id
stringlengths
12
19
title
stringlengths
0
237
description
stringlengths
35
3.87k
patches
listlengths
1
22
cwe
stringlengths
2
440
CVE-2021-23758
Deserialization of Untrusted Data
All versions of package ajaxpro.2 are vulnerable to Deserialization of Untrusted Data due to the possibility of deserialization of arbitrary .NET classes, which can be abused to gain remote code execution.
[ { "commit_message": "[PATCH] added allowed customized types .gitignore | 1 + AjaxPro/AjaxPro.csproj | 13 +- AjaxPro/AjaxPro.sln | 4 +- .../AjaxSettingsSectionHandler.cs | 19 + AjaxPro/Handler/AjaxProcHelper...
Deserialization of Untrusted Data
CVE-2022-4455
sproctor php-calendar index.php cross site scripting
A vulnerability was identified in sproctor php-calendar up to 2.0.13. This impacts an unknown function of the file index.php. Such manipulation of the argument $_SERVER['PHP_SELF'] leads to cross site scripting. The attack may be launched remotely. The name of the patch is a2941109b42201c19733127ced763e270a357809. It is advisable to implement a patch to correct this issue.
[ { "commit_message": "[PATCH] Attempt to mitigate reflective XSS attack index.php | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSBhMjk0MTEwOWI0MjIwMWMxOTczMzEyN2NlZDc2M2UyNzBhMzU3ODA5IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBTZWFuIFByb2N0b3IgPHNwcm9jdG9yQGdtYWlsLmNvbT4KR...
Cross Site Scripting
GHSA-v5x8-2g8c-7279
null
[ { "commit_message": "[PATCH] Bugfix: Possible SQL injection in nat/item-add-submit.php. Fixes #2344 app/admin/nat/item-add-submit.php | 6 ++++++ misc/CHANGELOG | 1 + 2 files changed, 7 insertions(+)", "patch_text_b64": "RnJvbSA4NTZiMTBjYTg1YTI0YzA0ZWQ4NjUxZjRlMTNmODY3ZWM3OGEzNTNkIE1vbiBTZ...
null
GHSA-vxwr-wpjv-qjq7
XWiki Platform: Privilege escalation (PR) from user registration through PDFClass
null
[ { "commit_message": "[PATCH] XWIKI-21337: Apply PDF templates with the rights of their authors (cherry picked from commit d28e21a670c69880b951e415dd2ddd69d273eae9) .../com/xpn/xwiki/pdf/impl/PdfExportImpl.java | 80 +++++--- .../xpn/xwiki/pdf/impl/PdfExportImplTest.java | 181 +++++++++++++++--- 2 files changed,...
null
GHSA-hm2w-8xwc-gpv5
null
[ { "commit_message": "[PATCH] Fix invalid free in RAnal.avr libr/anal/p/anal_avr.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAyNWEzNzAzZWYyZTAxNWJiZTFkMWYxNmY2YjJmNjNiYjEwZGQzNGY0IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBwYW5jYWtlIDxwYW5jYWtlQG5vcGNvZGUub3JnPgpEYXRlOiBX...
null
GHSA-9r4g-gmfh-6gxg
null
[ { "commit_message": "[PATCH] Fix a reflected cross-site scripting vulnerability CVE-2022-1187 inc/admin.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAyZDhjY2I3YjEyNzQyYmYxNmI1YTYwNjhmOWZkZWVhYzY5YmMxMWIxIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBwN2U0IDw0NDc1MDA4NytwN2...
null
CVE-2022-24976
Atheme IRC Services before 7.2.12, when used in conjunction with InspIRCd, allows authentication bypass by ending an IRC handshake at a certain point during a challenge-response login sequence.
[ { "commit_message": "[PATCH] saslserv/main: Track EID we're pending login to The existing model does not remember that we've sent a SVSLOGIN for a given SASL session, and simply assumes that if a client is introduced with a SASL session open, that session must have succeeded. The security of this approach requi...
n/a
CVE-2014-125106
Nanopb before 0.3.1 allows size_t overflows in pb_dec_bytes and pb_dec_string.
[ { "commit_message": "[PATCH] Protect against size_t overflows in pb_dec_bytes/pb_dec_string. Possible consequences of bug: 1) Denial of service by causing a crash Possible when all of the following apply: - Untrusted data is passed to pb_decode() - The top-level message contains a static string field as the fir...
n/a
GHSA-76p3-8jx3-jpfq
Prototype pollution in webpack loader-utils
null
[ { "commit_message": "[PATCH] fix: security problem (#220) lib/parseQuery.js | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA0NTA0ZTM0YzQ3OTZhNTgzNmVmNzA0NTgzMjczNTE2NzVhZWQ0OGE1IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBBbGV4YW5kZXIgQWthaXQgPDQ1Njc5MzQrYWxleGFuZGVyLWFrYWl0QH...
null
GHSA-g44v-6qfm-f6ch
Answer has Guessable CAPTCHA
null
[ { "commit_message": "[PATCH] update VerifyCaptcha internal/repo/captcha/captcha.go | 8 ++++++++ internal/service/action/captcha_service.go | 7 +++++++ 2 files changed, 15 insertions(+)", "patch_text_b64": "RnJvbSA4MTNhZDBiOTg5NDY3M2IxYmRkNDg5YTJlOWFiNjBhNDRmZTk5MGFmIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAw...
null
CVE-2020-36628
Calsign APDE ZIP File CopyBuildTask.java handleExtract path traversal
A vulnerability classified as critical has been found in Calsign APDE. This affects the function handleExtract of the file APDE/src/main/java/com/calsignlabs/apde/build/dag/CopyBuildTask.java of the component ZIP File Handler. The manipulation leads to path traversal. Upgrading to version 0.5.2-pre2-alpha is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216747.
[ { "commit_message": "[PATCH] fix zip path traversal vulnerability .../java/com/calsignlabs/apde/build/dag/CopyBuildTask.java | 4 ++++ build.gradle | 2 +- 2 files changed, 5 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBjNmQ2NGNiZTQ2NTM0OGMxYmZkM...
CWE-22 Path Traversal
CVE-2020-36278
Leptonica before 1.80.0 allows a heap-based buffer over-read in findNextBorderPixel in ccbord.c.
[ { "commit_message": "[PATCH] Issue 23433 in oss-fuzz: Heap-buffer-overflow in findNextBorderPixel() * Check pix boundary when looking for the next pixel. src/ccbord.c | 2 ++ 1 file changed, 2 insertions(+)", "patch_text_b64": "RnJvbSA4ZDZlMTc1NTUxOGNmYjk4NTM2ZDZjM2RhZjA2MDFmMjI2ZDE2ODQyIE1vbiBTZXAgMTcgMDA6M...
n/a
GHSA-pw34-qf6c-84fc
phpMyAdmin XSS Vulnerability
null
[ { "commit_message": "[PATCH] Fix XSS in DB_search.php Signed-off-by: Madhura Jayaratne <madhura.cj@gmail.com> libraries/DbSearch.class.php | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA3NWE1NTgyNDAxMjQwNmEwOGM0ZGViZjVkZGI3YWU0MWMzMmE3ZGJjIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwM...
null
GHSA-g4fr-ffvg-p5w6
null
[ { "commit_message": "[PATCH] Fix a bug in number_format() Summary: In case of error while calling snprintf, return empty string instead of malformed string. Reviewed By: binliu19 Differential Revision: D13379372 fbshipit-source-id: 1e5611598464daccc674d5a96558c9f2aee08fc8 hphp/runtime/base/zend-string.cpp ...
null
CVE-2022-31192
Cross Site Scripting possible in DSpace JSPUI "Request a Copy" feature
DSpace open source software is a repository application which provides durable access to digital resources. dspace-jspui is a UI component for DSpace. The JSPUI "Request a Copy" feature does not properly escape values submitted and stored from the "Request a Copy" form. This means that item requests could be vulnerable to XSS attacks. This vulnerability only impacts the JSPUI. Users are advised to upgrade. There are no known workarounds for this vulnerability.
[ { "commit_message": "[PATCH] [DS-4133] Improve URL handling in Controlled Vocab JSPUI servlet .../webui/servlet/ControlledVocabularyServlet.java | 12 ++++++++++-- 1 file changed, 10 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSBmNzc1ODQ1N2I3ZWMzNDg5ZDUyNWUzOWFhNzUzY2M3MDgwOWQ5YWQ5IE1vbiBTZXAgM...
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-39305
Envoy Proxy use after free when route hash policy is configured with cookie attributes
Envoy is a cloud-native, open source edge and service proxy. Prior to versions 1.30.4, 1.29.7, 1.28.5, and 1.27.7. Envoy references already freed memory when route hash policy is configured with cookie attributes. Note that this vulnerability has been fixed in the open as the effect would be immediately apparent if it was configured. Memory allocated for holding attribute values is freed after configuration was parsed. During request processing Envoy will attempt to copy content of de-allocated memory into request cookie header. This can lead to arbitrary content of Envoy's memory to be sent to the upstream service or abnormal process termination. This vulnerability is fixed in Envoy versions v1.30.4, v1.29.7, v1.28.5, and v1.27.7. As a workaround, do not use cookie attributes in route action hash policy.
[ { "commit_message": "[PATCH] http: fix cookie attributes (#34885) Signed-off-by: Rama Chavali <rama.rao@salesforce.com> changelogs/current.yaml | 4 ++ source/common/http/hash_policy.cc | 14 +++++-- .../multiplexed_integration_test.cc | 39 +++++++++++++++++++ 3 files ...
CWE-416: Use After Free
CVE-2023-41049
Improper Neutralization of Script in Attributes in @dcl/single-sign-on-client
@dcl/single-sign-on-client is an open source npm library which deals with single sign on authentication flows. Improper input validation in the `init` function allows arbitrary javascript to be executed using the `javascript:` prefix. This vulnerability has been patched on version `0.1.0`. Users are advised to upgrade. Users unable to upgrade should limit untrusted user input to the `init` function.
[ { "commit_message": "[PATCH] feat: verify url package-lock.json | 18 +++++++++++++++++- packages/lib/package.json | 4 +++- packages/lib/src/SingleSignOn.shared.ts | 2 +- packages/lib/src/SingleSignOn.ts | 14 ++++++++++++-- 4 files changed, 33 insertions(+), 5 deletio...
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-34080
MantisBT Vulnerable to Exposure of Sensitive Information to an Unauthorized Actor
MantisBT (Mantis Bug Tracker) is an open source issue tracker. If an issue references a note that belongs to another issue that the user doesn't have access to, then it gets hyperlinked. Clicking on the link gives an access denied error as expected, yet some information remains available via the link, link label, and tooltip. This can result in disclosure of the existence of the note, the note author name, the note creation timestamp, and the issue id the note belongs to. Version 2.26.2 contains a patch for the issue. No known workarounds are available.
[ { "commit_message": "[PATCH] Fix access level check for note links Fixes #34434 core/string_api.php | 42 +++++++++++++++++++++++++----------------- 1 file changed, 25 insertions(+), 17 deletions(-)", "patch_text_b64": "RnJvbSAwYTUwNTYyMzY5ZDgyMzY4OWM5Yjk0NjA2NmQxZTQ5ZDNjMmRmMjI2IE1vbiBTZXAgMTcgMDA6MDA6MDAgM...
CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
GHSA-jwrv-x6rx-8vfm
Macaron i18n Open Redirect vulnerability
null
[ { "commit_message": "<u@gogs.io> [PATCH] security: fix Open Redirection vulnerability .gitignore | 1 + go.mod | 3 +- go.sum | 13 +++- i18n.go | 18 +++-- i18n_test.go | 208 +++++++++++++++++++++++++++++---------------------- 5 files changed, 141 insertions(+), 102 deletions(-) create mod...
null
CVE-2020-36315
In RELIC before 2020-08-01, RSA PKCS#1 v1.5 signature forgery can occur because certain checks of the padding (and of the first two bytes) are inadequate. NOTE: this requires that a low public exponent (such as 3) is being used. The product, by default, does not generate RSA keys with such a low number.
[ { "commit_message": "[PATCH] Fix #154 and #155 by inverting the padding check logic and being more rigorous. src/cp/relic_cp_rsa.c | 234 +++++++++++++++++++++--------------------- 1 file changed, 117 insertions(+), 117 deletions(-)", "patch_text_b64": "RnJvbSA3NmM5YTFmZGYxOWQ5ZTkyZTU2NmE3NzM3NjY3M2U1MjJhYWU...
n/a
GHSA-cwx2-736x-mf6w
Prototype pollution in object-path
null
[ { "commit_message": "[PATCH] Fix prototype pollution in set() index.js | 4 + test.js | 1480 ++++++++++++++++++++++++++++-------------------------- 2 files changed, 765 insertions(+), 719 deletions(-)", "patch_text_b64": "RnJvbSAyYmUzMzU0YzZjNDYyMTVjNzYzNWViMWI3NmQ4MGYxMzE5NDAzYzY4IE1vbiBTZXAgMTcgMDA6MDA...
null
PYSEC-2024-23
null
[ { "commit_message": "[PATCH] Validate urls in `element` and `window` endpoints Domains were previously not validated before being handled, leading to a potential scenario where someone could pass something like \"element_url=127.0.0.1:<port>/<resource>\" to access other resources on a machine running Whoogle. T...
null
CVE-2017-7856
LibreOffice before 2017-03-11 has an out-of-bounds write caused by a heap-based buffer overflow in the SVMConverter::ImplConvertFromSVM1 function in vcl/source/gdi/svmconverter.cxx.
[ { "commit_message": "[PATCH] ofz#817 nStrLen-1 changed to nStrLen-3 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit regression from... commit ff8f6629287d0d1bdbcf4f8ed16cb8d077d08c7a Author: Caolán McNamara <caolanm@redhat.com> Resolves: ofz#424 guard against broken dxa...
n/a
PYSEC-2021-812
null
[ { "commit_message": "[PATCH] Don't constant-fold DT_RESOURCE constants. PiperOrigin-RevId: 391803952 Change-Id: I0ea3ec31d3e7dfda0f03b4027a237f08d00a3091 tensorflow/core/common_runtime/constant_folding.cc | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA3NzMxZThkZmJlNGE1Nj...
null
GHSA-g6hf-f9cq-q7w7
Cross-Site Request Forgery in Spring Framework
null
[ { "commit_message": "[PATCH] Disable ext entities in SourceHttpMessageConverter This change disables the processing of external entities in SourceHttpMessageConverter by default and provides an option to enable it if required. .../xml/SourceHttpMessageConverter.java | 152 +++++++++++++----- .../xml/Source...
null
GHSA-pw95-88fg-3j6f
Langroid Allows XXE Injection via XMLToolMessage
null
[ { "commit_message": "[PATCH] fix: harden table_chat_agent (eval), xml_tool_message against sec vulnerabilities langroid/agent/special/table_chat_agent.py | 6 +- langroid/agent/xml_tool_message.py | 12 +- pyproject.toml | 2 +- uv.lock | ...
null
GHSA-cp5v-2hmc-3vjx
WSO2 is vulnerable to Open Redirect through multi-option URL in its authentication endpoint
null
[ { "commit_message": "[PATCH] Validate multiOptionURI parameter .../pom.xml | 6 ++ .../util/AuthenticationEndpointUtil.java | 76 +++++++++++++++++++ 2 files changed, 82 insertions(+)", "patch_text_b64": "RnJvbSA3ZGU4ZDUxM2MyOWY4MzlhOTBmM2Q0YjM3ZDc1NGIzM2ZmMTkzZDg2IE1vb...
null
CVE-2025-66545
Nextcloud Groupfolders users with read-only permissions for team folder can restore deleted files from trash bin
Nextcloud Groupfolders provides admin-configured folders shared by everyone in a group or team. Prior to 14.0.11, 15.3.12, 16.0.15, 17.0.14, 18.1.8, 19.1.8, and 20.1.2, a user with read-only permission can restore a file from the trash bin. This vulnerability is fixed in 14.0.11, 15.3.12, 16.0.15, 17.0.14, 18.1.8, 19.1.8, and 20.1.2.
[ { "commit_message": "[PATCH] fix(trash): Restore from correct path Signed-off-by: provokateurin <kate@provokateurin.de> lib/Trash/TrashBackend.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAyMTU3NzdkOTRjODg2MjI4YTk3YjAzZjMyYTJhNTZlNWZmYTM0NTgzIE1vbiBTZXAgMTcgMDA6MDA6MDA...
CWE-707: Improper Neutralization
GHSA-85rq-hp8x-ghjq
Cross-Site Request Forgery in Jenkins Mailer Plugin
null
[ { "commit_message": "[PATCH] [SECURITY-2163] src/main/java/hudson/tasks/Mailer.java | 4 +- .../hudson/tasks/Mailer/global.jelly | 2 +- src/test/java/hudson/tasks/MailerTest.java | 37 ++++++++++++++++++- 3 files changed, 39 insertions(+), 4 deletions(-)", "patch_text_b64": "RnJvbSA1ZTYwN...
null
GHSA-3qhf-m339-9g5v
MCP Python SDK vulnerability in the FastMCP Server causes validation error, leading to DoS
null
[ { "commit_message": "[PATCH] Fix uncaught exception in MCP server (#822) src/mcp/shared/session.py | 59 ++++++--- tests/issues/test_malformed_input.py | 172 +++++++++++++++++++++++++++ 2 files changed, 212 insertions(+), 19 deletions(-) create mode 100644 tests/issues/test_malformed_input.py", "...
null
CVE-2023-37265
Incorrect identification of source IP addresses in CasaOS
CasaOS is an open-source Personal Cloud system. Due to a lack of IP address verification an unauthenticated attackers can execute arbitrary commands as `root` on CasaOS instances. The problem was addressed by improving the detection of client IP addresses in `391dd7f`. This patch is part of CasaOS 0.4.4. Users should upgrade to CasaOS 0.4.4. If they can't, they should temporarily restrict access to CasaOS to untrusted users, for instance by not exposing it publicly.
[ { "commit_message": "[PATCH] Merge pull request from GHSA-vjh7-5r6x-xh6g * fix:Incorrect identification of source IP addresses * feat: support reverse proxy * stash * stash * fix: the bug * fix: the bug * fix: the bug * fix: the bug * delete unused comment * refacotr the proccess * add comment to notice user to...
CWE-306: Missing Authentication for Critical Function
CVE-2019-20913
An issue was discovered in GNU LibreDWG through 0.9.3. Crafted input will lead to a heap-based buffer over-read in dwg_encode_entity in common_entity_data.spec.
[ { "commit_message": "[PATCH] add DEBUGGING_CLASS_CPP and use it for TABLECONTENT. This is more stable than CLASS_DXF in cases when TABLE is mixed up with TABLECONTENT. See e.g. GH #178, where it fixes the heap_overflow2 case. src/classes.inc | 26 +++++++++++++++++--------- src/dec_macros.h | 4 ++-- 2 files ch...
n/a
GHSA-w4fh-p39j-749c
null
[ { "commit_message": "[PATCH] fix: hide user data from comments module server/src/entities/comment.entity.ts | 2 +- server/src/services/comment.service.ts | 44 +++++++++++++++----------- 2 files changed, 27 insertions(+), 19 deletions(-)", "patch_text_b64": "RnJvbSA0NWUwZDMzMDJkOTJkZjdkN2YyZDYwOWMzMWNlYTcx...
null
GHSA-c7pp-g2v2-2766
DOM-based XSS in gmail-js
null
[ { "commit_message": "[PATCH] Replace new Function() with JSON.parse() src/gmail.js | 23 ++++++++--------------- 1 file changed, 8 insertions(+), 15 deletions(-)", "patch_text_b64": "RnJvbSBhODM0MzZmNDk5ZjljMDFiMDQyODBhZjk0NWE1YTgxMTM3YjZiYWYxIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiA9P1VURi04P3E/Sm9zdGVpbj...
null
CVE-2025-52435
Apache Mynewt NimBLE: Invalid error handling in pause encryption procedure in NimBLE controller
J2EE Misconfiguration: Data Transmission Without Encryption vulnerability in Apache NimBLE. Improper handling of Pause Encryption procedure on Link Layer results in a previously encrypted connection being left in un-encrypted state allowing an eavesdropper to observe the remainder of the exchange. This issue affects Apache NimBLE: through <= 1.8.0. Users are recommended to upgrade to version 1.9.0, which fixes the issue.
[ { "commit_message": "[PATCH] nimble/ll: Restrict allowed LL Control PDUs received This restricts allowed Control PDUs that can be received in specific encryption state. .../include/controller/ble_ll_ctrl.h | 3 +- nimble/controller/src/ble_ll_conn.c | 2 +- nimble/controller/src/ble_ll_ctrl.c...
CWE-5 J2EE Misconfiguration: Data Transmission Without Encryption
GHSA-f554-x222-wgf7
Command Injection in Xstream
null
[ { "commit_message": "[PATCH] Merge security framework from HEAD into branch. git-svn-id: http://svn.codehaus.org/xstream/branches/v-1.4.x@2219 9830eeb5-ddf4-0310-9ef7-f4b9a3e3227e xstream-distribution/src/content/changes.html | 6 + xstream-distribution/src/content/faq.html | 5 +- .../src/content/securit...
null
GHSA-8hgj-6pgq-37q3
null
[ { "commit_message": "[PATCH] https://bugs.launchpad.net/ubuntu/+source/imagemagick/+bug/1490362 coders/tga.c | 2 ++ 1 file changed, 2 insertions(+)", "patch_text_b64": "RnJvbSA0ZjY4ZTk2NjE1MTg0NjNmY2E1MjNjOTcyNmJiNWQ5NDBhMmFhNmQ4IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBDcmlzdHkgPHVyYmFuLXdhcnJpb3JAaW1hZ2V...
null
CVE-2024-35190
Asterisk' res_pjsip_endpoint_identifier_ip: wrongly matches ALL unauthorized SIP requests
Asterisk is an open source private branch exchange and telephony toolkit. After upgrade to 18.23.0, ALL unauthorized SIP requests are identified as PJSIP Endpoint of local asterisk server. This vulnerability is fixed in 18.23.1, 20.8.1, and 21.3.1.
[ { "commit_message": "[PATCH] Revert \"res_pjsip_endpoint_identifier_ip: Add endpoint identifier transport address.\" This reverts PR #602 Resolves: #GHSA-qqxj-v78h-hrf9 configs/samples/pjsip.conf.sample | 53 +-------- ...c7ea_revert_d5122576cca8_add_transport_.py | 22 ++++ include/asterisk/res_pjs...
CWE-303: Incorrect Implementation of Authentication Algorithm
PYSEC-2021-244
null
[ { "commit_message": "[PATCH] Fix OOB issue with `tf.raw_ops.SparseSparseMinimum`. PiperOrigin-RevId: 371005787 Change-Id: Ib686ccc077836e8b980b8b5a03936d36a8ecaf71 tensorflow/core/kernels/sparse_sparse_binary_op_shared.cc | 5 +++++ 1 file changed, 5 insertions(+)", "patch_text_b64": "RnJvbSBiYTY4MjJiZDdiNzM...
null
CVE-2022-24761
HTTP Request Smuggling in waitress
Waitress is a Web Server Gateway Interface server for Python 2 and 3. When using Waitress versions 2.1.0 and prior behind a proxy that does not properly validate the incoming HTTP request matches the RFC7230 standard, Waitress and the frontend proxy may disagree on where one request starts and where it ends. This would allow requests to be smuggled via the front-end proxy to waitress and later behavior. There are two classes of vulnerability that may lead to request smuggling that are addressed by this advisory: The use of Python's `int()` to parse strings into integers, leading to `+10` to be parsed as `10`, or `0x01` to be parsed as `1`, where as the standard specifies that the string should contain only digits or hex digits; and Waitress does not support chunk extensions, however it was discarding them without validating that they did not contain illegal characters. This vulnerability has been patched in Waitress 2.1.1. A workaround is available. When deploying a proxy in front of waitress, turning on any and all functionality to make sure that the request matches the RFC7230 standard. Certain proxy servers may not have this functionality though and users are encouraged to upgrade to the latest version of waitress instead.
[ { "commit_message": "[PATCH 1/7] Add new regular expressions for Chunked Encoding This also moves some regular expressions for QUOTED_PAIR/QUOTED_STRING into this module from utilities so that they may be reused. src/waitress/rfc7230.py | 27 ++++++++++++++++++++++++++- src/waitress/utilities.py | 28 +++------...
CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')
PYSEC-2022-162
null
[ { "commit_message": "[PATCH] vcs: Improve mercurial parameters handling Make sure that all user provided input is handled as expected. weblate/vcs/mercurial.py | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-)", "patch_text_b64": "RnJvbSAzNWQ1OWYxZjA0MDU0MWMzNThjZWNlMGE4ZDRhNjMxODNjYTkxOWI4IE1vbi...
null
CVE-2021-21243
Pre-Auth Unsafe Deserialization on KubernetesResource
OneDev is an all-in-one devops platform. In OneDev before version 4.0.3, a Kubernetes REST endpoint exposes two methods that deserialize untrusted data from the request body. These endpoints do not enforce any authentication or authorization checks. This issue may lead to pre-auth RCE. This issue was fixed in 4.0.3 by not using deserialization at KubernetesResource side.
[ { "commit_message": "[PATCH] Do not deserialize data from job nodes in Kubernetes resource to avoid security vulnerability pom.xml | 4 ++-- server-core/pom.xml | 2 +- server-plugin/pom.xml | 2 +- server-plugin/se...
CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
GHSA-cvx7-x8pj-x2gw
CoreDNS Vulnerable to DoQ Memory Exhaustion via Stream Amplification
null
[ { "commit_message": "[PATCH] feat: limit concurrent DoQ streams and goroutines (#7296) core/dnsserver/config.go | 8 ++ core/dnsserver/server_quic.go | 49 +++++-- core/dnsserver/zdirectives.go | 1 + core/plugin/zplugin.go | 1 + man/coredns-quic.7 | 69 ++++++++++ plugin.cfg ...
null
CVE-2022-42895
Info Leak in l2cap_core in the Linux Kernel
There is an infoleak vulnerability in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_parse_conf_req function which can be used to leak kernel pointers remotely. We recommend upgrading past commit  https://github.com/torvalds/linux/commit/b1a2cd50c0357f243b7435a732b4e62ba3157a2e https://www.google.com/url
[ { "commit_message": "[PATCH] Bluetooth: L2CAP: Fix attempting to access uninitialized memory MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit On l2cap_parse_conf_req the variable efs is only initialized if remote_efs has been set. CVE: CVE-2022-42895 CC: stable@vger.kern...
CWE-824 Access of Uninitialized Pointer
CVE-2015-1039
Cross-site scripting (XSS) vulnerability in user/login.phtml in ZF-Commons ZfcUser before 1.2.2 allows remote attackers to inject arbitrary web script or HTML via the redirect parameter.
[ { "commit_message": "[PATCH] Fix XSS vulnerability view/zfc-user/user/login.phtml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBiYWYwZTQ2MDc5NmVhOTJmNmM5MDJmYTliMDA3MTkwYmNjZmYyYjhmIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBEYW5pZWxzczg5IDxEYW5pZWxzczg5QGdtYWlsLmNvbT4KRGF0...
n/a
GHSA-f2g6-6jfq-w6cj
null
[ { "commit_message": "[PATCH] xss fix from Steven Chamberlain lib/Smokeping.pm | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSBiYWQ5ZjljMjhmMDkzOWIyNjlmOTAwNzJhYTRjZjQxZjIwZjE1NTYzIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBUb2JpYXMgT2V0aWtlciA8dG9iaUBvZXRpa2VyLmNoPgpEYXR...
null
GHSA-mv89-p3h4-x57h
null
[ { "commit_message": "[PATCH] [FIX] 0027430 Modules/File/classes/class.ilObjFileGUI.php | 13 +++---------- Services/Utilities/classes/class.ilFileUtils.php | 2 +- lang/ilias_de.lang | 3 ++- lang/ilias_en.lang | 1 + 4 files changed, 7 insertions(...
null
CVE-2022-0932
Missing Authorization in saleor/saleor
Missing Authorization in GitHub repository saleor/saleor prior to 3.1.2.
[ { "commit_message": "[PATCH] Require manage orders for fetching `user.orders` (#9128) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit * Require manage orders for fetching customer.orders * Update changelog Co-authored-by: Marcin Gębala <5421321+maarcingebala@users.norep...
CWE-862 Missing Authorization
CVE-2012-10007
madgicweb BuddyStream Plugin ShareBox.php cross site scripting
A vulnerability was found in madgicweb BuddyStream Plugin up to 3.2.7 on WordPress. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file ShareBox.php. The manipulation of the argument content/link/shares leads to cross site scripting. The attack can be launched remotely. Upgrading to version 3.2.8 is able to address this issue. The patch is named 7d5b9a89a27711aad76fd55ab4cc4185b545a1d0. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-221479.
[ { "commit_message": "[PATCH] fixed vulnerability git-svn-id: https://plugins.svn.wordpress.org/buddystream/trunk@634128 b8457f37-d9ea-0310-8a92-e5e31aec5664 buddystream.php | 4 ++-- extensions/default/templates/ShareBox.php | 10 +++++----- readme.txt | ...
CWE-79 Cross Site Scripting
CVE-2019-11514
User/Command/ConfirmEmailHandler.php in Flarum before 0.1.0-beta.8 mishandles invalidation of user email tokens.
[ { "commit_message": "[PATCH] Always invalidate all user email tokens Reported by B. Dhiyaneshwaran of Geek Freak. src/User/Command/ConfirmEmailHandler.php | 3 ++- src/User/User.php | 10 ++++++++++ 2 files changed, 12 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA2NjYwN2E1N...
n/a
GHSA-9m5p-c77c-f9j7
DoS in Cilium agent DNS proxy from crafted DNS responses
null
[ { "commit_message": "[PATCH] dnsproxy: bail when extracting info from DNS fails The comment asserted that it's okay to fail to extract information from the DNS query/response. I don't think that's true, since based on the qname and the responseIPs we do policy enforcement. I don't think this happens often, but ...
null
CVE-2019-15140
coders/mat.c in ImageMagick 7.0.8-43 Q16 allows remote attackers to cause a denial of service (use-after-free and application crash) or possibly have unspecified other impact by crafting a Matlab image file that is mishandled in ReadImage in MagickCore/constitute.c.
[ { "commit_message": "[PATCH] https://github.com/ImageMagick/ImageMagick/issues/1554 coders/mat.c | 8 +++++--- 1 file changed, 5 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSBmNzIwNjYxOGQyN2MyZTY5ZDk3N2FiZjQwZTMwMzVhMzNlNWY2YmUwIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBDcmlzdHkgPG1pa2F5bGEtZ3JhY...
n/a
GHSA-qhx6-hpfj-8m4g
null
[ { "commit_message": "[PATCH] [3.12] gh-119342: Fix a potential denial of service in plistlib (GH-119343) (#142149) Reading a specially prepared small Plist file could cause OOM because file's read(n) preallocates a bytes object for reading the specified amount of data. Now plistlib reads large data by chunks, t...
null
CVE-2024-29192
GHSL-2023-206 gotortc Cross-Site Request Forgery vulnerability
gotortc is a camera streaming application. Versions 1.8.5 and prior are vulnerable to Cross-Site Request Forgery. The `/api/config` endpoint allows one to modify the existing configuration with user-supplied values. While the API is only allowing localhost to interact without authentication, an attacker may be able to achieve that depending on how go2rtc is set up on the upstream application, and given that this endpoint is not protected against CSRF, it allows requests from any origin (e.g. a "drive-by" attack) . The `exec` handler allows for any stream to execute arbitrary commands. An attacker may add a custom stream through `api/config`, which may lead to arbitrary command execution. In the event of a victim visiting the server in question, their browser will execute the requests against the go2rtc instance. Commit 8793c3636493c5efdda08f3b5ed5c6e1ea594fd9 adds a warning about secure API access.
[ { "commit_message": "[PATCH] Add warning about secure access for API to docs README.md | 2 ++ 1 file changed, 2 insertions(+)", "patch_text_b64": "RnJvbSA4NzkzYzM2MzY0OTNjNWVmZGRhMDhmM2I1ZWQ1YzZlMWVhNTk0ZmQ5IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBBbGV4IFggPGFsZXhleS5raGl0QGdtYWlsLmNvbT4KRGF0ZTogVGh1LCAxM...
CWE-352: Cross-Site Request Forgery (CSRF)
GHSA-vc3v-ppc7-v486
vantage6-server node accepts non-whitelisted algorithms from malicious server
null
[ { "commit_message": "[PATCH] Remove lines that skip checking if algorithm is allowed when parent id is set This is a security vulnerability when the server is adapted to set a parent_id for each task. In such cases, any algorithm image would be run vantage6-node/vantage6/node/docker/docker_manager.py | 5 ----- ...
null
CVE-2018-8795
rdesktop versions up to and including v1.8.3 contain an Integer Overflow that leads to a Heap-Based Buffer Overflow in function process_bitmap_updates() and results in a memory corruption and probably even a remote code execution.
[ { "commit_message": "[PATCH] Malicious RDP server security fixes This commit includes fixes for a set of 21 vulnerabilities in rdesktop when a malicious RDP server is used. All vulnerabilities was identified and reported by Eyal Itkin. * Add rdp_protocol_error function that is used in several fixes * Refactor o...
CWE-680: Integer Overflow to Buffer Overflow
CVE-2024-39690
Capsule tenant owner with "patch namespace" permission can hijack system namespaces
Capsule is a multi-tenancy and policy-based framework for Kubernetes. In Capsule v0.7.0 and earlier, the tenant-owner can patch any arbitrary namespace that has not been taken over by a tenant (i.e., namespaces without the ownerReference field), thereby gaining control of that namespace. Version 0.7.1 contains a patch.
[ { "commit_message": "[PATCH] Merge commit from fork MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Signed-off-by: Oliver Bähler <oliverbaehler@hotmail.com> .../templates/configuration-default.yaml | 3 +- e2e/namespace_hijacking_test.go | 119 ++++++...
CWE-863: Incorrect Authorization
GHSA-2m39-62fm-q8r3
Regular Expression Denial of Service in sshpk
null
[ { "commit_message": "[PATCH] joyent/node-sshpk#44 Performance issues parsing long SSH public keys Reviewed by: Cody Peter Mello <cody.mello@joyent.com> lib/formats/ssh.js | 6 +++--- package.json | 2 +- test/horrors.js | 24 ++++++++++++++++++++++++ 3 files changed, 28 insertions(+), 4 deletions(-)", ...
null
GHSA-6fvq-23cw-5628
vLLM: Resource-Exhaustion (DoS) through Malicious Jinja Template in OpenAI-Compatible Server
null
[ { "commit_message": "[PATCH] Add filtering for chat template kwargs (#25794) Signed-off-by: Isotr0py <mozf@mail2.sysu.edu.cn> Co-authored-by: Isotr0py <mozf@mail2.sysu.edu.cn> tests/entrypoints/test_chat_utils.py | 85 +++++++++++++++++++++++++ vllm/entrypoints/chat_utils.py | 54 +++++++++++++++- vll...
null
GHSA-h93h-48cq-mpcw
null
[ { "commit_message": "[PATCH] issue #30 issue #31 issue #32: no multiple format chunks in WAV or W64 cli/riff.c | 7 ++++++- cli/wave64.c | 6 ++++++ 2 files changed, 12 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAyNmNiNDdmOTlkNDgxYWQ5YjkzZWVmZjgwZDI2ZTZiNjNiYmQ3ZTE1IE1vbiBTZXAgMTcgMDA6MDA6MDAgM...
null
CVE-2023-3521
Cross-site Scripting (XSS) - Reflected in fossbilling/fossbilling
Cross-site Scripting (XSS) - Reflected in GitHub repository fossbilling/fossbilling prior to 0.5.4.
[ { "commit_message": "[PATCH] Prevent exceptions from being interpreted as HTML (#1394) src/library/FOSSBilling/ErrorPage.php | 2 +- src/load.php | 9 +++++---- 2 files changed, 6 insertions(+), 5 deletions(-)", "patch_text_b64": "RnJvbSA1ZWI1MTZkNGViY2I3NjRkYjFiMmVkZjljOGQwNTM5ZTc2ZW...
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
GHSA-qppg-v75c-r5ff
S3Scanner allows Directory Traversal
null
[ { "commit_message": "[PATCH 1/4] Verify object will land in output dir when downloading S3Scanner/S3Service.py | 25 ++++++++++++++++++++++--- 1 file changed, 22 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSBmMDNjOGVlNjY3M2I2ZDUzMzViOGJlMjM1NGE2MTFkNWJlNDA3ZjRjIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpG...
null
GHSA-8gvg-8vhf-h26g
Out-of-bounds write
null
[ { "commit_message": "[PATCH] [CVE-2019-0937] lib/Runtime/ByteCode/ByteCodeEmitter.cpp | 10 ++++++++++ 1 file changed, 10 insertions(+)", "patch_text_b64": "RnJvbSA3ODI3ZTExNzc1MzA1MmQ0NzlmYWJlMTlhMjVjZmVjZTg4MDU5YmNhIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBQYXVsIExlYXRoZXJzIDxwbGVhdGhAbWljcm9zb2Z0LmNvbT4K...
null
CVE-2015-10127
PlusCaptcha Plugin cross site scripting
A vulnerability was found in PlusCaptcha Plugin up to 2.0.6 on WordPress and classified as problematic. Affected by this issue is some unknown functionality. The manipulation leads to cross site scripting. The attack may be launched remotely. Upgrading to version 2.0.14 is able to address this issue. The patch is identified as 1274afc635170daafd38306487b6bb8a01f78ecd. It is recommended to upgrade the affected component. VDB-248954 is the identifier assigned to this vulnerability.
[ { "commit_message": "[PATCH] Solver XSS git-svn-id: https://plugins.svn.wordpress.org/pluscaptcha/trunk@1094241 b8457f37-d9ea-0310-8a92-e5e31aec5664 PlusCaptcha.php | 14 +++- external/comment-form-inline-errors.php | 4 +- library/admin.php | 90 +++++++++++++-------...
CWE-79 Cross Site Scripting
CVE-2015-4715
The fetch function in OAuth/Curl.php in Dropbox-PHP, as used in ownCloud Server before 6.0.8, 7.x before 7.0.6, and 8.x before 8.0.4 when an external Dropbox storage has been mounted, allows remote administrators of Dropbox.com to read arbitrary files via an @ (at sign) character in unspecified POST values.
[ { "commit_message": "[PATCH] Revert custom patch that can cause problems apps/files_external/3rdparty/Dropbox/OAuth/Curl.php | 10 ++++++++-- 1 file changed, 8 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSBiZjBmMWE1MDkyNmE3NWEyNmE0MmEzZGE0ZDYyZTg0YTQ4OWVlNzdhIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm...
n/a
GHSA-5w4j-f78p-4wh9
Libcontainer is affected by capabilities elevation similar to GHSA-f3fp-gc8g-vw66
null
[ { "commit_message": "[PATCH] Merge commit from fork * fix the way we set capapbilities on tenant container Signed-off-by: Yashodhan Joshi <yjdoc2@gmail.com> * add tests and extract a function Signed-off-by: Yashodhan Joshi <yjdoc2@gmail.com> * fix: format and typo fix Signed-off-by: Yashodhan Joshi <yjdoc2@gmai...
null
CVE-2025-32969
org.xwiki.platform:xwiki-platform-rest-server allows SQL injection in query endpoint of REST API
XWiki is a generic wiki platform. In versions starting from 1.8 and prior to 15.10.16, 16.4.6, and 16.10.1, it is possible for a remote unauthenticated user to escape from the HQL execution context and perform a blind SQL injection to execute arbitrary SQL statements on the database backend, including when "Prevent unregistered users from viewing pages, regardless of the page rights" and "Prevent unregistered users from editing pages, regardless of the page rights" options are enabled. Depending on the used database backend, the attacker may be able to not only obtain confidential information such as password hashes from the database, but also execute UPDATE/INSERT/DELETE queries. This issue has been patched in versions 16.10.1, 16.4.6 and 15.10.16. There is no known workaround, other than upgrading XWiki.
[ { "commit_message": "[PATCH] XWIKI-22718, XWIKI-22691: Improve query validation .../hibernate/query/HqlQueryExecutor.java | 36 +++++++++++++------ .../hibernate/query/HqlQueryUtilsTest.java | 2 ++ .../hibernate/query/HqlQueryExecutorTest.java | 11 +++--- .../search/AbstractDatabaseSearchSource.java | ...
CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
GHSA-2xpp-rgp2-5r6f
null
[ { "commit_message": "[PATCH] update controller/generalization_controller.go | 2 +- controller/sys_dict_controller.go | 14 ++++++- controller/sys_menu_controller.go | 12 +++++- controller/sys_table_controller.go | 53 ++++++++++++++++++++++--- controller/sys_user_controller.go | 12 +++++- ...
null
CVE-2020-15203
Denial of Service in Tensorflow
In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, by controlling the `fill` argument of tf.strings.as_string, a malicious attacker is able to trigger a format string vulnerability due to the way the internal format use in a `printf` call is constructed. This may result in segmentation fault. The issue is patched in commit 33be22c65d86256e6826666662e40dbdfe70ee83, and is released in TensorFlow versions 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.
[ { "commit_message": "[PATCH] Prevent format string vulnerability in `tf.strings.as_string`. The `printf` format specifier only allows `#`, `0`, `-`, `+` and space as flag characters. Others are interpreted as width/precision/length modifier or conversion specifiers. If a character does not fit into any of these...
{"CWE-20":"Improper Input Validation"}
CVE-2021-46876
An issue was discovered in eZ Publish Ibexa Kernel before 7.5.15.1. The /user/sessions endpoint can be abused to determine account existence.
[ { "commit_message": "[PATCH] Merge pull request from GHSA-gmrf-99gw-vvwj Co-authored-by: Bartek Wajda <bartlomiej.wajda@ibexa.co> .../Resources/config/default_settings.yml | 4 ++++ .../Resources/config/security.yml | 2 ++ .../Server/Controller/SessionController.php | 2 +- .../Server/Securit...
n/a
CVE-2026-22705
RustCrypto: Signatures has timing side-channel in ML-DSA decomposition
RustCrypto: Signatures offers support for digital signatures, which provide authentication of data using public-key cryptography. Prior to version 0.1.0-rc.2, a timing side-channel was discovered in the Decompose algorithm which is used during ML-DSA signing to generate hints for the signature. This issue has been patched in version 0.1.0-rc.2.
[ { "commit_message": "[PATCH] ml-dsa: use Barrett reduction instead of integer division to prevent side-channels (#1144) ml-dsa/src/algebra.rs | 52 ++++++++++++++++++++++- ml-dsa/src/ntt.rs | 99 ++++++++++++++++++++++++++++++------------- 2 files changed, 119 insertions(+), 32 deletions(-)", "patch_text_...
CWE-1240: Use of a Cryptographic Primitive with a Risky Implementation
CVE-2022-39387
XWiki OIDC Authenticator vulnerable to OpenID login bypass due to improper authentication
XWiki OIDC has various tools to manipulate OpenID Connect protocol in XWiki. Prior to version 1.29.1, even if a wiki has an OpenID provider configured through its xwiki.properties, it is possible to provide a third party provider its details through request parameters. One can then bypass the XWiki authentication altogether by specifying its own provider through the oidc.endpoint.* request parameters (or by using an XWiki-based OpenID provider with oidc.xwikiprovider. With the same approach, one could also provide a specific group mapping through oidc.groups.mapping that would make his user automatically part of the XWikiAdminGroup. This issue has been patched, please upgrade to 1.29.1. There is no workaround, an upgrade of the authenticator is required.
[ { "commit_message": "[PATCH] OIDC-118: Fix bad handling of request parameters .../internal/OIDCClientConfiguration.java | 42 +++++++++------ .../internal/OIDCClientConfigurationTest.java | 52 +++++++++++++++++++ 2 files changed, 79 insertions(+), 15 deletions(-)", "patch_text_b64": "RnJvbSAwMjQ3YWYxNDE3...
CWE-287: Improper Authentication
CVE-2024-51498
[@imput/cobalt-web] Cross-site Scripting when downloading picker image from malicious instance
cobalt is a media downloader that doesn't piss you off. A malicious cobalt instance could serve links with the `javascript:` protocol, resulting in Cross-site Scripting (XSS) when the user tries to download an item from a picker. This issue has been present since commit `66bac03e`, was mitigated in commit `97977efa` (correctly configured web instances were no longer vulnerable) and fully fixed in commit `c4be1d3a` (included in release version 10.2.1). Users are advised to upgrade. Users unable to upgrade should enable a content-security-policy.
[ { "commit_message": "[PATCH] web/dialogs: add picker dialog & clean up small dialog web/i18n/en/a11y/dialog.json | 3 + web/i18n/en/dialog.json | 9 +- .../dialog/DialogBackdropClose.svelte | 18 ++ .../components/dialog/DialogButtons.svelte | 61 +++++ web/sr...
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
GHSA-2vv7-7crh-jr74
null
[ { "commit_message": "[PATCH] ALSA: control: Fix replacing user controls There are two issues with the current implementation for replacing user controls. The first is that the code does not check if the control is actually a user control and neither does it check if the control is owned by the process that trie...
null
GHSA-r78q-qgx6-64pp
Memory usage graphs accessible to anyone with Overall/Read
null
[ { "commit_message": "[PATCH] [SECURITY-1650] core/src/main/java/hudson/diagnosis/MemoryUsageMonitor.java | 2 ++ 1 file changed, 2 insertions(+)", "patch_text_b64": "RnJvbSA3ZDQ0ODM2ZmFkMGY0OTM0MWFlMmE2MWRlMDZkYmI1NTYwMTRhMmRmIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBEYW5pZWwgQmVjayA8ZGFuaWVsLWJlY2tAdXNlcnM...
null
CVE-2023-42465
Sudo before 1.9.15 might allow row hammer attacks (for authentication bypass or privilege escalation) because application logic sometimes is based on not equaling an error value (instead of equaling a success value), and because the values do not resist flips of a single bit.
[ { "commit_message": "[PATCH] Try to make sudo less vulnerable to ROWHAMMER attacks. We now use ROWHAMMER-resistent values for ALLOW, DENY, AUTH_SUCCESS, AUTH_FAILURE, AUTH_ERROR and AUTH_NONINTERACTIVE. In addition, we explicitly test for expected values instead of using a negated test against an error value. ...
n/a
GHSA-85ch-44w7-rf32
TYPO3 Cross-Site Scripting in Fluid ViewHelpers
null
[ { "commit_message": "[PATCH] [SECURITY] XSS issues in Fluid view helpers * HtmlentitiesViewHelper * UrlencodeViewHelper * StripTagsViewHelper Resolves: #85764 Releases: master, 9.5, 8.7 Security-Commit: 27d959e4dfcfb4b4b9c395d1fb619c8fe4d9f4cd Security-Bulletin: TYPO3-CORE-SA-2019-005 Change-Id: If22e4a4959ee67...
null
GHSA-q95w-c7qg-hrff
Django vulnerable to partial directory traversal via archives
null
[ { "commit_message": "[PATCH] Added CVE-2025-59681 and CVE-2025-59682 to security archive. docs/releases/security.txt | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+)", "patch_text_b64": "RnJvbSA0M2Q4NGFlZjA0YTllNzExNjRjMjFhNzQ4ODU5OTY5ODE4NTdlNjZlIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBKYWN...
null
CVE-2025-43973
An issue was discovered in GoBGP before 3.35.0. pkg/packet/rtr/rtr.go does not verify that the input length corresponds to a situation in which all bytes are available for an RTR message.
[ { "commit_message": "[PATCH] pkg/packet/rtr: fix parser to check the input length pkg/packet/rtr/rtr.go | 3 +++ 1 file changed, 3 insertions(+)", "patch_text_b64": "RnJvbSA1NjkzYzU4YTQ4MTVjYzYzMjdiOGQzYjY5ODBmMGU1YWNlZDI4YWJlIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBJdmFuIEdvdG92Y2hpdHMgPGl2Z0BtYXloZW0uc2V...
CWE-193 Off-by-one Error
GHSA-f8hv-rx9p-f9r4
generator-hottowel Cross-site Scripting vulnerability
null
[ { "commit_message": "[PATCH] Mitigate against reflected XSS attacks Mitigate against reflected XSS attacks in production by returning the custom 404 response object instead of express' default 404 response This was discovered using the Burp pen test tool and successfully tested by passing an arbitrary url param...
null
CVE-2022-25298
Path Traversal
This affects the package sprinfall/webcc before 0.3.0. It is possible to traverse directories to fetch arbitrary files from the server.
[ { "commit_message": "[PATCH] fix static file serving security issue; fix url path encoding issue examples/CMakeLists.txt | 2 +- examples/encoding.cc | 60 -------------------------- examples/encoding.h | 12 ------ examples/url_unicode.cc | Bin 1244 -> 1256 bytes webcc/body.cc | 2 +- webcc/...
Path Traversal
CVE-2025-65091
XWiki Full Calendar Macro vulnerable to SQL injection through Calendar.JSONService
XWiki Full Calendar Macro displays objects from the wiki on the calendar. Prior to version 2.4.5, users with the right to view the Calendar.JSONService page (including guest users) can exploit a SQL injection vulnerability by accessing database info or starting a DoS attack. This issue has been patched in version 2.4.5.
[ { "commit_message": "[PATCH] Merge commit from fork * security fix * security fix * security fix * security fix * security fix .../src/main/resources/Calendar/JSONService.xml | 12 ++++-------- 1 file changed, 4 insertions(+), 8 deletions(-)", "patch_text_b64": "RnJvbSA1ZmRjZjA2YTA1MDE1Nzg2NDkyZmRhNjliN...
CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
GHSA-fpgg-qjcj-58g7
null
[ { "commit_message": "[PATCH] dont allow directory traversal #2 src/node/utils/Minify.js | 1 - 1 file changed, 1 deletion(-)", "patch_text_b64": "RnJvbSAwZmE3NjUwZGY4Zjk0MGVkNmI1NzdkNzk4MzZhNzhlYjA5NzI2YzRiIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBsb3VpcyA8bG91aXNAc3lzdGVtbGkub3JnPgpEYXRlOiBTdW4sIDEyIEFwciA...
null
CVE-2019-13275
An issue was discovered in the VeronaLabs wp-statistics plugin before 12.6.7 for WordPress. The v1/hit endpoint of the API, when the non-default "use cache plugin" setting is enabled, is vulnerable to unauthenticated blind SQL Injection.
[ { "commit_message": "[PATCH] Check Prepare Parameter in CURD wpdb #286 includes/class-wp-statistics-pages.php | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSBiZDQ2NzIxYjk3Nzk0YTFiMTUyMGUyNGZmNTAyM2I2ZGE3MzhkZDc1IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBNZWhyc2hhZCBEYXJ6...
n/a
CVE-2023-1067
Cross-site Scripting (XSS) - Stored in pimcore/pimcore
Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.5.18.
[ { "commit_message": "[PATCH] [Task] Improve GDPR email search (#14410) * improved email in toolbar * added validator to email search input .../js/pimcore/settings/gdpr/dataproviders/sentMail.js | 2 +- .../public/js/pimcore/settings/gdpr/gdprPanel.js | 9 ++++++++- 2 files changed, 9 insertions(+), 2 de...
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
GHSA-wfcc-pff6-rgc5
Jetty vulnerable to exposure of sensitive information due to observable discrepancy
null
[ { "commit_message": "[PATCH] Fixes #1556 - A timing channel in Password.java. .../jaspi/modules/DigestAuthModule.java | 3 +- .../authentication/DigestAuthenticator.java | 2 +- .../jetty/util/security/Credential.java | 57 ++++++++++++++----- .../eclipse/jetty/util/security/Password.java | 25 ++++...
null
CVE-2018-14016
The r_bin_mdmp_init_directory_entry function in mdmp.c in radare2 2.7.0 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted Mini Crash Dump file.
[ { "commit_message": "[PATCH] Fix #10464 - oobread crash in mdmp (#10683) libr/bin/format/mdmp/mdmp.c | 15 ++++++++------- 1 file changed, 8 insertions(+), 7 deletions(-)", "patch_text_b64": "RnJvbSBlYjdkZWIyODFkZjU0NzcxZmI4ZWNmNTg5MGRjMzI1YTdkMjJkM2UyIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiByYWRhcmUgPHBhb...
n/a
CVE-2023-4750
Use After Free in vim/vim
Use After Free in GitHub repository vim/vim prior to 9.0.1857.
[ { "commit_message": "[PATCH] patch 9.0.1857: [security] heap-use-after-free in is_qf_win() Problem: heap-use-after-free in is_qf_win() Solution: Check buffer is valid before accessing it Signed-off-by: Christian Brabandt <cb@256bit.org> src/main.c | 2 +- src/quickfix.c ...
CWE-416 Use After Free
CVE-2016-15010
University of Cambridge django-ucamlookup Lookup cross site scripting
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as problematic was found in University of Cambridge django-ucamlookup up to 1.9.1. Affected by this vulnerability is an unknown functionality of the component Lookup Handler. The manipulation leads to cross site scripting. The attack can be launched remotely. Upgrading to version 1.9.2 is able to address this issue. The identifier of the patch is 5e25e4765637ea4b9e0bf5fcd5e9a922abee7eb3. It is recommended to upgrade the affected component. The identifier VDB-217441 was assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
[ { "commit_message": "[PATCH] Fix lack of escaping (and so XSS vuln.) in select2 calls The invocation of Jquery select2 to provide searchable dropdowns didn't sanitise data coming fom lookup, with the result that any HTML markup it contained, including <script>...</script>, was interpreted. The documentation is ...
CWE-79 Cross Site Scripting
GHSA-3jh2-wmv7-m932
LibreNMS stored Cross-site Scripting via Schedule Maintenance `Title` parameter
null
[ { "commit_message": "[PATCH] Fix scheduled maintenance xss (#14360) Fix for fields title, notes, and maybe recurring_day. Other fields can't store html. https://huntr.dev/bounties/bcb6ee68-1452-4fdb-932a-f1031d10984f/ app/Http/Controllers/Table/AlertScheduleController.php | 6 +++--- 1 file changed, 3 insertions...
null
GHSA-8cxx-7fx3-j6xj
null
[ { "commit_message": "[PATCH] Fix for #519 #520 #521 plugins/codecs/zfp/blosc2-zfp.c | 6 ++++++ 1 file changed, 6 insertions(+)", "patch_text_b64": "RnJvbSA0MjVlOGE5YTU5ZDQ5Mzc4ZDU3ZTIxMTZiNmM5YjAxOTBhNTk4NmY1IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBNYXJ0YSBJYm9ycmEgPG1hcnRhaWJvcnJhMjRAZ21haWwuY29tPgpEYXRl...
null
GHSA-6673-4983-2vx5
fonttools XML External Entity Injection (XXE) Vulnerability
null
[ { "commit_message": "[PATCH] subset: parse OT-SVG with resolve_entities=False to guard against XXE attacks as recommended in https://codeql.github.com/codeql-query-help/python/py-xxe/ Lib/fontTools/subset/svg.py | 3 +++ 1 file changed, 3 insertions(+)", "patch_text_b64": "RnJvbSA5ZjYxMjcxZGMxY2E4MmVkOTFmNTI...
null
CVE-2021-29549
Division by 0 in `QuantizedAdd`
TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a runtime division by zero error and denial of service in `tf.raw_ops.QuantizedBatchNormWithGlobalNormalization`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/6f26b3f3418201479c264f2a02000880d8df151c/tensorflow/core/kernels/quantized_add_op.cc#L289-L295) computes a modulo operation without validating that the divisor is not zero. Since `vector_num_elements` is determined based on input shapes(https://github.com/tensorflow/tensorflow/blob/6f26b3f3418201479c264f2a02000880d8df151c/tensorflow/core/kernels/quantized_add_op.cc#L522-L544), a user can trigger scenarios where this quantity is 0. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
[ { "commit_message": "[PATCH] Validate work in `QuantizedAdd`, ensure at least one element. PiperOrigin-RevId: 370127996 Change-Id: I57c6f3e01afdeada84737820a131590137463855 tensorflow/core/kernels/quantized_add_op.cc | 2 ++ 1 file changed, 2 insertions(+)", "patch_text_b64": "RnJvbSA3NDQwMDljOWU1Y2M1ZDA0NDd...
CWE-369: Divide By Zero
CVE-2020-23915
An issue was discovered in cpp-peglib through v0.1.12. peg::resolve_escape_sequence() in peglib.h has a heap-based buffer over-read.
[ { "commit_message": "[PATCH] Fix #122 peglib.h | 6 +++--- test/test1.cc | 11 +++++++++++ 2 files changed, 14 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSBiM2IyOWNlOGYzYWNmM2EzMjczM2Q5MzAxMDVhMTdkN2IwYmEzNDdlIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiB5aGlyb3NlIDx5dWppLmhpcm9zZS5idWdAZ21haW...
n/a
CVE-2024-4030
tempfile.mkdtemp() may be readable and writeable by all users on Windows
On Windows a directory returned by tempfile.mkdtemp() would not always have permissions set to restrict reading and writing to the temporary directory by other users, instead usually inheriting the correct permissions from the default location. Alternate configurations or users without a profile directory may not have the intended permissions. If you’re not using Windows or haven’t changed the temporary directory location then you aren’t affected by this vulnerability. On other platforms the returned directory is consistently readable and writable only by the current user. This issue was caused by Python not supporting Unix permissions on Windows. The fix adds support for Unix “700” for the mkdir function on Windows which is used by mkdtemp() to ensure the newly created directory has the proper permissions.
[ { "commit_message": "[PATCH] gh-118486: Support mkdir(mode=0o700) on Windows (GH-118488) Doc/library/os.rst | 7 + Lib/test/test_os.py | 19 +++ Lib/test/test_tempfile.py | 28 ++++ ...-05-01-20-57-09.gh-issue-118486.K44KJG.rst | 2 + Mo...
CWE-276 Incorrect Default Permissions
CVE-2025-67724
Tornado vulnerable to Header Injection and XSS via reason argument
Tornado is a Python web framework and asynchronous networking library. In versions 6.5.2 and below, the supplied reason phrase is used unescaped in HTTP headers (where it could be used for header injection) or in HTML in the default error page (where it could be used for XSS) and can be exploited by passing untrusted or malicious data into the reason argument. Used by both RequestHandler.set_status and tornado.web.HTTPError, the argument is designed to allow applications to pass custom "reason" phrases (the "Not Found" in HTTP/1.1 404 Not Found) to the HTTP status line (mainly for non-standard status codes). This issue is fixed in version 6.5.3.
[ { "commit_message": "[PATCH] web: Harden against invalid HTTP reason phrases We allow applications to set custom reason phrases for the HTTP status line (to support custom status codes), but if this were exposed to untrusted data it could be exploited in various ways. This commit guards against invalid reason p...
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2016-6271
The Bzrtp library (aka libbzrtp) 1.0.x before 1.0.4 allows man-in-the-middle attackers to conduct spoofing attacks by leveraging a missing HVI check on DHPart2 packet reception.
[ { "commit_message": "[PATCH] Add ZRTP Commit packet hvi check on DHPart2 packet reception include/packetParser.h | 1 + src/packetParser.c | 28 ++++++++++++++++++++++- test/bzrtpParserTest.c | 51 ++++++++++++++++++++++++++++++++++++++++-- test/bzrtpParserTest.h | 1 + test/bzrtpTest.c | 1 + 5 files c...
n/a
CVE-2016-9387
Integer overflow in the jpc_dec_process_siz function in libjasper/jpc/jpc_dec.c in JasPer before 1.900.13 allows remote attackers to have unspecified impact via a crafted file, which triggers an assertion failure.
[ { "commit_message": "[PATCH] Fixed another integer overflow problem. src/libjasper/jpc/jpc_dec.c | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBkOTExOThhYmQwMGZjNDM1YTM5N2ZlNmJhZDkwNmE0YzE3NDhlOWNmIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBNaWNoYWVsIEFkYW1zIDxtZGFkYW1z...
n/a
PYSEC-2021-655
null
[ { "commit_message": "[PATCH] Fix heap buffer overflow caused by rounding. This was hard to fix. Due to the way we compute the pixels that influence an output pixel in resized images, for certain input configuration we might have issued a read to a pixel that is outside of boundary of the original image. This is...
null
GHSA-2cpx-427x-q2c6
CHECK-fail in AddManySparseToTensorsMap
null
[ { "commit_message": "[PATCH] Fix overflow CHECK issue with `tf.raw_ops.AddManySparseToTensorsMap`. PiperOrigin-RevId: 369492969 Change-Id: I1d70d6c0c92e3d7a25bc3b3aa2a0c0ac9688bf81 .../core/kernels/sparse_tensors_map_ops.cc | 26 ++++++++++++++----- 1 file changed, 19 insertions(+), 7 deletions(-)", "patc...
null