) result;
remove_from_menu(argv, WEBKIT_HIT_TEST_RESULT_CONTEXT_EDITABLE);
}
| 184,156,379,419,836,100,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,451 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | menu_remove_image(WebKitWebView *page, GArray *argv, GString *result) {
(void) page;
(void) result;
remove_from_menu(argv, WEBKIT_HIT_TEST_RESULT_CONTEXT_IMAGE);
}
| 129,361,054,742,497,000,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,452 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | move_statusbar() {
if (!uzbl.gui.scrolled_win &&
!uzbl.gui.mainbar)
return;
g_object_ref(uzbl.gui.scrolled_win);
g_object_ref(uzbl.gui.mainbar);
gtk_container_remove(GTK_CONTAINER(uzbl.gui.vbox), uzbl.gui.scrolled_win);
gtk_container_remove(GTK_CONTAINER(uzbl.gui.vbox), uzbl.gui... | 150,104,669,042,476,010,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,453 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | new_window_load_uri (const gchar * uri) {
if (uzbl.behave.new_window) {
GString *s = g_string_new ("");
g_string_printf(s, "'%s'", uri);
run_handler(uzbl.behave.new_window, s->str);
send_event(NEW_WINDOW, s->str, NULL);
return;
}
GString* to_execute = g_string_new (""... | 261,672,472,478,263,240,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,454 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | parse_cmd_line(const char *ctl_line, GString *result) {
size_t len=0;
gchar *ctlstrip = NULL;
gchar *exp_line = NULL;
gchar *work_string = NULL;
work_string = g_strdup(ctl_line);
/* strip trailing newline */
len = strlen(ctl_line);
if (work_string[len - 1] == '\n')
ctlstrip = g... | 24,060,297,484,028,140,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,455 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | parseenv (gchar* string) {
extern char** environ;
gchar* tmpstr = NULL, * out;
int i = 0;
if(!string)
return NULL;
out = g_strdup(string);
while (environ[i] != NULL) {
gchar** env = g_strsplit (environ[i], "=", 2);
gchar* envname = g_strconcat ("$", env[0], NULL);
... | 313,860,236,985,200,400,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,456 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | print(WebKitWebView *page, GArray *argv, GString *result) {
(void) page; (void) result;
gchar* buf;
buf = expand(argv_idx(argv, 0), 0);
g_string_assign(result, buf);
g_free(buf);
}
| 69,012,571,201,465,900,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,457 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | read_file_by_line (const gchar *path) {
GIOChannel *chan = NULL;
gchar *readbuf = NULL;
gsize len;
GArray *lines = g_array_new(TRUE, FALSE, sizeof(gchar*));
int i = 0;
chan = g_io_channel_new_file(path, "r", NULL);
if (chan) {
while (g_io_channel_read_line(chan, &readbuf, &len, NULL... | 65,432,197,218,297,650,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,458 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | remove_from_menu(GArray *argv, guint context) {
GUI *g = &uzbl.gui;
MenuItem *mi;
gchar *name = NULL;
guint i=0;
if(!g->menu_items)
return;
if(!argv_idx(argv, 0))
return;
else
name = argv_idx(argv, 0);
for(i=0; i < g->menu_items->len; i++) {
mi = g_ptr_... | 175,009,899,948,586,550,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,459 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | remove_socket_from_array(GIOChannel *chan) {
gboolean ret = 0;
/* TODO: Do wee need to manually free the IO channel or is this
* happening implicitly on unref?
*/
ret = g_ptr_array_remove_fast(uzbl.comm.connect_chan, chan);
if(!ret)
ret = g_ptr_array_remove_fast(uzbl.comm.client... | 204,408,218,212,037,100,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,460 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | retrieve_geometry() {
int w, h, x, y;
GString *buf = g_string_new("");
gtk_window_get_size(GTK_WINDOW(uzbl.gui.main_window), &w, &h);
gtk_window_get_position(GTK_WINDOW(uzbl.gui.main_window), &x, &y);
g_string_printf(buf, "%dx%d+%d+%d", w, h, x, y);
if(uzbl.gui.geometry)
g_free(uzbl.g... | 68,252,939,897,559,080,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,461 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | run_command (const gchar *command, const guint npre, const gchar **args,
const gboolean sync, char **output_stdout) {
GError *err = NULL;
GArray *a = g_array_new (TRUE, FALSE, sizeof(gchar*));
gchar *pid = itos(getpid());
gchar *xwin = itos(uzbl.xwin);
guint i;
sharg_append(a, comm... | 146,155,546,269,811,380,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,462 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | run_external_js (WebKitWebView * web_view, GArray *argv, GString *result) {
(void) result;
gchar *path = NULL;
if (argv_idx(argv, 0) &&
((path = find_existing_file(argv_idx(argv, 0)))) ) {
GArray* lines = read_file_by_line (path);
gchar* js = NULL;
int i = 0;
gchar*... | 259,127,475,571,885,800,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,463 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | run_handler (const gchar *act, const gchar *args) {
/* Consider this code a temporary hack to make the handlers usable.
In practice, all this splicing, injection, and reconstruction is
inefficient, annoying and hard to manage. Potential pitfalls arise
when the handler specific args 1) are not ... | 131,017,435,530,149,780,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,464 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | run_js (WebKitWebView * web_view, GArray *argv, GString *result) {
if (argv_idx(argv, 0))
eval_js(web_view, argv_idx(argv, 0), result);
}
| 268,575,780,807,058,120,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,465 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | save_cookies (SoupMessage *msg, gpointer user_data){
(void) user_data;
GSList *ck;
char *cookie;
for (ck = soup_cookies_from_response(msg); ck; ck = ck->next){
cookie = soup_cookie_to_set_cookie_header(ck->data);
SoupURI * soup_uri = soup_message_get_uri(msg);
GString *s = g_stri... | 192,097,178,923,938,230,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,466 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | scroll (GtkAdjustment* bar, gchar *amount_str) {
gchar *end;
gdouble max_value;
gdouble page_size = gtk_adjustment_get_page_size(bar);
gdouble value = gtk_adjustment_get_value(bar);
gdouble amount = g_ascii_strtod(amount_str, &end);
if (*end == '%')
value += page_size * amount * 0.01;
... | 204,405,273,830,646,500,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,467 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | scroll_cmd(WebKitWebView* page, GArray *argv, GString *result) {
(void) page; (void) result;
gchar *direction = g_array_index(argv, gchar*, 0);
gchar *argv1 = g_array_index(argv, gchar*, 1);
if (g_strcmp0(direction, "horizontal") == 0)
{
if (g_strcmp0(argv1, "begin") == 0)
gtk_adj... | 234,379,071,942,434,100,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,468 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | search_clear(WebKitWebView *page, GArray *argv, GString *result) {
(void) argv;
(void) result;
webkit_web_view_unmark_text_matches (page);
if(uzbl.state.searchtx) {
g_free(uzbl.state.searchtx);
uzbl.state.searchtx = NULL;
}
}
| 95,006,858,482,696,400,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,469 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | search_forward_text (WebKitWebView *page, GArray *argv, GString *result) {
(void) result;
search_text(page, argv, TRUE);
}
| 300,764,178,730,633,470,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,470 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | search_reverse_text (WebKitWebView *page, GArray *argv, GString *result) {
(void) result;
search_text(page, argv, FALSE);
}
| 27,922,633,541,390,523,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,471 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | search_text (WebKitWebView *page, GArray *argv, const gboolean forward) {
if (argv_idx(argv, 0) && (*argv_idx(argv, 0) != '\0')) {
if (g_strcmp0 (uzbl.state.searchtx, argv_idx(argv, 0)) != 0) {
webkit_web_view_unmark_text_matches (page);
webkit_web_view_mark_text_matches (page, argv_... | 194,183,545,141,997,730,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,472 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | set_var(WebKitWebView *page, GArray *argv, GString *result) {
(void) page; (void) result;
if(!argv_idx(argv, 0))
return;
gchar **split = g_strsplit(argv_idx(argv, 0), "=", 2);
if (split[0] != NULL) {
gchar *value = parseenv(split[1] ? g_strchug(split[1]) : " ");
set_var_value(g... | 20,687,162,632,180,670,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,473 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | set_var_value(const gchar *name, gchar *val) {
uzbl_cmdprop *c = NULL;
char *endp = NULL;
char *buf = NULL;
char *invalid_chars = "^°!\"§$%&/()=?'`'+~*'#-.:,;@<>| \\{}[]¹²³¼½";
GString *msg;
if( (c = g_hash_table_lookup(uzbl.comm.proto_var, name)) ) {
if(!c->writeable) return FALSE;
... | 96,855,941,887,943,380,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,474 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | settings_init () {
State *s = &uzbl.state;
Network *n = &uzbl.net;
int i;
for (i = 0; default_config[i].command != NULL; i++) {
parse_cmd_line(default_config[i].command, NULL);
}
if (g_strcmp0(s->config_file, "-") == 0) {
s->config_file = NULL;
create_stdin();
}
... | 76,611,515,126,545,960,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,475 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | setup_signal(int signr, sigfunc *shandler) {
struct sigaction nh, oh;
nh.sa_handler = shandler;
sigemptyset(&nh.sa_mask);
nh.sa_flags = 0;
if(sigaction(signr, &nh, &oh) < 0)
return SIG_ERR;
return NULL;
}
| 318,570,891,115,291,900,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,476 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | sharg_append(GArray *a, const gchar *str) {
const gchar *s = (str ? str : "");
g_array_append_val(a, s);
}
| 241,481,171,583,912,740,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,477 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | spawn(WebKitWebView *web_view, GArray *argv, GString *result) {
(void)web_view; (void)result;
gchar *path = NULL;
if (argv_idx(argv, 0) &&
((path = find_existing_file(argv_idx(argv, 0)))) ) {
run_command(path, 0,
((const gchar **) (argv->data + sizeof(gchar*))),
... | 216,423,023,461,318,160,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,478 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | spawn_sh(WebKitWebView *web_view, GArray *argv, GString *result) {
(void)web_view; (void)result;
if (!uzbl.behave.shell_cmd) {
g_printerr ("spawn_sh: shell_cmd is not set!\n");
return;
}
guint i;
gchar *spacer = g_strdup("");
g_array_insert_val(argv, 1, spacer);
gchar **cmd ... | 254,433,430,049,605,870,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,479 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | spawn_sh_sync(WebKitWebView *web_view, GArray *argv, GString *result) {
(void)web_view; (void)result;
if (!uzbl.behave.shell_cmd) {
g_printerr ("spawn_sh_sync: shell_cmd is not set!\n");
return;
}
guint i;
gchar *spacer = g_strdup("");
g_array_insert_val(argv, 1, spacer);
gc... | 79,589,694,665,550,660,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,480 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | split_quoted(const gchar* src, const gboolean unquote) {
/* split on unquoted space, return array of strings;
remove a layer of quotes and backslashes if unquote */
if (!src) return NULL;
gboolean dq = FALSE;
gboolean sq = FALSE;
GArray *a = g_array_new (TRUE, FALSE, sizeof(gchar*));
GSt... | 194,081,863,440,583,480,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,481 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | str_replace (const char* search, const char* replace, const char* string) {
gchar **buf;
char *ret;
if(!string)
return NULL;
buf = g_strsplit (string, search, -1);
ret = g_strjoinv (replace, buf);
g_strfreev(buf);
return ret;
}
| 234,482,714,427,005,100,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,482 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | strfree(gchar *str) {
g_free(str);
return NULL;
}
| 213,108,160,113,175,300,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
21,483 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 0 | talk_to_socket(WebKitWebView *web_view, GArray *argv, GString *result) {
(void)web_view; (void)result;
int fd, len;
struct sockaddr_un sa;
char* sockpath;
ssize_t ret;
struct pollfd pfd;
struct iovec* iov;
guint i;
if(uzbl.comm.sync_stdout) uzbl.comm.sync_stdout = strfree(uzbl.comm... | 43,892,617,967,508,650,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.