Skip to content

Commit b378206

Browse files
matteogreekcopernico
authored andcommitted
Add 307 new statements (exact_tracer)
1 parent 46b6932 commit b378206

File tree

307 files changed

+3530
-0
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

307 files changed

+3530
-0
lines changed
Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,11 @@
1+
vulnerability_id: CVE-2010-5312
2+
notes:
3+
- links: []
4+
text: Cross-site scripting (XSS) vulnerability in jquery.ui.dialog.js in the Dialog
5+
widget in jQuery UI before 1.10.0 allows remote attackers to inject arbitrary
6+
web script or HTML via the title option.
7+
fixes:
8+
- id: DEFAULT_BRANCH
9+
commits:
10+
- id: 7e9060c109b928769a664dbcc2c17bd21231b6f3
11+
repository: https://github.com/jquery/jquery-ui
Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,12 @@
1+
vulnerability_id: CVE-2011-3186
2+
notes:
3+
- links: []
4+
text: CRLF injection vulnerability in actionpack/lib/action_controller/response.rb
5+
in Ruby on Rails 2.3.x before 2.3.13 allows remote attackers to inject arbitrary
6+
HTTP headers and conduct HTTP response splitting attacks via the Content-Type
7+
header.
8+
fixes:
9+
- id: DEFAULT_BRANCH
10+
commits:
11+
- id: 11dafeaa7533be26441a63618be93a03869c83a9
12+
repository: https://github.com/rails/rails
Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,12 @@
1+
vulnerability_id: CVE-2011-4030
2+
notes:
3+
- links: []
4+
text: The CMFEditions component 2.x in Plone 4.0.x through 4.0.9, 4.1, and 4.2 through
5+
4.2a2 does not prevent the KwAsAttributes classes from being publishable, which
6+
allows remote attackers to access sub-objects via unspecified vectors, a different
7+
vulnerability than CVE-2011-3587.
8+
fixes:
9+
- id: DEFAULT_BRANCH
10+
commits:
11+
- id: d55add52e5900967c8cc78becc6790048f02015b
12+
repository: https://github.com/plone/Products.CMFEditions
Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,10 @@
1+
vulnerability_id: CVE-2012-1109
2+
notes:
3+
- links: []
4+
text: 'mwlib 0.13 through 0.13.4 has a denial of service vulnerability when parsing
5+
#iferror magic functions'
6+
fixes:
7+
- id: DEFAULT_BRANCH
8+
commits:
9+
- id: aa987c281c10e29f26aa0faa21c04f3bb1167fde
10+
repository: https://github.com/pediapress/mwlib
Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,11 @@
1+
vulnerability_id: CVE-2012-1176
2+
notes:
3+
- links: []
4+
text: Buffer overflow in the fribidi_utf8_to_unicode function in PyFriBidi before
5+
0.11.0 allows remote attackers to cause a denial of service (application crash)
6+
via a 4-byte utf-8 sequence.
7+
fixes:
8+
- id: DEFAULT_BRANCH
9+
commits:
10+
- id: d2860c655357975e7b32d84e6b45e98f0dcecd7a
11+
repository: https://github.com/pediapress/pyfribidi
Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,11 @@
1+
vulnerability_id: CVE-2012-3366
2+
notes:
3+
- links: []
4+
text: The Trigger plugin in bcfg2 1.2.x before 1.2.3 allows remote attackers with
5+
root access to the client to execute arbitrary commands via shell metacharacters
6+
in the UUID field to the server process (bcfg2-server).
7+
fixes:
8+
- id: DEFAULT_BRANCH
9+
commits:
10+
- id: a524967e8d5c4c22e49cd619aed20c87a316c0be
11+
repository: https://github.com/Bcfg2/bcfg2
Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,12 @@
1+
vulnerability_id: CVE-2012-3408
2+
notes:
3+
- links: []
4+
text: lib/puppet/network/authstore.rb in Puppet before 2.7.18, and Puppet Enterprise
5+
before 2.5.2, supports use of IP addresses in certnames without warning of potential
6+
risks, which might allow remote attackers to spoof an agent by acquiring a previously
7+
used IP address.
8+
fixes:
9+
- id: DEFAULT_BRANCH
10+
commits:
11+
- id: ab9150baa1b738467a33b01df1d90e076253fbbd
12+
repository: https://github.com/puppetlabs/puppet
Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,11 @@
1+
vulnerability_id: CVE-2012-6550
2+
notes:
3+
- links: []
4+
text: Cross-site scripting (XSS) vulnerability in ZeroClipboard before 1.1.4 allows
5+
remote attackers to inject arbitrary web script or HTML via "the clipText returned
6+
from the flash object," a different vulnerability than CVE-2013-1808.
7+
fixes:
8+
- id: DEFAULT_BRANCH
9+
commits:
10+
- id: 51b67b6d696f62aaf003210c08542588222c4913
11+
repository: https://github.com/zeroclipboard/zeroclipboard
Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,11 @@
1+
vulnerability_id: CVE-2013-0256
2+
notes:
3+
- links: []
4+
text: darkfish.js in RDoc 2.3.0 through 3.12 and 4.x before 4.0.0.preview2.1, as
5+
used in Ruby, does not properly generate documents, which allows remote attackers
6+
to conduct cross-site scripting (XSS) attacks via a crafted URL.
7+
fixes:
8+
- id: DEFAULT_BRANCH
9+
commits:
10+
- id: ffa87887ee0517793df7541629a470e331f9fe60
11+
repository: https://github.com/ruby/rdoc
Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,11 @@
1+
vulnerability_id: CVE-2013-0294
2+
notes:
3+
- links: []
4+
text: packet.py in pyrad before 2.1 uses weak random numbers to generate RADIUS
5+
authenticators and hash passwords, which makes it easier for remote attackers
6+
to obtain sensitive information via a brute force attack.
7+
fixes:
8+
- id: DEFAULT_BRANCH
9+
commits:
10+
- id: 38f74b36814ca5b1a27d9898141126af4953bee5
11+
repository: https://github.com/pyradius/pyrad
Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
vulnerability_id: CVE-2013-1800
2+
notes:
3+
- links: []
4+
text: The crack gem 0.3.1 and earlier for Ruby does not properly restrict casts
5+
of string values, which might allow remote attackers to conduct object-injection
6+
attacks and execute arbitrary code, or cause a denial of service (memory and CPU
7+
consumption) by leveraging Action Pack support for (1) YAML type conversion or
8+
(2) Symbol type conversion, a similar vulnerability to CVE-2013-0156.
9+
fixes:
10+
- id: DEFAULT_BRANCH
11+
commits:
12+
- id: e3da1212a1f84a898ee3601336d1dbbf118fb5f6
13+
repository: https://github.com/jnunemaker/crack
Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
vulnerability_id: CVE-2013-1801
2+
notes:
3+
- links: []
4+
text: The httparty gem 0.9.0 and earlier for Ruby does not properly restrict casts
5+
of string values, which might allow remote attackers to conduct object-injection
6+
attacks and execute arbitrary code, or cause a denial of service (memory and CPU
7+
consumption) by leveraging Action Pack support for YAML type conversion, a similar
8+
vulnerability to CVE-2013-0156.
9+
fixes:
10+
- id: DEFAULT_BRANCH
11+
commits:
12+
- id: 53a812426dd32108d6cba4272b493aa03bc8c031
13+
repository: https://github.com/jnunemaker/httparty
Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,11 @@
1+
vulnerability_id: CVE-2013-2013
2+
notes:
3+
- links: []
4+
text: The user-password-update command in python-keystoneclient before 0.2.4 accepts
5+
the new password in the --password argument, which allows local users to obtain
6+
sensitive information by listing the process.
7+
fixes:
8+
- id: DEFAULT_BRANCH
9+
commits:
10+
- id: f2e0818bc97bfbeba83f6abbb07909a8debcad77
11+
repository: https://github.com/openstack/python-keystoneclient
Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,10 @@
1+
vulnerability_id: CVE-2013-2191
2+
notes:
3+
- links: []
4+
text: python-bugzilla before 0.9.0 does not validate X.509 certificates, which allows
5+
man-in-the-middle attackers to spoof Bugzilla servers via a crafted certificate.
6+
fixes:
7+
- id: DEFAULT_BRANCH
8+
commits:
9+
- id: a782282ee479ba4cc1b8b1d89700ac630ba83eef
10+
repository: https://github.com/python-bugzilla/python-bugzilla
Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,12 @@
1+
vulnerability_id: CVE-2013-3300
2+
notes:
3+
- links: []
4+
text: The JsonParser class in json/JsonParser.scala in Lift before 2.5 interprets
5+
a certain end-index value as a length value, which allows remote authenticated
6+
users to obtain sensitive information from other users' sessions via invalid input
7+
data containing a < (less than) character.
8+
fixes:
9+
- id: DEFAULT_BRANCH
10+
commits:
11+
- id: 099d9c86cf6d81f4953957add478ab699946e601
12+
repository: https://github.com/lift/framework
Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,11 @@
1+
vulnerability_id: CVE-2013-4116
2+
notes:
3+
- links: []
4+
text: lib/npm.js in Node Packaged Modules (npm) before 1.3.3 allows local users
5+
to overwrite arbitrary files via a symlink attack on temporary files with predictable
6+
names that are created when unpacking archives.
7+
fixes:
8+
- id: DEFAULT_BRANCH
9+
commits:
10+
- id: f4d31693e73a963574a88000580db1a716fe66f1
11+
repository: https://github.com/npm/npm
Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,11 @@
1+
vulnerability_id: CVE-2013-4413
2+
notes:
3+
- links: []
4+
text: Directory traversal vulnerability in controller/concerns/render_redirect.rb
5+
in the Wicked gem before 1.0.1 for Ruby allows remote attackers to read arbitrary
6+
files via a %2E%2E%2F (encoded dot dot slash) in the step.
7+
fixes:
8+
- id: DEFAULT_BRANCH
9+
commits:
10+
- id: fe31bb2533fffc9d098c69ebeb7afc3b80509f53
11+
repository: https://github.com/zombocom/wicked
Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,11 @@
1+
vulnerability_id: CVE-2013-4562
2+
notes:
3+
- links: []
4+
text: The omniauth-facebook gem 1.4.1 before 1.5.0 does not properly store the session
5+
parameter, which allows remote attackers to conduct cross-site request forgery
6+
(CSRF) attacks via the state parameter.
7+
fixes:
8+
- id: DEFAULT_BRANCH
9+
commits:
10+
- id: ccfcc26fe7e34acbd75ad4a095fd01ce5ff48ee7
11+
repository: https://github.com/simi/omniauth-facebook
Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
vulnerability_id: CVE-2013-4701
2+
notes:
3+
- links: []
4+
text: Auth/Yadis/XML.php in PHP OpenID Library 2.2.2 and earlier allows remote attackers
5+
to read arbitrary files, send HTTP requests to intranet servers, or cause a denial
6+
of service (CPU and memory consumption) via XRDS data containing an external entity
7+
declaration in conjunction with an entity reference, related to an XML External
8+
Entity (XXE) issue.
9+
fixes:
10+
- id: DEFAULT_BRANCH
11+
commits:
12+
- id: 625c16bb28bb120d262b3f19f89c2c06cb9b0da9
13+
repository: https://github.com/openid/php-openid
Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,11 @@
1+
vulnerability_id: CVE-2013-6465
2+
notes:
3+
- links: []
4+
text: Multiple cross-site scripting (XSS) vulnerabilities in JBPM KIE Workbench
5+
6.0.x allow remote authenticated users to inject arbitrary web script or HTML
6+
via vectors related to task name html inputs.
7+
fixes:
8+
- id: DEFAULT_BRANCH
9+
commits:
10+
- id: 4818204506e8e94645b52adb9426bedfa9ffdd04
11+
repository: https://github.com/kiegroup/jbpm-wb
Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,10 @@
1+
vulnerability_id: CVE-2013-7378
2+
notes:
3+
- links: []
4+
text: scripts/email.coffee in the Hubot Scripts module before 2.4.4 for Node.js
5+
allows remote attackers to execute arbitrary commands.
6+
fixes:
7+
- id: DEFAULT_BRANCH
8+
commits:
9+
- id: feee5abdb038a229a98969ae443cdb8a61747782
10+
repository: https://github.com/github/hubot-scripts
Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,11 @@
1+
vulnerability_id: CVE-2013-7459
2+
notes:
3+
- links: []
4+
text: Heap-based buffer overflow in the ALGnew function in block_templace.c in Python
5+
Cryptography Toolkit (aka pycrypto) allows remote attackers to execute arbitrary
6+
code as demonstrated by a crafted iv parameter to cryptmsg.py.
7+
fixes:
8+
- id: DEFAULT_BRANCH
9+
commits:
10+
- id: 8dbe0dc3eea5c689d4f76b37b93fe216cf1f00d4
11+
repository: https://github.com/pycrypto/pycrypto
Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
vulnerability_id: CVE-2014-0072
2+
notes:
3+
- links: []
4+
text: ios/CDVFileTransfer.m in the Apache Cordova File-Transfer standalone plugin
5+
(org.apache.cordova.file-transfer) before 0.4.2 for iOS and the File-Transfer
6+
plugin for iOS from Cordova 2.4.0 through 2.9.0 might allow remote attackers to
7+
spoof SSL servers by leveraging a default value of true for the trustAllHosts
8+
option.
9+
fixes:
10+
- id: DEFAULT_BRANCH
11+
commits:
12+
- id: a1d6fc07e8a40c1b2b16f4103c403b30e1089668
13+
repository: https://github.com/apache/cordova-plugin-file-transfer
Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
vulnerability_id: CVE-2014-0073
2+
notes:
3+
- links: []
4+
text: 'The CDVInAppBrowser class in the Apache Cordova In-App-Browser standalone
5+
plugin (org.apache.cordova.inappbrowser) before 0.3.2 for iOS and the In-App-Browser
6+
plugin for iOS from Cordova 2.6.0 through 2.9.0 does not properly validate callback
7+
identifiers, which allows remote attackers to execute arbitrary JavaScript in
8+
the host page and consequently gain privileges via a crafted gap-iab: URI.'
9+
fixes:
10+
- id: DEFAULT_BRANCH
11+
commits:
12+
- id: 26702cb0720c5c394b407c23570136c53171fa55
13+
repository: https://github.com/apache/cordova-plugin-inappbrowser
Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,11 @@
1+
vulnerability_id: CVE-2014-0120
2+
notes:
3+
- links: []
4+
text: Cross-site request forgery (CSRF) vulnerability in the admin terminal in Hawt.io
5+
allows remote attackers to hijack the authentication of arbitrary users for requests
6+
that run commands on the Karaf server, as demonstrated by running "shutdown -f."
7+
fixes:
8+
- id: DEFAULT_BRANCH
9+
commits:
10+
- id: b4e23e002639c274a2f687ada980118512f06113
11+
repository: https://github.com/hawtio/hawtio
Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
vulnerability_id: CVE-2014-0160
2+
notes:
3+
- links: []
4+
text: The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do
5+
not properly handle Heartbeat Extension packets, which allows remote attackers
6+
to obtain sensitive information from process memory via crafted packets that trigger
7+
a buffer over-read, as demonstrated by reading private keys, related to d1_both.c
8+
and t1_lib.c, aka the Heartbleed bug.
9+
fixes:
10+
- id: DEFAULT_BRANCH
11+
commits:
12+
- id: 96db9023b881d7cd9f379b0c154650d6c108e9a3
13+
repository: https://github.com/openssl/openssl
Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,10 @@
1+
vulnerability_id: CVE-2014-0177
2+
notes:
3+
- links: []
4+
text: The am function in lib/hub/commands.rb in hub before 1.12.1 allows local users
5+
to overwrite arbitrary files via a symlink attack on a temporary patch file.
6+
fixes:
7+
- id: DEFAULT_BRANCH
8+
commits:
9+
- id: 016ec99d25b1cb83cb4367e541177aa431beb600
10+
repository: https://github.com/github/hub
Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,12 @@
1+
vulnerability_id: CVE-2014-0228
2+
notes:
3+
- links: []
4+
text: Apache Hive before 0.13.1, when in SQL standards based authorization mode,
5+
does not properly check the file permissions for (1) import and (2) export statements,
6+
which allows remote authenticated users to obtain sensitive information via a
7+
crafted URI.
8+
fixes:
9+
- id: DEFAULT_BRANCH
10+
commits:
11+
- id: c3d7083b7605d1753946c4c4411e3a3241ea7ffe
12+
repository: https://github.com/apache/hive
Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,10 @@
1+
vulnerability_id: CVE-2014-1202
2+
notes:
3+
- links: []
4+
text: The WSDL/WADL import functionality in SoapUI before 4.6.4 allows remote attackers
5+
to execute arbitrary Java code via a crafted request parameter in a WSDL file.
6+
fixes:
7+
- id: DEFAULT_BRANCH
8+
commits:
9+
- id: 6373165649ad74257493c69dbc0569caa7e6b4a6
10+
repository: https://github.com/SmartBear/soapui
Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,11 @@
1+
vulnerability_id: CVE-2014-1403
2+
notes:
3+
- links: []
4+
text: Cross-site scripting (XSS) vulnerability in name.html in easyXDM before 2.4.19
5+
allows remote attackers to inject arbitrary web script or HTML via the location.hash
6+
value.
7+
fixes:
8+
- id: DEFAULT_BRANCH
9+
commits:
10+
- id: a3194d32c25a0d27a10a47304eb9c9be93ffbf13
11+
repository: https://github.com/oyvindkinsey/easyXDM
Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,11 @@
1+
vulnerability_id: CVE-2014-1604
2+
notes:
3+
- links: []
4+
text: The parser cache functionality in parsergenerator.py in RPLY (aka python-rply)
5+
before 0.7.1 allows local users to spoof cache data by pre-creating a temporary
6+
rply-*.json file with a predictable name.
7+
fixes:
8+
- id: DEFAULT_BRANCH
9+
commits:
10+
- id: fc9bbcd25b0b4f09bbd6339f710ad24c129d5d7c
11+
repository: https://github.com/alex/rply
Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,10 @@
1+
vulnerability_id: CVE-2014-3599
2+
notes:
3+
- links: []
4+
text: HornetQ REST is vulnerable to XML External Entity due to insecure configuration
5+
of RestEasy
6+
fixes:
7+
- id: DEFAULT_BRANCH
8+
commits:
9+
- id: b3a63576371828d5f8e64ba7ccbcecb1da8111d2
10+
repository: https://github.com/hornetq/hornetq

0 commit comments

Comments
 (0)