cve_id
stringlengths
13
16
obtain_all_privilege
stringclasses
3 values
obtain_user_privilege
stringclasses
2 values
obtain_other_privilege
stringclasses
2 values
user_interaction_required
stringclasses
3 values
cvss2_vector_string
stringclasses
106 values
cvss2_access_vector
stringclasses
4 values
cvss2_access_complexity
stringclasses
4 values
cvss2_authentication
stringclasses
3 values
cvss2_confidentiality_impact
stringclasses
4 values
cvss2_integrity_impact
stringclasses
4 values
cvss2_availability_impact
stringclasses
4 values
cvss2_base_score
stringclasses
50 values
cvss3_vector_string
stringclasses
226 values
cvss3_attack_vector
stringclasses
5 values
cvss3_attack_complexity
stringclasses
3 values
cvss3_privileges_required
stringclasses
4 values
cvss3_user_interaction
stringclasses
3 values
cvss3_scope
stringclasses
3 values
cvss3_confidentiality_impact
stringclasses
4 values
cvss3_integrity_impact
stringclasses
4 values
cvss3_availability_impact
stringclasses
4 values
cvss3_base_score
stringclasses
55 values
cvss3_base_severity
stringclasses
5 values
exploitability_score
stringclasses
22 values
impact_score
stringclasses
15 values
ac_insuf_info
stringclasses
3 values
reference_json
stringlengths
221
23.3k
problemtype_json
stringclasses
200 values
severity
stringclasses
4 values
cve_nodes
stringlengths
2
33.1k
cve_description
stringlengths
64
1.99k
cve_last_modified_date
stringlengths
17
17
cve_published_date
stringlengths
17
17
cwe_name
stringclasses
125 values
cwe_description
stringclasses
124 values
cwe_extended_description
stringclasses
95 values
cwe_url
stringclasses
124 values
cwe_is_category
int64
0
1
commit_author
stringlengths
0
34
commit_author_date
stringlengths
25
25
commit_msg
stringlengths
0
13.3k
commit_hash
stringlengths
40
40
commit_is_merge
stringclasses
1 value
repo_name
stringclasses
467 values
repo_description
stringclasses
459 values
repo_date_created
stringclasses
467 values
repo_date_last_push
stringclasses
467 values
repo_homepage
stringclasses
294 values
repo_owner
stringclasses
470 values
repo_stars
stringclasses
406 values
repo_forks
stringclasses
352 values
function_name
stringlengths
3
120
function_signature
stringlengths
6
640
function_parameters
stringlengths
2
302
function
stringlengths
12
114k
function_token_count
stringlengths
1
5
function_before_change
stringclasses
1 value
labels
int64
1
1
CVE-2014-9707
False
False
False
False
AV:N/AC:L/Au:N/C:P/I:P/A:P
NETWORK
LOW
NONE
PARTIAL
PARTIAL
PARTIAL
7.5
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'http://seclists.org/fulldisclosure/2015/Mar/157', 'name': '20150328 Advisory: CVE-2014-9707: GoAhead Web Server 3.0.0 - 3.4.1', 'refsource': 'FULLDISC', 'tags': ['Exploit']}, {'url': 'https://github.com/embedthis/goahead/issues/106', 'name': 'https://github.com/embedthis/goahead/issues/106', 'refsource': 'CONFIRM', 'tags': []}, {'url': 'https://github.com/embedthis/goahead/commit/eed4a7d177bf94a54c7b06ccce88507fbd76fb77', 'name': 'https://github.com/embedthis/goahead/commit/eed4a7d177bf94a54c7b06ccce88507fbd76fb77', 'refsource': 'CONFIRM', 'tags': []}, {'url': 'http://packetstormsecurity.com/files/131156/GoAhead-3.4.1-Heap-Overflow-Traversal.html', 'name': 'http://packetstormsecurity.com/files/131156/GoAhead-3.4.1-Heap-Overflow-Traversal.html', 'refsource': 'MISC', 'tags': ['Exploit']}, {'url': 'http://www.securitytracker.com/id/1032208', 'name': '1032208', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535027/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9707: GoAhead Web Server 3.0.0 - 3.4.1', 'refsource': 'BUGTRAQ', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'CWE-17'}]}]
HIGH
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:goahead:3.3.2:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:goahead:3.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:goahead:3.3.4:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:goahead:3.4.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:goahead:3.3.5:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:goahead:3.3.1:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:goahead:3.3.6:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:goahead:3.3.3:*:*:*:*:*:*:*', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'EmbedThis GoAhead 3.0.0 through 3.4.1 does not properly handle path segments starting with a . (dot), which allows remote attackers to conduct directory traversal attacks, cause a denial of service (heap-based buffer overflow and crash), or possibly execute arbitrary code via a crafted URI.'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
DEPRECATED: Code
This entry has been deprecated. It was originally used for organizing the Development View (CWE-699) and some other views, but it introduced unnecessary complexity and depth to the resulting tree.
https://cwe.mitre.org/data/definitions/17.html
1
Embedthis Software
2014-11-24 09:04:18-08:00
FIX: Dot filename segments permit directory traversal [issue 106]
eed4a7d177bf94a54c7b06ccce88507fbd76fb77
False
embedthis/goahead
GoAhead Enterprise Edition Web Server
2012-02-03 02:05:40
2022-05-25 02:03:29
https://www.embedthis.com/goahead/
embedthis
60.0
28.0
websNormalizeUriPath
websNormalizeUriPath( char * pathArg)
['pathArg']
PUBLIC char *websNormalizeUriPath(char *pathArg) { char *dupPath, *path, *sp, *dp, *mark, **segments; int firstc, j, i, nseg, len; if (pathArg == 0 || *pathArg == '\0') { return sclone(""); } len = (int) slen(pathArg); if ((dupPath = walloc(len + 2)) == 0) { return NULL; } strcpy(dupPath, pathArg); if ((segments = walloc(sizeof(char*) * (len + 1))) == 0) { return NULL; } nseg = len = 0; firstc = *dupPath; for (mark = sp = dupPath; *sp; sp++) { if (*sp == '/') { *sp = '\0'; while (sp[1] == '/') { sp++; } segments[nseg++] = mark; len += (int) (sp - mark); mark = sp + 1; } } segments[nseg++] = mark; len += (int) (sp - mark); for (j = i = 0; i < nseg; i++, j++) { sp = segments[i]; if (sp[0] == '.') { if (sp[1] == '\0') { if ((i+1) == nseg) { segments[j] = ""; } else { j--; } } else if (sp[1] == '.' && sp[2] == '\0') { if (i == 1 && *segments[0] == '\0') { j = 0; } else if ((i+1) == nseg) { if (--j >= 0) { segments[j] = ""; } } else { j = max(j - 2, -1); } } } else { segments[j] = segments[i]; } } nseg = j; assert(nseg >= 0); if ((path = walloc(len + nseg + 1)) != 0) { for (i = 0, dp = path; i < nseg; ) { strcpy(dp, segments[i]); len = (int) slen(segments[i]); dp += len; if (++i < nseg || (nseg == 1 && *segments[0] == '\0' && firstc == '/')) { *dp++ = '/'; } } *dp = '\0'; } wfree(dupPath); wfree(segments); if ((path[0] != '/') || strchr(path, '\\')) { return 0; } return path; }
539
True
1
CVE-2014-9707
False
False
False
False
AV:N/AC:L/Au:N/C:P/I:P/A:P
NETWORK
LOW
NONE
PARTIAL
PARTIAL
PARTIAL
7.5
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'http://seclists.org/fulldisclosure/2015/Mar/157', 'name': '20150328 Advisory: CVE-2014-9707: GoAhead Web Server 3.0.0 - 3.4.1', 'refsource': 'FULLDISC', 'tags': ['Exploit']}, {'url': 'https://github.com/embedthis/goahead/issues/106', 'name': 'https://github.com/embedthis/goahead/issues/106', 'refsource': 'CONFIRM', 'tags': []}, {'url': 'https://github.com/embedthis/goahead/commit/eed4a7d177bf94a54c7b06ccce88507fbd76fb77', 'name': 'https://github.com/embedthis/goahead/commit/eed4a7d177bf94a54c7b06ccce88507fbd76fb77', 'refsource': 'CONFIRM', 'tags': []}, {'url': 'http://packetstormsecurity.com/files/131156/GoAhead-3.4.1-Heap-Overflow-Traversal.html', 'name': 'http://packetstormsecurity.com/files/131156/GoAhead-3.4.1-Heap-Overflow-Traversal.html', 'refsource': 'MISC', 'tags': ['Exploit']}, {'url': 'http://www.securitytracker.com/id/1032208', 'name': '1032208', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535027/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9707: GoAhead Web Server 3.0.0 - 3.4.1', 'refsource': 'BUGTRAQ', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'CWE-17'}]}]
HIGH
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:goahead:3.3.2:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:goahead:3.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:goahead:3.3.4:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:goahead:3.4.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:goahead:3.3.5:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:goahead:3.3.1:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:goahead:3.3.6:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:goahead:3.3.3:*:*:*:*:*:*:*', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'EmbedThis GoAhead 3.0.0 through 3.4.1 does not properly handle path segments starting with a . (dot), which allows remote attackers to conduct directory traversal attacks, cause a denial of service (heap-based buffer overflow and crash), or possibly execute arbitrary code via a crafted URI.'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
DEPRECATED: Code
This entry has been deprecated. It was originally used for organizing the Development View (CWE-699) and some other views, but it introduced unnecessary complexity and depth to the resulting tree.
https://cwe.mitre.org/data/definitions/17.html
1
Embedthis Software
2014-11-24 09:04:18-08:00
FIX: Dot filename segments permit directory traversal [issue 106]
eed4a7d177bf94a54c7b06ccce88507fbd76fb77
False
embedthis/goahead
GoAhead Enterprise Edition Web Server
2012-02-03 02:05:40
2022-05-25 02:03:29
https://www.embedthis.com/goahead/
embedthis
60.0
28.0
websUrlParse
websUrlParse( char * url , char ** pbuf , char ** pscheme , char ** phost , char ** pport , char ** ppath , char ** pext , char ** preference , char ** pquery)
['url', 'pbuf', 'pscheme', 'phost', 'pport', 'ppath', 'pext', 'preference', 'pquery']
PUBLIC int websUrlParse(char *url, char **pbuf, char **pscheme, char **phost, char **pport, char **ppath, char **pext, char **preference, char **pquery) { char *tok, *delim, *host, *path, *port, *scheme, *reference, *query, *ext, *buf, *buf2; ssize buflen, ulen, len; int rc; assert(pbuf); if (url == 0) { url = ""; } /* Allocate twice. Need to null terminate the host so have to copy the path. */ ulen = strlen(url); len = ulen + 1; buflen = len * 2; if ((buf = walloc(buflen)) == NULL) { return -1; } buf2 = &buf[ulen + 1]; sncopy(buf, len, url, ulen); sncopy(buf2, len, url, ulen); url = buf; scheme = 0; host = 0; port = 0; path = 0; ext = 0; query = 0; reference = 0; tok = buf; /* [scheme://][hostname[:port]][/path[.ext]][#ref][?query] First trim query and then reference from the end */ if ((query = strchr(tok, '?')) != NULL) { *query++ = '\0'; } if ((reference = strchr(tok, '#')) != NULL) { *reference++ = '\0'; } /* [scheme://][hostname[:port]][/path] */ if ((delim = strstr(tok, "://")) != 0) { scheme = tok; *delim = '\0'; tok = &delim[3]; } /* [hostname[:port]][/path] */ if (*tok == '[' && ((delim = strchr(tok, ']')) != 0)) { /* IPv6 [::] */ host = &tok[1]; *delim++ = '\0'; tok = delim; } else if (*tok && *tok != '/' && *tok != ':' && (scheme || strchr(tok, ':'))) { /* Supported forms: scheme://hostname hostname[:port][/path] */ host = tok; if ((tok = strpbrk(tok, ":/")) == 0) { tok = ""; } /* Don't terminate the hostname yet, need to see if tok is a ':' for a port. */ assert(tok); } /* [:port][/path] */ if (*tok == ':') { /* Terminate hostname */ *tok++ = '\0'; port = tok; if ((tok = strchr(tok, '/')) == 0) { tok = ""; } } /* [/path] */ if (*tok) { /* Terminate hostname. This zeros the leading path slash. This will be repaired before returning if ppath is set */ *tok++ = '\0'; path = tok; /* path[.ext[/extra]] */ if ((tok = strrchr(path, '.')) != 0) { if (tok[1]) { if ((delim = strrchr(path, '/')) != 0) { if (delim < tok) { ext = tok; } } else { ext = tok; } } } } /* Pass back the requested fields */ rc = 0; *pbuf = buf; if (pscheme) { if (scheme == 0) { scheme = "http"; } *pscheme = scheme; } if (phost) { if (host == 0) { host = "localhost"; } *phost = host; } if (pport) { *pport = port; } if (ppath) { if (path == 0) { path = "/"; } else { /* Copy path to reinsert leading slash */ scopy(&buf2[1], len - 1, path); path = buf2; *path = '/'; if (!websValidUriChars(path)) { rc = -1; } else { websDecodeUrl(path, path, -1); } } *ppath = path; } if (pquery) { *pquery = query; } if (preference) { *preference = reference; } if (pext) { #if ME_WIN_LIKE slower(ext); #endif *pext = ext; } return rc; }
692
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
cacheDirective
cacheDirective( MaState * state , cchar * key , cchar * value)
['state', 'key', 'value']
static int cacheDirective(MaState *state, cchar *key, cchar *value) { MprTicks lifespan, clientLifespan, serverLifespan; char *option, *ovalue, *tok; char *methods, *extensions, *types, *uris; int flags; flags = 0; lifespan = clientLifespan = serverLifespan = 0; methods = uris = extensions = types = 0; for (option = stok(sclone(value), " \t", &tok); option; option = stok(0, " \t", &tok)) { if (*option == '/') { uris = option; if (tok) { /* Join the rest of the options back into one list of URIs */ tok[-1] = ','; } break; } option = stok(option, " =\t,", &ovalue); ovalue = strim(ovalue, "\"'", MPR_TRIM_BOTH); if ((int) isdigit((uchar) *option)) { lifespan = httpGetTicks(option); } else if (smatch(option, "client")) { flags |= HTTP_CACHE_CLIENT; if (ovalue) { clientLifespan = httpGetTicks(ovalue); } } else if (smatch(option, "server")) { flags |= HTTP_CACHE_SERVER; if (ovalue) { serverLifespan = httpGetTicks(ovalue); } } else if (smatch(option, "extensions")) { extensions = ovalue; } else if (smatch(option, "types")) { types = ovalue; } else if (smatch(option, "unique")) { flags |= HTTP_CACHE_UNIQUE; } else if (smatch(option, "manual")) { flags |= HTTP_CACHE_MANUAL; } else if (smatch(option, "methods")) { methods = ovalue; } else { mprLog("error appweb config", 0, "Unknown Cache option '%s'", option); return MPR_ERR_BAD_SYNTAX; } } if (lifespan > 0 && !uris && !extensions && !types && !methods) { state->route->lifespan = lifespan; } else { httpAddCache(state->route, methods, uris, extensions, types, clientLifespan, serverLifespan, flags); } return 0; }
389
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
closeVirtualHostDirective
closeVirtualHostDirective( MaState * state , cchar * key , cchar * value)
['state', 'key', 'value']
static int closeVirtualHostDirective(MaState *state, cchar *key, cchar *value) { HttpEndpoint *endpoint; char *address, *ip, *addresses, *tok; int port; if (state->enabled) { if (state->endpoints && *state->endpoints) { addresses = state->endpoints; while ((address = stok(addresses, " \t,", &tok)) != 0) { addresses = 0; mprParseSocketAddress(address, &ip, &port, NULL, -1); if ((endpoint = httpLookupEndpoint(ip, port)) == 0) { mprLog("error appweb config", 0, "Cannot find listen directive for virtual host %s", address); return MPR_ERR_BAD_SYNTAX; } else { httpAddHostToEndpoint(endpoint, state->host); } } } else { httpAddHostToEndpoints(state->host); } } closeDirective(state, key, value); return 0; }
168
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
crossOriginDirective
crossOriginDirective( MaState * state , cchar * key , cchar * value)
['state', 'key', 'value']
static int crossOriginDirective(MaState *state, cchar *key, cchar *value) { HttpRoute *route; char *option, *ovalue, *tok; route = state->route; tok = sclone(value); while ((option = maGetNextArg(tok, &tok)) != 0) { option = stok(option, " =\t,", &ovalue); ovalue = strim(ovalue, "\"'", MPR_TRIM_BOTH); if (scaselessmatch(option, "origin")) { route->corsOrigin = sclone(ovalue); } else if (scaselessmatch(option, "credentials")) { route->corsCredentials = httpGetBoolToken(ovalue); } else if (scaselessmatch(option, "headers")) { route->corsHeaders = sclone(ovalue); } else if (scaselessmatch(option, "age")) { route->corsAge = atoi(ovalue); } else { mprLog("error appweb config", 0, "Unknown CrossOrigin option %s", option); return MPR_ERR_BAD_SYNTAX; } } #if KEEP if (smatch(route->corsOrigin, "*") && route->corsCredentials) { mprLog("error appweb config", 0, "CrossOrigin: Cannot use wildcard Origin if allowing credentials"); return MPR_ERR_BAD_STATE; } #endif /* Need the options method for pre-flight requests */ httpAddRouteMethods(route, "OPTIONS"); route->flags |= HTTP_ROUTE_CORS; return 0; }
229
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
errorLogDirective
errorLogDirective( MaState * state , cchar * key , cchar * value)
['state', 'key', 'value']
static int errorLogDirective(MaState *state, cchar *key, cchar *value) { MprTicks stamp; char *option, *ovalue, *tok, *path; ssize size; int level, flags, backup; if (mprGetCmdlineLogging()) { mprLog("info appweb config", 4, "Already logging. Ignoring ErrorLog directive"); return 0; } size = MAXINT; stamp = 0; level = 0; backup = 0; path = 0; flags = 0; for (option = maGetNextArg(sclone(value), &tok); option; option = maGetNextArg(tok, &tok)) { if (!path) { path = mprJoinPath(httpGetRouteVar(state->route, "LOG_DIR"), httpExpandRouteVars(state->route, option)); } else { option = stok(option, " =\t,", &ovalue); ovalue = strim(ovalue, "\"'", MPR_TRIM_BOTH); if (smatch(option, "size")) { size = (ssize) getnum(ovalue); } else if (smatch(option, "level")) { level = atoi(ovalue); } else if (smatch(option, "backup")) { backup = atoi(ovalue); } else if (smatch(option, "anew")) { flags |= MPR_LOG_ANEW; } else if (smatch(option, "stamp")) { stamp = httpGetTicks(ovalue); } else { mprLog("error appweb config", 0, "Unknown ErrorLog option %s", option); } } } if (size < (10 * 1000)) { mprLog("error appweb config", 0, "Size is too small. Must be larger than 10K"); return MPR_ERR_BAD_SYNTAX; } if (path == 0) { mprLog("error appweb config", 0, "Missing filename"); return MPR_ERR_BAD_SYNTAX; } mprSetLogBackup(size, backup, flags); if (!smatch(path, "stdout") && !smatch(path, "stderr")) { path = httpMakePath(state->route, state->configDir, path); } if (mprStartLogging(path, MPR_LOG_DETAILED) < 0) { mprLog("error appweb config", 0, "Cannot write to ErrorLog: %s", path); return MPR_ERR_BAD_SYNTAX; } mprSetLogLevel(level); mprLogHeader(); if (stamp) { httpSetTimestamp(stamp); } return 0; }
417
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
getDirective
getDirective( char * line , char ** valuep)
['line', 'valuep']
static char *getDirective(char *line, char **valuep) { char *key, *value; ssize len; assert(line); assert(valuep); *valuep = 0; key = stok(line, " \t", &value); key = strim(key, " \t\r\n>", MPR_TRIM_END); if (value) { value = strim(value, " \t\r\n>", MPR_TRIM_END); /* Trim quotes if wrapping the entire value and no spaces. Preserve embedded quotes and leading/trailing "" etc. */ len = slen(value); if (*value == '\"' && value[len - 1] == '"' && len > 2 && value[1] != '\"' && !strpbrk(value, " \t")) { /* Cannot strip quotes if multiple args are quoted, only if one single arg is quoted */ if (schr(&value[1], '"') == &value[len - 1]) { value = snclone(&value[1], len - 2); } } *valuep = value; } return key; }
167
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
getnum
getnum( cchar * value)
['value']
static int64 getnum(cchar *value) { char *junk; int64 num; value = stok(slower(value), " \t", &junk); if (sends(value, "kb") || sends(value, "k")) { num = stoi(value) * 1024; } else if (sends(value, "mb") || sends(value, "m")) { num = stoi(value) * 1024 * 1024; } else if (sends(value, "gb") || sends(value, "g")) { num = stoi(value) * 1024 * 1024 * 1024; } else if (sends(value, "byte") || sends(value, "bytes")) { num = stoi(value); } else { num = stoi(value); } if (num == 0) { num = MAXINT; } return num; }
170
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
makeDirDirective
makeDirDirective( MaState * state , cchar * key , cchar * value)
['state', 'key', 'value']
static int makeDirDirective(MaState *state, cchar *key, cchar *value) { MprPath info; char *auth, *dirs, *path, *perms, *tok; cchar *dir, *group, *owner; int gid, mode, uid; if (!maTokenize(state, value, "%S ?*", &auth, &dirs)) { return MPR_ERR_BAD_SYNTAX; } uid = gid = 0; mode = 0750; if (schr(auth, ':')) { owner = stok(auth, ":", &tok); if (owner && *owner) { if (snumber(owner)) { uid = (int) stoi(owner); } else if (smatch(owner, "APPWEB")) { uid = HTTP->uid; } else { uid = userToID(owner); } } group = stok(tok, ":", &perms); if (group && *group) { if (snumber(group)) { gid = (int) stoi(group); } else if (smatch(owner, "APPWEB")) { gid = HTTP->gid; } else { gid = groupToID(group); } } if (perms && snumber(perms)) { mode = (int) stoiradix(perms, -1, NULL); } else { mode = 0; } if (gid < 0 || uid < 0) { return MPR_ERR_BAD_SYNTAX; } } else { dirs = auth; auth = 0; } tok = dirs; for (tok = sclone(dirs); (dir = stok(tok, ",", &tok)) != 0; ) { path = httpMakePath(state->route, state->configDir, dir); if (mprGetPathInfo(path, &info) == 0 && info.isDir) { continue; } if (mprMakeDir(path, mode, uid, gid, 1) < 0) { return MPR_ERR_BAD_SYNTAX; } } return 0; }
383
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
parseFileInner
parseFileInner( MaState * state , cchar * path)
['state', 'path']
static int parseFileInner(MaState *state, cchar *path) { MaDirective *directive; char *tok, *key, *line, *value; assert(state); assert(path && *path); if (openConfig(state, path) < 0) { return MPR_ERR_CANT_OPEN; } for (state->lineNumber = 1; state->file && (line = mprReadLine(state->file, 0, NULL)) != 0; state->lineNumber++) { for (tok = line; isspace((uchar) *tok); tok++) ; if (*tok == '\0' || *tok == '#') { continue; } state->key = 0; key = getDirective(line, &value); if (!state->enabled) { if (key[0] != '<') { continue; } } if ((directive = mprLookupKey(directives, key)) == 0) { mprLog("error appweb config", 0, "Unknown directive \"%s\". At line %d in %s", key, state->lineNumber, state->filename); return MPR_ERR_BAD_SYNTAX; } state->key = key; /* Allow directives to run commands and yield without worring about holding references. */ mprPauseGC(); if ((*directive)(state, key, value) < 0) { mprResumeGC(); mprLog("error appweb config", 0, "Error with directive \"%s\". At line %d in %s", state->key, state->lineNumber, state->filename); return MPR_ERR_BAD_SYNTAX; } mprResumeGC(); mprYield(0); state = state->top->current; } /* EOF */ if (state->prev && state->file == state->prev->file) { mprLog("error appweb config", 0, "Unclosed directives in %s", state->filename); while (state->prev && state->file == state->prev->file) { state = state->prev; } } mprCloseFile(state->file); return 0; }
344
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
requireDirective
requireDirective( MaState * state , cchar * key , cchar * value)
['state', 'key', 'value']
static int requireDirective(MaState *state, cchar *key, cchar *value) { char *age, *type, *rest, *option, *ovalue, *tok; int domains; if (!maTokenize(state, value, "%S ?*", &type, &rest)) { return MPR_ERR_BAD_SYNTAX; } if (scaselesscmp(type, "ability") == 0) { httpSetAuthRequiredAbilities(state->auth, rest); /* Support require group for legacy support */ // DEPRECATE "group" } else if (scaselesscmp(type, "group") == 0 || scaselesscmp(type, "role") == 0) { httpSetAuthRequiredAbilities(state->auth, rest); } else if (scaselesscmp(type, "secure") == 0) { domains = 0; age = 0; for (option = stok(sclone(rest), " \t", &tok); option; option = stok(0, " \t", &tok)) { option = stok(option, " =\t,", &ovalue); ovalue = strim(ovalue, "\"'", MPR_TRIM_BOTH); if (smatch(option, "age")) { age = sfmt("%lld", (int64) httpGetTicks(ovalue)); } else if (smatch(option, "domains")) { domains = 1; } } if (age) { if (domains) { /* Negative age signifies subdomains */ age = sjoin("-1", age, NULL); } } addCondition(state, "secure", age, HTTP_ROUTE_STRICT_TLS); } else if (scaselesscmp(type, "user") == 0) { httpSetAuthPermittedUsers(state->auth, rest); } else if (scaselesscmp(type, "valid-user") == 0) { httpSetAuthAnyValidUser(state->auth); } else { return configError(state, key); } return 0; }
327
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
sessionCookieDirective
sessionCookieDirective( MaState * state , cchar * key , cchar * value)
['state', 'key', 'value']
static int sessionCookieDirective(MaState *state, cchar *key, cchar *value) { char *options, *option, *ovalue, *tok; if (!maTokenize(state, value, "%*", &options)) { return MPR_ERR_BAD_SYNTAX; } if (smatch(options, "disable")) { httpSetAuthSession(state->route->auth, 0); return 0; } else if (smatch(options, "enable")) { httpSetAuthSession(state->route->auth, 1); return 0; } for (option = maGetNextArg(options, &tok); option; option = maGetNextArg(tok, &tok)) { option = stok(option, " =\t,", &ovalue); ovalue = strim(ovalue, "\"'", MPR_TRIM_BOTH); if (!ovalue || *ovalue == '\0') continue; if (smatch(option, "visible")) { httpSetRouteSessionVisibility(state->route, scaselessmatch(ovalue, "visible")); } else if (smatch(option, "name")) { httpSetRouteCookie(state->route, ovalue); } else { mprLog("error appweb config", 0, "Unknown SessionCookie option %s", option); return MPR_ERR_BAD_SYNTAX; } } return 0; }
227
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
traceDirective
traceDirective( MaState * state , cchar * key , cchar * value)
['state', 'key', 'value']
static int traceDirective(MaState *state, cchar *key, cchar *value) { HttpRoute *route; char *option, *ovalue, *tok; route = state->route; route->trace = httpCreateTrace(route->trace); for (option = stok(sclone(value), " \t", &tok); option; option = stok(0, " \t", &tok)) { option = stok(option, " =\t,", &ovalue); ovalue = strim(ovalue, "\"'", MPR_TRIM_BOTH); if (smatch(option, "content")) { httpSetTraceContentSize(route->trace, (ssize) getnum(ovalue)); } else { httpSetTraceEventLevel(route->trace, option, atoi(ovalue)); } } return 0; }
149
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
traceLogDirective
traceLogDirective( MaState * state , cchar * key , cchar * value)
['state', 'key', 'value']
static int traceLogDirective(MaState *state, cchar *key, cchar *value) { HttpRoute *route; char *format, *option, *ovalue, *tok, *path, *formatter; ssize size; int flags, backup, level; route = state->route; size = MAXINT; backup = 0; flags = 0; path = 0; format = ME_HTTP_LOG_FORMAT; formatter = "detail"; level = 0; if (route->trace->flags & MPR_LOG_CMDLINE) { mprLog("info appweb config", 4, "Already tracing. Ignoring TraceLog directive"); return 0; } for (option = maGetNextArg(sclone(value), &tok); option; option = maGetNextArg(tok, &tok)) { if (!path) { path = sclone(option); } else { option = stok(option, " =\t,", &ovalue); ovalue = strim(ovalue, "\"'", MPR_TRIM_BOTH); if (smatch(option, "anew")) { flags |= MPR_LOG_ANEW; } else if (smatch(option, "backup")) { backup = atoi(ovalue); } else if (smatch(option, "format")) { format = ovalue; } else if (smatch(option, "level")) { level = (int) stoi(ovalue); } else if (smatch(option, "size")) { size = (ssize) getnum(ovalue); } else if (smatch(option, "formatter")) { formatter = ovalue; } else { mprLog("error appweb config", 0, "Unknown TraceLog option %s", option); } } } if (size < HTTP_TRACE_MIN_LOG_SIZE) { size = HTTP_TRACE_MIN_LOG_SIZE; } if (path == 0) { mprLog("error appweb config", 0, "Missing TraceLog filename"); return MPR_ERR_BAD_SYNTAX; } if (formatter) { httpSetTraceFormatterName(route->trace, formatter); } if (!smatch(path, "stdout") && !smatch(path, "stderr")) { path = httpMakePath(route, state->configDir, path); } route->trace = httpCreateTrace(route->trace); if (httpSetTraceLogFile(route->trace, path, size, backup, format, flags) < 0) { return MPR_ERR_CANT_OPEN; } httpSetTraceLevel(level); return 0; }
425
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
virtualHostDirective
virtualHostDirective( MaState * state , cchar * key , cchar * value)
['state', 'key', 'value']
static int virtualHostDirective(MaState *state, cchar *key, cchar *value) { state = maPushState(state); if (state->enabled) { /* Inherit the current default route configuration (only) Other routes are not inherited due to the reset routes below */ state->route = httpCreateInheritedRoute(httpGetHostDefaultRoute(state->host)); state->route->ssl = 0; state->auth = state->route->auth; state->host = httpCloneHost(state->host); httpResetRoutes(state->host); httpSetRouteHost(state->route, state->host); httpSetHostDefaultRoute(state->host, state->route); /* Set a default host and route name */ if (value) { httpSetHostName(state->host, stok(sclone(value), " \t,", NULL)); httpSetRouteName(state->route, sfmt("default-%s", state->host->name)); /* Save the endpoints until the close of the VirtualHost to closeVirtualHostDirective can add the virtual host to the specified endpoints. */ state->endpoints = sclone(value); } } return 0; }
158
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
findExecutable
findExecutable( HttpConn * conn , char ** program , char ** script , char ** bangScript , cchar * fileName)
['conn', 'program', 'script', 'bangScript', 'fileName']
static void findExecutable(HttpConn *conn, char **program, char **script, char **bangScript, cchar *fileName) { HttpRx *rx; HttpTx *tx; HttpRoute *route; MprKey *kp; MprFile *file; cchar *actionProgram, *ext, *cmdShell, *cp, *start, *path; char *tok, buf[ME_MAX_FNAME + 1]; rx = conn->rx; tx = conn->tx; route = rx->route; *bangScript = 0; *script = 0; *program = 0; path = 0; actionProgram = mprGetMimeProgram(rx->route->mimeTypes, rx->mimeType); ext = tx->ext; /* If not found, go looking for the fileName with the extensions defined in appweb.conf. NOTE: we don't use PATH deliberately!!! */ if (access(fileName, X_OK) < 0) { for (kp = 0; (kp = mprGetNextKey(route->extensions, kp)) != 0; ) { path = sjoin(fileName, ".", kp->key, NULL); if (access(path, X_OK) == 0) { break; } path = 0; } if (kp) { ext = kp->key; } else { path = fileName; } } else { path = fileName; } assert(path && *path); #if ME_WIN_LIKE if (ext && (strcmp(ext, ".bat") == 0 || strcmp(ext, ".cmd") == 0)) { /* Let a mime action override COMSPEC */ if (actionProgram) { cmdShell = actionProgram; } else { cmdShell = getenv("COMSPEC"); } if (cmdShell == 0) { cmdShell = "cmd.exe"; } *script = sclone(path); *program = sclone(cmdShell); return; } #endif if (actionProgram) { *program = sclone(actionProgram); } else if ((file = mprOpenFile(path, O_RDONLY, 0)) != 0) { if (mprReadFile(file, buf, ME_MAX_FNAME) > 0) { mprCloseFile(file); buf[ME_MAX_FNAME] = '\0'; if (buf[0] == '#' && buf[1] == '!') { cp = start = &buf[2]; cmdShell = stok(&buf[2], "\r\n", &tok); if (!mprIsPathAbs(cmdShell)) { /* If we cannot access the command shell and the command is not an absolute path, look in the same directory as the script. */ if (mprPathExists(cmdShell, X_OK)) { cmdShell = mprJoinPath(mprGetPathDir(path), cmdShell); } } *program = sclone(cmdShell); *bangScript = sclone(path); return; } } else { mprCloseFile(file); } } if (actionProgram) { *program = sclone(actionProgram); *bangScript = sclone(path); } else { *program = sclone(path); } return; }
512
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
parseCgiHeaders
parseCgiHeaders( Cgi * cgi , HttpPacket * packet)
['cgi', 'packet']
static bool parseCgiHeaders(Cgi *cgi, HttpPacket *packet) { HttpConn *conn; MprBuf *buf; char *endHeaders, *headers, *key, *value, *junk; ssize blen; int len; conn = cgi->conn; value = 0; buf = packet->content; headers = mprGetBufStart(buf); blen = mprGetBufLength(buf); /* Split the headers from the body. Add null to ensure we can search for line terminators. */ len = 0; if ((endHeaders = sncontains(headers, "\r\n\r\n", blen)) == NULL) { if ((endHeaders = sncontains(headers, "\n\n", blen)) == NULL) { if (mprGetCmdFd(cgi->cmd, MPR_CMD_STDOUT) >= 0 && strlen(headers) < ME_MAX_HEADERS) { /* Not EOF and less than max headers and have not yet seen an end of headers delimiter */ return 0; } } len = 2; } else { len = 4; } if (endHeaders > buf->end) { assert(endHeaders <= buf->end); return 0; } if (endHeaders) { endHeaders[len - 1] = '\0'; endHeaders += len; } /* Want to be tolerant of CGI programs that omit the status line. */ if (strncmp((char*) buf->start, "HTTP/1.", 7) == 0) { if (!parseFirstCgiResponse(cgi, packet)) { /* httpError already called */ return 0; } } if (endHeaders && strchr(mprGetBufStart(buf), ':')) { while (mprGetBufLength(buf) > 0 && buf->start[0] && (buf->start[0] != '\r' && buf->start[0] != '\n')) { if ((key = getCgiToken(buf, ":")) == 0) { key = "Bad Header"; } value = getCgiToken(buf, "\n"); while (isspace((uchar) *value)) { value++; } len = (int) strlen(value); while (len > 0 && (value[len - 1] == '\r' || value[len - 1] == '\n')) { value[len - 1] = '\0'; len--; } key = slower(key); if (strcmp(key, "location") == 0) { cgi->location = value; } else if (strcmp(key, "status") == 0) { httpSetStatus(conn, atoi(value)); } else if (strcmp(key, "content-type") == 0) { httpSetHeaderString(conn, "Content-Type", value); } else if (strcmp(key, "content-length") == 0) { httpSetContentLength(conn, (MprOff) stoi(value)); httpSetChunkSize(conn, 0); } else { /* Now pass all other headers back to the client */ key = stok(key, ":\r\n\t ", &junk); httpSetHeaderString(conn, key, value); } } buf->start = endHeaders; } return 1; }
517
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
app_env
app_env( Ejs * ejs , EjsObj * app , int argc , EjsObj ** argv)
['ejs', 'app', 'argc', 'argv']
static EjsAny *app_env(Ejs *ejs, EjsObj *app, int argc, EjsObj **argv) { #if VXWORKS return ESV(null); #else EjsPot *result; char **ep, *pair, *key, *value; result = ejsCreatePot(ejs, ESV(Object), 0); for (ep = environ; ep && *ep; ep++) { pair = sclone(*ep); key = stok(pair, "=", &value); ejsSetPropertyByName(ejs, result, EN(key), ejsCreateStringFromAsc(ejs, value)); } return result; #endif }
114
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
getTokenValue
getTokenValue( Ejs * ejs , EjsObj * obj , cchar * fullToken , cchar * token , MprBuf * buf , EjsAny * missing , EjsString * join)
['ejs', 'obj', 'fullToken', 'token', 'buf', 'missing', 'join']
static int getTokenValue(Ejs *ejs, EjsObj *obj, cchar *fullToken, cchar *token, MprBuf *buf, EjsAny *missing, EjsString *join) { EjsAny *vp; EjsString *svalue; EjsName qname; char *rest, *first, *str; rest = (char*) (schr(token, '.') ? sclone(token) : token); first = stok(rest, ".", &rest); qname.name = ejsCreateStringFromAsc(ejs, first); qname.space = 0; if ((vp = ejsGetPropertyByName(ejs, obj, qname)) != 0) { if (rest && ejsIsPot(ejs, vp)) { return getTokenValue(ejs, vp, fullToken, rest, buf, missing, join); } else { if (ejsIs(ejs, vp, Array)) { svalue = ejsJoinArray(ejs, vp, join); } else { svalue = ejsToString(ejs, vp); } mprPutStringToBuf(buf, svalue->value); } } else if (!missing || (vp == ESV(null) || vp == ESV(undefined))) { ejsThrowReferenceError(ejs, "Missing property %s", fullToken); return 0; } else if (missing == ESV(true)) { mprPutStringToBuf(buf, "${"); mprPutStringToBuf(buf, fullToken); mprPutCharToBuf(buf, '}'); } else if (missing == ESV(false)) { /* Omit */; } else { str = ejsToMulti(ejs, missing); // DEPRECATE LEGACY if (smatch(str, "${}")) { mprPutStringToBuf(buf, "${"); mprPutStringToBuf(buf, fullToken); mprPutCharToBuf(buf, '}'); } else { mprPutStringToBuf(buf, str); } } return 1; }
341
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
http_info
http_info( Ejs * ejs , EjsHttp * hp , int argc , EjsObj ** argv)
['ejs', 'hp', 'argc', 'argv']
static EjsObj *http_info(Ejs *ejs, EjsHttp *hp, int argc, EjsObj **argv) { EjsObj *obj; char *key, *next, *value; if (hp->conn && hp->conn->sock) { obj = ejsCreateEmptyPot(ejs); for (key = stok(mprGetSocketState(hp->conn->sock), ",", &next); key; key = stok(NULL, ",", &next)) { stok(key, "=", &value); ejsSetPropertyByName(ejs, obj, EN(key), ejsCreateStringFromAsc(ejs, value)); } return obj; } return ESV(null); }
129
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
asNumber
asNumber( cchar * version)
['version']
static int64 asNumber(cchar *version) { char *tok; int64 major, minor, patch; major = stoi(stok(sclone(version), ".", &tok)); minor = stoi(stok(tok, ".", &tok)); patch = stoi(stok(tok, ".", &tok)); return (((major * VER_FACTOR) + minor) * VER_FACTOR) + patch; }
84
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
blendSpec
blendSpec( cchar * name , cchar * version , MprJson * spec)
['name', 'version', 'spec']
static bool blendSpec(cchar *name, cchar *version, MprJson *spec) { MprJson *blend, *cp, *scripts; cchar *script, *key; char *major, *minor, *patch; int i; /* Before blending, expand ${var} references */ if ((scripts = mprGetJsonObj(spec, "app.client.+scripts")) != 0) { for (ITERATE_JSON(scripts, cp, i)) { if (!(cp->type & MPR_JSON_STRING)) continue; script = httpExpandRouteVars(app->route, cp->value); script = stemplateJson(script, app->config); mprSetJson(spec, sfmt("app.client.+scripts[@=%s]", cp->value), script); } } blend = mprGetJsonObj(spec, "blend"); for (ITERATE_JSON(blend, cp, i)) { blendJson(app->config, cp->name, spec, cp->value); } if (mprGetJsonObj(spec, "app") != 0) { blendJson(app->config, "app", spec, "app"); } if (mprGetJsonObj(spec, "directories") != 0) { blendJson(app->config, "directories", spec, "directories"); } if (mprLookupKey(app->topDeps, name)) { major = stok(sclone(version), ".", &minor); minor = stok(minor, ".", &patch); key = sfmt("dependencies.%s", name); if (!mprGetJson(app->config, key)) { mprSetJson(app->config, key, sfmt("~%s.%s", major, minor)); } } return 1; }
304
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
createMigration
createMigration( cchar * name , cchar * table , cchar * comment , int fieldCount , char ** fields)
['name', 'table', 'comment', 'fieldCount', 'fields']
static void createMigration(cchar *name, cchar *table, cchar *comment, int fieldCount, char **fields) { MprHash *tokens; MprList *files; MprDirEntry *dp; cchar *dir, *seq, *forward, *backward, *data, *path, *def, *field, *tail, *typeDefine; char *typeString; int i, type, next; seq = sfmt("%s%d", mprGetDate("%Y%m%d%H%M%S"), nextMigration); forward = sfmt(" ediAddTable(db, \"%s\");\n", table); backward = sfmt(" ediRemoveTable(db, \"%s\");\n", table); def = sfmt(" ediAddColumn(db, \"%s\", \"id\", EDI_TYPE_INT, EDI_AUTO_INC | EDI_INDEX | EDI_KEY);\n", table); forward = sjoin(forward, def, NULL); for (i = 0; i < fieldCount; i++) { field = stok(sclone(fields[i]), ":", &typeString); if ((type = ediParseTypeString(typeString)) < 0) { fail("Unknown type '%s' for field '%s'", typeString, field); return; } if (smatch(field, "id")) { continue; } typeDefine = sfmt("EDI_TYPE_%s", supper(ediGetTypeString(type))); def = sfmt(" ediAddColumn(db, \"%s\", \"%s\", %s, 0);\n", table, field, typeDefine); forward = sjoin(forward, def, NULL); } tokens = mprDeserialize(sfmt("{ MIGRATION: '%s', TABLE: '%s', COMMENT: '%s', FORWARD: '%s', BACKWARD: '%s' }", name, table, comment, forward, backward)); if ((data = getTemplate("migration", tokens)) == 0) { return; } dir = mprJoinPath(httpGetDir(app->route, "db"), "migrations"); makeEspDir(dir); files = mprGetPathFiles("db/migrations", MPR_PATH_RELATIVE); tail = sfmt("%s.c", name); for (ITERATE_ITEMS(files, dp, next)) { if (sends(dp->name, tail)) { if (!app->force) { qtrace("Exists", "A migration with the same description already exists: %s", dp->name); return; } mprDeletePath(mprJoinPath("db/migrations/", dp->name)); } } path = sfmt("%s/%s_%s.c", dir, seq, name); makeEspFile(path, data, 0); }
400
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
editPackageValue
editPackageValue( int argc , char ** argv)
['argc', 'argv']
static void editPackageValue(int argc, char **argv) { cchar *key, *value; int i; if (argc < 1) { usageError(); return; } for (i = 0; i < argc; i++) { key = stok(sclone(argv[i]), "=", (char**) &value); if (value) { setPackageKey(key, value); } else { value = getConfigValue(key, 0); if (value) { printf("%s\n", value); } else { printf("undefined\n"); } } } }
118
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
findAcceptableVersion
findAcceptableVersion( cchar * name , cchar * originalCriteria)
['name', 'originalCriteria']
static cchar *findAcceptableVersion(cchar *name, cchar *originalCriteria) { MprDirEntry *dp; MprList *files; cchar *criteria; int next; criteria = originalCriteria; if (!criteria || smatch(criteria, "*")) { criteria = "x"; } if (schr(name, '#')) { name = stok(sclone(name), "#", (char**) &criteria); } files = mprGetPathFiles(mprJoinPath(app->paksCacheDir, name), MPR_PATH_RELATIVE); mprSortList(files, (MprSortProc) reverseSortFiles, 0); for (ITERATE_ITEMS(files, dp, next)) { if (acceptableVersion(criteria, dp->name)) { return dp->name; } } if (originalCriteria) { fail("Cannot find acceptable version for: \"%s\" with version criteria \"%s\" in %s", name, originalCriteria, app->paksCacheDir); } else { fail("Cannot find pak: \"%s\" in %s", name, app->paksCacheDir); } mprLog("", 0, "Use \"pak install %s\" to install", name); return 0; }
185
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
generateScaffold
generateScaffold( int argc , char ** argv)
['argc', 'argv']
static void generateScaffold(int argc, char **argv) { char *plural; if (argc < 1) { usageError(); return; } if (getConfigValue("app.esp.generate.controller", 0) == 0) { fail("No suitable package installed to generate scaffolds"); return; } app->controller = sclone(argv[0]); if (!identifier(app->controller)) { fail("Cannot generate scaffold. Controller name must be a valid C identifier"); return; } /* This feature is undocumented. Having plural database table names greatly complicates things and ejsJoin is not able to follow foreign fields: NameId. */ stok(sclone(app->controller), "-", &plural); if (plural) { app->table = sjoin(app->controller, plural, NULL); } else { app->table = app->table ? app->table : app->controller; } generateScaffoldController(argc, argv); generateClientController(argc, argv); generateScaffoldViews(argc, argv); generateClientModel(argc, argv); generateScaffoldMigration(argc, argv); migrate(0, 0); }
177
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
generateTable
generateTable( int argc , char ** argv)
['argc', 'argv']
static void generateTable(int argc, char **argv) { Edi *edi; cchar *field; char *typeString; int rc, i, type; app->table = app->table ? app->table : sclone(argv[0]); if ((edi = app->eroute->edi) == 0) { fail("Database not defined"); return; } edi->flags |= EDI_SUPPRESS_SAVE; if ((rc = ediAddTable(edi, app->table)) < 0) { if (rc != MPR_ERR_ALREADY_EXISTS) { fail("Cannot add table '%s'", app->table); } } else { if ((rc = ediAddColumn(edi, app->table, "id", EDI_TYPE_INT, EDI_AUTO_INC | EDI_INDEX | EDI_KEY)) != 0) { fail("Cannot add column 'id'"); } } for (i = 1; i < argc && !app->error; i++) { field = stok(sclone(argv[i]), ":", &typeString); if ((type = ediParseTypeString(typeString)) < 0) { fail("Unknown type '%s' for field '%s'", typeString, field); break; } if ((rc = ediAddColumn(edi, app->table, field, type, 0)) != 0) { if (rc != MPR_ERR_ALREADY_EXISTS) { fail("Cannot add column '%s'", field); break; } else { ediChangeColumn(edi, app->table, field, type, 0); } } } edi->flags &= ~EDI_SUPPRESS_SAVE; ediSave(edi); qtrace("Update", "Database schema"); }
294
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
getPakVersion
getPakVersion( cchar * name , cchar * version)
['name', 'version']
static cchar *getPakVersion(cchar *name, cchar *version) { MprDirEntry *dp; MprList *files; if (!version || smatch(version, "*")) { name = stok(sclone(name), "#", (char**) &version); if (!version) { files = mprGetPathFiles(mprJoinPath(app->paksCacheDir, name), MPR_PATH_RELATIVE); mprSortList(files, (MprSortProc) reverseSortFiles, 0); if ((dp = mprGetFirstItem(files)) != 0) { version = mprGetPathBase(dp->name); } if (version == 0) { fail("Cannot find pak: %s", name); return 0; } } } return version; }
133
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
inRange
inRange( cchar * expr , cchar * version)
['expr', 'version']
static bool inRange(cchar *expr, cchar *version) { char *cp, *op, *base, *pre, *low, *high, *preVersion; int64 min, max, numberVersion; ssize i; if ((i = strspn(expr, "<>=~ \t")) > 0) { op = snclone(expr, i); expr = &expr[i]; } else { op = 0; } if (smatch(expr, "*")) { expr = "x"; } version = stok(sclone(version), "-", &preVersion); base = stok(sclone(expr), "-", &pre); if (op && (*op == '~' || *op == '^')) { if (*op == '^' && schr(version, '-')) { return 0; } base = slower(base); if ((cp = scontains(base, ".x")) != 0) { *cp = '\0'; } return sstarts(version, base); } if (scontains(base, "x") && !schr(version, '-')) { low = sfmt(">=%s", sreplace(base, "x", "0")); high = sfmt("<%s", sreplace(base, "x", VER_FACTOR_MAX)); return inRange(low, version) && inRange(high, version); } min = 0; max = MAX_VER; if (!op) { min = max = asNumber(base); } else if (smatch(op, ">=")) { min = asNumber(base); } else if (*op == '>') { min = asNumber(base) + 1; } else if (smatch(op, "<=")) { max = asNumber(base); } else if (*op == '<') { max = asNumber(base) - 1; } else { min = max = asNumber(base); } numberVersion = asNumber(version); if (min <= numberVersion && numberVersion <= max) { if ((pre && smatch(pre, preVersion)) || (!pre && !preVersion)) { return 1; } } return 0; }
430
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
reverseSortFiles
reverseSortFiles( MprDirEntry ** d1 , MprDirEntry ** d2)
['d1', 'd2']
static int reverseSortFiles(MprDirEntry **d1, MprDirEntry **d2) { char *base1, *base2, *b1, *b2, *p1, *p2; int rc; base1 = mprGetPathBase((*d1)->name); base2 = mprGetPathBase((*d2)->name); if (smatch(base1, base2)) { return 0; } b1 = stok(base1, "-", &p1); b2 = stok(base2, "-", &p2); rc = scmp(b1, b2); if (rc == 0) { if (!p1) { rc = 1; } else if (!p2) { rc = -1; } else { rc = scmp(p1, p2); } } return -rc; }
153
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
role
role( int argc , char ** argv)
['argc', 'argv']
static void role(int argc, char **argv) { HttpAuth *auth; HttpRole *role; MprJson *abilities; MprBuf *buf; MprKey *kp; cchar *cmd, *def, *key, *rolename; if ((auth = app->route->auth) == 0) { fail("Authentication not configured in package.json"); return; } if (argc < 2) { usageError(); return; } cmd = argv[0]; rolename = argv[1]; if (smatch(cmd, "remove")) { key = sfmt("app.http.auth.roles.%s", rolename); if (mprRemoveJson(app->config, key) < 0) { fail("Cannot remove %s", key); return; } if (!app->noupdate) { savePackage(); trace("Remove", "Role %s", rolename); } return; } else if (smatch(cmd, "add")) { if (smatch(cmd, "add")) { def = sfmt("[%s]", sjoinArgs(argc - 2, (cchar**) &argv[2], ",")); abilities = mprParseJson(def); key = sfmt("app.http.auth.roles.%s", rolename); if (mprSetJsonObj(app->config, key, abilities) < 0) { fail("Cannot update %s", key); return; } savePackage(); if (!app->noupdate) { trace("Update", "Role %s", rolename); } } if (app->show) { trace("Info", "%s %s", rolename, sjoinArgs(argc - 2, (cchar**) &argv[3], " ")); } } else if (smatch(cmd, "show")) { if ((role = httpLookupRole(app->route->auth, rolename)) == 0) { fail("Cannot find role %s", rolename); return; } buf = mprCreateBuf(0, 0); for (ITERATE_KEYS(role->abilities, kp)) { mprPutToBuf(buf, "%s ", kp->key); } trace("Info", "%s %s", role->name, mprBufToString(buf)); } }
403
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
user
user( int argc , char ** argv)
['argc', 'argv']
static void user(int argc, char **argv) { HttpAuth *auth; HttpUser *user; MprJson *credentials; char *password; cchar *cmd, *def, *key, *username, *encodedPassword, *roles; if ((auth = app->route->auth) == 0) { fail("Authentication not configured in package.json"); return; } if (argc < 2) { usageError(); return; } cmd = argv[0]; username = argv[1]; if (smatch(cmd, "remove")) { if (httpRemoveUser(app->route->auth, username) < 0) { fail("Cannot remove user %s", username); return; } key = sfmt("app.http.auth.users.%s", username); if (mprRemoveJson(app->config, key) < 0) { fail("Cannot remove %s", key); return; } if (!app->noupdate) { savePackage(); trace("Remove", "User %s", username); } return; } else if (smatch(cmd, "add") || smatch(cmd, "compute")) { if (argc < 3) { usageError(); return; } password = argv[2]; if (smatch(password, "-")) { password = getPassword(); } if (auth->realm == 0 || *auth->realm == '\0') { fail("An authentication realm has not been defined. Define a \"app.http.auth.realm\" value."); return; } if (smatch(app->cipher, "md5")) { encodedPassword = mprGetMD5(sfmt("%s:%s:%s", username, auth->realm, password)); } else { /* This uses the more secure blowfish cipher */ encodedPassword = mprMakePassword(sfmt("%s:%s:%s", username, auth->realm, password), 16, 128); } serase(password); if (smatch(cmd, "add")) { def = sfmt("{password:'%s',roles:[%s]}", encodedPassword, sjoinArgs(argc - 3, (cchar**) &argv[3], ",")); credentials = mprParseJson(def); key = sfmt("app.http.auth.users.%s", username); if (mprSetJsonObj(app->config, key, credentials) < 0) { fail("Cannot update %s", key); return; } savePackage(); if (!app->noupdate) { trace("Update", "User %s", username); } } if (smatch(cmd, "compute") || app->show) { trace("Info", "%s %s %s", username, encodedPassword, sjoinArgs(argc - 3, (cchar**) &argv[3], " ")); } } else if (smatch(cmd, "show")) { if ((user = httpLookupUser(app->route->auth, username)) == 0) { fail("Cannot find user %s", username); return; } roles = sreplace(user->roles, ",", ""); roles = sreplace(roles, " ", " "); roles = strim(roles, " ", 0); trace("Info", "%s %s %s", user->name, user->password, roles); } }
575
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
espAddPak
espAddPak( HttpRoute * route , cchar * name , cchar * version)
['route', 'name', 'version']
PUBLIC void espAddPak(HttpRoute *route, cchar *name, cchar *version) { if (!version || !*version || smatch(version, "0.0.0")) { version = "*"; } mprSetJson(route->config, sfmt("dependencies.%s", name), version); }
54
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
espBuildScript
espBuildScript( HttpRoute * route , cchar * page , cchar * path , cchar * cacheName , cchar * layout , EspState * state , char ** err)
['route', 'page', 'path', 'cacheName', 'layout', 'state', 'err']
PUBLIC char *espBuildScript(HttpRoute *route, cchar *page, cchar *path, cchar *cacheName, cchar *layout, EspState *state, char **err) { EspState top; EspParse parse; MprBuf *body; cchar *layoutsDir; char *control, *incText, *where, *layoutCode, *bodyCode; char *rest, *include, *line, *fmt, *layoutPage, *incCode, *token; ssize len; int tid; assert(page); *err = 0; if (!state) { assert(cacheName); state = &top; memset(state, 0, sizeof(EspParse)); state->global = mprCreateBuf(0, 0); state->start = mprCreateBuf(0, 0); state->end = mprCreateBuf(0, 0); } body = mprCreateBuf(0, 0); parse.data = (char*) page; parse.next = parse.data; parse.lineNumber = 0; parse.token = mprCreateBuf(0, 0); tid = getEspToken(&parse); while (tid != ESP_TOK_EOF) { token = mprGetBufStart(parse.token); #if KEEP if (state->lineNumber != lastLine) { mprPutToBuf(script, "\n# %d \"%s\"\n", state->lineNumber, path); } #endif switch (tid) { case ESP_TOK_CODE: if (*token == '^') { for (token++; *token && isspace((uchar) *token); token++) ; where = stok(token, " \t\r\n", &rest); if (rest == 0) { ; } else if (scmp(where, "global") == 0) { mprPutStringToBuf(state->global, rest); } else if (scmp(where, "start") == 0) { mprPutToBuf(state->start, "%s ", rest); } else if (scmp(where, "end") == 0) { mprPutToBuf(state->end, "%s ", rest); } } else { mprPutStringToBuf(body, fixMultiStrings(token)); } break; case ESP_TOK_CONTROL: control = stok(token, " \t\r\n", &token); if (scmp(control, "content") == 0) { mprPutStringToBuf(body, ESP_CONTENT_MARKER); } else if (scmp(control, "include") == 0) { if (token == 0) { token = ""; } token = strim(token, " \t\r\n\"", MPR_TRIM_BOTH); token = mprNormalizePath(token); if (token[0] == '/') { include = sclone(token); } else { include = mprJoinPath(mprGetPathDir(path), token); } if ((incText = mprReadPathContents(include, &len)) == 0) { *err = sfmt("Cannot read include file: %s", include); return 0; } /* Recurse and process the include script */ if ((incCode = espBuildScript(route, incText, include, NULL, NULL, state, err)) == 0) { return 0; } mprPutStringToBuf(body, incCode); } else if (scmp(control, "layout") == 0) { token = strim(token, " \t\r\n\"", MPR_TRIM_BOTH); if (*token == '\0') { layout = 0; } else { token = mprNormalizePath(token); if (token[0] == '/') { layout = sclone(token); } else { if ((layoutsDir = httpGetDir(route, "layouts")) != 0) { layout = mprJoinPath(layoutsDir, token); } else { layout = mprJoinPath(mprGetPathDir(path), token); } } if (!mprPathExists(layout, F_OK)) { *err = sfmt("Cannot access layout page %s", layout); return 0; } } } else { *err = sfmt("Unknown control %s at line %d", control, state->lineNumber); return 0; } break; case ESP_TOK_ERR: return 0; case ESP_TOK_EXPR: /* <%= expr %> */ if (*token == '%') { fmt = stok(token, ": \t\r\n", &token); if (token == 0) { token = ""; } /* Default without format is safe. If users want a format and safe, use %S or renderSafe() */ token = strim(token, " \t\r\n;", MPR_TRIM_BOTH); mprPutToBuf(body, " espRender(conn, \"%s\", %s);\n", fmt, token); } else { token = strim(token, " \t\r\n;", MPR_TRIM_BOTH); mprPutToBuf(body, " espRenderSafeString(conn, %s);\n", token); } break; case ESP_TOK_FIELD: /* @#field -- field in the current record */ token = strim(token, " \t\r\n;", MPR_TRIM_BOTH); mprPutToBuf(body, " espRenderSafeString(conn, getField(getRec(), \"%s\"));\n", token); break; case ESP_TOK_PARAM: /* @@var -- variable in (param || session) - Safe render */ token = strim(token, " \t\r\n;", MPR_TRIM_BOTH); mprPutToBuf(body, " espRenderVar(conn, \"%s\");\n", token); break; case ESP_TOK_VAR: /* @!var -- string variable */ token = strim(token, " \t\r\n;", MPR_TRIM_BOTH); mprPutToBuf(body, " espRenderString(conn, %s);\n", token); break; case ESP_TOK_HOME: /* @~ Home URL */ mprPutToBuf(body, " espRenderString(conn, conn->rx->route->prefix);"); break; case ESP_TOK_SERVER: /* @^ Server URL */ mprPutToBuf(body, " espRenderString(conn, sjoin(conn->rx->route->prefix ? conn->rx->route->prefix : \"\", conn->rx->route->serverPrefix, NULL));"); break; case ESP_TOK_LITERAL: line = joinLine(token, &len); mprPutToBuf(body, " espRenderBlock(conn, \"%s\", %zd);\n", line, len); break; default: return 0; } tid = getEspToken(&parse); } mprAddNullToBuf(body); if (layout && mprPathExists(layout, R_OK)) { if ((layoutPage = mprReadPathContents(layout, &len)) == 0) { *err = sfmt("Cannot read layout page: %s", layout); return 0; } if ((layoutCode = espBuildScript(route, layoutPage, layout, NULL, NULL, state, err)) == 0) { return 0; } #if ME_DEBUG if (!scontains(layoutCode, ESP_CONTENT_MARKER)) { *err = sfmt("Layout page is missing content marker: %s", layout); return 0; } #endif bodyCode = sreplace(layoutCode, ESP_CONTENT_MARKER, mprGetBufStart(body)); } else { bodyCode = mprGetBufStart(body); } if (state == &top) { path = mprGetRelPath(path, route->documents); if (mprGetBufLength(state->start) > 0) { mprPutCharToBuf(state->start, '\n'); } if (mprGetBufLength(state->end) > 0) { mprPutCharToBuf(state->end, '\n'); } mprAddNullToBuf(state->global); mprAddNullToBuf(state->start); mprAddNullToBuf(state->end); bodyCode = sfmt(\ "/*\n Generated from %s\n */\n"\ "#include \"esp.h\"\n"\ "%s\n"\ "static void %s(HttpConn *conn) {\n"\ "%s%s%s"\ "}\n\n"\ "%s int esp_%s(HttpRoute *route, MprModule *module) {\n"\ " espDefineView(route, \"%s\", %s);\n"\ " return 0;\n"\ "}\n", path, mprGetBufStart(state->global), cacheName, mprGetBufStart(state->start), bodyCode, mprGetBufStart(state->end), ESP_EXPORT_STRING, cacheName, mprGetPortablePath(path), cacheName); mprDebug("esp", 5, "Create ESP script: \n%s\n", bodyCode); } return bodyCode; }
1257
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
espLoadApp
espLoadApp( HttpRoute * route)
['route']
PUBLIC int espLoadApp(HttpRoute *route) { #if !ME_STATIC EspRoute *eroute; eroute = route->eroute; if (!eroute->skipApps) { MprJson *preload, *item; cchar *errMsg, *source; char *kind; int i; /* Note: the config parser pauses GC, so this will never yield */ if (!loadApp(route, NULL)) { return MPR_ERR_CANT_LOAD; } if (!route->combine && (preload = mprGetJsonObj(route->config, "esp.preload")) != 0) { for (ITERATE_JSON(preload, item, i)) { source = stok(sclone(item->value), ":", &kind); if (!kind) kind = "controller"; source = mprJoinPath(httpGetDir(route, "controllers"), source); if (espLoadModule(route, NULL, kind, source, &errMsg) < 0) { mprLog("error esp", 0, "Cannot preload esp module %s. %s", source, errMsg); return MPR_ERR_CANT_LOAD; } } } } #endif return 0; }
179
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
espOpenDatabase
espOpenDatabase( HttpRoute * route , cchar * spec)
['route', 'spec']
PUBLIC int espOpenDatabase(HttpRoute *route, cchar *spec) { EspRoute *eroute; char *provider, *path, *dir; int flags; eroute = route->eroute; if (eroute->edi) { return 0; } flags = EDI_CREATE | EDI_AUTO_SAVE; if (smatch(spec, "default")) { #if ME_COM_SQLITE spec = sfmt("sdb://%s.sdb", eroute->appName); #elif ME_COM_MDB spec = sfmt("mdb://%s.mdb", eroute->appName); #endif } provider = stok(sclone(spec), "://", &path); if (provider == 0 || path == 0) { return MPR_ERR_BAD_ARGS; } path = mprJoinPath(httpGetDir(route, "db"), path); dir = mprGetPathDir(path); if (!mprPathExists(dir, X_OK)) { mprMakeDir(dir, 0755, -1, -1, 1); } if ((eroute->edi = ediOpen(mprGetRelPath(path, NULL), provider, flags)) == 0) { return MPR_ERR_CANT_OPEN; } route->database = sclone(spec); return 0; }
204
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
espRouteDirective
espRouteDirective( MaState * state , cchar * key , cchar * value)
['state', 'key', 'value']
static int espRouteDirective(MaState *state, cchar *key, cchar *value) { EspRoute *eroute; HttpRoute *route; cchar *methods, *name, *pattern, *source, *target; char *option, *ovalue, *tok; pattern = 0; name = 0; source = 0; target = 0; methods = "GET"; if (scontains(value, "=")) { for (option = maGetNextArg(sclone(value), &tok); option; option = maGetNextArg(tok, &tok)) { option = stok(option, "=,", &ovalue); ovalue = strim(ovalue, "\"'", MPR_TRIM_BOTH); if (smatch(option, "methods")) { methods = ovalue; } else if (smatch(option, "name")) { name = ovalue; } else if (smatch(option, "pattern") || smatch(option, "prefix")) { /* DEPRECATED prefix */ pattern = ovalue; } else if (smatch(option, "source")) { source = ovalue; } else if (smatch(option, "target")) { target = ovalue; } else { mprLog("error esp", 0, "Unknown EspRoute option \"%s\"", option); } } } if (!pattern || !target) { return MPR_ERR_BAD_SYNTAX; } if (target == 0 || *target == 0) { target = "$&"; } target = stemplate(target, state->route->vars); if ((route = httpDefineRoute(state->route, name, methods, pattern, target, source)) == 0) { return MPR_ERR_CANT_CREATE; } httpSetRouteHandler(route, "espHandler"); if ((eroute = getEroute(route)) == 0) { return MPR_ERR_MEMORY; } if (name) { eroute->appName = sclone(name); } return 0; }
349
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
getVxCPU
getVxCPU( cchar * arch)
['arch']
static cchar *getVxCPU(cchar *arch) { char *cpu, *family; family = stok(sclone(arch), ":", &cpu); if (!cpu || *cpu == '\0') { if (smatch(family, "i386")) { cpu = "I80386"; } else if (smatch(family, "i486")) { cpu = "I80486"; } else if (smatch(family, "x86") | sends(family, "86")) { cpu = "PENTIUM"; } else if (scaselessmatch(family, "mips")) { cpu = "MIPS32"; } else if (scaselessmatch(family, "arm")) { cpu = "ARM7TDMI"; } else if (scaselessmatch(family, "ppc")) { cpu = "PPC"; } else { cpu = (char*) arch; } } return supper(cpu); }
161
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
runAction
runAction( HttpConn * conn)
['conn']
static int runAction(HttpConn *conn) { HttpRx *rx; HttpRoute *route; EspRoute *eroute; EspReq *req; EspAction action; cchar *controllersDir; char *actionName, *key, *filename, *source; rx = conn->rx; req = conn->reqData; route = rx->route; eroute = route->eroute; assert(eroute); if (eroute->edi && eroute->edi->flags & EDI_PRIVATE) { cloneDatabase(conn); } else { req->edi = eroute->edi; } if (route->sourceName == 0 || *route->sourceName == '\0') { if (eroute->commonController) { (eroute->commonController)(conn); } return 1; } /* Expand any form var $tokens. This permits ${controller} and user form data to be used in the controller name */ filename = schr(route->sourceName, '$') ? stemplateJson(route->sourceName, rx->params) : route->sourceName; controllersDir = httpGetDir(route, "controllers"); source = controllersDir ? mprJoinPath(controllersDir, filename) : mprJoinPath(route->home, filename); #if !ME_STATIC key = mprJoinPath(controllersDir, rx->target); if (!route->combine && (route->update || !mprLookupKey(esp->actions, key))) { cchar *errMsg; if (espLoadModule(route, conn->dispatcher, "controller", source, &errMsg) < 0) { httpError(conn, HTTP_CODE_NOT_FOUND, "%s", errMsg); return 0; } } #endif /* !ME_STATIC */ key = mprJoinPath(controllersDir, rx->target); if ((action = mprLookupKey(esp->actions, key)) == 0) { if (!pageExists(conn)) { /* Actions are registered as: source/TARGET where TARGET is typically CONTROLLER-ACTION */ key = sfmt("%s/missing", mprGetPathDir(source)); if ((action = mprLookupKey(esp->actions, key)) == 0) { if ((action = mprLookupKey(esp->actions, "missing")) == 0) { httpError(conn, HTTP_CODE_NOT_FOUND, "Missing action for \"%s\"", rx->target); return 0; } } } } if (route->flags & HTTP_ROUTE_XSRF && !(rx->flags & HTTP_GET)) { if (!httpCheckSecurityToken(conn)) { httpSetStatus(conn, HTTP_CODE_UNAUTHORIZED); if (smatch(route->responseFormat, "json")) { httpTrace(conn, "esp.xsrf.error", "error", 0); espRenderString(conn, "{\"retry\": true, \"success\": 0, \"feedback\": {\"error\": \"Security token is stale. Please retry.\"}}"); espFinalize(conn); } else { httpError(conn, HTTP_CODE_UNAUTHORIZED, "Security token is stale. Please reload page."); } return 0; } } if (action) { httpSetParam(conn, "controller", stok(sclone(rx->target), "-", &actionName)); httpSetParam(conn, "action", actionName); if (eroute->commonController) { (eroute->commonController)(conn); } if (!httpIsFinalized(conn)) { (action)(conn); } } return 1; }
540
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
startEspAppDirective
startEspAppDirective( MaState * state , cchar * key , cchar * value)
['state', 'key', 'value']
static int startEspAppDirective(MaState *state, cchar *key, cchar *value) { HttpRoute *route; cchar *auth, *database, *name, *prefix, *dir, *routeSet, *combine; char *option, *ovalue, *tok; dir = "."; routeSet = 0; combine = 0; prefix = 0; database = 0; auth = 0; name = 0; if (scontains(value, "=")) { for (option = maGetNextArg(sclone(value), &tok); option; option = maGetNextArg(tok, &tok)) { option = stok(option, " =\t,", &ovalue); ovalue = strim(ovalue, "\"'", MPR_TRIM_BOTH); if (smatch(option, "auth")) { auth = ovalue; } else if (smatch(option, "database")) { database = ovalue; } else if (smatch(option, "dir")) { dir = ovalue; } else if (smatch(option, "combine")) { combine = ovalue; #if DEPRECATED || 1 } else if (smatch(option, "combined")) { combine = ovalue; #endif } else if (smatch(option, "name")) { name = ovalue; } else if (smatch(option, "prefix")) { prefix = ovalue; } else if (smatch(option, "routes")) { routeSet = ovalue; } else { mprLog("error esp", 0, "Unknown EspApp option \"%s\"", option); } } } if (mprSamePath(state->route->documents, dir)) { /* Can use existing route as it has the same prefix and documents directory. */ route = state->route; } else { route = httpCreateInheritedRoute(state->route); } state->route = route; if (auth) { if (httpSetAuthStore(route->auth, auth) < 0) { mprLog("error esp", 0, "The %s AuthStore is not available on this platform", auth); return MPR_ERR_BAD_STATE; } } if (combine) { route->combine = scaselessmatch(combine, "true") || smatch(combine, "1"); } if (database) { if (espDbDirective(state, key, database) < 0) { return MPR_ERR_BAD_STATE; } } if (espDefineApp(route, dir, name, prefix, routeSet) < 0) { return MPR_ERR_CANT_CREATE; } if (prefix) { espSetConfig(route, "esp.appPrefix", prefix); } return 0; }
446
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
updateFields
updateFields( cchar * tableName , MprJson * params)
['tableName', 'params']
PUBLIC bool updateFields(cchar *tableName, MprJson *params) { EdiRec *rec; cchar *key; key = mprLookupJson(params, "id"); if ((rec = ediSetFields(ediReadRec(getDatabase(), tableName, key), params)) == 0) { return 0; } return updateRec(rec); }
64
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
addFormVars
addFormVars( cchar * buf)
['buf']
static void addFormVars(cchar *buf) { char *pair, *tok; pair = stok(sclone(buf), "&", &tok); while (pair != 0) { mprAddItem(app->formData, sclone(pair)); pair = stok(0, "&", &tok); } }
62
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
addParamsFromBuf
addParamsFromBuf( HttpConn * conn , cchar * buf , ssize len)
['conn', 'buf', 'len']
static void addParamsFromBuf(HttpConn *conn, cchar *buf, ssize len) { MprJson *params, *prior; char *newValue, *decoded, *keyword, *value, *tok; assert(conn); params = httpGetParams(conn); decoded = mprAlloc(len + 1); decoded[len] = '\0'; memcpy(decoded, buf, len); keyword = stok(decoded, "&", &tok); while (keyword != 0) { if ((value = strchr(keyword, '=')) != 0) { *value++ = '\0'; value = mprUriDecode(value); } else { value = MPR->emptyString; } keyword = mprUriDecode(keyword); if (*keyword) { /* Append to existing keywords */ prior = mprLookupJsonObj(params, keyword); if (prior && prior->type == MPR_JSON_VALUE) { if (*value) { newValue = sjoin(prior->value, " ", value, NULL); mprSetJson(params, keyword, newValue); } } else { mprSetJson(params, keyword, value); } } keyword = stok(0, "&", &tok); } }
224
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
blendMode
blendMode( HttpRoute * route , MprJson * config)
['route', 'config']
static void blendMode(HttpRoute *route, MprJson *config) { MprJson *currentMode, *app; cchar *mode; mode = mprGetJson(config, "app.mode"); if (!mode) { mode = sclone("debug"); } route->debug = smatch(mode, "debug"); if ((currentMode = mprGetJsonObj(config, sfmt("app.modes.%s", mode))) != 0) { app = mprLookupJsonObj(config, "app"); mprBlendJson(app, currentMode, MPR_JSON_OVERWRITE); mprSetJson(app, "app.mode", mode); } }
106
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
clientCopy
clientCopy( HttpRoute * route , MprJson * dest , MprJson * obj)
['route', 'dest', 'obj']
static void clientCopy(HttpRoute *route, MprJson *dest, MprJson *obj) { MprJson *child, *job, *jvalue; cchar *key, *value; int ji; for (ITERATE_CONFIG(route, obj, child, ji)) { if (child->type & MPR_JSON_OBJ) { job = mprCreateJson(MPR_JSON_OBJ); clientCopy(route, job, child); mprSetJsonObj(dest, child->name, job); } else { key = child->value; if (sends(key, "|time")) { key = stok(sclone(key), " \t|", NULL); if ((value = mprGetJson(route->config, key)) != 0) { mprSetJson(dest, child->name, itos(httpGetTicks(value))); } } else { if ((jvalue = mprGetJsonObj(route->config, key)) != 0) { mprSetJsonObj(dest, child->name, mprCloneJson(jvalue)); } } } } }
194
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
cmdRemedy
cmdRemedy( MprHash * args)
['args']
static void cmdRemedy(MprHash *args) { MprCmd *cmd; cchar **argv; char *command, *data; int rc, status, argc, background; #if DEBUG_IDE && ME_UNIX_LIKE unsetenv("DYLD_LIBRARY_PATH"); unsetenv("DYLD_FRAMEWORK_PATH"); #endif if ((cmd = mprCreateCmd(NULL)) == 0) { return; } command = sclone(mprLookupKey(args, "CMD")); data = 0; if (scontains(command, "|")) { data = stok(command, "|", &command); data = stemplate(data, args); } command = strim(command, " \t", MPR_TRIM_BOTH); if ((background = (sends(command, "&"))) != 0) { command = strim(command, "&", MPR_TRIM_END); } argc = mprMakeArgv(command, &argv, 0); cmd->stdoutBuf = mprCreateBuf(ME_MAX_BUFFER, -1); cmd->stderrBuf = mprCreateBuf(ME_MAX_BUFFER, -1); httpTrace(0, "monitor.remedy.cmd", "context", "remedy:'%s'", command); if (mprStartCmd(cmd, argc, argv, NULL, MPR_CMD_DETACH | MPR_CMD_IN) < 0) { httpTrace(0, "monitor.rememdy.cmd.error", "error", "msg:'Cannot start command. %s", command); return; } if (data) { if (mprWriteCmdBlock(cmd, MPR_CMD_STDIN, data, -1) < 0) { httpTrace(0, "monitor.remedy.cmd.error", "error", "msg:'Cannot write to command. %s'", command); return; } } mprFinalizeCmd(cmd); if (!background) { rc = mprWaitForCmd(cmd, ME_HTTP_REMEDY_TIMEOUT); status = mprGetCmdExitStatus(cmd); if (rc < 0 || status != 0) { httpTrace(0, "monitor.remedy.cmd.error", "error", "msg:'Remedy failed. %s. %s', command: '%s'", mprGetBufStart(cmd->stderrBuf), mprGetBufStart(cmd->stdoutBuf), command); return; } mprDestroyCmd(cmd); } }
346
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
expandRequestTokens
expandRequestTokens( HttpConn * conn , char * str)
['conn', 'str']
static char *expandRequestTokens(HttpConn *conn, char *str) { HttpRx *rx; HttpTx *tx; HttpRoute *route; MprBuf *buf; HttpLang *lang; char *tok, *cp, *key, *value, *field, *header, *defaultValue, *state, *v, *p; assert(conn); assert(str); rx = conn->rx; route = rx->route; tx = conn->tx; buf = mprCreateBuf(-1, -1); tok = 0; for (cp = str; cp && *cp; ) { if ((tok = strstr(cp, "${")) == 0) { break; } if (tok > cp) { mprPutBlockToBuf(buf, cp, tok - cp); } if ((key = stok(&tok[2], ".:}", &value)) == 0) { continue; } stok(value, "}", &cp); if (smatch(key, "header")) { header = stok(value, "=", &defaultValue); if ((value = (char*) httpGetHeader(conn, header)) == 0) { value = defaultValue ? defaultValue : ""; } mprPutStringToBuf(buf, value); } else if (smatch(key, "param")) { field = stok(value, "=", &defaultValue); if (defaultValue == 0) { defaultValue = ""; } mprPutStringToBuf(buf, httpGetParam(conn, field, defaultValue)); } else if (smatch(key, "request")) { value = stok(value, "=", &defaultValue); // OPT with switch on first char if (smatch(value, "authenticated")) { mprPutStringToBuf(buf, rx->authenticated ? "true" : "false"); } else if (smatch(value, "clientAddress")) { mprPutStringToBuf(buf, conn->ip); } else if (smatch(value, "clientPort")) { mprPutIntToBuf(buf, conn->port); } else if (smatch(value, "error")) { mprPutStringToBuf(buf, conn->errorMsg); } else if (smatch(value, "ext")) { mprPutStringToBuf(buf, rx->parsedUri->ext); } else if (smatch(value, "extraPath")) { mprPutStringToBuf(buf, rx->extraPath); } else if (smatch(value, "filename")) { mprPutStringToBuf(buf, tx->filename); } else if (scaselessmatch(value, "language")) { if (!defaultValue) { defaultValue = route->defaultLanguage; } if ((lang = httpGetLanguage(conn, route->languages, defaultValue)) != 0) { mprPutStringToBuf(buf, lang->suffix); } else { mprPutStringToBuf(buf, defaultValue); } } else if (scaselessmatch(value, "languageDir")) { lang = httpGetLanguage(conn, route->languages, 0); if (!defaultValue) { defaultValue = "."; } mprPutStringToBuf(buf, lang ? lang->path : defaultValue); } else if (smatch(value, "host")) { /* Includes port if present */ mprPutStringToBuf(buf, rx->parsedUri->host); } else if (smatch(value, "method")) { mprPutStringToBuf(buf, rx->method); } else if (smatch(value, "originalUri")) { mprPutStringToBuf(buf, rx->originalUri); } else if (smatch(value, "pathInfo")) { mprPutStringToBuf(buf, rx->pathInfo); } else if (smatch(value, "prefix")) { mprPutStringToBuf(buf, route->prefix); } else if (smatch(value, "query")) { mprPutStringToBuf(buf, rx->parsedUri->query); } else if (smatch(value, "reference")) { mprPutStringToBuf(buf, rx->parsedUri->reference); } else if (smatch(value, "scheme")) { if (rx->parsedUri->scheme) { mprPutStringToBuf(buf, rx->parsedUri->scheme); } else { mprPutStringToBuf(buf, (conn->secure) ? "https" : "http"); } } else if (smatch(value, "scriptName")) { mprPutStringToBuf(buf, rx->scriptName); } else if (smatch(value, "serverAddress")) { /* Pure IP address, no port. See "serverPort" */ mprPutStringToBuf(buf, conn->sock->acceptIp); } else if (smatch(value, "serverPort")) { mprPutIntToBuf(buf, conn->sock->acceptPort); } else if (smatch(value, "uri")) { mprPutStringToBuf(buf, rx->uri); } } else if (smatch(key, "ssl")) { value = stok(value, "=", &defaultValue); if (smatch(value, "state")) { mprPutStringToBuf(buf, mprGetSocketState(conn->sock)); } else { state = mprGetSocketState(conn->sock); if ((p = scontains(state, value)) != 0) { stok(p, "=", &v); mprPutStringToBuf(buf, stok(v, ", ", NULL)); } } } } assert(cp); if (tok) { if (tok > cp) { mprPutBlockToBuf(buf, tok, tok - cp); } } else { mprPutStringToBuf(buf, cp); } mprAddNullToBuf(buf); return sclone(mprGetBufStart(buf)); }
1039
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
httpAddDefense
httpAddDefense( cchar * name , cchar * remedy , cchar * remedyArgs)
['name', 'remedy', 'remedyArgs']
PUBLIC int httpAddDefense(cchar *name, cchar *remedy, cchar *remedyArgs) { Http *http; MprHash *args; MprList *list; char *arg, *key, *value; int next; assert(name && *name); http = HTTP; args = mprCreateHash(0, MPR_HASH_STABLE); list = stolist(remedyArgs); for (ITERATE_ITEMS(list, arg, next)) { key = stok(arg, "=", &value); mprAddKey(args, key, strim(value, "\"'", 0)); } if (!remedy) { remedy = mprLookupKey(args, "REMEDY"); } mprAddKey(http->defenses, name, createDefense(name, remedy, args)); return 0; }
147
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
httpCreateCGIParams
httpCreateCGIParams( HttpConn * conn)
['conn']
PUBLIC void httpCreateCGIParams(HttpConn *conn) { HttpRx *rx; HttpTx *tx; HttpHost *host; HttpUploadFile *file; MprSocket *sock; MprHash *svars; MprJson *params; int index; rx = conn->rx; if ((svars = rx->svars) != 0) { /* Do only once */ return; } svars = rx->svars = mprCreateHash(HTTP_VAR_HASH_SIZE, MPR_HASH_STABLE); tx = conn->tx; host = conn->host; sock = conn->sock; mprAddKey(svars, "ROUTE_HOME", rx->route->home); mprAddKey(svars, "AUTH_TYPE", conn->authType); mprAddKey(svars, "AUTH_USER", conn->username); mprAddKey(svars, "AUTH_ACL", MPR->emptyString); mprAddKey(svars, "CONTENT_LENGTH", rx->contentLength); mprAddKey(svars, "CONTENT_TYPE", rx->mimeType); mprAddKey(svars, "DOCUMENTS", rx->route->documents); mprAddKey(svars, "GATEWAY_INTERFACE", sclone("CGI/1.1")); mprAddKey(svars, "QUERY_STRING", rx->parsedUri->query); mprAddKey(svars, "REMOTE_ADDR", conn->ip); mprAddKeyFmt(svars, "REMOTE_PORT", "%d", conn->port); /* Set to the same as AUTH_USER */ mprAddKey(svars, "REMOTE_USER", conn->username); mprAddKey(svars, "REQUEST_METHOD", rx->method); mprAddKey(svars, "REQUEST_TRANSPORT", sclone((char*) ((conn->secure) ? "https" : "http"))); mprAddKey(svars, "SERVER_ADDR", sock->acceptIp); mprAddKey(svars, "SERVER_NAME", host->name); mprAddKeyFmt(svars, "SERVER_PORT", "%d", sock->acceptPort); mprAddKey(svars, "SERVER_PROTOCOL", conn->protocol); mprAddKey(svars, "SERVER_SOFTWARE", conn->http->software); /* For PHP, REQUEST_URI must be the original URI. The SCRIPT_NAME will refer to the new pathInfo */ mprAddKey(svars, "REQUEST_URI", rx->originalUri); /* URIs are broken into the following: http://{SERVER_NAME}:{SERVER_PORT}{SCRIPT_NAME}{PATH_INFO} NOTE: Appweb refers to pathInfo as the app relative URI and scriptName as the app address before the pathInfo. In CGI|PHP terms, the scriptName is the appweb rx->pathInfo and the PATH_INFO is the extraPath. */ mprAddKey(svars, "PATH_INFO", rx->extraPath); mprAddKeyFmt(svars, "SCRIPT_NAME", "%s%s", rx->scriptName, rx->pathInfo); mprAddKey(svars, "SCRIPT_FILENAME", tx->filename); if (rx->extraPath) { /* Only set PATH_TRANSLATED if extraPath is set (CGI spec) */ assert(rx->extraPath[0] == '/'); mprAddKey(svars, "PATH_TRANSLATED", mprNormalizePath(sfmt("%s%s", rx->route->documents, rx->extraPath))); } if (rx->files) { params = httpGetParams(conn); assert(params); for (ITERATE_ITEMS(rx->files, file, index)) { mprSetJson(params, sfmt("FILE_%d_FILENAME", index), file->filename); mprSetJson(params, sfmt("FILE_%d_CLIENT_FILENAME", index), file->clientFilename); mprSetJson(params, sfmt("FILE_%d_CONTENT_TYPE", index), file->contentType); mprSetJson(params, sfmt("FILE_%d_NAME", index), file->name); mprSetJson(params, sfmt("FILE_%d_SIZE", index), sfmt("%zd", file->size)); } } if (conn->http->envCallback) { conn->http->envCallback(conn); } }
563
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
httpGetIntParam
httpGetIntParam( HttpConn * conn , cchar * var , int defaultValue)
['conn', 'var', 'defaultValue']
PUBLIC int httpGetIntParam(HttpConn *conn, cchar *var, int defaultValue) { cchar *value; value = mprLookupJson(httpGetParams(conn), var); return (value) ? (int) stoi(value) : defaultValue; }
46
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
httpGetParam
httpGetParam( HttpConn * conn , cchar * var , cchar * defaultValue)
['conn', 'var', 'defaultValue']
PUBLIC cchar *httpGetParam(HttpConn *conn, cchar *var, cchar *defaultValue) { cchar *value; value = mprLookupJson(httpGetParams(conn), var); return (value) ? value : defaultValue; }
41
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
httpGetStreaming
httpGetStreaming( HttpHost * host , cchar * mime , cchar * uri)
['host', 'mime', 'uri']
PUBLIC bool httpGetStreaming(HttpHost *host, cchar *mime, cchar *uri) { MprKey *kp; assert(host); assert(host->streams); if (schr(mime, ';')) { mime = stok(sclone(mime), ";", 0); } if ((kp = mprLookupKeyEntry(host->streams, mime)) != 0) { if (kp->data == NULL || sstarts(uri, kp->data)) { /* Type is set to the enable value */ return kp->type; } } return 1; }
103
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
httpSetCredentials
httpSetCredentials( HttpConn * conn , cchar * username , cchar * password , cchar * authType)
['conn', 'username', 'password', 'authType']
PUBLIC void httpSetCredentials(HttpConn *conn, cchar *username, cchar *password, cchar *authType) { char *ptok; httpResetCredentials(conn); if (password == NULL && strchr(username, ':') != 0) { conn->username = stok(sclone(username), ":", &ptok); conn->password = sclone(ptok); } else { conn->username = sclone(username); conn->password = sclone(password); } if (authType) { conn->authType = sclone(authType); } }
108
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
httpSetIntParam
httpSetIntParam( HttpConn * conn , cchar * var , int value)
['conn', 'var', 'value']
PUBLIC void httpSetIntParam(HttpConn *conn, cchar *var, int value) { mprSetJson(httpGetParams(conn), var, sfmt("%d", value)); }
32
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
httpSetParam
httpSetParam( HttpConn * conn , cchar * var , cchar * value)
['conn', 'var', 'value']
PUBLIC void httpSetParam(HttpConn *conn, cchar *var, cchar *value) { mprSetJson(httpGetParams(conn), var, value); }
28
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
httpTemplate
httpTemplate( HttpConn * conn , cchar * template , MprHash * options)
['conn', 'template', 'options']
PUBLIC char *httpTemplate(HttpConn *conn, cchar *template, MprHash *options) { MprBuf *buf; HttpRx *rx; HttpRoute *route; cchar *cp, *ep, *value; char key[ME_MAX_BUFFER]; rx = conn->rx; route = rx->route; if (template == 0 || *template == '\0') { return MPR->emptyString; } buf = mprCreateBuf(-1, -1); for (cp = template; *cp; cp++) { if (cp == template && *cp == '~') { mprPutStringToBuf(buf, route->prefix); } else if (cp == template && *cp == ME_SERVER_PREFIX_CHAR) { mprPutStringToBuf(buf, route->prefix); mprPutStringToBuf(buf, route->serverPrefix); } else if (*cp == '$' && cp[1] == '{' && (cp == template || cp[-1] != '\\')) { cp += 2; if ((ep = strchr(cp, '}')) != 0) { sncopy(key, sizeof(key), cp, ep - cp); if (options && (value = httpGetOption(options, key, 0)) != 0) { mprPutStringToBuf(buf, value); } else if ((value = mprLookupJson(rx->params, key)) != 0) { mprPutStringToBuf(buf, value); } if (value == 0) { /* Just emit the token name if the token cannot be found */ mprPutStringToBuf(buf, key); } cp = ep; } } else { mprPutCharToBuf(buf, *cp); } } mprAddNullToBuf(buf); return sclone(mprGetBufStart(buf)); }
320
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
httpTestParam
httpTestParam( HttpConn * conn , cchar * var)
['conn', 'var']
PUBLIC int httpTestParam(HttpConn *conn, cchar *var) { return mprLookupJsonObj(httpGetParams(conn), var) != 0; }
25
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
httpWriteUploadData
httpWriteUploadData( HttpConn * conn , MprList * fileData , MprList * formData)
['conn', 'fileData', 'formData']
PUBLIC ssize httpWriteUploadData(HttpConn *conn, MprList *fileData, MprList *formData) { char *path, *pair, *key, *value, *name; cchar *type; ssize rc; int next; rc = 0; if (formData) { for (rc = next = 0; rc >= 0 && (pair = mprGetNextItem(formData, &next)) != 0; ) { key = stok(sclone(pair), "=", &value); rc += httpWrite(conn->writeq, "%s\r\nContent-Disposition: form-data; name=\"%s\";\r\n", conn->boundary, key); rc += httpWrite(conn->writeq, "Content-Type: application/x-www-form-urlencoded\r\n\r\n%s\r\n", value); } } if (fileData) { for (rc = next = 0; rc >= 0 && (path = mprGetNextItem(fileData, &next)) != 0; ) { if (!mprPathExists(path, R_OK)) { httpError(conn, HTTP_CODE_NOT_FOUND, "Cannot open %s", path); return MPR_ERR_CANT_OPEN; } name = mprGetPathBase(path); rc += httpWrite(conn->writeq, "%s\r\nContent-Disposition: form-data; name=\"file%d\"; filename=\"%s\"\r\n", conn->boundary, next - 1, name); if ((type = mprLookupMime(MPR->mimeTypes, path)) != 0) { rc += httpWrite(conn->writeq, "Content-Type: %s\r\n", mprLookupMime(MPR->mimeTypes, path)); } httpWrite(conn->writeq, "\r\n"); if (blockingFileCopy(conn, path) < 0) { return MPR_ERR_CANT_WRITE; } rc += httpWrite(conn->writeq, "\r\n"); } } rc += httpWrite(conn->writeq, "%s--\r\n--", conn->boundary); return rc; }
308
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
parseAll
parseAll( HttpRoute * route , cchar * key , MprJson * prop)
['route', 'key', 'prop']
static void parseAll(HttpRoute *route, cchar *key, MprJson *prop) { MprJson *routes; MprJson *child; int ji; for (ITERATE_CONFIG(route, prop, child, ji)) { parseKey(route, key, child); } /* Property order is not guaranteed, so must ensure routes are processed after all outer properties. */ if ((routes = mprGetJsonObj(prop, "routes")) != 0) { parseRoutes(route, key, routes); } }
77
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
parseAuthAutoRoles
parseAuthAutoRoles( HttpRoute * route , cchar * key , MprJson * prop)
['route', 'key', 'prop']
static void parseAuthAutoRoles(HttpRoute *route, cchar *key, MprJson *prop) { MprHash *abilities; MprKey *kp; MprJson *child, *job; int ji; if ((job = mprGetJsonObj(route->config, "app.http.auth.roles")) != 0) { parseAuthRoles(route, "app.http.auth.roles", job); } abilities = mprCreateHash(0, 0); for (ITERATE_CONFIG(route, prop, child, ji)) { httpComputeRoleAbilities(route->auth, abilities, child->value); } if (mprGetHashLength(abilities) > 0) { job = mprCreateJson(MPR_JSON_ARRAY); for (ITERATE_KEYS(abilities, kp)) { mprSetJson(job, "$", kp->key); } mprSetJsonObj(route->config, "app.http.auth.auto.abilities", job); } }
150
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
parseAuthUsers
parseAuthUsers( HttpRoute * route , cchar * key , MprJson * prop)
['route', 'key', 'prop']
static void parseAuthUsers(HttpRoute *route, cchar *key, MprJson *prop) { MprJson *child; cchar *roles, *password; int ji; for (ITERATE_CONFIG(route, prop, child, ji)) { password = mprGetJson(child, "password"); roles = getList(mprGetJsonObj(child, "roles")); if (httpAddUser(route->auth, child->name, password, roles) < 0) { httpParseError(route, "Cannot add user %s", child->name); break; } if (!route->auth->store) { httpSetAuthStore(route->auth, "config"); } } }
120
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
parseCache
parseCache( HttpRoute * route , cchar * key , MprJson * prop)
['route', 'key', 'prop']
static void parseCache(HttpRoute *route, cchar *key, MprJson *prop) { MprJson *child; MprTicks clientLifespan, serverLifespan; cchar *methods, *extensions, *uris, *mimeTypes, *client, *server; int flags, ji; clientLifespan = serverLifespan = 0; for (ITERATE_CONFIG(route, prop, child, ji)) { flags = 0; if ((client = mprGetJson(child, "client")) != 0) { flags |= HTTP_CACHE_CLIENT; clientLifespan = httpGetTicks(client); } if ((server = mprGetJson(child, "server")) != 0) { flags |= HTTP_CACHE_SERVER; serverLifespan = httpGetTicks(server); } methods = getList(mprGetJsonObj(child, "methods")); extensions = getList(mprGetJsonObj(child, "extensions")); uris = getList(mprGetJsonObj(child, "uris")); mimeTypes = getList(mprGetJsonObj(child, "mime")); if (smatch(mprGetJson(child, "unique"), "true")) { /* Uniquely cache requests with different params */ flags |= HTTP_CACHE_UNIQUE; } if (smatch(mprGetJson(child, "manual"), "true")) { /* User must manually call httpWriteCache */ flags |= HTTP_CACHE_MANUAL; } httpAddCache(route, methods, uris, extensions, mimeTypes, clientLifespan, serverLifespan, flags); } }
237
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
parseContentCompress
parseContentCompress( HttpRoute * route , cchar * key , MprJson * prop)
['route', 'key', 'prop']
static void parseContentCompress(HttpRoute *route, cchar *key, MprJson *prop) { MprJson *child; int ji; for (ITERATE_CONFIG(route, prop, child, ji)) { if (mprGetJson(route->config, sfmt("app.http.content.minify[@ = '%s']", child->value))) { httpAddRouteMapping(route, child->value, "${1}.gz, min.${1}.gz, min.${1}"); } else { httpAddRouteMapping(route, child->value, "${1}.gz"); } } }
83
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
parseContentKeep
parseContentKeep( HttpRoute * route , cchar * key , MprJson * prop)
['route', 'key', 'prop']
static void parseContentKeep(HttpRoute *route, cchar *key, MprJson *prop) { if (mprGetJson(prop, "[@=c]")) { route->keepSource = 1; } }
33
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
parseContentMinify
parseContentMinify( HttpRoute * route , cchar * key , MprJson * prop)
['route', 'key', 'prop']
static void parseContentMinify(HttpRoute *route, cchar *key, MprJson *prop) { MprJson *child; int ji; for (ITERATE_CONFIG(route, prop, child, ji)) { /* Compressed and minified is handled in parseContentCompress */ if (mprGetJson(route->config, sfmt("app.http.content.compress[@ = '%s']", child->value)) == 0) { httpAddRouteMapping(route, child->value, "min.${1}"); } } }
71
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
parseLanguages
parseLanguages( HttpRoute * route , cchar * key , MprJson * prop)
['route', 'key', 'prop']
static void parseLanguages(HttpRoute *route, cchar *key, MprJson *prop) { MprJson *child; cchar *path, *prefix, *suffix; int ji; for (ITERATE_CONFIG(route, prop, child, ji)) { if ((prefix = mprGetJson(child, "prefix")) != 0) { httpAddRouteLanguageSuffix(route, child->name, child->value, HTTP_LANG_BEFORE); } if ((suffix = mprGetJson(child, "suffix")) != 0) { httpAddRouteLanguageSuffix(route, child->name, child->value, HTTP_LANG_AFTER); } if ((path = mprGetJson(child, "path")) != 0) { httpAddRouteLanguageDir(route, child->name, mprGetAbsPath(path)); } if (smatch(mprGetJson(child, "default"), "default")) { httpSetRouteDefaultLanguage(route, child->name); } } }
168
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
parseParams
parseParams( HttpRoute * route , cchar * key , MprJson * prop)
['route', 'key', 'prop']
static void parseParams(HttpRoute *route, cchar *key, MprJson *prop) { MprJson *child; cchar *name, *value; int not, ji; for (ITERATE_CONFIG(route, prop, child, ji)) { name = mprGetJson(child, "name"); value = mprGetJson(child, "value"); not = smatch(mprGetJson(child, "equals"), "true") ? 0 : HTTP_ROUTE_NOT; httpAddRouteParam(route, name, value, not); } }
94
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
parsePipelineFilters
parsePipelineFilters( HttpRoute * route , cchar * key , MprJson * prop)
['route', 'key', 'prop']
static void parsePipelineFilters(HttpRoute *route, cchar *key, MprJson *prop) { MprJson *child; cchar *name, *extensions; int flags, ji; for (ITERATE_CONFIG(route, prop, child, ji)) { if (child->type & MPR_JSON_STRING) { flags = HTTP_STAGE_RX | HTTP_STAGE_TX; extensions = 0; name = child->value; } else { name = mprGetJson(child, "name"); extensions = getList(mprGetJsonObj(child, "extensions")); #if KEEP direction = mprGetJson(child, "direction"); flags |= smatch(direction, "input") ? HTTP_STAGE_RX : 0; flags |= smatch(direction, "output") ? HTTP_STAGE_TX : 0; flags |= smatch(direction, "both") ? HTTP_STAGE_RX | HTTP_STAGE_TX : 0; #else flags = HTTP_STAGE_RX | HTTP_STAGE_TX; #endif } if (httpAddRouteFilter(route, name, extensions, flags) < 0) { httpParseError(route, "Cannot add filter %s", name); break; } } }
181
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
parseRange
parseRange( HttpConn * conn , char * value)
['conn', 'value']
static bool parseRange(HttpConn *conn, char *value) { HttpTx *tx; HttpRange *range, *last, *next; char *tok, *ep; tx = conn->tx; value = sclone(value); if (value == 0) { return 0; } /* Step over the "bytes=" */ stok(value, "=", &value); for (last = 0; value && *value; ) { if ((range = mprAllocObj(HttpRange, manageRange)) == 0) { return 0; } /* A range "-7" will set the start to -1 and end to 8 */ tok = stok(value, ",", &value); if (*tok != '-') { range->start = (ssize) stoi(tok); } else { range->start = -1; } range->end = -1; if ((ep = strchr(tok, '-')) != 0) { if (*++ep != '\0') { /* End is one beyond the range. Makes the math easier. */ range->end = (ssize) stoi(ep) + 1; } } if (range->start >= 0 && range->end >= 0) { range->len = (int) (range->end - range->start); } if (last == 0) { tx->outputRanges = range; } else { last->next = range; } last = range; } /* Validate ranges */ for (range = tx->outputRanges; range; range = range->next) { if (range->end != -1 && range->start >= range->end) { return 0; } if (range->start < 0 && range->end < 0) { return 0; } next = range->next; if (range->start < 0 && next) { /* This range goes to the end, so cannot have another range afterwards */ return 0; } if (next) { if (range->end < 0) { return 0; } if (next->start >= 0 && range->end > next->start) { return 0; } } } conn->tx->currentRange = tx->outputRanges; return (last) ? 1: 0; }
391
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
parseRedirect
parseRedirect( HttpRoute * route , cchar * key , MprJson * prop)
['route', 'key', 'prop']
static void parseRedirect(HttpRoute *route, cchar *key, MprJson *prop) { MprJson *child; cchar *from, *status, *to; int ji; if (prop->type & MPR_JSON_STRING) { if (smatch(prop->value, "secure") ||smatch(prop->value, "https://")) { httpAddRouteCondition(route, "secure", "https://", HTTP_ROUTE_REDIRECT); } else { createRedirectAlias(route, 0, "/", prop->value); } } else { for (ITERATE_CONFIG(route, prop, child, ji)) { if (child->type & MPR_JSON_STRING) { from = "/"; to = child->value; status = "302"; } else { from = mprGetJson(child, "from"); to = mprGetJson(child, "to"); status = mprGetJson(child, "status"); } if (smatch(child->value, "secure")) { httpAddRouteCondition(route, "secure", "https://", HTTP_ROUTE_REDIRECT); } else { createRedirectAlias(route, (int) stoi(status), from, to); } } } }
208
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
parseResources
parseResources( HttpRoute * route , cchar * key , MprJson * prop)
['route', 'key', 'prop']
static void parseResources(HttpRoute *route, cchar *key, MprJson *prop) { MprJson *child, *groups, *singletons, *sets; int ji; if ((sets = mprGetJsonObj(prop, "sets")) != 0) { for (ITERATE_CONFIG(route, sets, child, ji)) { httpAddRouteSet(route, child->value); } } if ((groups = mprGetJsonObj(prop, "groups")) != 0) { for (ITERATE_CONFIG(route, groups, child, ji)) { httpAddResourceGroup(route, route->serverPrefix, child->value); } } if ((singletons = mprGetJsonObj(prop, "singletons")) != 0) { for (ITERATE_CONFIG(route, singletons, child, ji)) { httpAddResource(route, route->serverPrefix, child->value); } } }
163
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
parseRoutes
parseRoutes( HttpRoute * route , cchar * key , MprJson * prop)
['route', 'key', 'prop']
static void parseRoutes(HttpRoute *route, cchar *key, MprJson *prop) { MprJson *child; HttpRoute *newRoute; cchar *pattern; int ji; if (route->loaded) { mprLog("warn http config", 1, "Skip reloading routes - must reboot if routes are modified"); return; } if (prop->type & MPR_JSON_STRING) { httpAddRouteSet(route, prop->value); } else if (prop->type & MPR_JSON_ARRAY) { key = sreplace(key, ".routes", ""); for (ITERATE_CONFIG(route, prop, child, ji)) { if (child->type & MPR_JSON_STRING) { httpAddRouteSet(route, child->value); } else if (child->type & MPR_JSON_OBJ) { newRoute = 0; pattern = mprLookupJson(child, "pattern"); if (pattern) { newRoute = httpLookupRouteByPattern(route->host, pattern); if (!newRoute) { newRoute = httpCreateInheritedRoute(route); httpSetRouteHost(newRoute, route->host); } } else { newRoute = route; } parseAll(newRoute, key, child); if (newRoute->error) { break; } if (pattern) { httpFinalizeRoute(newRoute); } } } } }
226
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
parseServerAccount
parseServerAccount( HttpRoute * route , cchar * key , MprJson * prop)
['route', 'key', 'prop']
static void parseServerAccount(HttpRoute *route, cchar *key, MprJson *prop) { cchar *value; if ((value = mprGetJson(prop, "user")) != 0) { if (!smatch(value, "_unchanged_") && !mprGetDebugMode()) { httpSetGroupAccount(value); } } if ((value = mprGetJson(prop, "user")) != 0) { if (!smatch(value, "_unchanged_") && !mprGetDebugMode()) { httpSetUserAccount(value); } } }
98
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
parseServerLog
parseServerLog( HttpRoute * route , cchar * key , MprJson * prop)
['route', 'key', 'prop']
static void parseServerLog(HttpRoute *route, cchar *key, MprJson *prop) { MprTicks timestamp; cchar *location; ssize size; int level, anew, backup; if (mprGetCmdlineLogging()) { mprLog("warn http config", 4, "Already logging. Ignoring log configuration"); return; } location = mprGetJson(prop, "location"); level = (int) stoi(mprGetJson(prop, "level")); backup = (int) stoi(mprGetJson(prop, "backup")); anew = smatch(mprGetJson(prop, "anew"), "true"); size = (ssize) httpGetNumber(mprGetJson(prop, "size")); timestamp = httpGetNumber(mprGetJson(prop, "timestamp")); if (size < HTTP_TRACE_MIN_LOG_SIZE) { size = HTTP_TRACE_MIN_LOG_SIZE; } if (location == 0) { httpParseError(route, "Missing location"); return; } if (!smatch(location, "stdout") && !smatch(location, "stderr")) { location = httpMakePath(route, 0, location); } mprSetLogBackup(size, backup, anew ? MPR_LOG_ANEW : 0); if (mprStartLogging(location, 0) < 0) { httpParseError(route, "Cannot write to error log: %s", location); return; } mprSetLogLevel(level); mprLogConfig(); if (timestamp) { httpSetTimestamp(timestamp); } }
249
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
parseServerMonitors
parseServerMonitors( HttpRoute * route , cchar * key , MprJson * prop)
['route', 'key', 'prop']
static void parseServerMonitors(HttpRoute *route, cchar *key, MprJson *prop) { MprJson *child; MprTicks period; cchar *counter, *expression, *limit, *relation, *defenses; int ji; for (ITERATE_CONFIG(route, prop, child, ji)) { defenses = mprGetJson(child, "defenses"); expression = mprGetJson(child, "expression"); period = httpGetTicks(mprGetJson(child, "period")); if (!httpTokenize(route, expression, "%S %S %S", &counter, &relation, &limit)) { httpParseError(route, "Cannot add monitor: %s", prop->name); break; } if (httpAddMonitor(counter, relation, getint(limit), period, defenses) < 0) { httpParseError(route, "Cannot add monitor: %s", prop->name); break; } } }
158
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
parseTarget
parseTarget( HttpRoute * route , cchar * key , MprJson * prop)
['route', 'key', 'prop']
static void parseTarget(HttpRoute *route, cchar *key, MprJson *prop) { cchar *name, *args; if (prop->type & MPR_JSON_OBJ) { name = mprGetJson(prop, "operation"); args = mprGetJson(prop, "args"); } else { name = "run"; args = prop->value; } httpSetRouteTarget(route, name, args); }
73
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
parseTrace
parseTrace( HttpRoute * route , cchar * key , MprJson * prop)
['route', 'key', 'prop']
static void parseTrace(HttpRoute *route, cchar *key, MprJson *prop) { MprJson *levels, *child; cchar *location; ssize size, maxContent; cchar *format, *formatter; char level; int anew, backup, ji; if (route->trace && route->trace->flags & MPR_LOG_CMDLINE) { mprLog("info http config", 4, "Already tracing. Ignoring trace configuration"); return; } size = (ssize) httpGetNumber(mprGetJson(prop, "size")); format = mprGetJson(prop, "format"); formatter = mprGetJson(prop, "formatter"); location = mprGetJson(prop, "location"); level = (char) stoi(mprGetJson(prop, "level")); backup = (int) stoi(mprGetJson(prop, "backup")); anew = smatch(mprGetJson(prop, "anew"), "true"); maxContent = (ssize) httpGetNumber(mprGetJson(prop, "content")); if (level < 0) { level = 0; } else if (level > 5) { level = 5; } if (size < (10 * 1000)) { httpParseError(route, "Trace log size is too small. Must be larger than 10K"); return; } if (location == 0) { httpParseError(route, "Missing trace filename"); return; } if (!smatch(location, "stdout") && !smatch(location, "stderr")) { location = httpMakePath(route, 0, location); } if ((levels = mprGetJsonObj(prop, "levels")) != 0) { for (ITERATE_CONFIG(route, prop, child, ji)) { httpSetTraceEventLevel(route->trace, child->name, (int) stoi(child->value)); } } route->trace = httpCreateTrace(route->trace); httpSetTraceFormatterName(route->trace, formatter); httpSetTraceLogFile(route->trace, location, size, backup, format, anew ? MPR_LOG_ANEW : 0); httpSetTraceFormat(route->trace, format); httpSetTraceContentSize(route->trace, maxContent); httpSetTraceLevel(level); }
388
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
postParse
postParse( HttpRoute * route)
['route']
static void postParse(HttpRoute *route) { Http *http; HttpHost *host; HttpRoute *rp; MprJson *mappings, *client; int nextHost, nextRoute; if (route->error) { return; } http = route->http; route->mode = mprGetJson(route->config, "app.mode"); /* Create a subset, optimized configuration to send to the client */ if ((mappings = mprGetJsonObj(route->config, "app.client.mappings")) != 0) { client = mprCreateJson(MPR_JSON_OBJ); clientCopy(route, client, mappings); mprSetJson(client, "prefix", route->prefix); route->client = mprJsonToString(client, MPR_JSON_QUOTES); } httpAddHostToEndpoints(route->host); /* Ensure the host home directory is set and the file handler is defined Propagate the HttpRoute.client to all child routes. */ for (nextHost = 0; (host = mprGetNextItem(http->hosts, &nextHost)) != 0; ) { for (nextRoute = 0; (rp = mprGetNextItem(host->routes, &nextRoute)) != 0; ) { if (!mprLookupKey(rp->extensions, "")) { if (!rp->handler) { httpAddRouteHandler(rp, "fileHandler", ""); httpAddRouteIndex(rp, "index.html"); } } if (rp->parent == route) { rp->client = route->client; } } } }
232
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
setConfigDefaults
setConfigDefaults( HttpRoute * route)
['route']
static void setConfigDefaults(HttpRoute *route) { route->mode = mprGetJson(route->config, "app.mode"); if (smatch(route->mode, "debug")) { httpSetRouteShowErrors(route, 1); route->keepSource = 1; } }
47
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
setHeadersFromCache
setHeadersFromCache( HttpConn * conn , cchar * content)
['conn', 'content']
static cchar *setHeadersFromCache(HttpConn *conn, cchar *content) { cchar *data; char *header, *headers, *key, *value, *tok; if ((data = strstr(content, "\n\n")) == 0) { data = content; } else { headers = snclone(content, data - content); data += 2; for (header = stok(headers, "\n", &tok); header; header = stok(NULL, "\n", &tok)) { key = stok(header, ": ", &value); if (smatch(key, "X-Status")) { conn->tx->status = (int) stoi(value); } else { httpAddHeaderString(conn, key, value); } } } return data; }
153
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
setAppDefaults
setAppDefaults()
[]
static void setAppDefaults() { app->company = stok(slower(ME_COMPANY), " ", NULL); app->serviceProgram = sclone(SERVICE_PROGRAM); app->serviceName = sclone(SERVICE_NAME); app->serviceHome = mprGetNativePath(SERVICE_HOME); app->retries = RESTART_MAX; app->signal = SIGTERM; app->logSpec = sclone("stderr:1"); if (mprPathExists("/var/run", X_OK) && getuid() == 0) { app->pidDir = sclone("/var/run"); } else if (mprPathExists("/tmp", X_OK)) { app->pidDir = sclone("/tmp"); } else if (mprPathExists("/Temp", X_OK)) { app->pidDir = sclone("/Temp"); } else { app->pidDir = sclone("."); } }
149
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
matchExpression
matchExpression( MprJson * obj , int operator , char * value)
['obj', 'operator', 'value']
static bool matchExpression(MprJson *obj, int operator, char *value) { if (!(obj->type & MPR_JSON_VALUE)) { return 0; } value = stok(value, "'\"", NULL); switch (operator) { case JSON_OP_EQ: return smatch(obj->value, value); case JSON_OP_NE: return !smatch(obj->value, value); case JSON_OP_LT: return scmp(obj->value, value) < 0; case JSON_OP_LE: return scmp(obj->value, value) <= 0; case JSON_OP_GT: return scmp(obj->value, value) > 0; case JSON_OP_GE: return scmp(obj->value, value) >= 0; case JSON_OP_MATCH: return scontains(obj->value, value) != 0; case JSON_OP_NMATCH: return scontains(obj->value, value) == 0; default: return 0; } }
170
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
mprAddKey
mprAddKey( MprHash * hash , cvoid * key , cvoid * ptr)
['hash', 'key', 'ptr']
PUBLIC MprKey *mprAddKey(MprHash *hash, cvoid *key, cvoid *ptr) { MprKey *sp, *prevSp; int index; if (hash == 0) { assert(hash); return 0; } lock(hash); if ((sp = lookupHash(&index, &prevSp, hash, key)) != 0) { if (hash->flags & MPR_HASH_UNIQUE) { unlock(hash); return 0; } /* Already exists. Just update the data. */ sp->data = ptr; unlock(hash); return sp; } /* Hash entries are managed by manageHashTable */ if ((sp = mprAllocStructNoZero(MprKey)) == 0) { unlock(hash); return 0; } sp->data = ptr; if (!(hash->flags & MPR_HASH_STATIC_KEYS)) { sp->key = dupKey(hash, key); } else { sp->key = (void*) key; } sp->type = 0; sp->bucket = index; sp->next = hash->buckets[index]; hash->buckets[index] = sp; hash->length++; unlock(hash); return sp; }
213
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
mprBlendJson
mprBlendJson( MprJson * dest , MprJson * src , int flags)
['dest', 'src', 'flags']
PUBLIC int mprBlendJson(MprJson *dest, MprJson *src, int flags) { MprJson *dp, *sp, *child; cchar *trimmedName; int kind, si, pflags; if (src == 0) { return 0; } if (dest == 0) { dest = mprCreateJson(MPR_JSON_OBJ); } if ((MPR_JSON_TYPE_MASK & dest->type) != (MPR_JSON_TYPE_MASK & src->type)) { if (flags & (MPR_JSON_APPEND | MPR_JSON_REPLACE)) { return 0; } } if (src->type & MPR_JSON_OBJ) { if (flags & MPR_JSON_CREATE) { /* Already present */ } else { /* Examine each property for: MPR_JSON_APPEND (default) | MPR_JSON_REPLACE) */ pflags = flags; for (ITERATE_JSON(src, sp, si)) { trimmedName = sp->name; pflags = flags; if (flags & MPR_JSON_COMBINE && sp->name) { kind = sp->name[0]; if (kind == '+') { pflags = MPR_JSON_APPEND | (flags & MPR_JSON_COMBINE); trimmedName = &sp->name[1]; } else if (kind == '-') { pflags = MPR_JSON_REPLACE | (flags & MPR_JSON_COMBINE); trimmedName = &sp->name[1]; } else if (kind == '?') { pflags = MPR_JSON_CREATE | (flags & MPR_JSON_COMBINE); trimmedName = &sp->name[1]; } else if (kind == '=') { pflags = MPR_JSON_OVERWRITE | (flags & MPR_JSON_COMBINE); trimmedName = &sp->name[1]; } } if ((dp = mprLookupJsonObj(dest, trimmedName)) == 0) { /* Absent in destination */ if (pflags & MPR_JSON_COMBINE && sp->type == MPR_JSON_OBJ) { dp = mprCreateJson(sp->type); if (trimmedName == &sp->name[1]) { trimmedName = sclone(trimmedName); } setProperty(dest, trimmedName, dp); mprBlendJson(dp, sp, pflags); } else if (!(pflags & MPR_JSON_REPLACE)) { if (trimmedName == &sp->name[1]) { trimmedName = sclone(trimmedName); } setProperty(dest, trimmedName, mprCloneJson(sp)); } } else if (!(pflags & MPR_JSON_CREATE)) { /* Already present in destination */ if (sp->type & MPR_JSON_OBJ && (MPR_JSON_TYPE_MASK & dp->type) != (MPR_JSON_TYPE_MASK & sp->type)) { dp = setProperty(dest, dp->name, mprCreateJson(sp->type)); } mprBlendJson(dp, sp, pflags); if (pflags & MPR_JSON_REPLACE && !(sp->type & (MPR_JSON_OBJ | MPR_JSON_ARRAY)) && sspace(dp->value)) { mprRemoveJsonChild(dest, dp); } } } } } else if (src->type & MPR_JSON_ARRAY) { if (flags & MPR_JSON_REPLACE) { for (ITERATE_JSON(src, sp, si)) { if ((child = mprLookupJsonValue(dest, sp->value)) != 0) { mprRemoveJsonChild(dest, child); } } } else if (flags & MPR_JSON_CREATE) { ; } else if (flags & MPR_JSON_APPEND) { for (ITERATE_JSON(src, sp, si)) { if ((child = mprLookupJsonValue(dest, sp->value)) == 0) { appendProperty(dest, mprCloneJson(sp)); } } } else { /* Default is to MPR_JSON_OVERWRITE */ if ((sp = mprCloneJson(src)) != 0) { adoptChildren(dest, sp); } } } else { /* Ordinary string value */ if (src->value) { if (flags & MPR_JSON_APPEND) { setValue(dest, sjoin(dest->value, " ", src->value, NULL)); } else if (flags & MPR_JSON_REPLACE) { setValue(dest, sreplace(dest->value, src->value, NULL)); } else if (flags & MPR_JSON_CREATE) { /* Do nothing */ } else { /* MPR_JSON_OVERWRITE (default) */ dest->value = sclone(src->value); } } } return 0; }
741
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
mprDefaultLogHandler
mprDefaultLogHandler( cchar * tags , int level , cchar * msg)
['tags', 'level', 'msg']
PUBLIC void mprDefaultLogHandler(cchar *tags, int level, cchar *msg) { MprFile *file; char tbuf[128]; static int check = 0; if ((file = MPR->logFile) == 0) { return; } if (MPR->logBackup && MPR->logSize && (check++ % 1000) == 0) { backupLog(); } if (tags && *tags) { if (MPR->flags & MPR_LOG_DETAILED) { fmt(tbuf, sizeof(tbuf), "%s %d %s, ", mprGetDate(MPR_LOG_DATE), level, tags); mprWriteFileString(file, tbuf); } else if (MPR->flags & MPR_LOG_TAGGED) { if (schr(tags, ' ')) { tags = stok(sclone(tags), " ", NULL); } if (!isupper((uchar) *tags)) { tags = stitle(tags); } mprWriteFileFmt(file, "%12s ", sfmt("[%s]", tags)); } } mprWriteFileString(file, msg); mprWriteFileString(file, "\n"); #if ME_MPR_OSLOG if (level == 0) { mprWriteToOsLog(sfmt("%s: %d %s: %s", MPR->name, level, tags, msg), level); } #endif }
232
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
mprGetJson
mprGetJson( MprJson * obj , cchar * key)
['obj', 'key']
PUBLIC cchar *mprGetJson(MprJson *obj, cchar *key) { MprJson *result; if (key && !strpbrk(key, ".[]*")) { return mprLookupJson(obj, key); } if ((result = mprQueryJson(obj, key, 0, 0)) != 0) { if (result->length == 1 && result->children->type & MPR_JSON_VALUE) { return result->children->value; } else if (result->length > 1) { return mprJsonToString(result, 0); } } return 0; }
106
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
mprGetJsonObj
mprGetJsonObj( MprJson * obj , cchar * key)
['obj', 'key']
PUBLIC MprJson *mprGetJsonObj(MprJson *obj, cchar *key) { MprJson *result; if (key && !strpbrk(key, ".[]*")) { return mprLookupJsonObj(obj, key); } if ((result = mprQueryJson(obj, key, 0, 0)) != 0 && result->children) { return result->children; } return 0; }
71
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
mprLookupJson
mprLookupJson( MprJson * obj , cchar * name)
['obj', 'name']
PUBLIC cchar *mprLookupJson(MprJson *obj, cchar *name) { MprJson *item; if ((item = mprLookupJsonObj(obj, name)) != 0 && item->type & MPR_JSON_VALUE) { return item->value; } return 0; }
47
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
mprLookupJsonObj
mprLookupJsonObj( MprJson * obj , cchar * name)
['obj', 'name']
PUBLIC MprJson *mprLookupJsonObj(MprJson *obj, cchar *name) { MprJson *child; int i, index; if (!obj || !name) { return 0; } if (obj->type & MPR_JSON_OBJ) { for (ITERATE_JSON(obj, child, i)) { if (smatch(child->name, name)) { return child; } } } else if (obj->type & MPR_JSON_ARRAY) { /* Note this does a linear traversal counting array elements. Not the fastest. This code is not optimized for huge arrays. */ if (*name == '$') { return 0; } index = (int) stoi(name); for (ITERATE_JSON(obj, child, i)) { if (i == index) { return child; } } } return 0; }
133
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
mprLookupJsonValue
mprLookupJsonValue( MprJson * obj , cchar * value)
['obj', 'value']
PUBLIC MprJson *mprLookupJsonValue(MprJson *obj, cchar *value) { MprJson *child; int i; if (!obj || !value) { return 0; } for (ITERATE_JSON(obj, child, i)) { if (smatch(child->value, value)) { return child; } } return 0; }
64
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
queryCore
queryCore( MprJson * obj , cchar * key , MprJson * value , int flags)
['obj', 'key', 'value', 'flags']
static MprJson *queryCore(MprJson *obj, cchar *key, MprJson *value, int flags) { MprJson *result, *child; char *property, *rest; int termType; if (obj == 0 || key == 0 || *key == '\0' || obj->type & MPR_JSON_VALUE) { return 0; } result = 0; for (property = getNextTerm(obj, value, sclone(key), &rest, &termType); property; ) { if (termType & JSON_PROP_COMPOUND) { result = queryCompound(obj, property, rest, value, flags, termType); break; } else if (rest == 0) { if (!result && !value) { result = mprCreateJson(MPR_JSON_ARRAY); } appendItem(result, queryLeaf(obj, property, value, flags)); break; } else if ((child = mprLookupJsonObj(obj, property)) == 0) { if (value) { child = mprCreateJson(termType & JSON_PROP_ARRAY ? MPR_JSON_ARRAY : MPR_JSON_OBJ); setProperty(obj, sclone(property), child); obj = (MprJson*) child; } else { break; } } obj = (MprJson*) child; property = getNextTerm(obj, value, 0, &rest, &termType); } return result ? result : mprCreateJson(MPR_JSON_ARRAY); }
261
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
queryLeaf
queryLeaf( MprJson * obj , cchar * property , MprJson * value , int flags)
['obj', 'property', 'value', 'flags']
static MprJson *queryLeaf(MprJson *obj, cchar *property, MprJson *value, int flags) { MprJson *child; assert(obj); assert(property && *property); if (value) { setProperty(obj, sclone(property), value); return 0; } else if (flags & MPR_JSON_REMOVE) { if ((child = mprLookupJsonObj(obj, property)) != 0) { return mprRemoveJsonChild(obj, child); } return 0; } else { return mprCloneJson(mprLookupJsonObj(obj, property)); } }
108
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
queryRange
queryRange( MprJson * obj , char * property , cchar * rest , MprJson * value , int flags)
['obj', 'property', 'rest', 'value', 'flags']
static MprJson *queryRange(MprJson *obj, char *property, cchar *rest, MprJson *value, int flags) { MprJson *child, *result; ssize start, end; char *e, *s, ibuf[16]; int index; result = mprCreateJson(MPR_JSON_ARRAY); if (!(obj->type & MPR_JSON_ARRAY)) { return result; } s = stok(property, ": \t", &e); start = (ssize) stoi(s); end = (ssize) stoi(e); if (start < 0) { start = obj->length + start; } if (end < 0) { end = obj->length + end; } for (ITERATE_JSON(obj, child, index)) { if (index < start) continue; if (index > end) break; if (rest == 0) { if (flags & MPR_JSON_REMOVE) { appendItem(result, mprRemoveJsonChild(obj, child)); } else { appendItem(result, queryLeaf(obj, itosbuf(ibuf, sizeof(ibuf), index, 10), value, flags)); } } else { appendItems(result, queryCore(child, rest, value, flags)); } } return result; }
247
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
setProperty
setProperty( MprJson * obj , cchar * name , MprJson * child)
['obj', 'name', 'child']
static MprJson *setProperty(MprJson *obj, cchar *name, MprJson *child) { MprJson *prior, *existing; if (!obj || !child) { return 0; } if ((existing = mprLookupJsonObj(obj, name)) != 0) { existing->value = child->value; existing->children = child->children; existing->type = child->type; existing->length = child->length; return existing; } if (obj->children) { prior = obj->children->prev; child->next = obj->children; child->prev = prior; prior->next->prev = child; prior->next = child; } else { child->next = child->prev = child; obj->children = child; } child->name = name; obj->length++; return child; }
165
True
1
CVE-2014-9708
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
[{'url': 'https://github.com/embedthis/appweb/issues/413', 'name': 'https://github.com/embedthis/appweb/issues/413', 'refsource': 'CONFIRM', 'tags': ['Exploit']}, {'url': 'http://seclists.org/fulldisclosure/2015/Mar/158', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'name': 'https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking']}, {'url': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'name': 'http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third Party Advisory', 'VDB Entry']}, {'url': 'http://seclists.org/fulldisclosure/2015/Apr/19', 'name': '20150408 Re: [oss-security] Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'FULLDISC', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'name': 'http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73407', 'name': '73407', 'refsource': 'BID', 'tags': []}, {'url': 'http://www.securitytracker.com/id/1037007', 'name': '1037007', 'refsource': 'SECTRACK', 'tags': []}, {'url': 'http://www.securityfocus.com/archive/1/535028/100/0/threaded', 'name': '20150328 Advisory: CVE-2014-9708: Appweb Web Server', 'refsource': 'BUGTRAQ', 'tags': []}, {'url': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'name': 'https://security.paloaltonetworks.com/CVE-2014-9708', 'refsource': 'CONFIRM', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.0.0', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.2.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.0.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:5.1.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:*', 'versionEndIncluding': '4.6.5', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".'}]
2018-10-09T19:55Z
2015-03-31T14:59Z
Other
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.
Insufficient Information
https://nvd.nist.gov/vuln/categories
0
Embedthis Software
2014-11-26 15:21:57-08:00
DEV: switch to use ssplit and mprReadJson ssplit is more robust than stok because it does not return null mprReadJson is faster, simpler and does not support dotted keys.
7e6a925f5e86a19a7934a94bbd6959101d0b84eb
False
embedthis/appweb
Appweb Enterprise Edition Embedded Web Server
2010-04-09 19:01:18
2022-07-31 06:38:42
https://www.embedthis.com/
embedthis
46.0
16.0
parseCertFields
parseCertFields( MprBuf * buf , char * prefix , char * prefix2 , char * info)
['buf', 'prefix', 'prefix2', 'info']
static void parseCertFields(MprBuf *buf, char *prefix, char *prefix2, char *info) { char c, *cp, *term, *key, *value; term = cp = info; do { c = *cp; if (c == '/' || c == '\0') { *cp = '\0'; key = stok(term, "=", &value); if (smatch(key, "emailAddress")) { key = "EMAIL"; } mprPutToBuf(buf, "%s%s%s=%s,", prefix, prefix2, key, value); term = &cp[1]; *cp = c; } } while (*cp++ != '\0'); }
130
True
1
CVE-2014-9709
False
False
False
False
AV:N/AC:L/Au:N/C:N/I:N/A:P
NETWORK
LOW
NONE
NONE
NONE
PARTIAL
5.0
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
nan
False
[{'url': 'https://bitbucket.org/libgd/gd-libgd/commits/47eb44b2e90ca88a08dca9f9a1aa9041e9587f43', 'name': 'https://bitbucket.org/libgd/gd-libgd/commits/47eb44b2e90ca88a08dca9f9a1aa9041e9587f43', 'refsource': 'CONFIRM', 'tags': ['Third Party Advisory']}, {'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1188639', 'name': 'https://bugzilla.redhat.com/show_bug.cgi?id=1188639', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking', 'Third Party Advisory']}, {'url': 'https://bugs.php.net/bug.php?id=68601', 'name': 'https://bugs.php.net/bug.php?id=68601', 'refsource': 'CONFIRM', 'tags': ['Vendor Advisory']}, {'url': 'http://php.net/ChangeLog-5.php', 'name': 'http://php.net/ChangeLog-5.php', 'refsource': 'CONFIRM', 'tags': ['Exploit', 'Vendor Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-updates/2015-04/msg00002.html', 'name': 'openSUSE-SU-2015:0644', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'http://www.debian.org/security/2015/dsa-3215', 'name': 'DSA-3215', 'refsource': 'DEBIAN', 'tags': ['Third Party Advisory']}, {'url': 'http://www.mandriva.com/security/advisories?name=MDVSA-2015:153', 'name': 'MDVSA-2015:153', 'refsource': 'MANDRIVA', 'tags': ['Third Party Advisory']}, {'url': 'http://advisories.mageia.org/MGASA-2015-0040.html', 'name': 'http://advisories.mageia.org/MGASA-2015-0040.html', 'refsource': 'CONFIRM', 'tags': ['Third Party Advisory']}, {'url': 'https://support.apple.com/HT205267', 'name': 'https://support.apple.com/HT205267', 'refsource': 'CONFIRM', 'tags': ['Third Party Advisory']}, {'url': 'http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html', 'name': 'APPLE-SA-2015-09-30-3', 'refsource': 'APPLE', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'http://rhn.redhat.com/errata/RHSA-2015-1135.html', 'name': 'RHSA-2015:1135', 'refsource': 'REDHAT', 'tags': ['Third Party Advisory']}, {'url': 'http://marc.info/?l=bugtraq&m=143403519711434&w=2', 'name': 'SSRT102066', 'refsource': 'HP', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html', 'name': 'http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html', 'refsource': 'CONFIRM', 'tags': ['Third Party Advisory']}, {'url': 'http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html', 'name': 'http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html', 'refsource': 'CONFIRM', 'tags': ['Third Party Advisory']}, {'url': 'http://www.securityfocus.com/bid/73306', 'name': '73306', 'refsource': 'BID', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'https://security.gentoo.org/glsa/201607-04', 'name': 'GLSA-201607-04', 'refsource': 'GENTOO', 'tags': ['Third Party Advisory']}, {'url': 'https://security.gentoo.org/glsa/201606-10', 'name': 'GLSA-201606-10', 'refsource': 'GENTOO', 'tags': ['Third Party Advisory']}, {'url': 'http://www.ubuntu.com/usn/USN-2987-1', 'name': 'USN-2987-1', 'refsource': 'UBUNTU', 'tags': ['Third Party Advisory']}, {'url': 'http://www.securitytracker.com/id/1033703', 'name': '1033703', 'refsource': 'SECTRACK', 'tags': ['Third Party Advisory', 'VDB Entry']}, {'url': 'http://rhn.redhat.com/errata/RHSA-2015-1066.html', 'name': 'RHSA-2015:1066', 'refsource': 'REDHAT', 'tags': ['Third Party Advisory']}, {'url': 'http://rhn.redhat.com/errata/RHSA-2015-1053.html', 'name': 'RHSA-2015:1053', 'refsource': 'REDHAT', 'tags': ['Third Party Advisory']}, {'url': 'http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00005.html', 'name': 'SUSE-SU-2015:0868', 'refsource': 'SUSE', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'http://rhn.redhat.com/errata/RHSA-2015-1218.html', 'name': 'RHSA-2015:1218', 'refsource': 'REDHAT', 'tags': ['Third Party Advisory']}]
[{'description': [{'lang': 'en', 'value': 'CWE-119'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:php:php:*:*:*:*:*:*:*:*', 'versionStartIncluding': '5.5.0', 'versionEndExcluding': '5.5.21', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:php:php:*:*:*:*:*:*:*:*', 'versionStartIncluding': '5.6.0', 'versionEndExcluding': '5.6.5', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:libgd:libgd:*:*:*:*:*:*:*:*', 'versionEndIncluding': '2.1.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'The GetCode_ function in gd_gif_in.c in GD 2.1.1 and earlier, as used in PHP before 5.5.21 and 5.6.x before 5.6.5, allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted GIF image that is improperly handled by the gdImageCreateFromGif function.'}]
2019-10-09T23:12Z
2015-03-30T10:59Z
Improper Restriction of Operations within the Bounds of a Memory Buffer
The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Certain languages allow direct addressing of memory locations and do not automatically ensure that these locations are valid for the memory buffer that is being referenced. This can cause read or write operations to be performed on memory locations that may be associated with other variables, data structures, or internal program data. As a result, an attacker may be able to execute arbitrary code, alter the intended control flow, read sensitive information, or cause the system to crash.
https://cwe.mitre.org/data/definitions/119.html
0
Remi Collet
2014-12-13 08:48:18+01:00
Fix possible buffer read overflow detected by -fsanitize=address, thanks to Jan Bee
47eb44b2e90ca88a08dca9f9a1aa9041e9587f43
False
visit repo url
visit repo url
visit repo url
visit repo url
visit repo url
libgd
visit repo url
visit repo url
GetCode_
GetCode_( gdIOCtx * fd , CODE_STATIC_DATA * scd , int code_size , int flag , int * ZeroDataBlockP)
['fd', 'scd', 'code_size', 'flag', 'ZeroDataBlockP']
GetCode_(gdIOCtx *fd, CODE_STATIC_DATA *scd, int code_size, int flag, int *ZeroDataBlockP) { int i, j, ret; unsigned char count; if(flag) { scd->curbit = 0; scd->lastbit = 0; scd->last_byte = 0; scd->done = FALSE; return 0; } if((scd->curbit + code_size) >= scd->lastbit) { if(scd->done) { if(scd->curbit >= scd->lastbit) { /* Oh well */ } return -1; } scd->buf[0] = scd->buf[scd->last_byte - 2]; scd->buf[1] = scd->buf[scd->last_byte - 1]; if((count = GetDataBlock(fd, &scd->buf[2], ZeroDataBlockP)) <= 0) { scd->done = TRUE; } scd->last_byte = 2 + count; scd->curbit = (scd->curbit - scd->lastbit) + 16; scd->lastbit = (2 + count) * 8; } ret = 0; for (i = scd->curbit, j = 0; j < code_size; ++i, ++j) { ret |= ((scd->buf[i / 8] & (1 << (i % 8))) != 0) << j; } scd->curbit += code_size; return ret; }
277
True
1
CVE-2014-9765
False
False
False
True
AV:N/AC:M/Au:N/C:P/I:P/A:P
NETWORK
MEDIUM
NONE
PARTIAL
PARTIAL
PARTIAL
6.8
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
NETWORK
LOW
NONE
REQUIRED
UNCHANGED
HIGH
HIGH
HIGH
8.8
HIGH
2.8
5.9
nan
[{'url': 'http://www.openwall.com/lists/oss-security/2016/02/08/1', 'name': '[oss-security] 20160208 CVE request - buffer overflow in xdelta3 before 3.0.9', 'refsource': 'MLIST', 'tags': []}, {'url': 'http://www.openwall.com/lists/oss-security/2016/02/08/2', 'name': '[oss-security] 20160208 Re: CVE request - buffer overflow in xdelta3 before 3.0.9', 'refsource': 'MLIST', 'tags': []}, {'url': 'http://www.ubuntu.com/usn/USN-2901-1', 'name': 'USN-2901-1', 'refsource': 'UBUNTU', 'tags': []}, {'url': 'http://lists.opensuse.org/opensuse-updates/2016-02/msg00125.html', 'name': 'openSUSE-SU-2016:0524', 'refsource': 'SUSE', 'tags': []}, {'url': 'http://www.debian.org/security/2016/dsa-3484', 'name': 'DSA-3484', 'refsource': 'DEBIAN', 'tags': []}, {'url': 'http://lists.opensuse.org/opensuse-updates/2016-02/msg00131.html', 'name': 'openSUSE-SU-2016:0530', 'refsource': 'SUSE', 'tags': []}, {'url': 'https://github.com/jmacd/xdelta-devel/commit/ef93ff74203e030073b898c05e8b4860b5d09ef2', 'name': 'https://github.com/jmacd/xdelta-devel/commit/ef93ff74203e030073b898c05e8b4860b5d09ef2', 'refsource': 'CONFIRM', 'tags': []}, {'url': 'http://www.securityfocus.com/bid/83109', 'name': '83109', 'refsource': 'BID', 'tags': []}, {'url': 'https://security.gentoo.org/glsa/201701-40', 'name': 'GLSA-201701-40', 'refsource': 'GENTOO', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'CWE-119'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:xdelta:xdelta3:*:*:*:*:*:*:*:*', 'versionEndIncluding': '3.0.8', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Buffer overflow in the main_get_appheader function in xdelta3-main.h in xdelta3 before 3.0.9 allows remote attackers to execute arbitrary code via a crafted input file.'}]
2018-10-30T16:27Z
2016-04-19T21:59Z
Improper Restriction of Operations within the Bounds of a Memory Buffer
The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Certain languages allow direct addressing of memory locations and do not automatically ensure that these locations are valid for the memory buffer that is being referenced. This can cause read or write operations to be performed on memory locations that may be associated with other variables, data structures, or internal program data. As a result, an attacker may be able to execute arbitrary code, alter the intended control flow, read sensitive information, or cause the system to crash.
https://cwe.mitre.org/data/definitions/119.html
0
josh.macdonald
2014-10-12 05:24:22+00:00
Add appheader tests; fix buffer overflow in main_get_appheader
ef93ff74203e030073b898c05e8b4860b5d09ef2
False
visit repo url
visit repo url
visit repo url
visit repo url
visit repo url
jmacd
visit repo url
visit repo url
main_get_appheader
main_get_appheader( xd3_stream * stream , main_file * ifile , main_file * output , main_file * sfile)
['stream', 'ifile', 'output', 'sfile']
main_get_appheader (xd3_stream *stream, main_file *ifile, main_file *output, main_file *sfile) { uint8_t *apphead; usize_t appheadsz; int ret; /* The user may disable the application header. Once the appheader * is set, this disables setting it again. */ if (! option_use_appheader) { return; } ret = xd3_get_appheader (stream, & apphead, & appheadsz); /* Ignore failure, it only means we haven't received a header yet. */ if (ret != 0) { return; } if (appheadsz > 0) { char *start = (char*)apphead; char *slash; int place = 0; char *parsed[4]; memset (parsed, 0, sizeof (parsed)); while ((slash = strchr (start, '/')) != NULL) { *slash = 0; parsed[place++] = start; start = slash + 1; } parsed[place++] = start; /* First take the output parameters. */ if (place == 2 || place == 4) { main_get_appheader_params (output, parsed, 1, "output", ifile); } /* Then take the source parameters. */ if (place == 4) { main_get_appheader_params (sfile, parsed+2, 0, "source", ifile); } } option_use_appheader = 0; return; }
206
True
1
CVE-2014-9765
False
False
False
True
AV:N/AC:M/Au:N/C:P/I:P/A:P
NETWORK
MEDIUM
NONE
PARTIAL
PARTIAL
PARTIAL
6.8
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
NETWORK
LOW
NONE
REQUIRED
UNCHANGED
HIGH
HIGH
HIGH
8.8
HIGH
2.8
5.9
nan
[{'url': 'http://www.openwall.com/lists/oss-security/2016/02/08/1', 'name': '[oss-security] 20160208 CVE request - buffer overflow in xdelta3 before 3.0.9', 'refsource': 'MLIST', 'tags': []}, {'url': 'http://www.openwall.com/lists/oss-security/2016/02/08/2', 'name': '[oss-security] 20160208 Re: CVE request - buffer overflow in xdelta3 before 3.0.9', 'refsource': 'MLIST', 'tags': []}, {'url': 'http://www.ubuntu.com/usn/USN-2901-1', 'name': 'USN-2901-1', 'refsource': 'UBUNTU', 'tags': []}, {'url': 'http://lists.opensuse.org/opensuse-updates/2016-02/msg00125.html', 'name': 'openSUSE-SU-2016:0524', 'refsource': 'SUSE', 'tags': []}, {'url': 'http://www.debian.org/security/2016/dsa-3484', 'name': 'DSA-3484', 'refsource': 'DEBIAN', 'tags': []}, {'url': 'http://lists.opensuse.org/opensuse-updates/2016-02/msg00131.html', 'name': 'openSUSE-SU-2016:0530', 'refsource': 'SUSE', 'tags': []}, {'url': 'https://github.com/jmacd/xdelta-devel/commit/ef93ff74203e030073b898c05e8b4860b5d09ef2', 'name': 'https://github.com/jmacd/xdelta-devel/commit/ef93ff74203e030073b898c05e8b4860b5d09ef2', 'refsource': 'CONFIRM', 'tags': []}, {'url': 'http://www.securityfocus.com/bid/83109', 'name': '83109', 'refsource': 'BID', 'tags': []}, {'url': 'https://security.gentoo.org/glsa/201701-40', 'name': 'GLSA-201701-40', 'refsource': 'GENTOO', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'CWE-119'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:xdelta:xdelta3:*:*:*:*:*:*:*:*', 'versionEndIncluding': '3.0.8', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Buffer overflow in the main_get_appheader function in xdelta3-main.h in xdelta3 before 3.0.9 allows remote attackers to execute arbitrary code via a crafted input file.'}]
2018-10-30T16:27Z
2016-04-19T21:59Z
Improper Restriction of Operations within the Bounds of a Memory Buffer
The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Certain languages allow direct addressing of memory locations and do not automatically ensure that these locations are valid for the memory buffer that is being referenced. This can cause read or write operations to be performed on memory locations that may be associated with other variables, data structures, or internal program data. As a result, an attacker may be able to execute arbitrary code, alter the intended control flow, read sensitive information, or cause the system to crash.
https://cwe.mitre.org/data/definitions/119.html
0
josh.macdonald
2014-10-12 05:24:22+00:00
Add appheader tests; fix buffer overflow in main_get_appheader
ef93ff74203e030073b898c05e8b4860b5d09ef2
False
visit repo url
visit repo url
visit repo url
visit repo url
visit repo url
jmacd
visit repo url
visit repo url
do_cmd
do_cmd( xd3_stream * stream , const char * buf)
['stream', 'buf']
static int do_cmd (xd3_stream *stream, const char *buf) { int ret; if ((ret = system (buf)) != 0) { if (WIFEXITED (ret)) { stream->msg = "command exited non-zero"; IF_DEBUG1 (XPR(NT "command was: %s\n", buf)); } else { stream->msg = "abnormal command termination"; } return XD3_INTERNAL; } return 0; }
72
True
1
CVE-2014-9765
False
False
False
True
AV:N/AC:M/Au:N/C:P/I:P/A:P
NETWORK
MEDIUM
NONE
PARTIAL
PARTIAL
PARTIAL
6.8
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
NETWORK
LOW
NONE
REQUIRED
UNCHANGED
HIGH
HIGH
HIGH
8.8
HIGH
2.8
5.9
nan
[{'url': 'http://www.openwall.com/lists/oss-security/2016/02/08/1', 'name': '[oss-security] 20160208 CVE request - buffer overflow in xdelta3 before 3.0.9', 'refsource': 'MLIST', 'tags': []}, {'url': 'http://www.openwall.com/lists/oss-security/2016/02/08/2', 'name': '[oss-security] 20160208 Re: CVE request - buffer overflow in xdelta3 before 3.0.9', 'refsource': 'MLIST', 'tags': []}, {'url': 'http://www.ubuntu.com/usn/USN-2901-1', 'name': 'USN-2901-1', 'refsource': 'UBUNTU', 'tags': []}, {'url': 'http://lists.opensuse.org/opensuse-updates/2016-02/msg00125.html', 'name': 'openSUSE-SU-2016:0524', 'refsource': 'SUSE', 'tags': []}, {'url': 'http://www.debian.org/security/2016/dsa-3484', 'name': 'DSA-3484', 'refsource': 'DEBIAN', 'tags': []}, {'url': 'http://lists.opensuse.org/opensuse-updates/2016-02/msg00131.html', 'name': 'openSUSE-SU-2016:0530', 'refsource': 'SUSE', 'tags': []}, {'url': 'https://github.com/jmacd/xdelta-devel/commit/ef93ff74203e030073b898c05e8b4860b5d09ef2', 'name': 'https://github.com/jmacd/xdelta-devel/commit/ef93ff74203e030073b898c05e8b4860b5d09ef2', 'refsource': 'CONFIRM', 'tags': []}, {'url': 'http://www.securityfocus.com/bid/83109', 'name': '83109', 'refsource': 'BID', 'tags': []}, {'url': 'https://security.gentoo.org/glsa/201701-40', 'name': 'GLSA-201701-40', 'refsource': 'GENTOO', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'CWE-119'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:xdelta:xdelta3:*:*:*:*:*:*:*:*', 'versionEndIncluding': '3.0.8', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Buffer overflow in the main_get_appheader function in xdelta3-main.h in xdelta3 before 3.0.9 allows remote attackers to execute arbitrary code via a crafted input file.'}]
2018-10-30T16:27Z
2016-04-19T21:59Z
Improper Restriction of Operations within the Bounds of a Memory Buffer
The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Certain languages allow direct addressing of memory locations and do not automatically ensure that these locations are valid for the memory buffer that is being referenced. This can cause read or write operations to be performed on memory locations that may be associated with other variables, data structures, or internal program data. As a result, an attacker may be able to execute arbitrary code, alter the intended control flow, read sensitive information, or cause the system to crash.
https://cwe.mitre.org/data/definitions/119.html
0
josh.macdonald
2014-10-12 05:24:22+00:00
Add appheader tests; fix buffer overflow in main_get_appheader
ef93ff74203e030073b898c05e8b4860b5d09ef2
False
visit repo url
visit repo url
visit repo url
visit repo url
visit repo url
jmacd
visit repo url
visit repo url
mt_init
mt_init( mtrand * mt , uint32_t seed)
['mt', 'seed']
void mt_init(mtrand *mt, uint32_t seed) { int i; mt->mt_buffer_[0] = seed; mt->mt_index_ = MT_LEN; for (i = 1; i < MT_LEN; i++) { /* See Knuth TAOCP Vol2. 3rd Ed. P.106 for multiplier. */ /* In the previous versions, MSBs of the seed affect */ /* only MSBs of the array mt[]. */ /* 2002/01/09 modified by Makoto Matsumoto */ mt->mt_buffer_[i] = (1812433253UL * (mt->mt_buffer_[i-1] ^ (mt->mt_buffer_[i-1] >> 30)) + i); } }
82
True
1
CVE-2014-9765
False
False
False
True
AV:N/AC:M/Au:N/C:P/I:P/A:P
NETWORK
MEDIUM
NONE
PARTIAL
PARTIAL
PARTIAL
6.8
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
NETWORK
LOW
NONE
REQUIRED
UNCHANGED
HIGH
HIGH
HIGH
8.8
HIGH
2.8
5.9
nan
[{'url': 'http://www.openwall.com/lists/oss-security/2016/02/08/1', 'name': '[oss-security] 20160208 CVE request - buffer overflow in xdelta3 before 3.0.9', 'refsource': 'MLIST', 'tags': []}, {'url': 'http://www.openwall.com/lists/oss-security/2016/02/08/2', 'name': '[oss-security] 20160208 Re: CVE request - buffer overflow in xdelta3 before 3.0.9', 'refsource': 'MLIST', 'tags': []}, {'url': 'http://www.ubuntu.com/usn/USN-2901-1', 'name': 'USN-2901-1', 'refsource': 'UBUNTU', 'tags': []}, {'url': 'http://lists.opensuse.org/opensuse-updates/2016-02/msg00125.html', 'name': 'openSUSE-SU-2016:0524', 'refsource': 'SUSE', 'tags': []}, {'url': 'http://www.debian.org/security/2016/dsa-3484', 'name': 'DSA-3484', 'refsource': 'DEBIAN', 'tags': []}, {'url': 'http://lists.opensuse.org/opensuse-updates/2016-02/msg00131.html', 'name': 'openSUSE-SU-2016:0530', 'refsource': 'SUSE', 'tags': []}, {'url': 'https://github.com/jmacd/xdelta-devel/commit/ef93ff74203e030073b898c05e8b4860b5d09ef2', 'name': 'https://github.com/jmacd/xdelta-devel/commit/ef93ff74203e030073b898c05e8b4860b5d09ef2', 'refsource': 'CONFIRM', 'tags': []}, {'url': 'http://www.securityfocus.com/bid/83109', 'name': '83109', 'refsource': 'BID', 'tags': []}, {'url': 'https://security.gentoo.org/glsa/201701-40', 'name': 'GLSA-201701-40', 'refsource': 'GENTOO', 'tags': []}]
[{'description': [{'lang': 'en', 'value': 'CWE-119'}]}]
MEDIUM
[{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:xdelta:xdelta3:*:*:*:*:*:*:*:*', 'versionEndIncluding': '3.0.8', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*', 'cpe_name': []}]}]
[{'lang': 'en', 'value': 'Buffer overflow in the main_get_appheader function in xdelta3-main.h in xdelta3 before 3.0.9 allows remote attackers to execute arbitrary code via a crafted input file.'}]
2018-10-30T16:27Z
2016-04-19T21:59Z
Improper Restriction of Operations within the Bounds of a Memory Buffer
The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Certain languages allow direct addressing of memory locations and do not automatically ensure that these locations are valid for the memory buffer that is being referenced. This can cause read or write operations to be performed on memory locations that may be associated with other variables, data structures, or internal program data. As a result, an attacker may be able to execute arbitrary code, alter the intended control flow, read sensitive information, or cause the system to crash.
https://cwe.mitre.org/data/definitions/119.html
0
josh.macdonald
2014-10-12 05:24:22+00:00
Add appheader tests; fix buffer overflow in main_get_appheader
ef93ff74203e030073b898c05e8b4860b5d09ef2
False
visit repo url
visit repo url
visit repo url
visit repo url
visit repo url
jmacd
visit repo url
visit repo url
mt_random
mt_random( mtrand * mt)
['mt']
uint32_t mt_random (mtrand *mt) { uint32_t y; unsigned long mag01[2]; mag01[0] = 0; mag01[1] = MATRIX_A; if (mt->mt_index_ >= MT_LEN) { int kk; for (kk = 0; kk < MT_LEN - MT_IA; kk++) { y = (mt->mt_buffer_[kk] & UPPER_MASK) | (mt->mt_buffer_[kk + 1] & LOWER_MASK); mt->mt_buffer_[kk] = mt->mt_buffer_[kk + MT_IA] ^ (y >> 1) ^ mag01[y & 0x1UL]; } for (;kk < MT_LEN - 1; kk++) { y = (mt->mt_buffer_[kk] & UPPER_MASK) | (mt->mt_buffer_[kk + 1] & LOWER_MASK); mt->mt_buffer_[kk] = mt->mt_buffer_[kk + (MT_IA - MT_LEN)] ^ (y >> 1) ^ mag01[y & 0x1UL]; } y = (mt->mt_buffer_[MT_LEN - 1] & UPPER_MASK) | (mt->mt_buffer_[0] & LOWER_MASK); mt->mt_buffer_[MT_LEN - 1] = mt->mt_buffer_[MT_IA - 1] ^ (y >> 1) ^ mag01[y & 0x1UL]; mt->mt_index_ = 0; } y = mt->mt_buffer_[mt->mt_index_++]; y ^= (y >> 11); y ^= (y << 7) & 0x9d2c5680UL; y ^= (y << 15) & 0xefc60000UL; y ^= (y >> 18); return y; }
311
True
1