cve_id
stringlengths 13
16
| obtain_all_privilege
stringclasses 3
values | obtain_user_privilege
stringclasses 2
values | obtain_other_privilege
stringclasses 2
values | user_interaction_required
stringclasses 3
values | cvss2_vector_string
stringclasses 106
values | cvss2_access_vector
stringclasses 4
values | cvss2_access_complexity
stringclasses 4
values | cvss2_authentication
stringclasses 3
values | cvss2_confidentiality_impact
stringclasses 4
values | cvss2_integrity_impact
stringclasses 4
values | cvss2_availability_impact
stringclasses 4
values | cvss2_base_score
stringclasses 50
values | cvss3_vector_string
stringclasses 226
values | cvss3_attack_vector
stringclasses 5
values | cvss3_attack_complexity
stringclasses 3
values | cvss3_privileges_required
stringclasses 4
values | cvss3_user_interaction
stringclasses 3
values | cvss3_scope
stringclasses 3
values | cvss3_confidentiality_impact
stringclasses 4
values | cvss3_integrity_impact
stringclasses 4
values | cvss3_availability_impact
stringclasses 4
values | cvss3_base_score
stringclasses 55
values | cvss3_base_severity
stringclasses 5
values | exploitability_score
stringclasses 22
values | impact_score
stringclasses 15
values | ac_insuf_info
stringclasses 3
values | reference_json
stringlengths 221
23.3k
| problemtype_json
stringclasses 200
values | severity
stringclasses 4
values | cve_nodes
stringlengths 2
33.1k
| cve_description
stringlengths 64
1.99k
| cve_last_modified_date
stringlengths 17
17
| cve_published_date
stringlengths 17
17
| cwe_name
stringclasses 125
values | cwe_description
stringclasses 124
values | cwe_extended_description
stringclasses 95
values | cwe_url
stringclasses 124
values | cwe_is_category
int64 0
1
| commit_author
stringlengths 0
34
| commit_author_date
stringlengths 25
25
| commit_msg
stringlengths 0
13.3k
| commit_hash
stringlengths 40
40
| commit_is_merge
stringclasses 1
value | repo_name
stringclasses 467
values | repo_description
stringclasses 459
values | repo_date_created
stringclasses 467
values | repo_date_last_push
stringclasses 467
values | repo_homepage
stringclasses 294
values | repo_owner
stringclasses 470
values | repo_stars
stringclasses 406
values | repo_forks
stringclasses 352
values | function_name
stringlengths 3
120
| function_signature
stringlengths 6
640
| function_parameters
stringlengths 2
302
| function
stringlengths 12
114k
| function_token_count
stringlengths 1
5
| function_before_change
stringclasses 1
value | labels
int64 1
1
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2014-9707 | False | False | False | False | AV:N/AC:L/Au:N/C:P/I:P/A:P | NETWORK | LOW | NONE | PARTIAL | PARTIAL | PARTIAL | 7.5 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'http://seclists.org/fulldisclosure/2015/Mar/157', 'name': '20150328 Advisory: CVE-2014-9707: GoAhead Web Server 3.0.0 - 3.4.1', 'refsource': 'FULLDISC', 'tags': ['Exploit']}, {'url': 'https://github.com/embedthis/goahead/issues/106', 'name': 'https://github.com/embedthis/goahead/issues/106', 'refsource': 'CONFIRM', 'tags': []}, {'url': 'https://github.com/embedthis/goahead/commit/eed4a7d177bf94a54c7b06ccce88507fbd76fb77', 'name': 'https://github.com/embedthis/goahead/commit/eed4a7d177bf94a54c7b06ccce88507fbd76fb77', 'refsource': 'CONFIRM', 'tags': []}, {'url': 'http://packetstormsecurity.com/files/131156/GoAhead-3.4.1-Heap-Overflow-Traversal.html', 'name': 'http://packetstormsecurity.com/files/131156/GoAhead-3.4.1-Heap-Overflow-Traversal.html', 'refsource': 'MISC', 'tags': ['Exploit']}, {'url': 'http://www.securitytracker.com/id/1032208', 'name': '1032208', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535027/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9707: GoAhead Web Server 3.0.0 - 3.4.1', 'refsource': 'BUGTRAQ', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'CWE-17'}]}] | HIGH | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:goahead:3.3.2:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:goahead:3.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:goahead:3.3.4:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:goahead:3.4.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:goahead:3.3.5:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:goahead:3.3.1:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:goahead:3.3.6:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:goahead:3.3.3:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'EmbedThis GoAhead 3.0.0 through 3.4.1 does not properly handle path segments starting with a . (dot), which allows remote attackers to conduct directory traversal attacks, cause a denial of service (heap-based buffer overflow and crash), or possibly execute arbitrary code via a crafted URI.'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | DEPRECATED: Code | This entry has been deprecated. It was originally used for organizing the Development View (CWE-699) and some other views, but it introduced unnecessary complexity and depth to the resulting tree. | https://cwe.mitre.org/data/definitions/17.html | 1 | Embedthis Software | 2014-11-24 09:04:18-08:00 | FIX: Dot filename segments permit directory traversal [issue 106] | eed4a7d177bf94a54c7b06ccce88507fbd76fb77 | False | embedthis/goahead | GoAhead Enterprise Edition Web Server | 2012-02-03 02:05:40 | 2022-05-25 02:03:29 | https://www.embedthis.com/goahead/ | embedthis | 60.0 | 28.0 | websNormalizeUriPath | websNormalizeUriPath( char * pathArg) | ['pathArg'] | PUBLIC char *websNormalizeUriPath(char *pathArg)
{
char *dupPath, *path, *sp, *dp, *mark, **segments;
int firstc, j, i, nseg, len;
if (pathArg == 0 || *pathArg == '\0') {
return sclone("");
}
len = (int) slen(pathArg);
if ((dupPath = walloc(len + 2)) == 0) {
return NULL;
}
strcpy(dupPath, pathArg);
if ((segments = walloc(sizeof(char*) * (len + 1))) == 0) {
return NULL;
}
nseg = len = 0;
firstc = *dupPath;
for (mark = sp = dupPath; *sp; sp++) {
if (*sp == '/') {
*sp = '\0';
while (sp[1] == '/') {
sp++;
}
segments[nseg++] = mark;
len += (int) (sp - mark);
mark = sp + 1;
}
}
segments[nseg++] = mark;
len += (int) (sp - mark);
for (j = i = 0; i < nseg; i++, j++) {
sp = segments[i];
if (sp[0] == '.') {
if (sp[1] == '\0') {
if ((i+1) == nseg) {
segments[j] = "";
} else {
j--;
}
} else if (sp[1] == '.' && sp[2] == '\0') {
if (i == 1 && *segments[0] == '\0') {
j = 0;
} else if ((i+1) == nseg) {
if (--j >= 0) {
segments[j] = "";
}
} else {
j = max(j - 2, -1);
}
}
} else {
segments[j] = segments[i];
}
}
nseg = j;
assert(nseg >= 0);
if ((path = walloc(len + nseg + 1)) != 0) {
for (i = 0, dp = path; i < nseg; ) {
strcpy(dp, segments[i]);
len = (int) slen(segments[i]);
dp += len;
if (++i < nseg || (nseg == 1 && *segments[0] == '\0' && firstc == '/')) {
*dp++ = '/';
}
}
*dp = '\0';
}
wfree(dupPath);
wfree(segments);
if ((path[0] != '/') || strchr(path, '\\')) {
return 0;
}
return path;
} | 539 | True | 1 |
|
CVE-2014-9707 | False | False | False | False | AV:N/AC:L/Au:N/C:P/I:P/A:P | NETWORK | LOW | NONE | PARTIAL | PARTIAL | PARTIAL | 7.5 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'http://seclists.org/fulldisclosure/2015/Mar/157', 'name': '20150328 Advisory: CVE-2014-9707: GoAhead Web Server 3.0.0 - 3.4.1', 'refsource': 'FULLDISC', 'tags': ['Exploit']}, {'url': 'https://github.com/embedthis/goahead/issues/106', 'name': 'https://github.com/embedthis/goahead/issues/106', 'refsource': 'CONFIRM', 'tags': []}, {'url': 'https://github.com/embedthis/goahead/commit/eed4a7d177bf94a54c7b06ccce88507fbd76fb77', 'name': 'https://github.com/embedthis/goahead/commit/eed4a7d177bf94a54c7b06ccce88507fbd76fb77', 'refsource': 'CONFIRM', 'tags': []}, {'url': 'http://packetstormsecurity.com/files/131156/GoAhead-3.4.1-Heap-Overflow-Traversal.html', 'name': 'http://packetstormsecurity.com/files/131156/GoAhead-3.4.1-Heap-Overflow-Traversal.html', 'refsource': 'MISC', 'tags': ['Exploit']}, {'url': 'http://www.securitytracker.com/id/1032208', 'name': '1032208', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535027/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9707: GoAhead Web Server 3.0.0 - 3.4.1', 'refsource': 'BUGTRAQ', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'CWE-17'}]}] | HIGH | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:goahead:3.3.2:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:goahead:3.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:goahead:3.3.4:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:goahead:3.4.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:goahead:3.3.5:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:goahead:3.3.1:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:goahead:3.3.6:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:goahead:3.3.3:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'EmbedThis GoAhead 3.0.0 through 3.4.1 does not properly handle path segments starting with a . (dot), which allows remote attackers to conduct directory traversal attacks, cause a denial of service (heap-based buffer overflow and crash), or possibly execute arbitrary code via a crafted URI.'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | DEPRECATED: Code | This entry has been deprecated. It was originally used for organizing the Development View (CWE-699) and some other views, but it introduced unnecessary complexity and depth to the resulting tree. | https://cwe.mitre.org/data/definitions/17.html | 1 | Embedthis Software | 2014-11-24 09:04:18-08:00 | FIX: Dot filename segments permit directory traversal [issue 106] | eed4a7d177bf94a54c7b06ccce88507fbd76fb77 | False | embedthis/goahead | GoAhead Enterprise Edition Web Server | 2012-02-03 02:05:40 | 2022-05-25 02:03:29 | https://www.embedthis.com/goahead/ | embedthis | 60.0 | 28.0 | websUrlParse | websUrlParse( char * url , char ** pbuf , char ** pscheme , char ** phost , char ** pport , char ** ppath , char ** pext , char ** preference , char ** pquery) | ['url', 'pbuf', 'pscheme', 'phost', 'pport', 'ppath', 'pext', 'preference', 'pquery'] | PUBLIC int websUrlParse(char *url, char **pbuf, char **pscheme, char **phost, char **pport, char **ppath, char **pext,
char **preference, char **pquery)
{
char *tok, *delim, *host, *path, *port, *scheme, *reference, *query, *ext, *buf, *buf2;
ssize buflen, ulen, len;
int rc;
assert(pbuf);
if (url == 0) {
url = "";
}
/*
Allocate twice. Need to null terminate the host so have to copy the path.
*/
ulen = strlen(url);
len = ulen + 1;
buflen = len * 2;
if ((buf = walloc(buflen)) == NULL) {
return -1;
}
buf2 = &buf[ulen + 1];
sncopy(buf, len, url, ulen);
sncopy(buf2, len, url, ulen);
url = buf;
scheme = 0;
host = 0;
port = 0;
path = 0;
ext = 0;
query = 0;
reference = 0;
tok = buf;
/*
[scheme://][hostname[:port]][/path[.ext]][#ref][?query]
First trim query and then reference from the end
*/
if ((query = strchr(tok, '?')) != NULL) {
*query++ = '\0';
}
if ((reference = strchr(tok, '#')) != NULL) {
*reference++ = '\0';
}
/*
[scheme://][hostname[:port]][/path]
*/
if ((delim = strstr(tok, "://")) != 0) {
scheme = tok;
*delim = '\0';
tok = &delim[3];
}
/*
[hostname[:port]][/path]
*/
if (*tok == '[' && ((delim = strchr(tok, ']')) != 0)) {
/* IPv6 [::] */
host = &tok[1];
*delim++ = '\0';
tok = delim;
} else if (*tok && *tok != '/' && *tok != ':' && (scheme || strchr(tok, ':'))) {
/*
Supported forms:
scheme://hostname
hostname[:port][/path]
*/
host = tok;
if ((tok = strpbrk(tok, ":/")) == 0) {
tok = "";
}
/* Don't terminate the hostname yet, need to see if tok is a ':' for a port. */
assert(tok);
}
/* [:port][/path] */
if (*tok == ':') {
/* Terminate hostname */
*tok++ = '\0';
port = tok;
if ((tok = strchr(tok, '/')) == 0) {
tok = "";
}
}
/* [/path] */
if (*tok) {
/*
Terminate hostname. This zeros the leading path slash.
This will be repaired before returning if ppath is set
*/
*tok++ = '\0';
path = tok;
/* path[.ext[/extra]] */
if ((tok = strrchr(path, '.')) != 0) {
if (tok[1]) {
if ((delim = strrchr(path, '/')) != 0) {
if (delim < tok) {
ext = tok;
}
} else {
ext = tok;
}
}
}
}
/*
Pass back the requested fields
*/
rc = 0;
*pbuf = buf;
if (pscheme) {
if (scheme == 0) {
scheme = "http";
}
*pscheme = scheme;
}
if (phost) {
if (host == 0) {
host = "localhost";
}
*phost = host;
}
if (pport) {
*pport = port;
}
if (ppath) {
if (path == 0) {
path = "/";
} else {
/* Copy path to reinsert leading slash */
scopy(&buf2[1], len - 1, path);
path = buf2;
*path = '/';
if (!websValidUriChars(path)) {
rc = -1;
} else {
websDecodeUrl(path, path, -1);
}
}
*ppath = path;
}
if (pquery) {
*pquery = query;
}
if (preference) {
*preference = reference;
}
if (pext) {
#if ME_WIN_LIKE
slower(ext);
#endif
*pext = ext;
}
return rc;
} | 692 | True | 1 |
|
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | cacheDirective | cacheDirective( MaState * state , cchar * key , cchar * value) | ['state', 'key', 'value'] | static int cacheDirective(MaState *state, cchar *key, cchar *value)
{
MprTicks lifespan, clientLifespan, serverLifespan;
char *option, *ovalue, *tok;
char *methods, *extensions, *types, *uris;
int flags;
flags = 0;
lifespan = clientLifespan = serverLifespan = 0;
methods = uris = extensions = types = 0;
for (option = stok(sclone(value), " \t", &tok); option; option = stok(0, " \t", &tok)) {
if (*option == '/') {
uris = option;
if (tok) {
/* Join the rest of the options back into one list of URIs */
tok[-1] = ',';
}
break;
}
option = stok(option, " =\t,", &ovalue);
ovalue = strim(ovalue, "\"'", MPR_TRIM_BOTH);
if ((int) isdigit((uchar) *option)) {
lifespan = httpGetTicks(option);
} else if (smatch(option, "client")) {
flags |= HTTP_CACHE_CLIENT;
if (ovalue) {
clientLifespan = httpGetTicks(ovalue);
}
} else if (smatch(option, "server")) {
flags |= HTTP_CACHE_SERVER;
if (ovalue) {
serverLifespan = httpGetTicks(ovalue);
}
} else if (smatch(option, "extensions")) {
extensions = ovalue;
} else if (smatch(option, "types")) {
types = ovalue;
} else if (smatch(option, "unique")) {
flags |= HTTP_CACHE_UNIQUE;
} else if (smatch(option, "manual")) {
flags |= HTTP_CACHE_MANUAL;
} else if (smatch(option, "methods")) {
methods = ovalue;
} else {
mprLog("error appweb config", 0, "Unknown Cache option '%s'", option);
return MPR_ERR_BAD_SYNTAX;
}
}
if (lifespan > 0 && !uris && !extensions && !types && !methods) {
state->route->lifespan = lifespan;
} else {
httpAddCache(state->route, methods, uris, extensions, types, clientLifespan, serverLifespan, flags);
}
return 0;
} | 389 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | closeVirtualHostDirective | closeVirtualHostDirective( MaState * state , cchar * key , cchar * value) | ['state', 'key', 'value'] | static int closeVirtualHostDirective(MaState *state, cchar *key, cchar *value)
{
HttpEndpoint *endpoint;
char *address, *ip, *addresses, *tok;
int port;
if (state->enabled) {
if (state->endpoints && *state->endpoints) {
addresses = state->endpoints;
while ((address = stok(addresses, " \t,", &tok)) != 0) {
addresses = 0;
mprParseSocketAddress(address, &ip, &port, NULL, -1);
if ((endpoint = httpLookupEndpoint(ip, port)) == 0) {
mprLog("error appweb config", 0, "Cannot find listen directive for virtual host %s", address);
return MPR_ERR_BAD_SYNTAX;
} else {
httpAddHostToEndpoint(endpoint, state->host);
}
}
} else {
httpAddHostToEndpoints(state->host);
}
}
closeDirective(state, key, value);
return 0;
} | 168 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | crossOriginDirective | crossOriginDirective( MaState * state , cchar * key , cchar * value) | ['state', 'key', 'value'] | static int crossOriginDirective(MaState *state, cchar *key, cchar *value)
{
HttpRoute *route;
char *option, *ovalue, *tok;
route = state->route;
tok = sclone(value);
while ((option = maGetNextArg(tok, &tok)) != 0) {
option = stok(option, " =\t,", &ovalue);
ovalue = strim(ovalue, "\"'", MPR_TRIM_BOTH);
if (scaselessmatch(option, "origin")) {
route->corsOrigin = sclone(ovalue);
} else if (scaselessmatch(option, "credentials")) {
route->corsCredentials = httpGetBoolToken(ovalue);
} else if (scaselessmatch(option, "headers")) {
route->corsHeaders = sclone(ovalue);
} else if (scaselessmatch(option, "age")) {
route->corsAge = atoi(ovalue);
} else {
mprLog("error appweb config", 0, "Unknown CrossOrigin option %s", option);
return MPR_ERR_BAD_SYNTAX;
}
}
#if KEEP
if (smatch(route->corsOrigin, "*") && route->corsCredentials) {
mprLog("error appweb config", 0, "CrossOrigin: Cannot use wildcard Origin if allowing credentials");
return MPR_ERR_BAD_STATE;
}
#endif
/*
Need the options method for pre-flight requests
*/
httpAddRouteMethods(route, "OPTIONS");
route->flags |= HTTP_ROUTE_CORS;
return 0;
} | 229 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | errorLogDirective | errorLogDirective( MaState * state , cchar * key , cchar * value) | ['state', 'key', 'value'] | static int errorLogDirective(MaState *state, cchar *key, cchar *value)
{
MprTicks stamp;
char *option, *ovalue, *tok, *path;
ssize size;
int level, flags, backup;
if (mprGetCmdlineLogging()) {
mprLog("info appweb config", 4, "Already logging. Ignoring ErrorLog directive");
return 0;
}
size = MAXINT;
stamp = 0;
level = 0;
backup = 0;
path = 0;
flags = 0;
for (option = maGetNextArg(sclone(value), &tok); option; option = maGetNextArg(tok, &tok)) {
if (!path) {
path = mprJoinPath(httpGetRouteVar(state->route, "LOG_DIR"), httpExpandRouteVars(state->route, option));
} else {
option = stok(option, " =\t,", &ovalue);
ovalue = strim(ovalue, "\"'", MPR_TRIM_BOTH);
if (smatch(option, "size")) {
size = (ssize) getnum(ovalue);
} else if (smatch(option, "level")) {
level = atoi(ovalue);
} else if (smatch(option, "backup")) {
backup = atoi(ovalue);
} else if (smatch(option, "anew")) {
flags |= MPR_LOG_ANEW;
} else if (smatch(option, "stamp")) {
stamp = httpGetTicks(ovalue);
} else {
mprLog("error appweb config", 0, "Unknown ErrorLog option %s", option);
}
}
}
if (size < (10 * 1000)) {
mprLog("error appweb config", 0, "Size is too small. Must be larger than 10K");
return MPR_ERR_BAD_SYNTAX;
}
if (path == 0) {
mprLog("error appweb config", 0, "Missing filename");
return MPR_ERR_BAD_SYNTAX;
}
mprSetLogBackup(size, backup, flags);
if (!smatch(path, "stdout") && !smatch(path, "stderr")) {
path = httpMakePath(state->route, state->configDir, path);
}
if (mprStartLogging(path, MPR_LOG_DETAILED) < 0) {
mprLog("error appweb config", 0, "Cannot write to ErrorLog: %s", path);
return MPR_ERR_BAD_SYNTAX;
}
mprSetLogLevel(level);
mprLogHeader();
if (stamp) {
httpSetTimestamp(stamp);
}
return 0;
} | 417 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | getDirective | getDirective( char * line , char ** valuep) | ['line', 'valuep'] | static char *getDirective(char *line, char **valuep)
{
char *key, *value;
ssize len;
assert(line);
assert(valuep);
*valuep = 0;
key = stok(line, " \t", &value);
key = strim(key, " \t\r\n>", MPR_TRIM_END);
if (value) {
value = strim(value, " \t\r\n>", MPR_TRIM_END);
/*
Trim quotes if wrapping the entire value and no spaces. Preserve embedded quotes and leading/trailing "" etc.
*/
len = slen(value);
if (*value == '\"' && value[len - 1] == '"' && len > 2 && value[1] != '\"' && !strpbrk(value, " \t")) {
/*
Cannot strip quotes if multiple args are quoted, only if one single arg is quoted
*/
if (schr(&value[1], '"') == &value[len - 1]) {
value = snclone(&value[1], len - 2);
}
}
*valuep = value;
}
return key;
} | 167 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | getnum | getnum( cchar * value) | ['value'] | static int64 getnum(cchar *value)
{
char *junk;
int64 num;
value = stok(slower(value), " \t", &junk);
if (sends(value, "kb") || sends(value, "k")) {
num = stoi(value) * 1024;
} else if (sends(value, "mb") || sends(value, "m")) {
num = stoi(value) * 1024 * 1024;
} else if (sends(value, "gb") || sends(value, "g")) {
num = stoi(value) * 1024 * 1024 * 1024;
} else if (sends(value, "byte") || sends(value, "bytes")) {
num = stoi(value);
} else {
num = stoi(value);
}
if (num == 0) {
num = MAXINT;
}
return num;
} | 170 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | makeDirDirective | makeDirDirective( MaState * state , cchar * key , cchar * value) | ['state', 'key', 'value'] | static int makeDirDirective(MaState *state, cchar *key, cchar *value)
{
MprPath info;
char *auth, *dirs, *path, *perms, *tok;
cchar *dir, *group, *owner;
int gid, mode, uid;
if (!maTokenize(state, value, "%S ?*", &auth, &dirs)) {
return MPR_ERR_BAD_SYNTAX;
}
uid = gid = 0;
mode = 0750;
if (schr(auth, ':')) {
owner = stok(auth, ":", &tok);
if (owner && *owner) {
if (snumber(owner)) {
uid = (int) stoi(owner);
} else if (smatch(owner, "APPWEB")) {
uid = HTTP->uid;
} else {
uid = userToID(owner);
}
}
group = stok(tok, ":", &perms);
if (group && *group) {
if (snumber(group)) {
gid = (int) stoi(group);
} else if (smatch(owner, "APPWEB")) {
gid = HTTP->gid;
} else {
gid = groupToID(group);
}
}
if (perms && snumber(perms)) {
mode = (int) stoiradix(perms, -1, NULL);
} else {
mode = 0;
}
if (gid < 0 || uid < 0) {
return MPR_ERR_BAD_SYNTAX;
}
} else {
dirs = auth;
auth = 0;
}
tok = dirs;
for (tok = sclone(dirs); (dir = stok(tok, ",", &tok)) != 0; ) {
path = httpMakePath(state->route, state->configDir, dir);
if (mprGetPathInfo(path, &info) == 0 && info.isDir) {
continue;
}
if (mprMakeDir(path, mode, uid, gid, 1) < 0) {
return MPR_ERR_BAD_SYNTAX;
}
}
return 0;
} | 383 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | parseFileInner | parseFileInner( MaState * state , cchar * path) | ['state', 'path'] | static int parseFileInner(MaState *state, cchar *path)
{
MaDirective *directive;
char *tok, *key, *line, *value;
assert(state);
assert(path && *path);
if (openConfig(state, path) < 0) {
return MPR_ERR_CANT_OPEN;
}
for (state->lineNumber = 1; state->file && (line = mprReadLine(state->file, 0, NULL)) != 0; state->lineNumber++) {
for (tok = line; isspace((uchar) *tok); tok++) ;
if (*tok == '\0' || *tok == '#') {
continue;
}
state->key = 0;
key = getDirective(line, &value);
if (!state->enabled) {
if (key[0] != '<') {
continue;
}
}
if ((directive = mprLookupKey(directives, key)) == 0) {
mprLog("error appweb config", 0, "Unknown directive \"%s\". At line %d in %s",
key, state->lineNumber, state->filename);
return MPR_ERR_BAD_SYNTAX;
}
state->key = key;
/*
Allow directives to run commands and yield without worring about holding references.
*/
mprPauseGC();
if ((*directive)(state, key, value) < 0) {
mprResumeGC();
mprLog("error appweb config", 0, "Error with directive \"%s\". At line %d in %s",
state->key, state->lineNumber, state->filename);
return MPR_ERR_BAD_SYNTAX;
}
mprResumeGC();
mprYield(0);
state = state->top->current;
}
/* EOF */
if (state->prev && state->file == state->prev->file) {
mprLog("error appweb config", 0, "Unclosed directives in %s", state->filename);
while (state->prev && state->file == state->prev->file) {
state = state->prev;
}
}
mprCloseFile(state->file);
return 0;
} | 344 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | requireDirective | requireDirective( MaState * state , cchar * key , cchar * value) | ['state', 'key', 'value'] | static int requireDirective(MaState *state, cchar *key, cchar *value)
{
char *age, *type, *rest, *option, *ovalue, *tok;
int domains;
if (!maTokenize(state, value, "%S ?*", &type, &rest)) {
return MPR_ERR_BAD_SYNTAX;
}
if (scaselesscmp(type, "ability") == 0) {
httpSetAuthRequiredAbilities(state->auth, rest);
/* Support require group for legacy support */
// DEPRECATE "group"
} else if (scaselesscmp(type, "group") == 0 || scaselesscmp(type, "role") == 0) {
httpSetAuthRequiredAbilities(state->auth, rest);
} else if (scaselesscmp(type, "secure") == 0) {
domains = 0;
age = 0;
for (option = stok(sclone(rest), " \t", &tok); option; option = stok(0, " \t", &tok)) {
option = stok(option, " =\t,", &ovalue);
ovalue = strim(ovalue, "\"'", MPR_TRIM_BOTH);
if (smatch(option, "age")) {
age = sfmt("%lld", (int64) httpGetTicks(ovalue));
} else if (smatch(option, "domains")) {
domains = 1;
}
}
if (age) {
if (domains) {
/* Negative age signifies subdomains */
age = sjoin("-1", age, NULL);
}
}
addCondition(state, "secure", age, HTTP_ROUTE_STRICT_TLS);
} else if (scaselesscmp(type, "user") == 0) {
httpSetAuthPermittedUsers(state->auth, rest);
} else if (scaselesscmp(type, "valid-user") == 0) {
httpSetAuthAnyValidUser(state->auth);
} else {
return configError(state, key);
}
return 0;
} | 327 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | sessionCookieDirective | sessionCookieDirective( MaState * state , cchar * key , cchar * value) | ['state', 'key', 'value'] | static int sessionCookieDirective(MaState *state, cchar *key, cchar *value)
{
char *options, *option, *ovalue, *tok;
if (!maTokenize(state, value, "%*", &options)) {
return MPR_ERR_BAD_SYNTAX;
}
if (smatch(options, "disable")) {
httpSetAuthSession(state->route->auth, 0);
return 0;
} else if (smatch(options, "enable")) {
httpSetAuthSession(state->route->auth, 1);
return 0;
}
for (option = maGetNextArg(options, &tok); option; option = maGetNextArg(tok, &tok)) {
option = stok(option, " =\t,", &ovalue);
ovalue = strim(ovalue, "\"'", MPR_TRIM_BOTH);
if (!ovalue || *ovalue == '\0') continue;
if (smatch(option, "visible")) {
httpSetRouteSessionVisibility(state->route, scaselessmatch(ovalue, "visible"));
} else if (smatch(option, "name")) {
httpSetRouteCookie(state->route, ovalue);
} else {
mprLog("error appweb config", 0, "Unknown SessionCookie option %s", option);
return MPR_ERR_BAD_SYNTAX;
}
}
return 0;
} | 227 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | traceDirective | traceDirective( MaState * state , cchar * key , cchar * value) | ['state', 'key', 'value'] | static int traceDirective(MaState *state, cchar *key, cchar *value)
{
HttpRoute *route;
char *option, *ovalue, *tok;
route = state->route;
route->trace = httpCreateTrace(route->trace);
for (option = stok(sclone(value), " \t", &tok); option; option = stok(0, " \t", &tok)) {
option = stok(option, " =\t,", &ovalue);
ovalue = strim(ovalue, "\"'", MPR_TRIM_BOTH);
if (smatch(option, "content")) {
httpSetTraceContentSize(route->trace, (ssize) getnum(ovalue));
} else {
httpSetTraceEventLevel(route->trace, option, atoi(ovalue));
}
}
return 0;
} | 149 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | traceLogDirective | traceLogDirective( MaState * state , cchar * key , cchar * value) | ['state', 'key', 'value'] | static int traceLogDirective(MaState *state, cchar *key, cchar *value)
{
HttpRoute *route;
char *format, *option, *ovalue, *tok, *path, *formatter;
ssize size;
int flags, backup, level;
route = state->route;
size = MAXINT;
backup = 0;
flags = 0;
path = 0;
format = ME_HTTP_LOG_FORMAT;
formatter = "detail";
level = 0;
if (route->trace->flags & MPR_LOG_CMDLINE) {
mprLog("info appweb config", 4, "Already tracing. Ignoring TraceLog directive");
return 0;
}
for (option = maGetNextArg(sclone(value), &tok); option; option = maGetNextArg(tok, &tok)) {
if (!path) {
path = sclone(option);
} else {
option = stok(option, " =\t,", &ovalue);
ovalue = strim(ovalue, "\"'", MPR_TRIM_BOTH);
if (smatch(option, "anew")) {
flags |= MPR_LOG_ANEW;
} else if (smatch(option, "backup")) {
backup = atoi(ovalue);
} else if (smatch(option, "format")) {
format = ovalue;
} else if (smatch(option, "level")) {
level = (int) stoi(ovalue);
} else if (smatch(option, "size")) {
size = (ssize) getnum(ovalue);
} else if (smatch(option, "formatter")) {
formatter = ovalue;
} else {
mprLog("error appweb config", 0, "Unknown TraceLog option %s", option);
}
}
}
if (size < HTTP_TRACE_MIN_LOG_SIZE) {
size = HTTP_TRACE_MIN_LOG_SIZE;
}
if (path == 0) {
mprLog("error appweb config", 0, "Missing TraceLog filename");
return MPR_ERR_BAD_SYNTAX;
}
if (formatter) {
httpSetTraceFormatterName(route->trace, formatter);
}
if (!smatch(path, "stdout") && !smatch(path, "stderr")) {
path = httpMakePath(route, state->configDir, path);
}
route->trace = httpCreateTrace(route->trace);
if (httpSetTraceLogFile(route->trace, path, size, backup, format, flags) < 0) {
return MPR_ERR_CANT_OPEN;
}
httpSetTraceLevel(level);
return 0;
} | 425 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | virtualHostDirective | virtualHostDirective( MaState * state , cchar * key , cchar * value) | ['state', 'key', 'value'] | static int virtualHostDirective(MaState *state, cchar *key, cchar *value)
{
state = maPushState(state);
if (state->enabled) {
/*
Inherit the current default route configuration (only)
Other routes are not inherited due to the reset routes below
*/
state->route = httpCreateInheritedRoute(httpGetHostDefaultRoute(state->host));
state->route->ssl = 0;
state->auth = state->route->auth;
state->host = httpCloneHost(state->host);
httpResetRoutes(state->host);
httpSetRouteHost(state->route, state->host);
httpSetHostDefaultRoute(state->host, state->route);
/* Set a default host and route name */
if (value) {
httpSetHostName(state->host, stok(sclone(value), " \t,", NULL));
httpSetRouteName(state->route, sfmt("default-%s", state->host->name));
/*
Save the endpoints until the close of the VirtualHost to closeVirtualHostDirective can
add the virtual host to the specified endpoints.
*/
state->endpoints = sclone(value);
}
}
return 0;
} | 158 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | findExecutable | findExecutable( HttpConn * conn , char ** program , char ** script , char ** bangScript , cchar * fileName) | ['conn', 'program', 'script', 'bangScript', 'fileName'] | static void findExecutable(HttpConn *conn, char **program, char **script, char **bangScript, cchar *fileName)
{
HttpRx *rx;
HttpTx *tx;
HttpRoute *route;
MprKey *kp;
MprFile *file;
cchar *actionProgram, *ext, *cmdShell, *cp, *start, *path;
char *tok, buf[ME_MAX_FNAME + 1];
rx = conn->rx;
tx = conn->tx;
route = rx->route;
*bangScript = 0;
*script = 0;
*program = 0;
path = 0;
actionProgram = mprGetMimeProgram(rx->route->mimeTypes, rx->mimeType);
ext = tx->ext;
/*
If not found, go looking for the fileName with the extensions defined in appweb.conf.
NOTE: we don't use PATH deliberately!!!
*/
if (access(fileName, X_OK) < 0) {
for (kp = 0; (kp = mprGetNextKey(route->extensions, kp)) != 0; ) {
path = sjoin(fileName, ".", kp->key, NULL);
if (access(path, X_OK) == 0) {
break;
}
path = 0;
}
if (kp) {
ext = kp->key;
} else {
path = fileName;
}
} else {
path = fileName;
}
assert(path && *path);
#if ME_WIN_LIKE
if (ext && (strcmp(ext, ".bat") == 0 || strcmp(ext, ".cmd") == 0)) {
/*
Let a mime action override COMSPEC
*/
if (actionProgram) {
cmdShell = actionProgram;
} else {
cmdShell = getenv("COMSPEC");
}
if (cmdShell == 0) {
cmdShell = "cmd.exe";
}
*script = sclone(path);
*program = sclone(cmdShell);
return;
}
#endif
if (actionProgram) {
*program = sclone(actionProgram);
} else if ((file = mprOpenFile(path, O_RDONLY, 0)) != 0) {
if (mprReadFile(file, buf, ME_MAX_FNAME) > 0) {
mprCloseFile(file);
buf[ME_MAX_FNAME] = '\0';
if (buf[0] == '#' && buf[1] == '!') {
cp = start = &buf[2];
cmdShell = stok(&buf[2], "\r\n", &tok);
if (!mprIsPathAbs(cmdShell)) {
/*
If we cannot access the command shell and the command is not an absolute path,
look in the same directory as the script.
*/
if (mprPathExists(cmdShell, X_OK)) {
cmdShell = mprJoinPath(mprGetPathDir(path), cmdShell);
}
}
*program = sclone(cmdShell);
*bangScript = sclone(path);
return;
}
} else {
mprCloseFile(file);
}
}
if (actionProgram) {
*program = sclone(actionProgram);
*bangScript = sclone(path);
} else {
*program = sclone(path);
}
return;
} | 512 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | parseCgiHeaders | parseCgiHeaders( Cgi * cgi , HttpPacket * packet) | ['cgi', 'packet'] | static bool parseCgiHeaders(Cgi *cgi, HttpPacket *packet)
{
HttpConn *conn;
MprBuf *buf;
char *endHeaders, *headers, *key, *value, *junk;
ssize blen;
int len;
conn = cgi->conn;
value = 0;
buf = packet->content;
headers = mprGetBufStart(buf);
blen = mprGetBufLength(buf);
/*
Split the headers from the body. Add null to ensure we can search for line terminators.
*/
len = 0;
if ((endHeaders = sncontains(headers, "\r\n\r\n", blen)) == NULL) {
if ((endHeaders = sncontains(headers, "\n\n", blen)) == NULL) {
if (mprGetCmdFd(cgi->cmd, MPR_CMD_STDOUT) >= 0 && strlen(headers) < ME_MAX_HEADERS) {
/* Not EOF and less than max headers and have not yet seen an end of headers delimiter */
return 0;
}
}
len = 2;
} else {
len = 4;
}
if (endHeaders > buf->end) {
assert(endHeaders <= buf->end);
return 0;
}
if (endHeaders) {
endHeaders[len - 1] = '\0';
endHeaders += len;
}
/*
Want to be tolerant of CGI programs that omit the status line.
*/
if (strncmp((char*) buf->start, "HTTP/1.", 7) == 0) {
if (!parseFirstCgiResponse(cgi, packet)) {
/* httpError already called */
return 0;
}
}
if (endHeaders && strchr(mprGetBufStart(buf), ':')) {
while (mprGetBufLength(buf) > 0 && buf->start[0] && (buf->start[0] != '\r' && buf->start[0] != '\n')) {
if ((key = getCgiToken(buf, ":")) == 0) {
key = "Bad Header";
}
value = getCgiToken(buf, "\n");
while (isspace((uchar) *value)) {
value++;
}
len = (int) strlen(value);
while (len > 0 && (value[len - 1] == '\r' || value[len - 1] == '\n')) {
value[len - 1] = '\0';
len--;
}
key = slower(key);
if (strcmp(key, "location") == 0) {
cgi->location = value;
} else if (strcmp(key, "status") == 0) {
httpSetStatus(conn, atoi(value));
} else if (strcmp(key, "content-type") == 0) {
httpSetHeaderString(conn, "Content-Type", value);
} else if (strcmp(key, "content-length") == 0) {
httpSetContentLength(conn, (MprOff) stoi(value));
httpSetChunkSize(conn, 0);
} else {
/*
Now pass all other headers back to the client
*/
key = stok(key, ":\r\n\t ", &junk);
httpSetHeaderString(conn, key, value);
}
}
buf->start = endHeaders;
}
return 1;
} | 517 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | app_env | app_env( Ejs * ejs , EjsObj * app , int argc , EjsObj ** argv) | ['ejs', 'app', 'argc', 'argv'] | static EjsAny *app_env(Ejs *ejs, EjsObj *app, int argc, EjsObj **argv)
{
#if VXWORKS
return ESV(null);
#else
EjsPot *result;
char **ep, *pair, *key, *value;
result = ejsCreatePot(ejs, ESV(Object), 0);
for (ep = environ; ep && *ep; ep++) {
pair = sclone(*ep);
key = stok(pair, "=", &value);
ejsSetPropertyByName(ejs, result, EN(key), ejsCreateStringFromAsc(ejs, value));
}
return result;
#endif
} | 114 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | getTokenValue | getTokenValue( Ejs * ejs , EjsObj * obj , cchar * fullToken , cchar * token , MprBuf * buf , EjsAny * missing , EjsString * join) | ['ejs', 'obj', 'fullToken', 'token', 'buf', 'missing', 'join'] | static int getTokenValue(Ejs *ejs, EjsObj *obj, cchar *fullToken, cchar *token, MprBuf *buf, EjsAny *missing,
EjsString *join)
{
EjsAny *vp;
EjsString *svalue;
EjsName qname;
char *rest, *first, *str;
rest = (char*) (schr(token, '.') ? sclone(token) : token);
first = stok(rest, ".", &rest);
qname.name = ejsCreateStringFromAsc(ejs, first);
qname.space = 0;
if ((vp = ejsGetPropertyByName(ejs, obj, qname)) != 0) {
if (rest && ejsIsPot(ejs, vp)) {
return getTokenValue(ejs, vp, fullToken, rest, buf, missing, join);
} else {
if (ejsIs(ejs, vp, Array)) {
svalue = ejsJoinArray(ejs, vp, join);
} else {
svalue = ejsToString(ejs, vp);
}
mprPutStringToBuf(buf, svalue->value);
}
} else if (!missing || (vp == ESV(null) || vp == ESV(undefined))) {
ejsThrowReferenceError(ejs, "Missing property %s", fullToken);
return 0;
} else if (missing == ESV(true)) {
mprPutStringToBuf(buf, "${");
mprPutStringToBuf(buf, fullToken);
mprPutCharToBuf(buf, '}');
} else if (missing == ESV(false)) {
/* Omit */;
} else {
str = ejsToMulti(ejs, missing);
// DEPRECATE LEGACY
if (smatch(str, "${}")) {
mprPutStringToBuf(buf, "${");
mprPutStringToBuf(buf, fullToken);
mprPutCharToBuf(buf, '}');
} else {
mprPutStringToBuf(buf, str);
}
}
return 1;
} | 341 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | http_info | http_info( Ejs * ejs , EjsHttp * hp , int argc , EjsObj ** argv) | ['ejs', 'hp', 'argc', 'argv'] | static EjsObj *http_info(Ejs *ejs, EjsHttp *hp, int argc, EjsObj **argv)
{
EjsObj *obj;
char *key, *next, *value;
if (hp->conn && hp->conn->sock) {
obj = ejsCreateEmptyPot(ejs);
for (key = stok(mprGetSocketState(hp->conn->sock), ",", &next); key; key = stok(NULL, ",", &next)) {
stok(key, "=", &value);
ejsSetPropertyByName(ejs, obj, EN(key), ejsCreateStringFromAsc(ejs, value));
}
return obj;
}
return ESV(null);
} | 129 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | asNumber | asNumber( cchar * version) | ['version'] | static int64 asNumber(cchar *version)
{
char *tok;
int64 major, minor, patch;
major = stoi(stok(sclone(version), ".", &tok));
minor = stoi(stok(tok, ".", &tok));
patch = stoi(stok(tok, ".", &tok));
return (((major * VER_FACTOR) + minor) * VER_FACTOR) + patch;
} | 84 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | blendSpec | blendSpec( cchar * name , cchar * version , MprJson * spec) | ['name', 'version', 'spec'] | static bool blendSpec(cchar *name, cchar *version, MprJson *spec)
{
MprJson *blend, *cp, *scripts;
cchar *script, *key;
char *major, *minor, *patch;
int i;
/*
Before blending, expand ${var} references
*/
if ((scripts = mprGetJsonObj(spec, "app.client.+scripts")) != 0) {
for (ITERATE_JSON(scripts, cp, i)) {
if (!(cp->type & MPR_JSON_STRING)) continue;
script = httpExpandRouteVars(app->route, cp->value);
script = stemplateJson(script, app->config);
mprSetJson(spec, sfmt("app.client.+scripts[@=%s]", cp->value), script);
}
}
blend = mprGetJsonObj(spec, "blend");
for (ITERATE_JSON(blend, cp, i)) {
blendJson(app->config, cp->name, spec, cp->value);
}
if (mprGetJsonObj(spec, "app") != 0) {
blendJson(app->config, "app", spec, "app");
}
if (mprGetJsonObj(spec, "directories") != 0) {
blendJson(app->config, "directories", spec, "directories");
}
if (mprLookupKey(app->topDeps, name)) {
major = stok(sclone(version), ".", &minor);
minor = stok(minor, ".", &patch);
key = sfmt("dependencies.%s", name);
if (!mprGetJson(app->config, key)) {
mprSetJson(app->config, key, sfmt("~%s.%s", major, minor));
}
}
return 1;
} | 304 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | createMigration | createMigration( cchar * name , cchar * table , cchar * comment , int fieldCount , char ** fields) | ['name', 'table', 'comment', 'fieldCount', 'fields'] | static void createMigration(cchar *name, cchar *table, cchar *comment, int fieldCount, char **fields)
{
MprHash *tokens;
MprList *files;
MprDirEntry *dp;
cchar *dir, *seq, *forward, *backward, *data, *path, *def, *field, *tail, *typeDefine;
char *typeString;
int i, type, next;
seq = sfmt("%s%d", mprGetDate("%Y%m%d%H%M%S"), nextMigration);
forward = sfmt(" ediAddTable(db, \"%s\");\n", table);
backward = sfmt(" ediRemoveTable(db, \"%s\");\n", table);
def = sfmt(" ediAddColumn(db, \"%s\", \"id\", EDI_TYPE_INT, EDI_AUTO_INC | EDI_INDEX | EDI_KEY);\n", table);
forward = sjoin(forward, def, NULL);
for (i = 0; i < fieldCount; i++) {
field = stok(sclone(fields[i]), ":", &typeString);
if ((type = ediParseTypeString(typeString)) < 0) {
fail("Unknown type '%s' for field '%s'", typeString, field);
return;
}
if (smatch(field, "id")) {
continue;
}
typeDefine = sfmt("EDI_TYPE_%s", supper(ediGetTypeString(type)));
def = sfmt(" ediAddColumn(db, \"%s\", \"%s\", %s, 0);\n", table, field, typeDefine);
forward = sjoin(forward, def, NULL);
}
tokens = mprDeserialize(sfmt("{ MIGRATION: '%s', TABLE: '%s', COMMENT: '%s', FORWARD: '%s', BACKWARD: '%s' }",
name, table, comment, forward, backward));
if ((data = getTemplate("migration", tokens)) == 0) {
return;
}
dir = mprJoinPath(httpGetDir(app->route, "db"), "migrations");
makeEspDir(dir);
files = mprGetPathFiles("db/migrations", MPR_PATH_RELATIVE);
tail = sfmt("%s.c", name);
for (ITERATE_ITEMS(files, dp, next)) {
if (sends(dp->name, tail)) {
if (!app->force) {
qtrace("Exists", "A migration with the same description already exists: %s", dp->name);
return;
}
mprDeletePath(mprJoinPath("db/migrations/", dp->name));
}
}
path = sfmt("%s/%s_%s.c", dir, seq, name);
makeEspFile(path, data, 0);
} | 400 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | editPackageValue | editPackageValue( int argc , char ** argv) | ['argc', 'argv'] | static void editPackageValue(int argc, char **argv)
{
cchar *key, *value;
int i;
if (argc < 1) {
usageError();
return;
}
for (i = 0; i < argc; i++) {
key = stok(sclone(argv[i]), "=", (char**) &value);
if (value) {
setPackageKey(key, value);
} else {
value = getConfigValue(key, 0);
if (value) {
printf("%s\n", value);
} else {
printf("undefined\n");
}
}
}
} | 118 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | findAcceptableVersion | findAcceptableVersion( cchar * name , cchar * originalCriteria) | ['name', 'originalCriteria'] | static cchar *findAcceptableVersion(cchar *name, cchar *originalCriteria)
{
MprDirEntry *dp;
MprList *files;
cchar *criteria;
int next;
criteria = originalCriteria;
if (!criteria || smatch(criteria, "*")) {
criteria = "x";
}
if (schr(name, '#')) {
name = stok(sclone(name), "#", (char**) &criteria);
}
files = mprGetPathFiles(mprJoinPath(app->paksCacheDir, name), MPR_PATH_RELATIVE);
mprSortList(files, (MprSortProc) reverseSortFiles, 0);
for (ITERATE_ITEMS(files, dp, next)) {
if (acceptableVersion(criteria, dp->name)) {
return dp->name;
}
}
if (originalCriteria) {
fail("Cannot find acceptable version for: \"%s\" with version criteria \"%s\" in %s",
name, originalCriteria, app->paksCacheDir);
} else {
fail("Cannot find pak: \"%s\" in %s", name, app->paksCacheDir);
}
mprLog("", 0, "Use \"pak install %s\" to install", name);
return 0;
} | 185 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | generateScaffold | generateScaffold( int argc , char ** argv) | ['argc', 'argv'] | static void generateScaffold(int argc, char **argv)
{
char *plural;
if (argc < 1) {
usageError();
return;
}
if (getConfigValue("app.esp.generate.controller", 0) == 0) {
fail("No suitable package installed to generate scaffolds");
return;
}
app->controller = sclone(argv[0]);
if (!identifier(app->controller)) {
fail("Cannot generate scaffold. Controller name must be a valid C identifier");
return;
}
/*
This feature is undocumented.
Having plural database table names greatly complicates things and ejsJoin is not able to follow foreign fields: NameId.
*/
stok(sclone(app->controller), "-", &plural);
if (plural) {
app->table = sjoin(app->controller, plural, NULL);
} else {
app->table = app->table ? app->table : app->controller;
}
generateScaffoldController(argc, argv);
generateClientController(argc, argv);
generateScaffoldViews(argc, argv);
generateClientModel(argc, argv);
generateScaffoldMigration(argc, argv);
migrate(0, 0);
} | 177 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | generateTable | generateTable( int argc , char ** argv) | ['argc', 'argv'] | static void generateTable(int argc, char **argv)
{
Edi *edi;
cchar *field;
char *typeString;
int rc, i, type;
app->table = app->table ? app->table : sclone(argv[0]);
if ((edi = app->eroute->edi) == 0) {
fail("Database not defined");
return;
}
edi->flags |= EDI_SUPPRESS_SAVE;
if ((rc = ediAddTable(edi, app->table)) < 0) {
if (rc != MPR_ERR_ALREADY_EXISTS) {
fail("Cannot add table '%s'", app->table);
}
} else {
if ((rc = ediAddColumn(edi, app->table, "id", EDI_TYPE_INT, EDI_AUTO_INC | EDI_INDEX | EDI_KEY)) != 0) {
fail("Cannot add column 'id'");
}
}
for (i = 1; i < argc && !app->error; i++) {
field = stok(sclone(argv[i]), ":", &typeString);
if ((type = ediParseTypeString(typeString)) < 0) {
fail("Unknown type '%s' for field '%s'", typeString, field);
break;
}
if ((rc = ediAddColumn(edi, app->table, field, type, 0)) != 0) {
if (rc != MPR_ERR_ALREADY_EXISTS) {
fail("Cannot add column '%s'", field);
break;
} else {
ediChangeColumn(edi, app->table, field, type, 0);
}
}
}
edi->flags &= ~EDI_SUPPRESS_SAVE;
ediSave(edi);
qtrace("Update", "Database schema");
} | 294 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | getPakVersion | getPakVersion( cchar * name , cchar * version) | ['name', 'version'] | static cchar *getPakVersion(cchar *name, cchar *version)
{
MprDirEntry *dp;
MprList *files;
if (!version || smatch(version, "*")) {
name = stok(sclone(name), "#", (char**) &version);
if (!version) {
files = mprGetPathFiles(mprJoinPath(app->paksCacheDir, name), MPR_PATH_RELATIVE);
mprSortList(files, (MprSortProc) reverseSortFiles, 0);
if ((dp = mprGetFirstItem(files)) != 0) {
version = mprGetPathBase(dp->name);
}
if (version == 0) {
fail("Cannot find pak: %s", name);
return 0;
}
}
}
return version;
} | 133 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | inRange | inRange( cchar * expr , cchar * version) | ['expr', 'version'] | static bool inRange(cchar *expr, cchar *version)
{
char *cp, *op, *base, *pre, *low, *high, *preVersion;
int64 min, max, numberVersion;
ssize i;
if ((i = strspn(expr, "<>=~ \t")) > 0) {
op = snclone(expr, i);
expr = &expr[i];
} else {
op = 0;
}
if (smatch(expr, "*")) {
expr = "x";
}
version = stok(sclone(version), "-", &preVersion);
base = stok(sclone(expr), "-", &pre);
if (op && (*op == '~' || *op == '^')) {
if (*op == '^' && schr(version, '-')) {
return 0;
}
base = slower(base);
if ((cp = scontains(base, ".x")) != 0) {
*cp = '\0';
}
return sstarts(version, base);
}
if (scontains(base, "x") && !schr(version, '-')) {
low = sfmt(">=%s", sreplace(base, "x", "0"));
high = sfmt("<%s", sreplace(base, "x", VER_FACTOR_MAX));
return inRange(low, version) && inRange(high, version);
}
min = 0;
max = MAX_VER;
if (!op) {
min = max = asNumber(base);
} else if (smatch(op, ">=")) {
min = asNumber(base);
} else if (*op == '>') {
min = asNumber(base) + 1;
} else if (smatch(op, "<=")) {
max = asNumber(base);
} else if (*op == '<') {
max = asNumber(base) - 1;
} else {
min = max = asNumber(base);
}
numberVersion = asNumber(version);
if (min <= numberVersion && numberVersion <= max) {
if ((pre && smatch(pre, preVersion)) || (!pre && !preVersion)) {
return 1;
}
}
return 0;
} | 430 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | reverseSortFiles | reverseSortFiles( MprDirEntry ** d1 , MprDirEntry ** d2) | ['d1', 'd2'] | static int reverseSortFiles(MprDirEntry **d1, MprDirEntry **d2)
{
char *base1, *base2, *b1, *b2, *p1, *p2;
int rc;
base1 = mprGetPathBase((*d1)->name);
base2 = mprGetPathBase((*d2)->name);
if (smatch(base1, base2)) {
return 0;
}
b1 = stok(base1, "-", &p1);
b2 = stok(base2, "-", &p2);
rc = scmp(b1, b2);
if (rc == 0) {
if (!p1) {
rc = 1;
} else if (!p2) {
rc = -1;
} else {
rc = scmp(p1, p2);
}
}
return -rc;
} | 153 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | role | role( int argc , char ** argv) | ['argc', 'argv'] | static void role(int argc, char **argv)
{
HttpAuth *auth;
HttpRole *role;
MprJson *abilities;
MprBuf *buf;
MprKey *kp;
cchar *cmd, *def, *key, *rolename;
if ((auth = app->route->auth) == 0) {
fail("Authentication not configured in package.json");
return;
}
if (argc < 2) {
usageError();
return;
}
cmd = argv[0];
rolename = argv[1];
if (smatch(cmd, "remove")) {
key = sfmt("app.http.auth.roles.%s", rolename);
if (mprRemoveJson(app->config, key) < 0) {
fail("Cannot remove %s", key);
return;
}
if (!app->noupdate) {
savePackage();
trace("Remove", "Role %s", rolename);
}
return;
} else if (smatch(cmd, "add")) {
if (smatch(cmd, "add")) {
def = sfmt("[%s]", sjoinArgs(argc - 2, (cchar**) &argv[2], ","));
abilities = mprParseJson(def);
key = sfmt("app.http.auth.roles.%s", rolename);
if (mprSetJsonObj(app->config, key, abilities) < 0) {
fail("Cannot update %s", key);
return;
}
savePackage();
if (!app->noupdate) {
trace("Update", "Role %s", rolename);
}
}
if (app->show) {
trace("Info", "%s %s", rolename, sjoinArgs(argc - 2, (cchar**) &argv[3], " "));
}
} else if (smatch(cmd, "show")) {
if ((role = httpLookupRole(app->route->auth, rolename)) == 0) {
fail("Cannot find role %s", rolename);
return;
}
buf = mprCreateBuf(0, 0);
for (ITERATE_KEYS(role->abilities, kp)) {
mprPutToBuf(buf, "%s ", kp->key);
}
trace("Info", "%s %s", role->name, mprBufToString(buf));
}
} | 403 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | user | user( int argc , char ** argv) | ['argc', 'argv'] | static void user(int argc, char **argv)
{
HttpAuth *auth;
HttpUser *user;
MprJson *credentials;
char *password;
cchar *cmd, *def, *key, *username, *encodedPassword, *roles;
if ((auth = app->route->auth) == 0) {
fail("Authentication not configured in package.json");
return;
}
if (argc < 2) {
usageError();
return;
}
cmd = argv[0];
username = argv[1];
if (smatch(cmd, "remove")) {
if (httpRemoveUser(app->route->auth, username) < 0) {
fail("Cannot remove user %s", username);
return;
}
key = sfmt("app.http.auth.users.%s", username);
if (mprRemoveJson(app->config, key) < 0) {
fail("Cannot remove %s", key);
return;
}
if (!app->noupdate) {
savePackage();
trace("Remove", "User %s", username);
}
return;
} else if (smatch(cmd, "add") || smatch(cmd, "compute")) {
if (argc < 3) {
usageError();
return;
}
password = argv[2];
if (smatch(password, "-")) {
password = getPassword();
}
if (auth->realm == 0 || *auth->realm == '\0') {
fail("An authentication realm has not been defined. Define a \"app.http.auth.realm\" value.");
return;
}
if (smatch(app->cipher, "md5")) {
encodedPassword = mprGetMD5(sfmt("%s:%s:%s", username, auth->realm, password));
} else {
/* This uses the more secure blowfish cipher */
encodedPassword = mprMakePassword(sfmt("%s:%s:%s", username, auth->realm, password), 16, 128);
}
serase(password);
if (smatch(cmd, "add")) {
def = sfmt("{password:'%s',roles:[%s]}", encodedPassword, sjoinArgs(argc - 3, (cchar**) &argv[3], ","));
credentials = mprParseJson(def);
key = sfmt("app.http.auth.users.%s", username);
if (mprSetJsonObj(app->config, key, credentials) < 0) {
fail("Cannot update %s", key);
return;
}
savePackage();
if (!app->noupdate) {
trace("Update", "User %s", username);
}
}
if (smatch(cmd, "compute") || app->show) {
trace("Info", "%s %s %s", username, encodedPassword, sjoinArgs(argc - 3, (cchar**) &argv[3], " "));
}
} else if (smatch(cmd, "show")) {
if ((user = httpLookupUser(app->route->auth, username)) == 0) {
fail("Cannot find user %s", username);
return;
}
roles = sreplace(user->roles, ",", "");
roles = sreplace(roles, " ", " ");
roles = strim(roles, " ", 0);
trace("Info", "%s %s %s", user->name, user->password, roles);
}
} | 575 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | espAddPak | espAddPak( HttpRoute * route , cchar * name , cchar * version) | ['route', 'name', 'version'] | PUBLIC void espAddPak(HttpRoute *route, cchar *name, cchar *version)
{
if (!version || !*version || smatch(version, "0.0.0")) {
version = "*";
}
mprSetJson(route->config, sfmt("dependencies.%s", name), version);
} | 54 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | espBuildScript | espBuildScript( HttpRoute * route , cchar * page , cchar * path , cchar * cacheName , cchar * layout , EspState * state , char ** err) | ['route', 'page', 'path', 'cacheName', 'layout', 'state', 'err'] | PUBLIC char *espBuildScript(HttpRoute *route, cchar *page, cchar *path, cchar *cacheName, cchar *layout,
EspState *state, char **err)
{
EspState top;
EspParse parse;
MprBuf *body;
cchar *layoutsDir;
char *control, *incText, *where, *layoutCode, *bodyCode;
char *rest, *include, *line, *fmt, *layoutPage, *incCode, *token;
ssize len;
int tid;
assert(page);
*err = 0;
if (!state) {
assert(cacheName);
state = ⊤
memset(state, 0, sizeof(EspParse));
state->global = mprCreateBuf(0, 0);
state->start = mprCreateBuf(0, 0);
state->end = mprCreateBuf(0, 0);
}
body = mprCreateBuf(0, 0);
parse.data = (char*) page;
parse.next = parse.data;
parse.lineNumber = 0;
parse.token = mprCreateBuf(0, 0);
tid = getEspToken(&parse);
while (tid != ESP_TOK_EOF) {
token = mprGetBufStart(parse.token);
#if KEEP
if (state->lineNumber != lastLine) {
mprPutToBuf(script, "\n# %d \"%s\"\n", state->lineNumber, path);
}
#endif
switch (tid) {
case ESP_TOK_CODE:
if (*token == '^') {
for (token++; *token && isspace((uchar) *token); token++) ;
where = stok(token, " \t\r\n", &rest);
if (rest == 0) {
;
} else if (scmp(where, "global") == 0) {
mprPutStringToBuf(state->global, rest);
} else if (scmp(where, "start") == 0) {
mprPutToBuf(state->start, "%s ", rest);
} else if (scmp(where, "end") == 0) {
mprPutToBuf(state->end, "%s ", rest);
}
} else {
mprPutStringToBuf(body, fixMultiStrings(token));
}
break;
case ESP_TOK_CONTROL:
control = stok(token, " \t\r\n", &token);
if (scmp(control, "content") == 0) {
mprPutStringToBuf(body, ESP_CONTENT_MARKER);
} else if (scmp(control, "include") == 0) {
if (token == 0) {
token = "";
}
token = strim(token, " \t\r\n\"", MPR_TRIM_BOTH);
token = mprNormalizePath(token);
if (token[0] == '/') {
include = sclone(token);
} else {
include = mprJoinPath(mprGetPathDir(path), token);
}
if ((incText = mprReadPathContents(include, &len)) == 0) {
*err = sfmt("Cannot read include file: %s", include);
return 0;
}
/* Recurse and process the include script */
if ((incCode = espBuildScript(route, incText, include, NULL, NULL, state, err)) == 0) {
return 0;
}
mprPutStringToBuf(body, incCode);
} else if (scmp(control, "layout") == 0) {
token = strim(token, " \t\r\n\"", MPR_TRIM_BOTH);
if (*token == '\0') {
layout = 0;
} else {
token = mprNormalizePath(token);
if (token[0] == '/') {
layout = sclone(token);
} else {
if ((layoutsDir = httpGetDir(route, "layouts")) != 0) {
layout = mprJoinPath(layoutsDir, token);
} else {
layout = mprJoinPath(mprGetPathDir(path), token);
}
}
if (!mprPathExists(layout, F_OK)) {
*err = sfmt("Cannot access layout page %s", layout);
return 0;
}
}
} else {
*err = sfmt("Unknown control %s at line %d", control, state->lineNumber);
return 0;
}
break;
case ESP_TOK_ERR:
return 0;
case ESP_TOK_EXPR:
/* <%= expr %> */
if (*token == '%') {
fmt = stok(token, ": \t\r\n", &token);
if (token == 0) {
token = "";
}
/* Default without format is safe. If users want a format and safe, use %S or renderSafe() */
token = strim(token, " \t\r\n;", MPR_TRIM_BOTH);
mprPutToBuf(body, " espRender(conn, \"%s\", %s);\n", fmt, token);
} else {
token = strim(token, " \t\r\n;", MPR_TRIM_BOTH);
mprPutToBuf(body, " espRenderSafeString(conn, %s);\n", token);
}
break;
case ESP_TOK_FIELD:
/* @#field -- field in the current record */
token = strim(token, " \t\r\n;", MPR_TRIM_BOTH);
mprPutToBuf(body, " espRenderSafeString(conn, getField(getRec(), \"%s\"));\n", token);
break;
case ESP_TOK_PARAM:
/* @@var -- variable in (param || session) - Safe render */
token = strim(token, " \t\r\n;", MPR_TRIM_BOTH);
mprPutToBuf(body, " espRenderVar(conn, \"%s\");\n", token);
break;
case ESP_TOK_VAR:
/* @!var -- string variable */
token = strim(token, " \t\r\n;", MPR_TRIM_BOTH);
mprPutToBuf(body, " espRenderString(conn, %s);\n", token);
break;
case ESP_TOK_HOME:
/* @~ Home URL */
mprPutToBuf(body, " espRenderString(conn, conn->rx->route->prefix);");
break;
case ESP_TOK_SERVER:
/* @^ Server URL */
mprPutToBuf(body, " espRenderString(conn, sjoin(conn->rx->route->prefix ? conn->rx->route->prefix : \"\", conn->rx->route->serverPrefix, NULL));");
break;
case ESP_TOK_LITERAL:
line = joinLine(token, &len);
mprPutToBuf(body, " espRenderBlock(conn, \"%s\", %zd);\n", line, len);
break;
default:
return 0;
}
tid = getEspToken(&parse);
}
mprAddNullToBuf(body);
if (layout && mprPathExists(layout, R_OK)) {
if ((layoutPage = mprReadPathContents(layout, &len)) == 0) {
*err = sfmt("Cannot read layout page: %s", layout);
return 0;
}
if ((layoutCode = espBuildScript(route, layoutPage, layout, NULL, NULL, state, err)) == 0) {
return 0;
}
#if ME_DEBUG
if (!scontains(layoutCode, ESP_CONTENT_MARKER)) {
*err = sfmt("Layout page is missing content marker: %s", layout);
return 0;
}
#endif
bodyCode = sreplace(layoutCode, ESP_CONTENT_MARKER, mprGetBufStart(body));
} else {
bodyCode = mprGetBufStart(body);
}
if (state == &top) {
path = mprGetRelPath(path, route->documents);
if (mprGetBufLength(state->start) > 0) {
mprPutCharToBuf(state->start, '\n');
}
if (mprGetBufLength(state->end) > 0) {
mprPutCharToBuf(state->end, '\n');
}
mprAddNullToBuf(state->global);
mprAddNullToBuf(state->start);
mprAddNullToBuf(state->end);
bodyCode = sfmt(\
"/*\n Generated from %s\n */\n"\
"#include \"esp.h\"\n"\
"%s\n"\
"static void %s(HttpConn *conn) {\n"\
"%s%s%s"\
"}\n\n"\
"%s int esp_%s(HttpRoute *route, MprModule *module) {\n"\
" espDefineView(route, \"%s\", %s);\n"\
" return 0;\n"\
"}\n",
path, mprGetBufStart(state->global), cacheName, mprGetBufStart(state->start), bodyCode, mprGetBufStart(state->end),
ESP_EXPORT_STRING, cacheName, mprGetPortablePath(path), cacheName);
mprDebug("esp", 5, "Create ESP script: \n%s\n", bodyCode);
}
return bodyCode;
} | 1257 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | espLoadApp | espLoadApp( HttpRoute * route) | ['route'] | PUBLIC int espLoadApp(HttpRoute *route)
{
#if !ME_STATIC
EspRoute *eroute;
eroute = route->eroute;
if (!eroute->skipApps) {
MprJson *preload, *item;
cchar *errMsg, *source;
char *kind;
int i;
/*
Note: the config parser pauses GC, so this will never yield
*/
if (!loadApp(route, NULL)) {
return MPR_ERR_CANT_LOAD;
}
if (!route->combine && (preload = mprGetJsonObj(route->config, "esp.preload")) != 0) {
for (ITERATE_JSON(preload, item, i)) {
source = stok(sclone(item->value), ":", &kind);
if (!kind) kind = "controller";
source = mprJoinPath(httpGetDir(route, "controllers"), source);
if (espLoadModule(route, NULL, kind, source, &errMsg) < 0) {
mprLog("error esp", 0, "Cannot preload esp module %s. %s", source, errMsg);
return MPR_ERR_CANT_LOAD;
}
}
}
}
#endif
return 0;
} | 179 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | espOpenDatabase | espOpenDatabase( HttpRoute * route , cchar * spec) | ['route', 'spec'] | PUBLIC int espOpenDatabase(HttpRoute *route, cchar *spec)
{
EspRoute *eroute;
char *provider, *path, *dir;
int flags;
eroute = route->eroute;
if (eroute->edi) {
return 0;
}
flags = EDI_CREATE | EDI_AUTO_SAVE;
if (smatch(spec, "default")) {
#if ME_COM_SQLITE
spec = sfmt("sdb://%s.sdb", eroute->appName);
#elif ME_COM_MDB
spec = sfmt("mdb://%s.mdb", eroute->appName);
#endif
}
provider = stok(sclone(spec), "://", &path);
if (provider == 0 || path == 0) {
return MPR_ERR_BAD_ARGS;
}
path = mprJoinPath(httpGetDir(route, "db"), path);
dir = mprGetPathDir(path);
if (!mprPathExists(dir, X_OK)) {
mprMakeDir(dir, 0755, -1, -1, 1);
}
if ((eroute->edi = ediOpen(mprGetRelPath(path, NULL), provider, flags)) == 0) {
return MPR_ERR_CANT_OPEN;
}
route->database = sclone(spec);
return 0;
} | 204 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | espRouteDirective | espRouteDirective( MaState * state , cchar * key , cchar * value) | ['state', 'key', 'value'] | static int espRouteDirective(MaState *state, cchar *key, cchar *value)
{
EspRoute *eroute;
HttpRoute *route;
cchar *methods, *name, *pattern, *source, *target;
char *option, *ovalue, *tok;
pattern = 0;
name = 0;
source = 0;
target = 0;
methods = "GET";
if (scontains(value, "=")) {
for (option = maGetNextArg(sclone(value), &tok); option; option = maGetNextArg(tok, &tok)) {
option = stok(option, "=,", &ovalue);
ovalue = strim(ovalue, "\"'", MPR_TRIM_BOTH);
if (smatch(option, "methods")) {
methods = ovalue;
} else if (smatch(option, "name")) {
name = ovalue;
} else if (smatch(option, "pattern") || smatch(option, "prefix")) {
/* DEPRECATED prefix */
pattern = ovalue;
} else if (smatch(option, "source")) {
source = ovalue;
} else if (smatch(option, "target")) {
target = ovalue;
} else {
mprLog("error esp", 0, "Unknown EspRoute option \"%s\"", option);
}
}
}
if (!pattern || !target) {
return MPR_ERR_BAD_SYNTAX;
}
if (target == 0 || *target == 0) {
target = "$&";
}
target = stemplate(target, state->route->vars);
if ((route = httpDefineRoute(state->route, name, methods, pattern, target, source)) == 0) {
return MPR_ERR_CANT_CREATE;
}
httpSetRouteHandler(route, "espHandler");
if ((eroute = getEroute(route)) == 0) {
return MPR_ERR_MEMORY;
}
if (name) {
eroute->appName = sclone(name);
}
return 0;
} | 349 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | getVxCPU | getVxCPU( cchar * arch) | ['arch'] | static cchar *getVxCPU(cchar *arch)
{
char *cpu, *family;
family = stok(sclone(arch), ":", &cpu);
if (!cpu || *cpu == '\0') {
if (smatch(family, "i386")) {
cpu = "I80386";
} else if (smatch(family, "i486")) {
cpu = "I80486";
} else if (smatch(family, "x86") | sends(family, "86")) {
cpu = "PENTIUM";
} else if (scaselessmatch(family, "mips")) {
cpu = "MIPS32";
} else if (scaselessmatch(family, "arm")) {
cpu = "ARM7TDMI";
} else if (scaselessmatch(family, "ppc")) {
cpu = "PPC";
} else {
cpu = (char*) arch;
}
}
return supper(cpu);
} | 161 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | runAction | runAction( HttpConn * conn) | ['conn'] | static int runAction(HttpConn *conn)
{
HttpRx *rx;
HttpRoute *route;
EspRoute *eroute;
EspReq *req;
EspAction action;
cchar *controllersDir;
char *actionName, *key, *filename, *source;
rx = conn->rx;
req = conn->reqData;
route = rx->route;
eroute = route->eroute;
assert(eroute);
if (eroute->edi && eroute->edi->flags & EDI_PRIVATE) {
cloneDatabase(conn);
} else {
req->edi = eroute->edi;
}
if (route->sourceName == 0 || *route->sourceName == '\0') {
if (eroute->commonController) {
(eroute->commonController)(conn);
}
return 1;
}
/*
Expand any form var $tokens. This permits ${controller} and user form data to be used in the controller name
*/
filename = schr(route->sourceName, '$') ? stemplateJson(route->sourceName, rx->params) : route->sourceName;
controllersDir = httpGetDir(route, "controllers");
source = controllersDir ? mprJoinPath(controllersDir, filename) : mprJoinPath(route->home, filename);
#if !ME_STATIC
key = mprJoinPath(controllersDir, rx->target);
if (!route->combine && (route->update || !mprLookupKey(esp->actions, key))) {
cchar *errMsg;
if (espLoadModule(route, conn->dispatcher, "controller", source, &errMsg) < 0) {
httpError(conn, HTTP_CODE_NOT_FOUND, "%s", errMsg);
return 0;
}
}
#endif /* !ME_STATIC */
key = mprJoinPath(controllersDir, rx->target);
if ((action = mprLookupKey(esp->actions, key)) == 0) {
if (!pageExists(conn)) {
/*
Actions are registered as: source/TARGET where TARGET is typically CONTROLLER-ACTION
*/
key = sfmt("%s/missing", mprGetPathDir(source));
if ((action = mprLookupKey(esp->actions, key)) == 0) {
if ((action = mprLookupKey(esp->actions, "missing")) == 0) {
httpError(conn, HTTP_CODE_NOT_FOUND, "Missing action for \"%s\"", rx->target);
return 0;
}
}
}
}
if (route->flags & HTTP_ROUTE_XSRF && !(rx->flags & HTTP_GET)) {
if (!httpCheckSecurityToken(conn)) {
httpSetStatus(conn, HTTP_CODE_UNAUTHORIZED);
if (smatch(route->responseFormat, "json")) {
httpTrace(conn, "esp.xsrf.error", "error", 0);
espRenderString(conn,
"{\"retry\": true, \"success\": 0, \"feedback\": {\"error\": \"Security token is stale. Please retry.\"}}");
espFinalize(conn);
} else {
httpError(conn, HTTP_CODE_UNAUTHORIZED, "Security token is stale. Please reload page.");
}
return 0;
}
}
if (action) {
httpSetParam(conn, "controller", stok(sclone(rx->target), "-", &actionName));
httpSetParam(conn, "action", actionName);
if (eroute->commonController) {
(eroute->commonController)(conn);
}
if (!httpIsFinalized(conn)) {
(action)(conn);
}
}
return 1;
} | 540 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | startEspAppDirective | startEspAppDirective( MaState * state , cchar * key , cchar * value) | ['state', 'key', 'value'] | static int startEspAppDirective(MaState *state, cchar *key, cchar *value)
{
HttpRoute *route;
cchar *auth, *database, *name, *prefix, *dir, *routeSet, *combine;
char *option, *ovalue, *tok;
dir = ".";
routeSet = 0;
combine = 0;
prefix = 0;
database = 0;
auth = 0;
name = 0;
if (scontains(value, "=")) {
for (option = maGetNextArg(sclone(value), &tok); option; option = maGetNextArg(tok, &tok)) {
option = stok(option, " =\t,", &ovalue);
ovalue = strim(ovalue, "\"'", MPR_TRIM_BOTH);
if (smatch(option, "auth")) {
auth = ovalue;
} else if (smatch(option, "database")) {
database = ovalue;
} else if (smatch(option, "dir")) {
dir = ovalue;
} else if (smatch(option, "combine")) {
combine = ovalue;
#if DEPRECATED || 1
} else if (smatch(option, "combined")) {
combine = ovalue;
#endif
} else if (smatch(option, "name")) {
name = ovalue;
} else if (smatch(option, "prefix")) {
prefix = ovalue;
} else if (smatch(option, "routes")) {
routeSet = ovalue;
} else {
mprLog("error esp", 0, "Unknown EspApp option \"%s\"", option);
}
}
}
if (mprSamePath(state->route->documents, dir)) {
/*
Can use existing route as it has the same prefix and documents directory.
*/
route = state->route;
} else {
route = httpCreateInheritedRoute(state->route);
}
state->route = route;
if (auth) {
if (httpSetAuthStore(route->auth, auth) < 0) {
mprLog("error esp", 0, "The %s AuthStore is not available on this platform", auth);
return MPR_ERR_BAD_STATE;
}
}
if (combine) {
route->combine = scaselessmatch(combine, "true") || smatch(combine, "1");
}
if (database) {
if (espDbDirective(state, key, database) < 0) {
return MPR_ERR_BAD_STATE;
}
}
if (espDefineApp(route, dir, name, prefix, routeSet) < 0) {
return MPR_ERR_CANT_CREATE;
}
if (prefix) {
espSetConfig(route, "esp.appPrefix", prefix);
}
return 0;
} | 446 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | updateFields | updateFields( cchar * tableName , MprJson * params) | ['tableName', 'params'] | PUBLIC bool updateFields(cchar *tableName, MprJson *params)
{
EdiRec *rec;
cchar *key;
key = mprLookupJson(params, "id");
if ((rec = ediSetFields(ediReadRec(getDatabase(), tableName, key), params)) == 0) {
return 0;
}
return updateRec(rec);
} | 64 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | addFormVars | addFormVars( cchar * buf) | ['buf'] | static void addFormVars(cchar *buf)
{
char *pair, *tok;
pair = stok(sclone(buf), "&", &tok);
while (pair != 0) {
mprAddItem(app->formData, sclone(pair));
pair = stok(0, "&", &tok);
}
} | 62 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | addParamsFromBuf | addParamsFromBuf( HttpConn * conn , cchar * buf , ssize len) | ['conn', 'buf', 'len'] | static void addParamsFromBuf(HttpConn *conn, cchar *buf, ssize len)
{
MprJson *params, *prior;
char *newValue, *decoded, *keyword, *value, *tok;
assert(conn);
params = httpGetParams(conn);
decoded = mprAlloc(len + 1);
decoded[len] = '\0';
memcpy(decoded, buf, len);
keyword = stok(decoded, "&", &tok);
while (keyword != 0) {
if ((value = strchr(keyword, '=')) != 0) {
*value++ = '\0';
value = mprUriDecode(value);
} else {
value = MPR->emptyString;
}
keyword = mprUriDecode(keyword);
if (*keyword) {
/*
Append to existing keywords
*/
prior = mprLookupJsonObj(params, keyword);
if (prior && prior->type == MPR_JSON_VALUE) {
if (*value) {
newValue = sjoin(prior->value, " ", value, NULL);
mprSetJson(params, keyword, newValue);
}
} else {
mprSetJson(params, keyword, value);
}
}
keyword = stok(0, "&", &tok);
}
} | 224 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | blendMode | blendMode( HttpRoute * route , MprJson * config) | ['route', 'config'] | static void blendMode(HttpRoute *route, MprJson *config)
{
MprJson *currentMode, *app;
cchar *mode;
mode = mprGetJson(config, "app.mode");
if (!mode) {
mode = sclone("debug");
}
route->debug = smatch(mode, "debug");
if ((currentMode = mprGetJsonObj(config, sfmt("app.modes.%s", mode))) != 0) {
app = mprLookupJsonObj(config, "app");
mprBlendJson(app, currentMode, MPR_JSON_OVERWRITE);
mprSetJson(app, "app.mode", mode);
}
} | 106 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | clientCopy | clientCopy( HttpRoute * route , MprJson * dest , MprJson * obj) | ['route', 'dest', 'obj'] | static void clientCopy(HttpRoute *route, MprJson *dest, MprJson *obj)
{
MprJson *child, *job, *jvalue;
cchar *key, *value;
int ji;
for (ITERATE_CONFIG(route, obj, child, ji)) {
if (child->type & MPR_JSON_OBJ) {
job = mprCreateJson(MPR_JSON_OBJ);
clientCopy(route, job, child);
mprSetJsonObj(dest, child->name, job);
} else {
key = child->value;
if (sends(key, "|time")) {
key = stok(sclone(key), " \t|", NULL);
if ((value = mprGetJson(route->config, key)) != 0) {
mprSetJson(dest, child->name, itos(httpGetTicks(value)));
}
} else {
if ((jvalue = mprGetJsonObj(route->config, key)) != 0) {
mprSetJsonObj(dest, child->name, mprCloneJson(jvalue));
}
}
}
}
} | 194 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | cmdRemedy | cmdRemedy( MprHash * args) | ['args'] | static void cmdRemedy(MprHash *args)
{
MprCmd *cmd;
cchar **argv;
char *command, *data;
int rc, status, argc, background;
#if DEBUG_IDE && ME_UNIX_LIKE
unsetenv("DYLD_LIBRARY_PATH");
unsetenv("DYLD_FRAMEWORK_PATH");
#endif
if ((cmd = mprCreateCmd(NULL)) == 0) {
return;
}
command = sclone(mprLookupKey(args, "CMD"));
data = 0;
if (scontains(command, "|")) {
data = stok(command, "|", &command);
data = stemplate(data, args);
}
command = strim(command, " \t", MPR_TRIM_BOTH);
if ((background = (sends(command, "&"))) != 0) {
command = strim(command, "&", MPR_TRIM_END);
}
argc = mprMakeArgv(command, &argv, 0);
cmd->stdoutBuf = mprCreateBuf(ME_MAX_BUFFER, -1);
cmd->stderrBuf = mprCreateBuf(ME_MAX_BUFFER, -1);
httpTrace(0, "monitor.remedy.cmd", "context", "remedy:'%s'", command);
if (mprStartCmd(cmd, argc, argv, NULL, MPR_CMD_DETACH | MPR_CMD_IN) < 0) {
httpTrace(0, "monitor.rememdy.cmd.error", "error", "msg:'Cannot start command. %s", command);
return;
}
if (data) {
if (mprWriteCmdBlock(cmd, MPR_CMD_STDIN, data, -1) < 0) {
httpTrace(0, "monitor.remedy.cmd.error", "error", "msg:'Cannot write to command. %s'", command);
return;
}
}
mprFinalizeCmd(cmd);
if (!background) {
rc = mprWaitForCmd(cmd, ME_HTTP_REMEDY_TIMEOUT);
status = mprGetCmdExitStatus(cmd);
if (rc < 0 || status != 0) {
httpTrace(0, "monitor.remedy.cmd.error", "error", "msg:'Remedy failed. %s. %s', command: '%s'",
mprGetBufStart(cmd->stderrBuf), mprGetBufStart(cmd->stdoutBuf), command);
return;
}
mprDestroyCmd(cmd);
}
} | 346 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | expandRequestTokens | expandRequestTokens( HttpConn * conn , char * str) | ['conn', 'str'] | static char *expandRequestTokens(HttpConn *conn, char *str)
{
HttpRx *rx;
HttpTx *tx;
HttpRoute *route;
MprBuf *buf;
HttpLang *lang;
char *tok, *cp, *key, *value, *field, *header, *defaultValue, *state, *v, *p;
assert(conn);
assert(str);
rx = conn->rx;
route = rx->route;
tx = conn->tx;
buf = mprCreateBuf(-1, -1);
tok = 0;
for (cp = str; cp && *cp; ) {
if ((tok = strstr(cp, "${")) == 0) {
break;
}
if (tok > cp) {
mprPutBlockToBuf(buf, cp, tok - cp);
}
if ((key = stok(&tok[2], ".:}", &value)) == 0) {
continue;
}
stok(value, "}", &cp);
if (smatch(key, "header")) {
header = stok(value, "=", &defaultValue);
if ((value = (char*) httpGetHeader(conn, header)) == 0) {
value = defaultValue ? defaultValue : "";
}
mprPutStringToBuf(buf, value);
} else if (smatch(key, "param")) {
field = stok(value, "=", &defaultValue);
if (defaultValue == 0) {
defaultValue = "";
}
mprPutStringToBuf(buf, httpGetParam(conn, field, defaultValue));
} else if (smatch(key, "request")) {
value = stok(value, "=", &defaultValue);
// OPT with switch on first char
if (smatch(value, "authenticated")) {
mprPutStringToBuf(buf, rx->authenticated ? "true" : "false");
} else if (smatch(value, "clientAddress")) {
mprPutStringToBuf(buf, conn->ip);
} else if (smatch(value, "clientPort")) {
mprPutIntToBuf(buf, conn->port);
} else if (smatch(value, "error")) {
mprPutStringToBuf(buf, conn->errorMsg);
} else if (smatch(value, "ext")) {
mprPutStringToBuf(buf, rx->parsedUri->ext);
} else if (smatch(value, "extraPath")) {
mprPutStringToBuf(buf, rx->extraPath);
} else if (smatch(value, "filename")) {
mprPutStringToBuf(buf, tx->filename);
} else if (scaselessmatch(value, "language")) {
if (!defaultValue) {
defaultValue = route->defaultLanguage;
}
if ((lang = httpGetLanguage(conn, route->languages, defaultValue)) != 0) {
mprPutStringToBuf(buf, lang->suffix);
} else {
mprPutStringToBuf(buf, defaultValue);
}
} else if (scaselessmatch(value, "languageDir")) {
lang = httpGetLanguage(conn, route->languages, 0);
if (!defaultValue) {
defaultValue = ".";
}
mprPutStringToBuf(buf, lang ? lang->path : defaultValue);
} else if (smatch(value, "host")) {
/* Includes port if present */
mprPutStringToBuf(buf, rx->parsedUri->host);
} else if (smatch(value, "method")) {
mprPutStringToBuf(buf, rx->method);
} else if (smatch(value, "originalUri")) {
mprPutStringToBuf(buf, rx->originalUri);
} else if (smatch(value, "pathInfo")) {
mprPutStringToBuf(buf, rx->pathInfo);
} else if (smatch(value, "prefix")) {
mprPutStringToBuf(buf, route->prefix);
} else if (smatch(value, "query")) {
mprPutStringToBuf(buf, rx->parsedUri->query);
} else if (smatch(value, "reference")) {
mprPutStringToBuf(buf, rx->parsedUri->reference);
} else if (smatch(value, "scheme")) {
if (rx->parsedUri->scheme) {
mprPutStringToBuf(buf, rx->parsedUri->scheme);
} else {
mprPutStringToBuf(buf, (conn->secure) ? "https" : "http");
}
} else if (smatch(value, "scriptName")) {
mprPutStringToBuf(buf, rx->scriptName);
} else if (smatch(value, "serverAddress")) {
/* Pure IP address, no port. See "serverPort" */
mprPutStringToBuf(buf, conn->sock->acceptIp);
} else if (smatch(value, "serverPort")) {
mprPutIntToBuf(buf, conn->sock->acceptPort);
} else if (smatch(value, "uri")) {
mprPutStringToBuf(buf, rx->uri);
}
} else if (smatch(key, "ssl")) {
value = stok(value, "=", &defaultValue);
if (smatch(value, "state")) {
mprPutStringToBuf(buf, mprGetSocketState(conn->sock));
} else {
state = mprGetSocketState(conn->sock);
if ((p = scontains(state, value)) != 0) {
stok(p, "=", &v);
mprPutStringToBuf(buf, stok(v, ", ", NULL));
}
}
}
}
assert(cp);
if (tok) {
if (tok > cp) {
mprPutBlockToBuf(buf, tok, tok - cp);
}
} else {
mprPutStringToBuf(buf, cp);
}
mprAddNullToBuf(buf);
return sclone(mprGetBufStart(buf));
} | 1039 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | httpAddDefense | httpAddDefense( cchar * name , cchar * remedy , cchar * remedyArgs) | ['name', 'remedy', 'remedyArgs'] | PUBLIC int httpAddDefense(cchar *name, cchar *remedy, cchar *remedyArgs)
{
Http *http;
MprHash *args;
MprList *list;
char *arg, *key, *value;
int next;
assert(name && *name);
http = HTTP;
args = mprCreateHash(0, MPR_HASH_STABLE);
list = stolist(remedyArgs);
for (ITERATE_ITEMS(list, arg, next)) {
key = stok(arg, "=", &value);
mprAddKey(args, key, strim(value, "\"'", 0));
}
if (!remedy) {
remedy = mprLookupKey(args, "REMEDY");
}
mprAddKey(http->defenses, name, createDefense(name, remedy, args));
return 0;
} | 147 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | httpCreateCGIParams | httpCreateCGIParams( HttpConn * conn) | ['conn'] | PUBLIC void httpCreateCGIParams(HttpConn *conn)
{
HttpRx *rx;
HttpTx *tx;
HttpHost *host;
HttpUploadFile *file;
MprSocket *sock;
MprHash *svars;
MprJson *params;
int index;
rx = conn->rx;
if ((svars = rx->svars) != 0) {
/* Do only once */
return;
}
svars = rx->svars = mprCreateHash(HTTP_VAR_HASH_SIZE, MPR_HASH_STABLE);
tx = conn->tx;
host = conn->host;
sock = conn->sock;
mprAddKey(svars, "ROUTE_HOME", rx->route->home);
mprAddKey(svars, "AUTH_TYPE", conn->authType);
mprAddKey(svars, "AUTH_USER", conn->username);
mprAddKey(svars, "AUTH_ACL", MPR->emptyString);
mprAddKey(svars, "CONTENT_LENGTH", rx->contentLength);
mprAddKey(svars, "CONTENT_TYPE", rx->mimeType);
mprAddKey(svars, "DOCUMENTS", rx->route->documents);
mprAddKey(svars, "GATEWAY_INTERFACE", sclone("CGI/1.1"));
mprAddKey(svars, "QUERY_STRING", rx->parsedUri->query);
mprAddKey(svars, "REMOTE_ADDR", conn->ip);
mprAddKeyFmt(svars, "REMOTE_PORT", "%d", conn->port);
/*
Set to the same as AUTH_USER
*/
mprAddKey(svars, "REMOTE_USER", conn->username);
mprAddKey(svars, "REQUEST_METHOD", rx->method);
mprAddKey(svars, "REQUEST_TRANSPORT", sclone((char*) ((conn->secure) ? "https" : "http")));
mprAddKey(svars, "SERVER_ADDR", sock->acceptIp);
mprAddKey(svars, "SERVER_NAME", host->name);
mprAddKeyFmt(svars, "SERVER_PORT", "%d", sock->acceptPort);
mprAddKey(svars, "SERVER_PROTOCOL", conn->protocol);
mprAddKey(svars, "SERVER_SOFTWARE", conn->http->software);
/*
For PHP, REQUEST_URI must be the original URI. The SCRIPT_NAME will refer to the new pathInfo
*/
mprAddKey(svars, "REQUEST_URI", rx->originalUri);
/*
URIs are broken into the following: http://{SERVER_NAME}:{SERVER_PORT}{SCRIPT_NAME}{PATH_INFO}
NOTE: Appweb refers to pathInfo as the app relative URI and scriptName as the app address before the pathInfo.
In CGI|PHP terms, the scriptName is the appweb rx->pathInfo and the PATH_INFO is the extraPath.
*/
mprAddKey(svars, "PATH_INFO", rx->extraPath);
mprAddKeyFmt(svars, "SCRIPT_NAME", "%s%s", rx->scriptName, rx->pathInfo);
mprAddKey(svars, "SCRIPT_FILENAME", tx->filename);
if (rx->extraPath) {
/*
Only set PATH_TRANSLATED if extraPath is set (CGI spec)
*/
assert(rx->extraPath[0] == '/');
mprAddKey(svars, "PATH_TRANSLATED", mprNormalizePath(sfmt("%s%s", rx->route->documents, rx->extraPath)));
}
if (rx->files) {
params = httpGetParams(conn);
assert(params);
for (ITERATE_ITEMS(rx->files, file, index)) {
mprSetJson(params, sfmt("FILE_%d_FILENAME", index), file->filename);
mprSetJson(params, sfmt("FILE_%d_CLIENT_FILENAME", index), file->clientFilename);
mprSetJson(params, sfmt("FILE_%d_CONTENT_TYPE", index), file->contentType);
mprSetJson(params, sfmt("FILE_%d_NAME", index), file->name);
mprSetJson(params, sfmt("FILE_%d_SIZE", index), sfmt("%zd", file->size));
}
}
if (conn->http->envCallback) {
conn->http->envCallback(conn);
}
} | 563 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | httpGetIntParam | httpGetIntParam( HttpConn * conn , cchar * var , int defaultValue) | ['conn', 'var', 'defaultValue'] | PUBLIC int httpGetIntParam(HttpConn *conn, cchar *var, int defaultValue)
{
cchar *value;
value = mprLookupJson(httpGetParams(conn), var);
return (value) ? (int) stoi(value) : defaultValue;
} | 46 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | httpGetParam | httpGetParam( HttpConn * conn , cchar * var , cchar * defaultValue) | ['conn', 'var', 'defaultValue'] | PUBLIC cchar *httpGetParam(HttpConn *conn, cchar *var, cchar *defaultValue)
{
cchar *value;
value = mprLookupJson(httpGetParams(conn), var);
return (value) ? value : defaultValue;
} | 41 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | httpGetStreaming | httpGetStreaming( HttpHost * host , cchar * mime , cchar * uri) | ['host', 'mime', 'uri'] | PUBLIC bool httpGetStreaming(HttpHost *host, cchar *mime, cchar *uri)
{
MprKey *kp;
assert(host);
assert(host->streams);
if (schr(mime, ';')) {
mime = stok(sclone(mime), ";", 0);
}
if ((kp = mprLookupKeyEntry(host->streams, mime)) != 0) {
if (kp->data == NULL || sstarts(uri, kp->data)) {
/* Type is set to the enable value */
return kp->type;
}
}
return 1;
} | 103 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | httpSetCredentials | httpSetCredentials( HttpConn * conn , cchar * username , cchar * password , cchar * authType) | ['conn', 'username', 'password', 'authType'] | PUBLIC void httpSetCredentials(HttpConn *conn, cchar *username, cchar *password, cchar *authType)
{
char *ptok;
httpResetCredentials(conn);
if (password == NULL && strchr(username, ':') != 0) {
conn->username = stok(sclone(username), ":", &ptok);
conn->password = sclone(ptok);
} else {
conn->username = sclone(username);
conn->password = sclone(password);
}
if (authType) {
conn->authType = sclone(authType);
}
} | 108 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | httpSetIntParam | httpSetIntParam( HttpConn * conn , cchar * var , int value) | ['conn', 'var', 'value'] | PUBLIC void httpSetIntParam(HttpConn *conn, cchar *var, int value)
{
mprSetJson(httpGetParams(conn), var, sfmt("%d", value));
} | 32 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | httpSetParam | httpSetParam( HttpConn * conn , cchar * var , cchar * value) | ['conn', 'var', 'value'] | PUBLIC void httpSetParam(HttpConn *conn, cchar *var, cchar *value)
{
mprSetJson(httpGetParams(conn), var, value);
} | 28 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | httpTemplate | httpTemplate( HttpConn * conn , cchar * template , MprHash * options) | ['conn', 'template', 'options'] | PUBLIC char *httpTemplate(HttpConn *conn, cchar *template, MprHash *options)
{
MprBuf *buf;
HttpRx *rx;
HttpRoute *route;
cchar *cp, *ep, *value;
char key[ME_MAX_BUFFER];
rx = conn->rx;
route = rx->route;
if (template == 0 || *template == '\0') {
return MPR->emptyString;
}
buf = mprCreateBuf(-1, -1);
for (cp = template; *cp; cp++) {
if (cp == template && *cp == '~') {
mprPutStringToBuf(buf, route->prefix);
} else if (cp == template && *cp == ME_SERVER_PREFIX_CHAR) {
mprPutStringToBuf(buf, route->prefix);
mprPutStringToBuf(buf, route->serverPrefix);
} else if (*cp == '$' && cp[1] == '{' && (cp == template || cp[-1] != '\\')) {
cp += 2;
if ((ep = strchr(cp, '}')) != 0) {
sncopy(key, sizeof(key), cp, ep - cp);
if (options && (value = httpGetOption(options, key, 0)) != 0) {
mprPutStringToBuf(buf, value);
} else if ((value = mprLookupJson(rx->params, key)) != 0) {
mprPutStringToBuf(buf, value);
}
if (value == 0) {
/* Just emit the token name if the token cannot be found */
mprPutStringToBuf(buf, key);
}
cp = ep;
}
} else {
mprPutCharToBuf(buf, *cp);
}
}
mprAddNullToBuf(buf);
return sclone(mprGetBufStart(buf));
} | 320 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | httpTestParam | httpTestParam( HttpConn * conn , cchar * var) | ['conn', 'var'] | PUBLIC int httpTestParam(HttpConn *conn, cchar *var)
{
return mprLookupJsonObj(httpGetParams(conn), var) != 0;
} | 25 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | httpWriteUploadData | httpWriteUploadData( HttpConn * conn , MprList * fileData , MprList * formData) | ['conn', 'fileData', 'formData'] | PUBLIC ssize httpWriteUploadData(HttpConn *conn, MprList *fileData, MprList *formData)
{
char *path, *pair, *key, *value, *name;
cchar *type;
ssize rc;
int next;
rc = 0;
if (formData) {
for (rc = next = 0; rc >= 0 && (pair = mprGetNextItem(formData, &next)) != 0; ) {
key = stok(sclone(pair), "=", &value);
rc += httpWrite(conn->writeq, "%s\r\nContent-Disposition: form-data; name=\"%s\";\r\n", conn->boundary, key);
rc += httpWrite(conn->writeq, "Content-Type: application/x-www-form-urlencoded\r\n\r\n%s\r\n", value);
}
}
if (fileData) {
for (rc = next = 0; rc >= 0 && (path = mprGetNextItem(fileData, &next)) != 0; ) {
if (!mprPathExists(path, R_OK)) {
httpError(conn, HTTP_CODE_NOT_FOUND, "Cannot open %s", path);
return MPR_ERR_CANT_OPEN;
}
name = mprGetPathBase(path);
rc += httpWrite(conn->writeq, "%s\r\nContent-Disposition: form-data; name=\"file%d\"; filename=\"%s\"\r\n",
conn->boundary, next - 1, name);
if ((type = mprLookupMime(MPR->mimeTypes, path)) != 0) {
rc += httpWrite(conn->writeq, "Content-Type: %s\r\n", mprLookupMime(MPR->mimeTypes, path));
}
httpWrite(conn->writeq, "\r\n");
if (blockingFileCopy(conn, path) < 0) {
return MPR_ERR_CANT_WRITE;
}
rc += httpWrite(conn->writeq, "\r\n");
}
}
rc += httpWrite(conn->writeq, "%s--\r\n--", conn->boundary);
return rc;
} | 308 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | parseAll | parseAll( HttpRoute * route , cchar * key , MprJson * prop) | ['route', 'key', 'prop'] | static void parseAll(HttpRoute *route, cchar *key, MprJson *prop)
{
MprJson *routes;
MprJson *child;
int ji;
for (ITERATE_CONFIG(route, prop, child, ji)) {
parseKey(route, key, child);
}
/*
Property order is not guaranteed, so must ensure routes are processed after all outer properties.
*/
if ((routes = mprGetJsonObj(prop, "routes")) != 0) {
parseRoutes(route, key, routes);
}
} | 77 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | parseAuthAutoRoles | parseAuthAutoRoles( HttpRoute * route , cchar * key , MprJson * prop) | ['route', 'key', 'prop'] | static void parseAuthAutoRoles(HttpRoute *route, cchar *key, MprJson *prop)
{
MprHash *abilities;
MprKey *kp;
MprJson *child, *job;
int ji;
if ((job = mprGetJsonObj(route->config, "app.http.auth.roles")) != 0) {
parseAuthRoles(route, "app.http.auth.roles", job);
}
abilities = mprCreateHash(0, 0);
for (ITERATE_CONFIG(route, prop, child, ji)) {
httpComputeRoleAbilities(route->auth, abilities, child->value);
}
if (mprGetHashLength(abilities) > 0) {
job = mprCreateJson(MPR_JSON_ARRAY);
for (ITERATE_KEYS(abilities, kp)) {
mprSetJson(job, "$", kp->key);
}
mprSetJsonObj(route->config, "app.http.auth.auto.abilities", job);
}
} | 150 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | parseAuthUsers | parseAuthUsers( HttpRoute * route , cchar * key , MprJson * prop) | ['route', 'key', 'prop'] | static void parseAuthUsers(HttpRoute *route, cchar *key, MprJson *prop)
{
MprJson *child;
cchar *roles, *password;
int ji;
for (ITERATE_CONFIG(route, prop, child, ji)) {
password = mprGetJson(child, "password");
roles = getList(mprGetJsonObj(child, "roles"));
if (httpAddUser(route->auth, child->name, password, roles) < 0) {
httpParseError(route, "Cannot add user %s", child->name);
break;
}
if (!route->auth->store) {
httpSetAuthStore(route->auth, "config");
}
}
} | 120 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | parseCache | parseCache( HttpRoute * route , cchar * key , MprJson * prop) | ['route', 'key', 'prop'] | static void parseCache(HttpRoute *route, cchar *key, MprJson *prop)
{
MprJson *child;
MprTicks clientLifespan, serverLifespan;
cchar *methods, *extensions, *uris, *mimeTypes, *client, *server;
int flags, ji;
clientLifespan = serverLifespan = 0;
for (ITERATE_CONFIG(route, prop, child, ji)) {
flags = 0;
if ((client = mprGetJson(child, "client")) != 0) {
flags |= HTTP_CACHE_CLIENT;
clientLifespan = httpGetTicks(client);
}
if ((server = mprGetJson(child, "server")) != 0) {
flags |= HTTP_CACHE_SERVER;
serverLifespan = httpGetTicks(server);
}
methods = getList(mprGetJsonObj(child, "methods"));
extensions = getList(mprGetJsonObj(child, "extensions"));
uris = getList(mprGetJsonObj(child, "uris"));
mimeTypes = getList(mprGetJsonObj(child, "mime"));
if (smatch(mprGetJson(child, "unique"), "true")) {
/* Uniquely cache requests with different params */
flags |= HTTP_CACHE_UNIQUE;
}
if (smatch(mprGetJson(child, "manual"), "true")) {
/* User must manually call httpWriteCache */
flags |= HTTP_CACHE_MANUAL;
}
httpAddCache(route, methods, uris, extensions, mimeTypes, clientLifespan, serverLifespan, flags);
}
} | 237 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | parseContentCompress | parseContentCompress( HttpRoute * route , cchar * key , MprJson * prop) | ['route', 'key', 'prop'] | static void parseContentCompress(HttpRoute *route, cchar *key, MprJson *prop)
{
MprJson *child;
int ji;
for (ITERATE_CONFIG(route, prop, child, ji)) {
if (mprGetJson(route->config, sfmt("app.http.content.minify[@ = '%s']", child->value))) {
httpAddRouteMapping(route, child->value, "${1}.gz, min.${1}.gz, min.${1}");
} else {
httpAddRouteMapping(route, child->value, "${1}.gz");
}
}
} | 83 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | parseContentKeep | parseContentKeep( HttpRoute * route , cchar * key , MprJson * prop) | ['route', 'key', 'prop'] | static void parseContentKeep(HttpRoute *route, cchar *key, MprJson *prop)
{
if (mprGetJson(prop, "[@=c]")) {
route->keepSource = 1;
}
} | 33 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | parseContentMinify | parseContentMinify( HttpRoute * route , cchar * key , MprJson * prop) | ['route', 'key', 'prop'] | static void parseContentMinify(HttpRoute *route, cchar *key, MprJson *prop)
{
MprJson *child;
int ji;
for (ITERATE_CONFIG(route, prop, child, ji)) {
/*
Compressed and minified is handled in parseContentCompress
*/
if (mprGetJson(route->config, sfmt("app.http.content.compress[@ = '%s']", child->value)) == 0) {
httpAddRouteMapping(route, child->value, "min.${1}");
}
}
} | 71 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | parseLanguages | parseLanguages( HttpRoute * route , cchar * key , MprJson * prop) | ['route', 'key', 'prop'] | static void parseLanguages(HttpRoute *route, cchar *key, MprJson *prop)
{
MprJson *child;
cchar *path, *prefix, *suffix;
int ji;
for (ITERATE_CONFIG(route, prop, child, ji)) {
if ((prefix = mprGetJson(child, "prefix")) != 0) {
httpAddRouteLanguageSuffix(route, child->name, child->value, HTTP_LANG_BEFORE);
}
if ((suffix = mprGetJson(child, "suffix")) != 0) {
httpAddRouteLanguageSuffix(route, child->name, child->value, HTTP_LANG_AFTER);
}
if ((path = mprGetJson(child, "path")) != 0) {
httpAddRouteLanguageDir(route, child->name, mprGetAbsPath(path));
}
if (smatch(mprGetJson(child, "default"), "default")) {
httpSetRouteDefaultLanguage(route, child->name);
}
}
} | 168 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | parseParams | parseParams( HttpRoute * route , cchar * key , MprJson * prop) | ['route', 'key', 'prop'] | static void parseParams(HttpRoute *route, cchar *key, MprJson *prop)
{
MprJson *child;
cchar *name, *value;
int not, ji;
for (ITERATE_CONFIG(route, prop, child, ji)) {
name = mprGetJson(child, "name");
value = mprGetJson(child, "value");
not = smatch(mprGetJson(child, "equals"), "true") ? 0 : HTTP_ROUTE_NOT;
httpAddRouteParam(route, name, value, not);
}
} | 94 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | parsePipelineFilters | parsePipelineFilters( HttpRoute * route , cchar * key , MprJson * prop) | ['route', 'key', 'prop'] | static void parsePipelineFilters(HttpRoute *route, cchar *key, MprJson *prop)
{
MprJson *child;
cchar *name, *extensions;
int flags, ji;
for (ITERATE_CONFIG(route, prop, child, ji)) {
if (child->type & MPR_JSON_STRING) {
flags = HTTP_STAGE_RX | HTTP_STAGE_TX;
extensions = 0;
name = child->value;
} else {
name = mprGetJson(child, "name");
extensions = getList(mprGetJsonObj(child, "extensions"));
#if KEEP
direction = mprGetJson(child, "direction");
flags |= smatch(direction, "input") ? HTTP_STAGE_RX : 0;
flags |= smatch(direction, "output") ? HTTP_STAGE_TX : 0;
flags |= smatch(direction, "both") ? HTTP_STAGE_RX | HTTP_STAGE_TX : 0;
#else
flags = HTTP_STAGE_RX | HTTP_STAGE_TX;
#endif
}
if (httpAddRouteFilter(route, name, extensions, flags) < 0) {
httpParseError(route, "Cannot add filter %s", name);
break;
}
}
} | 181 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | parseRange | parseRange( HttpConn * conn , char * value) | ['conn', 'value'] | static bool parseRange(HttpConn *conn, char *value)
{
HttpTx *tx;
HttpRange *range, *last, *next;
char *tok, *ep;
tx = conn->tx;
value = sclone(value);
if (value == 0) {
return 0;
}
/*
Step over the "bytes="
*/
stok(value, "=", &value);
for (last = 0; value && *value; ) {
if ((range = mprAllocObj(HttpRange, manageRange)) == 0) {
return 0;
}
/*
A range "-7" will set the start to -1 and end to 8
*/
tok = stok(value, ",", &value);
if (*tok != '-') {
range->start = (ssize) stoi(tok);
} else {
range->start = -1;
}
range->end = -1;
if ((ep = strchr(tok, '-')) != 0) {
if (*++ep != '\0') {
/*
End is one beyond the range. Makes the math easier.
*/
range->end = (ssize) stoi(ep) + 1;
}
}
if (range->start >= 0 && range->end >= 0) {
range->len = (int) (range->end - range->start);
}
if (last == 0) {
tx->outputRanges = range;
} else {
last->next = range;
}
last = range;
}
/*
Validate ranges
*/
for (range = tx->outputRanges; range; range = range->next) {
if (range->end != -1 && range->start >= range->end) {
return 0;
}
if (range->start < 0 && range->end < 0) {
return 0;
}
next = range->next;
if (range->start < 0 && next) {
/* This range goes to the end, so cannot have another range afterwards */
return 0;
}
if (next) {
if (range->end < 0) {
return 0;
}
if (next->start >= 0 && range->end > next->start) {
return 0;
}
}
}
conn->tx->currentRange = tx->outputRanges;
return (last) ? 1: 0;
} | 391 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | parseRedirect | parseRedirect( HttpRoute * route , cchar * key , MprJson * prop) | ['route', 'key', 'prop'] | static void parseRedirect(HttpRoute *route, cchar *key, MprJson *prop)
{
MprJson *child;
cchar *from, *status, *to;
int ji;
if (prop->type & MPR_JSON_STRING) {
if (smatch(prop->value, "secure") ||smatch(prop->value, "https://")) {
httpAddRouteCondition(route, "secure", "https://", HTTP_ROUTE_REDIRECT);
} else {
createRedirectAlias(route, 0, "/", prop->value);
}
} else {
for (ITERATE_CONFIG(route, prop, child, ji)) {
if (child->type & MPR_JSON_STRING) {
from = "/";
to = child->value;
status = "302";
} else {
from = mprGetJson(child, "from");
to = mprGetJson(child, "to");
status = mprGetJson(child, "status");
}
if (smatch(child->value, "secure")) {
httpAddRouteCondition(route, "secure", "https://", HTTP_ROUTE_REDIRECT);
} else {
createRedirectAlias(route, (int) stoi(status), from, to);
}
}
}
} | 208 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | parseResources | parseResources( HttpRoute * route , cchar * key , MprJson * prop) | ['route', 'key', 'prop'] | static void parseResources(HttpRoute *route, cchar *key, MprJson *prop)
{
MprJson *child, *groups, *singletons, *sets;
int ji;
if ((sets = mprGetJsonObj(prop, "sets")) != 0) {
for (ITERATE_CONFIG(route, sets, child, ji)) {
httpAddRouteSet(route, child->value);
}
}
if ((groups = mprGetJsonObj(prop, "groups")) != 0) {
for (ITERATE_CONFIG(route, groups, child, ji)) {
httpAddResourceGroup(route, route->serverPrefix, child->value);
}
}
if ((singletons = mprGetJsonObj(prop, "singletons")) != 0) {
for (ITERATE_CONFIG(route, singletons, child, ji)) {
httpAddResource(route, route->serverPrefix, child->value);
}
}
} | 163 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | parseRoutes | parseRoutes( HttpRoute * route , cchar * key , MprJson * prop) | ['route', 'key', 'prop'] | static void parseRoutes(HttpRoute *route, cchar *key, MprJson *prop)
{
MprJson *child;
HttpRoute *newRoute;
cchar *pattern;
int ji;
if (route->loaded) {
mprLog("warn http config", 1, "Skip reloading routes - must reboot if routes are modified");
return;
}
if (prop->type & MPR_JSON_STRING) {
httpAddRouteSet(route, prop->value);
} else if (prop->type & MPR_JSON_ARRAY) {
key = sreplace(key, ".routes", "");
for (ITERATE_CONFIG(route, prop, child, ji)) {
if (child->type & MPR_JSON_STRING) {
httpAddRouteSet(route, child->value);
} else if (child->type & MPR_JSON_OBJ) {
newRoute = 0;
pattern = mprLookupJson(child, "pattern");
if (pattern) {
newRoute = httpLookupRouteByPattern(route->host, pattern);
if (!newRoute) {
newRoute = httpCreateInheritedRoute(route);
httpSetRouteHost(newRoute, route->host);
}
} else {
newRoute = route;
}
parseAll(newRoute, key, child);
if (newRoute->error) {
break;
}
if (pattern) {
httpFinalizeRoute(newRoute);
}
}
}
}
} | 226 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | parseServerAccount | parseServerAccount( HttpRoute * route , cchar * key , MprJson * prop) | ['route', 'key', 'prop'] | static void parseServerAccount(HttpRoute *route, cchar *key, MprJson *prop)
{
cchar *value;
if ((value = mprGetJson(prop, "user")) != 0) {
if (!smatch(value, "_unchanged_") && !mprGetDebugMode()) {
httpSetGroupAccount(value);
}
}
if ((value = mprGetJson(prop, "user")) != 0) {
if (!smatch(value, "_unchanged_") && !mprGetDebugMode()) {
httpSetUserAccount(value);
}
}
} | 98 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | parseServerLog | parseServerLog( HttpRoute * route , cchar * key , MprJson * prop) | ['route', 'key', 'prop'] | static void parseServerLog(HttpRoute *route, cchar *key, MprJson *prop)
{
MprTicks timestamp;
cchar *location;
ssize size;
int level, anew, backup;
if (mprGetCmdlineLogging()) {
mprLog("warn http config", 4, "Already logging. Ignoring log configuration");
return;
}
location = mprGetJson(prop, "location");
level = (int) stoi(mprGetJson(prop, "level"));
backup = (int) stoi(mprGetJson(prop, "backup"));
anew = smatch(mprGetJson(prop, "anew"), "true");
size = (ssize) httpGetNumber(mprGetJson(prop, "size"));
timestamp = httpGetNumber(mprGetJson(prop, "timestamp"));
if (size < HTTP_TRACE_MIN_LOG_SIZE) {
size = HTTP_TRACE_MIN_LOG_SIZE;
}
if (location == 0) {
httpParseError(route, "Missing location");
return;
}
if (!smatch(location, "stdout") && !smatch(location, "stderr")) {
location = httpMakePath(route, 0, location);
}
mprSetLogBackup(size, backup, anew ? MPR_LOG_ANEW : 0);
if (mprStartLogging(location, 0) < 0) {
httpParseError(route, "Cannot write to error log: %s", location);
return;
}
mprSetLogLevel(level);
mprLogConfig();
if (timestamp) {
httpSetTimestamp(timestamp);
}
} | 249 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | parseServerMonitors | parseServerMonitors( HttpRoute * route , cchar * key , MprJson * prop) | ['route', 'key', 'prop'] | static void parseServerMonitors(HttpRoute *route, cchar *key, MprJson *prop)
{
MprJson *child;
MprTicks period;
cchar *counter, *expression, *limit, *relation, *defenses;
int ji;
for (ITERATE_CONFIG(route, prop, child, ji)) {
defenses = mprGetJson(child, "defenses");
expression = mprGetJson(child, "expression");
period = httpGetTicks(mprGetJson(child, "period"));
if (!httpTokenize(route, expression, "%S %S %S", &counter, &relation, &limit)) {
httpParseError(route, "Cannot add monitor: %s", prop->name);
break;
}
if (httpAddMonitor(counter, relation, getint(limit), period, defenses) < 0) {
httpParseError(route, "Cannot add monitor: %s", prop->name);
break;
}
}
} | 158 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | parseTarget | parseTarget( HttpRoute * route , cchar * key , MprJson * prop) | ['route', 'key', 'prop'] | static void parseTarget(HttpRoute *route, cchar *key, MprJson *prop)
{
cchar *name, *args;
if (prop->type & MPR_JSON_OBJ) {
name = mprGetJson(prop, "operation");
args = mprGetJson(prop, "args");
} else {
name = "run";
args = prop->value;
}
httpSetRouteTarget(route, name, args);
} | 73 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | parseTrace | parseTrace( HttpRoute * route , cchar * key , MprJson * prop) | ['route', 'key', 'prop'] | static void parseTrace(HttpRoute *route, cchar *key, MprJson *prop)
{
MprJson *levels, *child;
cchar *location;
ssize size, maxContent;
cchar *format, *formatter;
char level;
int anew, backup, ji;
if (route->trace && route->trace->flags & MPR_LOG_CMDLINE) {
mprLog("info http config", 4, "Already tracing. Ignoring trace configuration");
return;
}
size = (ssize) httpGetNumber(mprGetJson(prop, "size"));
format = mprGetJson(prop, "format");
formatter = mprGetJson(prop, "formatter");
location = mprGetJson(prop, "location");
level = (char) stoi(mprGetJson(prop, "level"));
backup = (int) stoi(mprGetJson(prop, "backup"));
anew = smatch(mprGetJson(prop, "anew"), "true");
maxContent = (ssize) httpGetNumber(mprGetJson(prop, "content"));
if (level < 0) {
level = 0;
} else if (level > 5) {
level = 5;
}
if (size < (10 * 1000)) {
httpParseError(route, "Trace log size is too small. Must be larger than 10K");
return;
}
if (location == 0) {
httpParseError(route, "Missing trace filename");
return;
}
if (!smatch(location, "stdout") && !smatch(location, "stderr")) {
location = httpMakePath(route, 0, location);
}
if ((levels = mprGetJsonObj(prop, "levels")) != 0) {
for (ITERATE_CONFIG(route, prop, child, ji)) {
httpSetTraceEventLevel(route->trace, child->name, (int) stoi(child->value));
}
}
route->trace = httpCreateTrace(route->trace);
httpSetTraceFormatterName(route->trace, formatter);
httpSetTraceLogFile(route->trace, location, size, backup, format, anew ? MPR_LOG_ANEW : 0);
httpSetTraceFormat(route->trace, format);
httpSetTraceContentSize(route->trace, maxContent);
httpSetTraceLevel(level);
} | 388 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | postParse | postParse( HttpRoute * route) | ['route'] | static void postParse(HttpRoute *route)
{
Http *http;
HttpHost *host;
HttpRoute *rp;
MprJson *mappings, *client;
int nextHost, nextRoute;
if (route->error) {
return;
}
http = route->http;
route->mode = mprGetJson(route->config, "app.mode");
/*
Create a subset, optimized configuration to send to the client
*/
if ((mappings = mprGetJsonObj(route->config, "app.client.mappings")) != 0) {
client = mprCreateJson(MPR_JSON_OBJ);
clientCopy(route, client, mappings);
mprSetJson(client, "prefix", route->prefix);
route->client = mprJsonToString(client, MPR_JSON_QUOTES);
}
httpAddHostToEndpoints(route->host);
/*
Ensure the host home directory is set and the file handler is defined
Propagate the HttpRoute.client to all child routes.
*/
for (nextHost = 0; (host = mprGetNextItem(http->hosts, &nextHost)) != 0; ) {
for (nextRoute = 0; (rp = mprGetNextItem(host->routes, &nextRoute)) != 0; ) {
if (!mprLookupKey(rp->extensions, "")) {
if (!rp->handler) {
httpAddRouteHandler(rp, "fileHandler", "");
httpAddRouteIndex(rp, "index.html");
}
}
if (rp->parent == route) {
rp->client = route->client;
}
}
}
} | 232 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | setConfigDefaults | setConfigDefaults( HttpRoute * route) | ['route'] | static void setConfigDefaults(HttpRoute *route)
{
route->mode = mprGetJson(route->config, "app.mode");
if (smatch(route->mode, "debug")) {
httpSetRouteShowErrors(route, 1);
route->keepSource = 1;
}
} | 47 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | setHeadersFromCache | setHeadersFromCache( HttpConn * conn , cchar * content) | ['conn', 'content'] | static cchar *setHeadersFromCache(HttpConn *conn, cchar *content)
{
cchar *data;
char *header, *headers, *key, *value, *tok;
if ((data = strstr(content, "\n\n")) == 0) {
data = content;
} else {
headers = snclone(content, data - content);
data += 2;
for (header = stok(headers, "\n", &tok); header; header = stok(NULL, "\n", &tok)) {
key = stok(header, ": ", &value);
if (smatch(key, "X-Status")) {
conn->tx->status = (int) stoi(value);
} else {
httpAddHeaderString(conn, key, value);
}
}
}
return data;
} | 153 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | setAppDefaults | setAppDefaults() | [] | static void setAppDefaults()
{
app->company = stok(slower(ME_COMPANY), " ", NULL);
app->serviceProgram = sclone(SERVICE_PROGRAM);
app->serviceName = sclone(SERVICE_NAME);
app->serviceHome = mprGetNativePath(SERVICE_HOME);
app->retries = RESTART_MAX;
app->signal = SIGTERM;
app->logSpec = sclone("stderr:1");
if (mprPathExists("/var/run", X_OK) && getuid() == 0) {
app->pidDir = sclone("/var/run");
} else if (mprPathExists("/tmp", X_OK)) {
app->pidDir = sclone("/tmp");
} else if (mprPathExists("/Temp", X_OK)) {
app->pidDir = sclone("/Temp");
} else {
app->pidDir = sclone(".");
}
} | 149 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | matchExpression | matchExpression( MprJson * obj , int operator , char * value) | ['obj', 'operator', 'value'] | static bool matchExpression(MprJson *obj, int operator, char *value)
{
if (!(obj->type & MPR_JSON_VALUE)) {
return 0;
}
value = stok(value, "'\"", NULL);
switch (operator) {
case JSON_OP_EQ:
return smatch(obj->value, value);
case JSON_OP_NE:
return !smatch(obj->value, value);
case JSON_OP_LT:
return scmp(obj->value, value) < 0;
case JSON_OP_LE:
return scmp(obj->value, value) <= 0;
case JSON_OP_GT:
return scmp(obj->value, value) > 0;
case JSON_OP_GE:
return scmp(obj->value, value) >= 0;
case JSON_OP_MATCH:
return scontains(obj->value, value) != 0;
case JSON_OP_NMATCH:
return scontains(obj->value, value) == 0;
default:
return 0;
}
} | 170 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | mprAddKey | mprAddKey( MprHash * hash , cvoid * key , cvoid * ptr) | ['hash', 'key', 'ptr'] | PUBLIC MprKey *mprAddKey(MprHash *hash, cvoid *key, cvoid *ptr)
{
MprKey *sp, *prevSp;
int index;
if (hash == 0) {
assert(hash);
return 0;
}
lock(hash);
if ((sp = lookupHash(&index, &prevSp, hash, key)) != 0) {
if (hash->flags & MPR_HASH_UNIQUE) {
unlock(hash);
return 0;
}
/*
Already exists. Just update the data.
*/
sp->data = ptr;
unlock(hash);
return sp;
}
/*
Hash entries are managed by manageHashTable
*/
if ((sp = mprAllocStructNoZero(MprKey)) == 0) {
unlock(hash);
return 0;
}
sp->data = ptr;
if (!(hash->flags & MPR_HASH_STATIC_KEYS)) {
sp->key = dupKey(hash, key);
} else {
sp->key = (void*) key;
}
sp->type = 0;
sp->bucket = index;
sp->next = hash->buckets[index];
hash->buckets[index] = sp;
hash->length++;
unlock(hash);
return sp;
} | 213 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | mprBlendJson | mprBlendJson( MprJson * dest , MprJson * src , int flags) | ['dest', 'src', 'flags'] | PUBLIC int mprBlendJson(MprJson *dest, MprJson *src, int flags)
{
MprJson *dp, *sp, *child;
cchar *trimmedName;
int kind, si, pflags;
if (src == 0) {
return 0;
}
if (dest == 0) {
dest = mprCreateJson(MPR_JSON_OBJ);
}
if ((MPR_JSON_TYPE_MASK & dest->type) != (MPR_JSON_TYPE_MASK & src->type)) {
if (flags & (MPR_JSON_APPEND | MPR_JSON_REPLACE)) {
return 0;
}
}
if (src->type & MPR_JSON_OBJ) {
if (flags & MPR_JSON_CREATE) {
/* Already present */
} else {
/* Examine each property for: MPR_JSON_APPEND (default) | MPR_JSON_REPLACE) */
pflags = flags;
for (ITERATE_JSON(src, sp, si)) {
trimmedName = sp->name;
pflags = flags;
if (flags & MPR_JSON_COMBINE && sp->name) {
kind = sp->name[0];
if (kind == '+') {
pflags = MPR_JSON_APPEND | (flags & MPR_JSON_COMBINE);
trimmedName = &sp->name[1];
} else if (kind == '-') {
pflags = MPR_JSON_REPLACE | (flags & MPR_JSON_COMBINE);
trimmedName = &sp->name[1];
} else if (kind == '?') {
pflags = MPR_JSON_CREATE | (flags & MPR_JSON_COMBINE);
trimmedName = &sp->name[1];
} else if (kind == '=') {
pflags = MPR_JSON_OVERWRITE | (flags & MPR_JSON_COMBINE);
trimmedName = &sp->name[1];
}
}
if ((dp = mprLookupJsonObj(dest, trimmedName)) == 0) {
/* Absent in destination */
if (pflags & MPR_JSON_COMBINE && sp->type == MPR_JSON_OBJ) {
dp = mprCreateJson(sp->type);
if (trimmedName == &sp->name[1]) {
trimmedName = sclone(trimmedName);
}
setProperty(dest, trimmedName, dp);
mprBlendJson(dp, sp, pflags);
} else if (!(pflags & MPR_JSON_REPLACE)) {
if (trimmedName == &sp->name[1]) {
trimmedName = sclone(trimmedName);
}
setProperty(dest, trimmedName, mprCloneJson(sp));
}
} else if (!(pflags & MPR_JSON_CREATE)) {
/* Already present in destination */
if (sp->type & MPR_JSON_OBJ && (MPR_JSON_TYPE_MASK & dp->type) != (MPR_JSON_TYPE_MASK & sp->type)) {
dp = setProperty(dest, dp->name, mprCreateJson(sp->type));
}
mprBlendJson(dp, sp, pflags);
if (pflags & MPR_JSON_REPLACE &&
!(sp->type & (MPR_JSON_OBJ | MPR_JSON_ARRAY)) && sspace(dp->value)) {
mprRemoveJsonChild(dest, dp);
}
}
}
}
} else if (src->type & MPR_JSON_ARRAY) {
if (flags & MPR_JSON_REPLACE) {
for (ITERATE_JSON(src, sp, si)) {
if ((child = mprLookupJsonValue(dest, sp->value)) != 0) {
mprRemoveJsonChild(dest, child);
}
}
} else if (flags & MPR_JSON_CREATE) {
;
} else if (flags & MPR_JSON_APPEND) {
for (ITERATE_JSON(src, sp, si)) {
if ((child = mprLookupJsonValue(dest, sp->value)) == 0) {
appendProperty(dest, mprCloneJson(sp));
}
}
} else {
/* Default is to MPR_JSON_OVERWRITE */
if ((sp = mprCloneJson(src)) != 0) {
adoptChildren(dest, sp);
}
}
} else {
/* Ordinary string value */
if (src->value) {
if (flags & MPR_JSON_APPEND) {
setValue(dest, sjoin(dest->value, " ", src->value, NULL));
} else if (flags & MPR_JSON_REPLACE) {
setValue(dest, sreplace(dest->value, src->value, NULL));
} else if (flags & MPR_JSON_CREATE) {
/* Do nothing */
} else {
/* MPR_JSON_OVERWRITE (default) */
dest->value = sclone(src->value);
}
}
}
return 0;
} | 741 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | mprDefaultLogHandler | mprDefaultLogHandler( cchar * tags , int level , cchar * msg) | ['tags', 'level', 'msg'] | PUBLIC void mprDefaultLogHandler(cchar *tags, int level, cchar *msg)
{
MprFile *file;
char tbuf[128];
static int check = 0;
if ((file = MPR->logFile) == 0) {
return;
}
if (MPR->logBackup && MPR->logSize && (check++ % 1000) == 0) {
backupLog();
}
if (tags && *tags) {
if (MPR->flags & MPR_LOG_DETAILED) {
fmt(tbuf, sizeof(tbuf), "%s %d %s, ", mprGetDate(MPR_LOG_DATE), level, tags);
mprWriteFileString(file, tbuf);
} else if (MPR->flags & MPR_LOG_TAGGED) {
if (schr(tags, ' ')) {
tags = stok(sclone(tags), " ", NULL);
}
if (!isupper((uchar) *tags)) {
tags = stitle(tags);
}
mprWriteFileFmt(file, "%12s ", sfmt("[%s]", tags));
}
}
mprWriteFileString(file, msg);
mprWriteFileString(file, "\n");
#if ME_MPR_OSLOG
if (level == 0) {
mprWriteToOsLog(sfmt("%s: %d %s: %s", MPR->name, level, tags, msg), level);
}
#endif
} | 232 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | mprGetJson | mprGetJson( MprJson * obj , cchar * key) | ['obj', 'key'] | PUBLIC cchar *mprGetJson(MprJson *obj, cchar *key)
{
MprJson *result;
if (key && !strpbrk(key, ".[]*")) {
return mprLookupJson(obj, key);
}
if ((result = mprQueryJson(obj, key, 0, 0)) != 0) {
if (result->length == 1 && result->children->type & MPR_JSON_VALUE) {
return result->children->value;
} else if (result->length > 1) {
return mprJsonToString(result, 0);
}
}
return 0;
} | 106 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | mprGetJsonObj | mprGetJsonObj( MprJson * obj , cchar * key) | ['obj', 'key'] | PUBLIC MprJson *mprGetJsonObj(MprJson *obj, cchar *key)
{
MprJson *result;
if (key && !strpbrk(key, ".[]*")) {
return mprLookupJsonObj(obj, key);
}
if ((result = mprQueryJson(obj, key, 0, 0)) != 0 && result->children) {
return result->children;
}
return 0;
} | 71 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | mprLookupJson | mprLookupJson( MprJson * obj , cchar * name) | ['obj', 'name'] | PUBLIC cchar *mprLookupJson(MprJson *obj, cchar *name)
{
MprJson *item;
if ((item = mprLookupJsonObj(obj, name)) != 0 && item->type & MPR_JSON_VALUE) {
return item->value;
}
return 0;
} | 47 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | mprLookupJsonObj | mprLookupJsonObj( MprJson * obj , cchar * name) | ['obj', 'name'] | PUBLIC MprJson *mprLookupJsonObj(MprJson *obj, cchar *name)
{
MprJson *child;
int i, index;
if (!obj || !name) {
return 0;
}
if (obj->type & MPR_JSON_OBJ) {
for (ITERATE_JSON(obj, child, i)) {
if (smatch(child->name, name)) {
return child;
}
}
} else if (obj->type & MPR_JSON_ARRAY) {
/*
Note this does a linear traversal counting array elements. Not the fastest.
This code is not optimized for huge arrays.
*/
if (*name == '$') {
return 0;
}
index = (int) stoi(name);
for (ITERATE_JSON(obj, child, i)) {
if (i == index) {
return child;
}
}
}
return 0;
} | 133 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | mprLookupJsonValue | mprLookupJsonValue( MprJson * obj , cchar * value) | ['obj', 'value'] | PUBLIC MprJson *mprLookupJsonValue(MprJson *obj, cchar *value)
{
MprJson *child;
int i;
if (!obj || !value) {
return 0;
}
for (ITERATE_JSON(obj, child, i)) {
if (smatch(child->value, value)) {
return child;
}
}
return 0;
} | 64 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | queryCore | queryCore( MprJson * obj , cchar * key , MprJson * value , int flags) | ['obj', 'key', 'value', 'flags'] | static MprJson *queryCore(MprJson *obj, cchar *key, MprJson *value, int flags)
{
MprJson *result, *child;
char *property, *rest;
int termType;
if (obj == 0 || key == 0 || *key == '\0' || obj->type & MPR_JSON_VALUE) {
return 0;
}
result = 0;
for (property = getNextTerm(obj, value, sclone(key), &rest, &termType); property; ) {
if (termType & JSON_PROP_COMPOUND) {
result = queryCompound(obj, property, rest, value, flags, termType);
break;
} else if (rest == 0) {
if (!result && !value) {
result = mprCreateJson(MPR_JSON_ARRAY);
}
appendItem(result, queryLeaf(obj, property, value, flags));
break;
} else if ((child = mprLookupJsonObj(obj, property)) == 0) {
if (value) {
child = mprCreateJson(termType & JSON_PROP_ARRAY ? MPR_JSON_ARRAY : MPR_JSON_OBJ);
setProperty(obj, sclone(property), child);
obj = (MprJson*) child;
} else {
break;
}
}
obj = (MprJson*) child;
property = getNextTerm(obj, value, 0, &rest, &termType);
}
return result ? result : mprCreateJson(MPR_JSON_ARRAY);
} | 261 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | queryLeaf | queryLeaf( MprJson * obj , cchar * property , MprJson * value , int flags) | ['obj', 'property', 'value', 'flags'] | static MprJson *queryLeaf(MprJson *obj, cchar *property, MprJson *value, int flags)
{
MprJson *child;
assert(obj);
assert(property && *property);
if (value) {
setProperty(obj, sclone(property), value);
return 0;
} else if (flags & MPR_JSON_REMOVE) {
if ((child = mprLookupJsonObj(obj, property)) != 0) {
return mprRemoveJsonChild(obj, child);
}
return 0;
} else {
return mprCloneJson(mprLookupJsonObj(obj, property));
}
} | 108 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | queryRange | queryRange( MprJson * obj , char * property , cchar * rest , MprJson * value , int flags) | ['obj', 'property', 'rest', 'value', 'flags'] | static MprJson *queryRange(MprJson *obj, char *property, cchar *rest, MprJson *value, int flags)
{
MprJson *child, *result;
ssize start, end;
char *e, *s, ibuf[16];
int index;
result = mprCreateJson(MPR_JSON_ARRAY);
if (!(obj->type & MPR_JSON_ARRAY)) {
return result;
}
s = stok(property, ": \t", &e);
start = (ssize) stoi(s);
end = (ssize) stoi(e);
if (start < 0) {
start = obj->length + start;
}
if (end < 0) {
end = obj->length + end;
}
for (ITERATE_JSON(obj, child, index)) {
if (index < start) continue;
if (index > end) break;
if (rest == 0) {
if (flags & MPR_JSON_REMOVE) {
appendItem(result, mprRemoveJsonChild(obj, child));
} else {
appendItem(result, queryLeaf(obj, itosbuf(ibuf, sizeof(ibuf), index, 10), value, flags));
}
} else {
appendItems(result, queryCore(child, rest, value, flags));
}
}
return result;
} | 247 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | setProperty | setProperty( MprJson * obj , cchar * name , MprJson * child) | ['obj', 'name', 'child'] | static MprJson *setProperty(MprJson *obj, cchar *name, MprJson *child)
{
MprJson *prior, *existing;
if (!obj || !child) {
return 0;
}
if ((existing = mprLookupJsonObj(obj, name)) != 0) {
existing->value = child->value;
existing->children = child->children;
existing->type = child->type;
existing->length = child->length;
return existing;
}
if (obj->children) {
prior = obj->children->prev;
child->next = obj->children;
child->prev = prior;
prior->next->prev = child;
prior->next = child;
} else {
child->next = child->prev = child;
obj->children = child;
}
child->name = name;
obj->length++;
return child;
} | 165 | True | 1 |
CVE-2014-9708 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}] | 2018-10-09T19:55Z | 2015-03-31T14:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Embedthis Software | 2014-11-26 15:21:57-08:00 | DEV: switch to use ssplit and mprReadJson
ssplit is more robust than stok because it does not return null
mprReadJson is faster, simpler and does not support dotted keys. | 7e6a925f5e86a19a7934a94bbd6959101d0b84eb | False | embedthis/appweb | Appweb Enterprise Edition Embedded Web Server | 2010-04-09 19:01:18 | 2022-07-31 06:38:42 | https://www.embedthis.com/ | embedthis | 46.0 | 16.0 | parseCertFields | parseCertFields( MprBuf * buf , char * prefix , char * prefix2 , char * info) | ['buf', 'prefix', 'prefix2', 'info'] | static void parseCertFields(MprBuf *buf, char *prefix, char *prefix2, char *info)
{
char c, *cp, *term, *key, *value;
term = cp = info;
do {
c = *cp;
if (c == '/' || c == '\0') {
*cp = '\0';
key = stok(term, "=", &value);
if (smatch(key, "emailAddress")) {
key = "EMAIL";
}
mprPutToBuf(buf, "%s%s%s=%s,", prefix, prefix2, key, value);
term = &cp[1];
*cp = c;
}
} while (*cp++ != '\0');
} | 130 | True | 1 |
CVE-2014-9709 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | False | [{'url': 'https://bitbucket.org/libgd/gd-libgd/commits/47eb44b2e90ca88a08dca9f9a1aa9041e9587f43', 'name': 'https://bitbucket.org/libgd/gd-libgd/commits/47eb44b2e90ca88a08dca9f9a1aa9041e9587f43', 'refsource': 'CONFIRM', 'tags': ['Third Party Advisory']}, {'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1188639', 'name': 'https://bugzilla.redhat.com/show_bug.cgi?id=1188639', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking', 'Third Party Advisory']}, {'url': 'https://bugs.php.net/bug.php?id=68601', 'name': 'https://bugs.php.net/bug.php?id=68601', 'refsource': 'CONFIRM', 'tags': ['Vendor Advisory']}, {'url': 'http://php.net/ChangeLog-5.php', 'name': 'http://php.net/ChangeLog-5.php', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Vendor Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-updates/2015-04/msg00002.html', 'name': 'openSUSE-SU-2015:0644', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'http://www.debian.org/security/2015/dsa-3215', 'name': 'DSA-3215', 'refsource': 'DEBIAN', 'tags': ['Third Party Advisory']}, {'url': 'http://www.mandriva.com/security/advisories?name=MDVSA-2015:153', 'name': 'MDVSA-2015:153', 'refsource': 'MANDRIVA', 'tags': ['Third Party Advisory']}, {'url': 'http://advisories.mageia.org/MGASA-2015-0040.html', 'name': 'http://advisories.mageia.org/MGASA-2015-0040.html', 'refsource': 'CONFIRM', 'tags': ['Third Party Advisory']}, {'url': 'https://support.apple.com/HT205267', 'name': 'https://support.apple.com/HT205267', 'refsource': 'CONFIRM', 'tags': ['Third Party Advisory']}, {'url': 'http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html', 'name': 'APPLE-SA-2015-09-30-3', 'refsource': 'APPLE', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'http://rhn.redhat.com/errata/RHSA-2015-1135.html', 'name': 'RHSA-2015:1135', 'refsource': 'REDHAT', 'tags': ['Third Party Advisory']}, {'url': 'http://marc.info/?l=bugtraq&m=143403519711434&w=2', 'name': 'SSRT102066', 'refsource': 'HP', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html', 'name': 'http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html', 'refsource': 'CONFIRM', 'tags': ['Third Party Advisory']}, {'url': 'http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html', 'name': 'http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html', 'refsource': 'CONFIRM', 'tags': ['Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73306', 'name': '73306', 'refsource': 'BID', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'https://security.gentoo.org/glsa/201607-04', 'name': 'GLSA-201607-04', 'refsource': 'GENTOO', 'tags': ['Third Party Advisory']}, {'url': 'https://security.gentoo.org/glsa/201606-10', 'name': 'GLSA-201606-10', 'refsource': 'GENTOO', 'tags': ['Third Party Advisory']}, {'url': 'http://www.ubuntu.com/usn/USN-2987-1', 'name': 'USN-2987-1', 'refsource': 'UBUNTU', 'tags': ['Third Party Advisory']}, {'url': 'http://www.securitytracker.com/id/1033703', 'name': '1033703', 'refsource': 'SECTRACK', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://rhn.redhat.com/errata/RHSA-2015-1066.html', 'name': 'RHSA-2015:1066', 'refsource': 'REDHAT', 'tags': ['Third Party Advisory']}, {'url': 'http://rhn.redhat.com/errata/RHSA-2015-1053.html', 'name': 'RHSA-2015:1053', 'refsource': 'REDHAT', 'tags': ['Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00005.html', 'name': 'SUSE-SU-2015:0868', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'http://rhn.redhat.com/errata/RHSA-2015-1218.html', 'name': 'RHSA-2015:1218', 'refsource': 'REDHAT', 'tags': ['Third Party Advisory']}] | [{'description': [{'lang': 'en', 'value': 'CWE-119'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:php:php:*:*:*:*:*:*:*:*', 'versionStartIncluding': '5.5.0', 'versionEndExcluding': '5.5.21', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:php:php:*:*:*:*:*:*:*:*', 'versionStartIncluding': '5.6.0', 'versionEndExcluding': '5.6.5', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:libgd:libgd:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.1.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'The GetCode_ function in gd_gif_in.c in GD 2.1.1 and earlier, as used in PHP before 5.5.21 and 5.6.x before 5.6.5, allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted GIF image that is improperly handled by the gdImageCreateFromGif function.'}] | 2019-10-09T23:12Z | 2015-03-30T10:59Z | Improper Restriction of Operations within the Bounds of a Memory Buffer | The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer. |
Certain languages allow direct addressing of memory locations and do not automatically ensure that these locations are valid for the memory buffer that is being referenced. This can cause read or write operations to be performed on memory locations that may be associated with other variables, data structures, or internal program data.
As a result, an attacker may be able to execute arbitrary code, alter the intended control flow, read sensitive information, or cause the system to crash.
| https://cwe.mitre.org/data/definitions/119.html | 0 | Remi Collet | 2014-12-13 08:48:18+01:00 | Fix possible buffer read overflow
detected by -fsanitize=address, thanks to Jan Bee | 47eb44b2e90ca88a08dca9f9a1aa9041e9587f43 | False | visit repo url | visit repo url | visit repo url | visit repo url | visit repo url | libgd | visit repo url | visit repo url | GetCode_ | GetCode_( gdIOCtx * fd , CODE_STATIC_DATA * scd , int code_size , int flag , int * ZeroDataBlockP) | ['fd', 'scd', 'code_size', 'flag', 'ZeroDataBlockP'] | GetCode_(gdIOCtx *fd, CODE_STATIC_DATA *scd, int code_size, int flag, int *ZeroDataBlockP)
{
int i, j, ret;
unsigned char count;
if(flag) {
scd->curbit = 0;
scd->lastbit = 0;
scd->last_byte = 0;
scd->done = FALSE;
return 0;
}
if((scd->curbit + code_size) >= scd->lastbit) {
if(scd->done) {
if(scd->curbit >= scd->lastbit) {
/* Oh well */
}
return -1;
}
scd->buf[0] = scd->buf[scd->last_byte - 2];
scd->buf[1] = scd->buf[scd->last_byte - 1];
if((count = GetDataBlock(fd, &scd->buf[2], ZeroDataBlockP)) <= 0) {
scd->done = TRUE;
}
scd->last_byte = 2 + count;
scd->curbit = (scd->curbit - scd->lastbit) + 16;
scd->lastbit = (2 + count) * 8;
}
ret = 0;
for (i = scd->curbit, j = 0; j < code_size; ++i, ++j) {
ret |= ((scd->buf[i / 8] & (1 << (i % 8))) != 0) << j;
}
scd->curbit += code_size;
return ret;
} | 277 | True | 1 |
CVE-2014-9765 | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:P/A:P | NETWORK | MEDIUM | NONE | PARTIAL | PARTIAL | PARTIAL | 6.8 | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H | NETWORK | LOW | NONE | REQUIRED | UNCHANGED | HIGH | HIGH | HIGH | 8.8 | HIGH | 2.8 | 5.9 | nan | [{'url': 'http://www.openwall.com/lists/oss-security/2016/02/08/1', 'name': '[oss-security] 20160208 CVE request - buffer overflow in xdelta3 before 3.0.9', 'refsource': 'MLIST', 'tags': []}, {'url': 'http://www.openwall.com/lists/oss-security/2016/02/08/2', 'name': '[oss-security] 20160208 Re: CVE request - buffer overflow in xdelta3 before 3.0.9', 'refsource': 'MLIST', 'tags': []}, {'url': 'http://www.ubuntu.com/usn/USN-2901-1', 'name': 'USN-2901-1', 'refsource': 'UBUNTU', 'tags': []}, {'url': 'http://lists.opensuse.org/opensuse-updates/2016-02/msg00125.html', 'name': 'openSUSE-SU-2016:0524', 'refsource': 'SUSE', 'tags': []}, {'url': 'http://www.debian.org/security/2016/dsa-3484', 'name': 'DSA-3484', 'refsource': 'DEBIAN', 'tags': []}, {'url': 'http://lists.opensuse.org/opensuse-updates/2016-02/msg00131.html', 'name': 'openSUSE-SU-2016:0530', 'refsource': 'SUSE', 'tags': []}, {'url': 'https://github.com/jmacd/xdelta-devel/commit/ef93ff74203e030073b898c05e8b4860b5d09ef2', 'name': 'https://github.com/jmacd/xdelta-devel/commit/ef93ff74203e030073b898c05e8b4860b5d09ef2', 'refsource': 'CONFIRM', 'tags': []}, {'url': 'http://www.securityfocus.com/bid/83109', 'name': '83109', 'refsource': 'BID', 'tags': []}, {'url': 'https://security.gentoo.org/glsa/201701-40', 'name': 'GLSA-201701-40', 'refsource': 'GENTOO', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'CWE-119'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:xdelta:xdelta3:*:*:*:*:*:*:*:*', 'versionEndIncluding': '3.0.8', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Buffer overflow in the main_get_appheader function in xdelta3-main.h in xdelta3 before 3.0.9 allows remote attackers to execute arbitrary code via a crafted input file.'}] | 2018-10-30T16:27Z | 2016-04-19T21:59Z | Improper Restriction of Operations within the Bounds of a Memory Buffer | The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer. |
Certain languages allow direct addressing of memory locations and do not automatically ensure that these locations are valid for the memory buffer that is being referenced. This can cause read or write operations to be performed on memory locations that may be associated with other variables, data structures, or internal program data.
As a result, an attacker may be able to execute arbitrary code, alter the intended control flow, read sensitive information, or cause the system to crash.
| https://cwe.mitre.org/data/definitions/119.html | 0 | josh.macdonald | 2014-10-12 05:24:22+00:00 | Add appheader tests; fix buffer overflow in main_get_appheader | ef93ff74203e030073b898c05e8b4860b5d09ef2 | False | visit repo url | visit repo url | visit repo url | visit repo url | visit repo url | jmacd | visit repo url | visit repo url | main_get_appheader | main_get_appheader( xd3_stream * stream , main_file * ifile , main_file * output , main_file * sfile) | ['stream', 'ifile', 'output', 'sfile'] | main_get_appheader (xd3_stream *stream, main_file *ifile,
main_file *output, main_file *sfile)
{
uint8_t *apphead;
usize_t appheadsz;
int ret;
/* The user may disable the application header. Once the appheader
* is set, this disables setting it again. */
if (! option_use_appheader) { return; }
ret = xd3_get_appheader (stream, & apphead, & appheadsz);
/* Ignore failure, it only means we haven't received a header yet. */
if (ret != 0) { return; }
if (appheadsz > 0)
{
char *start = (char*)apphead;
char *slash;
int place = 0;
char *parsed[4];
memset (parsed, 0, sizeof (parsed));
while ((slash = strchr (start, '/')) != NULL)
{
*slash = 0;
parsed[place++] = start;
start = slash + 1;
}
parsed[place++] = start;
/* First take the output parameters. */
if (place == 2 || place == 4)
{
main_get_appheader_params (output, parsed, 1, "output", ifile);
}
/* Then take the source parameters. */
if (place == 4)
{
main_get_appheader_params (sfile, parsed+2, 0, "source", ifile);
}
}
option_use_appheader = 0;
return;
} | 206 | True | 1 |
CVE-2014-9765 | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:P/A:P | NETWORK | MEDIUM | NONE | PARTIAL | PARTIAL | PARTIAL | 6.8 | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H | NETWORK | LOW | NONE | REQUIRED | UNCHANGED | HIGH | HIGH | HIGH | 8.8 | HIGH | 2.8 | 5.9 | nan | [{'url': 'http://www.openwall.com/lists/oss-security/2016/02/08/1', 'name': '[oss-security] 20160208 CVE request - buffer overflow in xdelta3 before 3.0.9', 'refsource': 'MLIST', 'tags': []}, {'url': 'http://www.openwall.com/lists/oss-security/2016/02/08/2', 'name': '[oss-security] 20160208 Re: CVE request - buffer overflow in xdelta3 before 3.0.9', 'refsource': 'MLIST', 'tags': []}, {'url': 'http://www.ubuntu.com/usn/USN-2901-1', 'name': 'USN-2901-1', 'refsource': 'UBUNTU', 'tags': []}, {'url': 'http://lists.opensuse.org/opensuse-updates/2016-02/msg00125.html', 'name': 'openSUSE-SU-2016:0524', 'refsource': 'SUSE', 'tags': []}, {'url': 'http://www.debian.org/security/2016/dsa-3484', 'name': 'DSA-3484', 'refsource': 'DEBIAN', 'tags': []}, {'url': 'http://lists.opensuse.org/opensuse-updates/2016-02/msg00131.html', 'name': 'openSUSE-SU-2016:0530', 'refsource': 'SUSE', 'tags': []}, {'url': 'https://github.com/jmacd/xdelta-devel/commit/ef93ff74203e030073b898c05e8b4860b5d09ef2', 'name': 'https://github.com/jmacd/xdelta-devel/commit/ef93ff74203e030073b898c05e8b4860b5d09ef2', 'refsource': 'CONFIRM', 'tags': []}, {'url': 'http://www.securityfocus.com/bid/83109', 'name': '83109', 'refsource': 'BID', 'tags': []}, {'url': 'https://security.gentoo.org/glsa/201701-40', 'name': 'GLSA-201701-40', 'refsource': 'GENTOO', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'CWE-119'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:xdelta:xdelta3:*:*:*:*:*:*:*:*', 'versionEndIncluding': '3.0.8', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Buffer overflow in the main_get_appheader function in xdelta3-main.h in xdelta3 before 3.0.9 allows remote attackers to execute arbitrary code via a crafted input file.'}] | 2018-10-30T16:27Z | 2016-04-19T21:59Z | Improper Restriction of Operations within the Bounds of a Memory Buffer | The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer. |
Certain languages allow direct addressing of memory locations and do not automatically ensure that these locations are valid for the memory buffer that is being referenced. This can cause read or write operations to be performed on memory locations that may be associated with other variables, data structures, or internal program data.
As a result, an attacker may be able to execute arbitrary code, alter the intended control flow, read sensitive information, or cause the system to crash.
| https://cwe.mitre.org/data/definitions/119.html | 0 | josh.macdonald | 2014-10-12 05:24:22+00:00 | Add appheader tests; fix buffer overflow in main_get_appheader | ef93ff74203e030073b898c05e8b4860b5d09ef2 | False | visit repo url | visit repo url | visit repo url | visit repo url | visit repo url | jmacd | visit repo url | visit repo url | do_cmd | do_cmd( xd3_stream * stream , const char * buf) | ['stream', 'buf'] | static int do_cmd (xd3_stream *stream, const char *buf)
{
int ret;
if ((ret = system (buf)) != 0)
{
if (WIFEXITED (ret))
{
stream->msg = "command exited non-zero";
IF_DEBUG1 (XPR(NT "command was: %s\n", buf));
}
else
{
stream->msg = "abnormal command termination";
}
return XD3_INTERNAL;
}
return 0;
} | 72 | True | 1 |
CVE-2014-9765 | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:P/A:P | NETWORK | MEDIUM | NONE | PARTIAL | PARTIAL | PARTIAL | 6.8 | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H | NETWORK | LOW | NONE | REQUIRED | UNCHANGED | HIGH | HIGH | HIGH | 8.8 | HIGH | 2.8 | 5.9 | nan | [{'url': 'http://www.openwall.com/lists/oss-security/2016/02/08/1', 'name': '[oss-security] 20160208 CVE request - buffer overflow in xdelta3 before 3.0.9', 'refsource': 'MLIST', 'tags': []}, {'url': 'http://www.openwall.com/lists/oss-security/2016/02/08/2', 'name': '[oss-security] 20160208 Re: CVE request - buffer overflow in xdelta3 before 3.0.9', 'refsource': 'MLIST', 'tags': []}, {'url': 'http://www.ubuntu.com/usn/USN-2901-1', 'name': 'USN-2901-1', 'refsource': 'UBUNTU', 'tags': []}, {'url': 'http://lists.opensuse.org/opensuse-updates/2016-02/msg00125.html', 'name': 'openSUSE-SU-2016:0524', 'refsource': 'SUSE', 'tags': []}, {'url': 'http://www.debian.org/security/2016/dsa-3484', 'name': 'DSA-3484', 'refsource': 'DEBIAN', 'tags': []}, {'url': 'http://lists.opensuse.org/opensuse-updates/2016-02/msg00131.html', 'name': 'openSUSE-SU-2016:0530', 'refsource': 'SUSE', 'tags': []}, {'url': 'https://github.com/jmacd/xdelta-devel/commit/ef93ff74203e030073b898c05e8b4860b5d09ef2', 'name': 'https://github.com/jmacd/xdelta-devel/commit/ef93ff74203e030073b898c05e8b4860b5d09ef2', 'refsource': 'CONFIRM', 'tags': []}, {'url': 'http://www.securityfocus.com/bid/83109', 'name': '83109', 'refsource': 'BID', 'tags': []}, {'url': 'https://security.gentoo.org/glsa/201701-40', 'name': 'GLSA-201701-40', 'refsource': 'GENTOO', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'CWE-119'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:xdelta:xdelta3:*:*:*:*:*:*:*:*', 'versionEndIncluding': '3.0.8', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Buffer overflow in the main_get_appheader function in xdelta3-main.h in xdelta3 before 3.0.9 allows remote attackers to execute arbitrary code via a crafted input file.'}] | 2018-10-30T16:27Z | 2016-04-19T21:59Z | Improper Restriction of Operations within the Bounds of a Memory Buffer | The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer. |
Certain languages allow direct addressing of memory locations and do not automatically ensure that these locations are valid for the memory buffer that is being referenced. This can cause read or write operations to be performed on memory locations that may be associated with other variables, data structures, or internal program data.
As a result, an attacker may be able to execute arbitrary code, alter the intended control flow, read sensitive information, or cause the system to crash.
| https://cwe.mitre.org/data/definitions/119.html | 0 | josh.macdonald | 2014-10-12 05:24:22+00:00 | Add appheader tests; fix buffer overflow in main_get_appheader | ef93ff74203e030073b898c05e8b4860b5d09ef2 | False | visit repo url | visit repo url | visit repo url | visit repo url | visit repo url | jmacd | visit repo url | visit repo url | mt_init | mt_init( mtrand * mt , uint32_t seed) | ['mt', 'seed'] | void mt_init(mtrand *mt, uint32_t seed) {
int i;
mt->mt_buffer_[0] = seed;
mt->mt_index_ = MT_LEN;
for (i = 1; i < MT_LEN; i++) {
/* See Knuth TAOCP Vol2. 3rd Ed. P.106 for multiplier. */
/* In the previous versions, MSBs of the seed affect */
/* only MSBs of the array mt[]. */
/* 2002/01/09 modified by Makoto Matsumoto */
mt->mt_buffer_[i] =
(1812433253UL * (mt->mt_buffer_[i-1] ^
(mt->mt_buffer_[i-1] >> 30)) + i);
}
} | 82 | True | 1 |
CVE-2014-9765 | False | False | False | True | AV:N/AC:M/Au:N/C:P/I:P/A:P | NETWORK | MEDIUM | NONE | PARTIAL | PARTIAL | PARTIAL | 6.8 | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H | NETWORK | LOW | NONE | REQUIRED | UNCHANGED | HIGH | HIGH | HIGH | 8.8 | HIGH | 2.8 | 5.9 | nan | [{'url': 'http://www.openwall.com/lists/oss-security/2016/02/08/1', 'name': '[oss-security] 20160208 CVE request - buffer overflow in xdelta3 before 3.0.9', 'refsource': 'MLIST', 'tags': []}, {'url': 'http://www.openwall.com/lists/oss-security/2016/02/08/2', 'name': '[oss-security] 20160208 Re: CVE request - buffer overflow in xdelta3 before 3.0.9', 'refsource': 'MLIST', 'tags': []}, {'url': 'http://www.ubuntu.com/usn/USN-2901-1', 'name': 'USN-2901-1', 'refsource': 'UBUNTU', 'tags': []}, {'url': 'http://lists.opensuse.org/opensuse-updates/2016-02/msg00125.html', 'name': 'openSUSE-SU-2016:0524', 'refsource': 'SUSE', 'tags': []}, {'url': 'http://www.debian.org/security/2016/dsa-3484', 'name': 'DSA-3484', 'refsource': 'DEBIAN', 'tags': []}, {'url': 'http://lists.opensuse.org/opensuse-updates/2016-02/msg00131.html', 'name': 'openSUSE-SU-2016:0530', 'refsource': 'SUSE', 'tags': []}, {'url': 'https://github.com/jmacd/xdelta-devel/commit/ef93ff74203e030073b898c05e8b4860b5d09ef2', 'name': 'https://github.com/jmacd/xdelta-devel/commit/ef93ff74203e030073b898c05e8b4860b5d09ef2', 'refsource': 'CONFIRM', 'tags': []}, {'url': 'http://www.securityfocus.com/bid/83109', 'name': '83109', 'refsource': 'BID', 'tags': []}, {'url': 'https://security.gentoo.org/glsa/201701-40', 'name': 'GLSA-201701-40', 'refsource': 'GENTOO', 'tags': []}] | [{'description': [{'lang': 'en', 'value': 'CWE-119'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:xdelta:xdelta3:*:*:*:*:*:*:*:*', 'versionEndIncluding': '3.0.8', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'Buffer overflow in the main_get_appheader function in xdelta3-main.h in xdelta3 before 3.0.9 allows remote attackers to execute arbitrary code via a crafted input file.'}] | 2018-10-30T16:27Z | 2016-04-19T21:59Z | Improper Restriction of Operations within the Bounds of a Memory Buffer | The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer. |
Certain languages allow direct addressing of memory locations and do not automatically ensure that these locations are valid for the memory buffer that is being referenced. This can cause read or write operations to be performed on memory locations that may be associated with other variables, data structures, or internal program data.
As a result, an attacker may be able to execute arbitrary code, alter the intended control flow, read sensitive information, or cause the system to crash.
| https://cwe.mitre.org/data/definitions/119.html | 0 | josh.macdonald | 2014-10-12 05:24:22+00:00 | Add appheader tests; fix buffer overflow in main_get_appheader | ef93ff74203e030073b898c05e8b4860b5d09ef2 | False | visit repo url | visit repo url | visit repo url | visit repo url | visit repo url | jmacd | visit repo url | visit repo url | mt_random | mt_random( mtrand * mt) | ['mt'] | uint32_t mt_random (mtrand *mt) {
uint32_t y;
unsigned long mag01[2];
mag01[0] = 0;
mag01[1] = MATRIX_A;
if (mt->mt_index_ >= MT_LEN) {
int kk;
for (kk = 0; kk < MT_LEN - MT_IA; kk++) {
y = (mt->mt_buffer_[kk] & UPPER_MASK) |
(mt->mt_buffer_[kk + 1] & LOWER_MASK);
mt->mt_buffer_[kk] = mt->mt_buffer_[kk + MT_IA] ^
(y >> 1) ^ mag01[y & 0x1UL];
}
for (;kk < MT_LEN - 1; kk++) {
y = (mt->mt_buffer_[kk] & UPPER_MASK) |
(mt->mt_buffer_[kk + 1] & LOWER_MASK);
mt->mt_buffer_[kk] = mt->mt_buffer_[kk + (MT_IA - MT_LEN)] ^
(y >> 1) ^ mag01[y & 0x1UL];
}
y = (mt->mt_buffer_[MT_LEN - 1] & UPPER_MASK) |
(mt->mt_buffer_[0] & LOWER_MASK);
mt->mt_buffer_[MT_LEN - 1] = mt->mt_buffer_[MT_IA - 1] ^
(y >> 1) ^ mag01[y & 0x1UL];
mt->mt_index_ = 0;
}
y = mt->mt_buffer_[mt->mt_index_++];
y ^= (y >> 11);
y ^= (y << 7) & 0x9d2c5680UL;
y ^= (y << 15) & 0xefc60000UL;
y ^= (y >> 18);
return y;
} | 311 | True | 1 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.