id stringlengths 12 19 | title stringlengths 0 237 | description stringlengths 35 3.87k ⌀ | patches listlengths 1 22 | cwe stringlengths 2 440 ⌀ |
|---|---|---|---|---|
CVE-2021-23758 | Deserialization of Untrusted Data | All versions of package ajaxpro.2 are vulnerable to Deserialization of Untrusted Data due to the possibility of deserialization of arbitrary .NET classes, which can be abused to gain remote code execution. | [
{
"commit_message": "[PATCH] added allowed customized types .gitignore | 1 + AjaxPro/AjaxPro.csproj | 13 +- AjaxPro/AjaxPro.sln | 4 +- .../AjaxSettingsSectionHandler.cs | 19 + AjaxPro/Handler/AjaxProcHelper... | Deserialization of Untrusted Data |
CVE-2022-4455 | sproctor php-calendar index.php cross site scripting | A vulnerability was identified in sproctor php-calendar up to 2.0.13. This impacts an unknown function of the file index.php. Such manipulation of the argument $_SERVER['PHP_SELF'] leads to cross site scripting. The attack may be launched remotely. The name of the patch is a2941109b42201c19733127ced763e270a357809. It is advisable to implement a patch to correct this issue. | [
{
"commit_message": "[PATCH] Attempt to mitigate reflective XSS attack index.php | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)",
"patch_text_b64": "RnJvbSBhMjk0MTEwOWI0MjIwMWMxOTczMzEyN2NlZDc2M2UyNzBhMzU3ODA5IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBTZWFuIFByb2N0b3IgPHNwcm9jdG9yQGdtYWlsLmNvbT4KR... | Cross Site Scripting |
GHSA-v5x8-2g8c-7279 | null | [
{
"commit_message": "[PATCH] Bugfix: Possible SQL injection in nat/item-add-submit.php. Fixes #2344 app/admin/nat/item-add-submit.php | 6 ++++++ misc/CHANGELOG | 1 + 2 files changed, 7 insertions(+)",
"patch_text_b64": "RnJvbSA4NTZiMTBjYTg1YTI0YzA0ZWQ4NjUxZjRlMTNmODY3ZWM3OGEzNTNkIE1vbiBTZ... | null | |
GHSA-vxwr-wpjv-qjq7 | XWiki Platform: Privilege escalation (PR) from user registration through PDFClass | null | [
{
"commit_message": "[PATCH] XWIKI-21337: Apply PDF templates with the rights of their authors (cherry picked from commit d28e21a670c69880b951e415dd2ddd69d273eae9) .../com/xpn/xwiki/pdf/impl/PdfExportImpl.java | 80 +++++--- .../xpn/xwiki/pdf/impl/PdfExportImplTest.java | 181 +++++++++++++++--- 2 files changed,... | null |
GHSA-hm2w-8xwc-gpv5 | null | [
{
"commit_message": "[PATCH] Fix invalid free in RAnal.avr libr/anal/p/anal_avr.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSAyNWEzNzAzZWYyZTAxNWJiZTFkMWYxNmY2YjJmNjNiYjEwZGQzNGY0IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBwYW5jYWtlIDxwYW5jYWtlQG5vcGNvZGUub3JnPgpEYXRlOiBX... | null | |
GHSA-9r4g-gmfh-6gxg | null | [
{
"commit_message": "[PATCH] Fix a reflected cross-site scripting vulnerability CVE-2022-1187 inc/admin.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSAyZDhjY2I3YjEyNzQyYmYxNmI1YTYwNjhmOWZkZWVhYzY5YmMxMWIxIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBwN2U0IDw0NDc1MDA4NytwN2... | null | |
CVE-2022-24976 | Atheme IRC Services before 7.2.12, when used in conjunction with InspIRCd, allows authentication bypass by ending an IRC handshake at a certain point during a challenge-response login sequence. | [
{
"commit_message": "[PATCH] saslserv/main: Track EID we're pending login to The existing model does not remember that we've sent a SVSLOGIN for a given SASL session, and simply assumes that if a client is introduced with a SASL session open, that session must have succeeded. The security of this approach requi... | n/a | |
CVE-2014-125106 | Nanopb before 0.3.1 allows size_t overflows in pb_dec_bytes and pb_dec_string. | [
{
"commit_message": "[PATCH] Protect against size_t overflows in pb_dec_bytes/pb_dec_string. Possible consequences of bug: 1) Denial of service by causing a crash Possible when all of the following apply: - Untrusted data is passed to pb_decode() - The top-level message contains a static string field as the fir... | n/a | |
GHSA-76p3-8jx3-jpfq | Prototype pollution in webpack loader-utils | null | [
{
"commit_message": "[PATCH] fix: security problem (#220) lib/parseQuery.js | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSA0NTA0ZTM0YzQ3OTZhNTgzNmVmNzA0NTgzMjczNTE2NzVhZWQ0OGE1IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBBbGV4YW5kZXIgQWthaXQgPDQ1Njc5MzQrYWxleGFuZGVyLWFrYWl0QH... | null |
GHSA-g44v-6qfm-f6ch | Answer has Guessable CAPTCHA | null | [
{
"commit_message": "[PATCH] update VerifyCaptcha internal/repo/captcha/captcha.go | 8 ++++++++ internal/service/action/captcha_service.go | 7 +++++++ 2 files changed, 15 insertions(+)",
"patch_text_b64": "RnJvbSA4MTNhZDBiOTg5NDY3M2IxYmRkNDg5YTJlOWFiNjBhNDRmZTk5MGFmIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAw... | null |
CVE-2020-36628 | Calsign APDE ZIP File CopyBuildTask.java handleExtract path traversal | A vulnerability classified as critical has been found in Calsign APDE. This affects the function handleExtract of the file APDE/src/main/java/com/calsignlabs/apde/build/dag/CopyBuildTask.java of the component ZIP File Handler. The manipulation leads to path traversal. Upgrading to version 0.5.2-pre2-alpha is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216747. | [
{
"commit_message": "[PATCH] fix zip path traversal vulnerability .../java/com/calsignlabs/apde/build/dag/CopyBuildTask.java | 4 ++++ build.gradle | 2 +- 2 files changed, 5 insertions(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSBjNmQ2NGNiZTQ2NTM0OGMxYmZkM... | CWE-22 Path Traversal |
CVE-2020-36278 | Leptonica before 1.80.0 allows a heap-based buffer over-read in findNextBorderPixel in ccbord.c. | [
{
"commit_message": "[PATCH] Issue 23433 in oss-fuzz: Heap-buffer-overflow in findNextBorderPixel() * Check pix boundary when looking for the next pixel. src/ccbord.c | 2 ++ 1 file changed, 2 insertions(+)",
"patch_text_b64": "RnJvbSA4ZDZlMTc1NTUxOGNmYjk4NTM2ZDZjM2RhZjA2MDFmMjI2ZDE2ODQyIE1vbiBTZXAgMTcgMDA6M... | n/a | |
GHSA-pw34-qf6c-84fc | phpMyAdmin XSS Vulnerability | null | [
{
"commit_message": "[PATCH] Fix XSS in DB_search.php Signed-off-by: Madhura Jayaratne <madhura.cj@gmail.com> libraries/DbSearch.class.php | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSA3NWE1NTgyNDAxMjQwNmEwOGM0ZGViZjVkZGI3YWU0MWMzMmE3ZGJjIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwM... | null |
GHSA-g4fr-ffvg-p5w6 | null | [
{
"commit_message": "[PATCH] Fix a bug in number_format() Summary: In case of error while calling snprintf, return empty string instead of malformed string. Reviewed By: binliu19 Differential Revision: D13379372 fbshipit-source-id: 1e5611598464daccc674d5a96558c9f2aee08fc8 hphp/runtime/base/zend-string.cpp ... | null | |
CVE-2022-31192 | Cross Site Scripting possible in DSpace JSPUI "Request a Copy" feature | DSpace open source software is a repository application which provides durable access to digital resources. dspace-jspui is a UI component for DSpace. The JSPUI "Request a Copy" feature does not properly escape values submitted and stored from the "Request a Copy" form. This means that item requests could be vulnerable to XSS attacks. This vulnerability only impacts the JSPUI. Users are advised to upgrade. There are no known workarounds for this vulnerability. | [
{
"commit_message": "[PATCH] [DS-4133] Improve URL handling in Controlled Vocab JSPUI servlet .../webui/servlet/ControlledVocabularyServlet.java | 12 ++++++++++-- 1 file changed, 10 insertions(+), 2 deletions(-)",
"patch_text_b64": "RnJvbSBmNzc1ODQ1N2I3ZWMzNDg5ZDUyNWUzOWFhNzUzY2M3MDgwOWQ5YWQ5IE1vbiBTZXAgM... | CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') |
CVE-2024-39305 | Envoy Proxy use after free when route hash policy is configured with cookie attributes | Envoy is a cloud-native, open source edge and service proxy. Prior to versions 1.30.4, 1.29.7, 1.28.5, and 1.27.7. Envoy references already freed memory when route hash policy is configured with cookie attributes. Note that this vulnerability has been fixed in the open as the effect would be immediately apparent if it was configured. Memory allocated for holding attribute values is freed after configuration was parsed. During request processing Envoy will attempt to copy content of de-allocated memory into request cookie header. This can lead to arbitrary content of Envoy's memory to be sent to the upstream service or abnormal process termination. This vulnerability is fixed in Envoy versions v1.30.4, v1.29.7, v1.28.5, and v1.27.7. As a workaround, do not use cookie attributes in route action hash policy. | [
{
"commit_message": "[PATCH] http: fix cookie attributes (#34885) Signed-off-by: Rama Chavali <rama.rao@salesforce.com> changelogs/current.yaml | 4 ++ source/common/http/hash_policy.cc | 14 +++++-- .../multiplexed_integration_test.cc | 39 +++++++++++++++++++ 3 files ... | CWE-416: Use After Free |
CVE-2023-41049 | Improper Neutralization of Script in Attributes in @dcl/single-sign-on-client | @dcl/single-sign-on-client is an open source npm library which deals with single sign on authentication flows. Improper input validation in the `init` function allows arbitrary javascript to be executed using the `javascript:` prefix. This vulnerability has been patched on version `0.1.0`. Users are advised to upgrade. Users unable to upgrade should limit untrusted user input to the `init` function. | [
{
"commit_message": "[PATCH] feat: verify url package-lock.json | 18 +++++++++++++++++- packages/lib/package.json | 4 +++- packages/lib/src/SingleSignOn.shared.ts | 2 +- packages/lib/src/SingleSignOn.ts | 14 ++++++++++++-- 4 files changed, 33 insertions(+), 5 deletio... | CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') |
CVE-2024-34080 | MantisBT Vulnerable to Exposure of Sensitive Information to an Unauthorized Actor | MantisBT (Mantis Bug Tracker) is an open source issue tracker. If an issue references a note that belongs to another issue that the user doesn't have access to, then it gets hyperlinked. Clicking on the link gives an access denied error as expected, yet some information remains available via the link, link label, and tooltip. This can result in disclosure of the existence of the note, the note author name, the note creation timestamp, and the issue id the note belongs to. Version 2.26.2 contains a patch for the issue. No known workarounds are available. | [
{
"commit_message": "[PATCH] Fix access level check for note links Fixes #34434 core/string_api.php | 42 +++++++++++++++++++++++++----------------- 1 file changed, 25 insertions(+), 17 deletions(-)",
"patch_text_b64": "RnJvbSAwYTUwNTYyMzY5ZDgyMzY4OWM5Yjk0NjA2NmQxZTQ5ZDNjMmRmMjI2IE1vbiBTZXAgMTcgMDA6MDA6MDAgM... | CWE-200: Exposure of Sensitive Information to an Unauthorized Actor |
GHSA-jwrv-x6rx-8vfm | Macaron i18n Open Redirect vulnerability | null | [
{
"commit_message": "<u@gogs.io> [PATCH] security: fix Open Redirection vulnerability .gitignore | 1 + go.mod | 3 +- go.sum | 13 +++- i18n.go | 18 +++-- i18n_test.go | 208 +++++++++++++++++++++++++++++---------------------- 5 files changed, 141 insertions(+), 102 deletions(-) create mod... | null |
CVE-2020-36315 | In RELIC before 2020-08-01, RSA PKCS#1 v1.5 signature forgery can occur because certain checks of the padding (and of the first two bytes) are inadequate. NOTE: this requires that a low public exponent (such as 3) is being used. The product, by default, does not generate RSA keys with such a low number. | [
{
"commit_message": "[PATCH] Fix #154 and #155 by inverting the padding check logic and being more rigorous. src/cp/relic_cp_rsa.c | 234 +++++++++++++++++++++--------------------- 1 file changed, 117 insertions(+), 117 deletions(-)",
"patch_text_b64": "RnJvbSA3NmM5YTFmZGYxOWQ5ZTkyZTU2NmE3NzM3NjY3M2U1MjJhYWU... | n/a | |
GHSA-cwx2-736x-mf6w | Prototype pollution in object-path | null | [
{
"commit_message": "[PATCH] Fix prototype pollution in set() index.js | 4 + test.js | 1480 ++++++++++++++++++++++++++++-------------------------- 2 files changed, 765 insertions(+), 719 deletions(-)",
"patch_text_b64": "RnJvbSAyYmUzMzU0YzZjNDYyMTVjNzYzNWViMWI3NmQ4MGYxMzE5NDAzYzY4IE1vbiBTZXAgMTcgMDA6MDA... | null |
PYSEC-2024-23 | null | [
{
"commit_message": "[PATCH] Validate urls in `element` and `window` endpoints Domains were previously not validated before being handled, leading to a potential scenario where someone could pass something like \"element_url=127.0.0.1:<port>/<resource>\" to access other resources on a machine running Whoogle. T... | null | |
CVE-2017-7856 | LibreOffice before 2017-03-11 has an out-of-bounds write caused by a heap-based buffer overflow in the SVMConverter::ImplConvertFromSVM1 function in vcl/source/gdi/svmconverter.cxx. | [
{
"commit_message": "[PATCH] ofz#817 nStrLen-1 changed to nStrLen-3 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit regression from... commit ff8f6629287d0d1bdbcf4f8ed16cb8d077d08c7a Author: Caolán McNamara <caolanm@redhat.com> Resolves: ofz#424 guard against broken dxa... | n/a | |
PYSEC-2021-812 | null | [
{
"commit_message": "[PATCH] Don't constant-fold DT_RESOURCE constants. PiperOrigin-RevId: 391803952 Change-Id: I0ea3ec31d3e7dfda0f03b4027a237f08d00a3091 tensorflow/core/common_runtime/constant_folding.cc | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSA3NzMxZThkZmJlNGE1Nj... | null | |
GHSA-g6hf-f9cq-q7w7 | Cross-Site Request Forgery in Spring Framework | null | [
{
"commit_message": "[PATCH] Disable ext entities in SourceHttpMessageConverter This change disables the processing of external entities in SourceHttpMessageConverter by default and provides an option to enable it if required. .../xml/SourceHttpMessageConverter.java | 152 +++++++++++++----- .../xml/Source... | null |
GHSA-pw95-88fg-3j6f | Langroid Allows XXE Injection via XMLToolMessage | null | [
{
"commit_message": "[PATCH] fix: harden table_chat_agent (eval), xml_tool_message against sec vulnerabilities langroid/agent/special/table_chat_agent.py | 6 +- langroid/agent/xml_tool_message.py | 12 +- pyproject.toml | 2 +- uv.lock | ... | null |
GHSA-cp5v-2hmc-3vjx | WSO2 is vulnerable to Open Redirect through multi-option URL in its authentication endpoint | null | [
{
"commit_message": "[PATCH] Validate multiOptionURI parameter .../pom.xml | 6 ++ .../util/AuthenticationEndpointUtil.java | 76 +++++++++++++++++++ 2 files changed, 82 insertions(+)",
"patch_text_b64": "RnJvbSA3ZGU4ZDUxM2MyOWY4MzlhOTBmM2Q0YjM3ZDc1NGIzM2ZmMTkzZDg2IE1vb... | null |
CVE-2025-66545 | Nextcloud Groupfolders users with read-only permissions for team folder can restore deleted files from trash bin | Nextcloud Groupfolders provides admin-configured folders shared by everyone in a group or team. Prior to 14.0.11, 15.3.12, 16.0.15, 17.0.14, 18.1.8, 19.1.8, and 20.1.2, a user with read-only permission can restore a file from the trash bin. This vulnerability is fixed in 14.0.11, 15.3.12, 16.0.15, 17.0.14, 18.1.8, 19.1.8, and 20.1.2. | [
{
"commit_message": "[PATCH] fix(trash): Restore from correct path Signed-off-by: provokateurin <kate@provokateurin.de> lib/Trash/TrashBackend.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSAyMTU3NzdkOTRjODg2MjI4YTk3YjAzZjMyYTJhNTZlNWZmYTM0NTgzIE1vbiBTZXAgMTcgMDA6MDA6MDA... | CWE-707: Improper Neutralization |
GHSA-85rq-hp8x-ghjq | Cross-Site Request Forgery in Jenkins Mailer Plugin | null | [
{
"commit_message": "[PATCH] [SECURITY-2163] src/main/java/hudson/tasks/Mailer.java | 4 +- .../hudson/tasks/Mailer/global.jelly | 2 +- src/test/java/hudson/tasks/MailerTest.java | 37 ++++++++++++++++++- 3 files changed, 39 insertions(+), 4 deletions(-)",
"patch_text_b64": "RnJvbSA1ZTYwN... | null |
GHSA-3qhf-m339-9g5v | MCP Python SDK vulnerability in the FastMCP Server causes validation error, leading to DoS | null | [
{
"commit_message": "[PATCH] Fix uncaught exception in MCP server (#822) src/mcp/shared/session.py | 59 ++++++--- tests/issues/test_malformed_input.py | 172 +++++++++++++++++++++++++++ 2 files changed, 212 insertions(+), 19 deletions(-) create mode 100644 tests/issues/test_malformed_input.py",
"... | null |
CVE-2023-37265 | Incorrect identification of source IP addresses in CasaOS | CasaOS is an open-source Personal Cloud system. Due to a lack of IP address verification an unauthenticated attackers can execute arbitrary commands as `root` on CasaOS instances. The problem was addressed by improving the detection of client IP addresses in `391dd7f`. This patch is part of CasaOS 0.4.4. Users should upgrade to CasaOS 0.4.4. If they can't, they should temporarily restrict access to CasaOS to untrusted users, for instance by not exposing it publicly. | [
{
"commit_message": "[PATCH] Merge pull request from GHSA-vjh7-5r6x-xh6g * fix:Incorrect identification of source IP addresses * feat: support reverse proxy * stash * stash * fix: the bug * fix: the bug * fix: the bug * fix: the bug * delete unused comment * refacotr the proccess * add comment to notice user to... | CWE-306: Missing Authentication for Critical Function |
CVE-2019-20913 | An issue was discovered in GNU LibreDWG through 0.9.3. Crafted input will lead to a heap-based buffer over-read in dwg_encode_entity in common_entity_data.spec. | [
{
"commit_message": "[PATCH] add DEBUGGING_CLASS_CPP and use it for TABLECONTENT. This is more stable than CLASS_DXF in cases when TABLE is mixed up with TABLECONTENT. See e.g. GH #178, where it fixes the heap_overflow2 case. src/classes.inc | 26 +++++++++++++++++--------- src/dec_macros.h | 4 ++-- 2 files ch... | n/a | |
GHSA-w4fh-p39j-749c | null | [
{
"commit_message": "[PATCH] fix: hide user data from comments module server/src/entities/comment.entity.ts | 2 +- server/src/services/comment.service.ts | 44 +++++++++++++++----------- 2 files changed, 27 insertions(+), 19 deletions(-)",
"patch_text_b64": "RnJvbSA0NWUwZDMzMDJkOTJkZjdkN2YyZDYwOWMzMWNlYTcx... | null | |
GHSA-c7pp-g2v2-2766 | DOM-based XSS in gmail-js | null | [
{
"commit_message": "[PATCH] Replace new Function() with JSON.parse() src/gmail.js | 23 ++++++++--------------- 1 file changed, 8 insertions(+), 15 deletions(-)",
"patch_text_b64": "RnJvbSBhODM0MzZmNDk5ZjljMDFiMDQyODBhZjk0NWE1YTgxMTM3YjZiYWYxIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiA9P1VURi04P3E/Sm9zdGVpbj... | null |
CVE-2025-52435 | Apache Mynewt NimBLE: Invalid error handling in pause encryption procedure in NimBLE controller | J2EE Misconfiguration: Data Transmission Without Encryption vulnerability in Apache NimBLE.
Improper handling of Pause Encryption procedure on Link Layer results in a previously encrypted connection being left in un-encrypted state allowing an eavesdropper to observe the remainder of the exchange.
This issue affects Apache NimBLE: through <= 1.8.0.
Users are recommended to upgrade to version 1.9.0, which fixes the issue. | [
{
"commit_message": "[PATCH] nimble/ll: Restrict allowed LL Control PDUs received This restricts allowed Control PDUs that can be received in specific encryption state. .../include/controller/ble_ll_ctrl.h | 3 +- nimble/controller/src/ble_ll_conn.c | 2 +- nimble/controller/src/ble_ll_ctrl.c... | CWE-5 J2EE Misconfiguration: Data Transmission Without Encryption |
GHSA-f554-x222-wgf7 | Command Injection in Xstream | null | [
{
"commit_message": "[PATCH] Merge security framework from HEAD into branch. git-svn-id: http://svn.codehaus.org/xstream/branches/v-1.4.x@2219 9830eeb5-ddf4-0310-9ef7-f4b9a3e3227e xstream-distribution/src/content/changes.html | 6 + xstream-distribution/src/content/faq.html | 5 +- .../src/content/securit... | null |
GHSA-8hgj-6pgq-37q3 | null | [
{
"commit_message": "[PATCH] https://bugs.launchpad.net/ubuntu/+source/imagemagick/+bug/1490362 coders/tga.c | 2 ++ 1 file changed, 2 insertions(+)",
"patch_text_b64": "RnJvbSA0ZjY4ZTk2NjE1MTg0NjNmY2E1MjNjOTcyNmJiNWQ5NDBhMmFhNmQ4IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBDcmlzdHkgPHVyYmFuLXdhcnJpb3JAaW1hZ2V... | null | |
CVE-2024-35190 | Asterisk' res_pjsip_endpoint_identifier_ip: wrongly matches ALL unauthorized SIP requests | Asterisk is an open source private branch exchange and telephony toolkit. After upgrade to 18.23.0, ALL unauthorized SIP requests are identified as PJSIP Endpoint of local asterisk server. This vulnerability is fixed in 18.23.1, 20.8.1, and 21.3.1.
| [
{
"commit_message": "[PATCH] Revert \"res_pjsip_endpoint_identifier_ip: Add endpoint identifier transport address.\" This reverts PR #602 Resolves: #GHSA-qqxj-v78h-hrf9 configs/samples/pjsip.conf.sample | 53 +-------- ...c7ea_revert_d5122576cca8_add_transport_.py | 22 ++++ include/asterisk/res_pjs... | CWE-303: Incorrect Implementation of Authentication Algorithm |
PYSEC-2021-244 | null | [
{
"commit_message": "[PATCH] Fix OOB issue with `tf.raw_ops.SparseSparseMinimum`. PiperOrigin-RevId: 371005787 Change-Id: Ib686ccc077836e8b980b8b5a03936d36a8ecaf71 tensorflow/core/kernels/sparse_sparse_binary_op_shared.cc | 5 +++++ 1 file changed, 5 insertions(+)",
"patch_text_b64": "RnJvbSBiYTY4MjJiZDdiNzM... | null | |
CVE-2022-24761 | HTTP Request Smuggling in waitress | Waitress is a Web Server Gateway Interface server for Python 2 and 3. When using Waitress versions 2.1.0 and prior behind a proxy that does not properly validate the incoming HTTP request matches the RFC7230 standard, Waitress and the frontend proxy may disagree on where one request starts and where it ends. This would allow requests to be smuggled via the front-end proxy to waitress and later behavior. There are two classes of vulnerability that may lead to request smuggling that are addressed by this advisory: The use of Python's `int()` to parse strings into integers, leading to `+10` to be parsed as `10`, or `0x01` to be parsed as `1`, where as the standard specifies that the string should contain only digits or hex digits; and Waitress does not support chunk extensions, however it was discarding them without validating that they did not contain illegal characters. This vulnerability has been patched in Waitress 2.1.1. A workaround is available. When deploying a proxy in front of waitress, turning on any and all functionality to make sure that the request matches the RFC7230 standard. Certain proxy servers may not have this functionality though and users are encouraged to upgrade to the latest version of waitress instead. | [
{
"commit_message": "[PATCH 1/7] Add new regular expressions for Chunked Encoding This also moves some regular expressions for QUOTED_PAIR/QUOTED_STRING into this module from utilities so that they may be reused. src/waitress/rfc7230.py | 27 ++++++++++++++++++++++++++- src/waitress/utilities.py | 28 +++------... | CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') |
PYSEC-2022-162 | null | [
{
"commit_message": "[PATCH] vcs: Improve mercurial parameters handling Make sure that all user provided input is handled as expected. weblate/vcs/mercurial.py | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-)",
"patch_text_b64": "RnJvbSAzNWQ1OWYxZjA0MDU0MWMzNThjZWNlMGE4ZDRhNjMxODNjYTkxOWI4IE1vbi... | null | |
CVE-2021-21243 | Pre-Auth Unsafe Deserialization on KubernetesResource | OneDev is an all-in-one devops platform. In OneDev before version 4.0.3, a Kubernetes REST endpoint exposes two methods that deserialize untrusted data from the request body. These endpoints do not enforce any authentication or authorization checks. This issue may lead to pre-auth RCE. This issue was fixed in 4.0.3 by not using deserialization at KubernetesResource side. | [
{
"commit_message": "[PATCH] Do not deserialize data from job nodes in Kubernetes resource to avoid security vulnerability pom.xml | 4 ++-- server-core/pom.xml | 2 +- server-plugin/pom.xml | 2 +- server-plugin/se... | CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') |
GHSA-cvx7-x8pj-x2gw | CoreDNS Vulnerable to DoQ Memory Exhaustion via Stream Amplification | null | [
{
"commit_message": "[PATCH] feat: limit concurrent DoQ streams and goroutines (#7296) core/dnsserver/config.go | 8 ++ core/dnsserver/server_quic.go | 49 +++++-- core/dnsserver/zdirectives.go | 1 + core/plugin/zplugin.go | 1 + man/coredns-quic.7 | 69 ++++++++++ plugin.cfg ... | null |
CVE-2022-42895 | Info Leak in l2cap_core in the Linux Kernel | There is an infoleak vulnerability in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_parse_conf_req function which can be used to leak kernel pointers remotely.
We recommend upgrading past commit https://github.com/torvalds/linux/commit/b1a2cd50c0357f243b7435a732b4e62ba3157a2e https://www.google.com/url
| [
{
"commit_message": "[PATCH] Bluetooth: L2CAP: Fix attempting to access uninitialized memory MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit On l2cap_parse_conf_req the variable efs is only initialized if remote_efs has been set. CVE: CVE-2022-42895 CC: stable@vger.kern... | CWE-824 Access of Uninitialized Pointer |
CVE-2015-1039 | Cross-site scripting (XSS) vulnerability in user/login.phtml in ZF-Commons ZfcUser before 1.2.2 allows remote attackers to inject arbitrary web script or HTML via the redirect parameter. | [
{
"commit_message": "[PATCH] Fix XSS vulnerability view/zfc-user/user/login.phtml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSBiYWYwZTQ2MDc5NmVhOTJmNmM5MDJmYTliMDA3MTkwYmNjZmYyYjhmIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBEYW5pZWxzczg5IDxEYW5pZWxzczg5QGdtYWlsLmNvbT4KRGF0... | n/a | |
GHSA-f2g6-6jfq-w6cj | null | [
{
"commit_message": "[PATCH] xss fix from Steven Chamberlain lib/Smokeping.pm | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-)",
"patch_text_b64": "RnJvbSBiYWQ5ZjljMjhmMDkzOWIyNjlmOTAwNzJhYTRjZjQxZjIwZjE1NTYzIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBUb2JpYXMgT2V0aWtlciA8dG9iaUBvZXRpa2VyLmNoPgpEYXR... | null | |
GHSA-mv89-p3h4-x57h | null | [
{
"commit_message": "[PATCH] [FIX] 0027430 Modules/File/classes/class.ilObjFileGUI.php | 13 +++---------- Services/Utilities/classes/class.ilFileUtils.php | 2 +- lang/ilias_de.lang | 3 ++- lang/ilias_en.lang | 1 + 4 files changed, 7 insertions(... | null | |
CVE-2022-0932 | Missing Authorization in saleor/saleor | Missing Authorization in GitHub repository saleor/saleor prior to 3.1.2. | [
{
"commit_message": "[PATCH] Require manage orders for fetching `user.orders` (#9128) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit * Require manage orders for fetching customer.orders * Update changelog Co-authored-by: Marcin Gębala <5421321+maarcingebala@users.norep... | CWE-862 Missing Authorization |
CVE-2012-10007 | madgicweb BuddyStream Plugin ShareBox.php cross site scripting | A vulnerability was found in madgicweb BuddyStream Plugin up to 3.2.7 on WordPress. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file ShareBox.php. The manipulation of the argument content/link/shares leads to cross site scripting. The attack can be launched remotely. Upgrading to version 3.2.8 is able to address this issue. The patch is named 7d5b9a89a27711aad76fd55ab4cc4185b545a1d0. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-221479. | [
{
"commit_message": "[PATCH] fixed vulnerability git-svn-id: https://plugins.svn.wordpress.org/buddystream/trunk@634128 b8457f37-d9ea-0310-8a92-e5e31aec5664 buddystream.php | 4 ++-- extensions/default/templates/ShareBox.php | 10 +++++----- readme.txt | ... | CWE-79 Cross Site Scripting |
CVE-2019-11514 | User/Command/ConfirmEmailHandler.php in Flarum before 0.1.0-beta.8 mishandles invalidation of user email tokens. | [
{
"commit_message": "[PATCH] Always invalidate all user email tokens Reported by B. Dhiyaneshwaran of Geek Freak. src/User/Command/ConfirmEmailHandler.php | 3 ++- src/User/User.php | 10 ++++++++++ 2 files changed, 12 insertions(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSA2NjYwN2E1N... | n/a | |
GHSA-9m5p-c77c-f9j7 | DoS in Cilium agent DNS proxy from crafted DNS responses | null | [
{
"commit_message": "[PATCH] dnsproxy: bail when extracting info from DNS fails The comment asserted that it's okay to fail to extract information from the DNS query/response. I don't think that's true, since based on the qname and the responseIPs we do policy enforcement. I don't think this happens often, but ... | null |
CVE-2019-15140 | coders/mat.c in ImageMagick 7.0.8-43 Q16 allows remote attackers to cause a denial of service (use-after-free and application crash) or possibly have unspecified other impact by crafting a Matlab image file that is mishandled in ReadImage in MagickCore/constitute.c. | [
{
"commit_message": "[PATCH] https://github.com/ImageMagick/ImageMagick/issues/1554 coders/mat.c | 8 +++++--- 1 file changed, 5 insertions(+), 3 deletions(-)",
"patch_text_b64": "RnJvbSBmNzIwNjYxOGQyN2MyZTY5ZDk3N2FiZjQwZTMwMzVhMzNlNWY2YmUwIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBDcmlzdHkgPG1pa2F5bGEtZ3JhY... | n/a | |
GHSA-qhx6-hpfj-8m4g | null | [
{
"commit_message": "[PATCH] [3.12] gh-119342: Fix a potential denial of service in plistlib (GH-119343) (#142149) Reading a specially prepared small Plist file could cause OOM because file's read(n) preallocates a bytes object for reading the specified amount of data. Now plistlib reads large data by chunks, t... | null | |
CVE-2024-29192 | GHSL-2023-206 gotortc Cross-Site Request Forgery vulnerability | gotortc is a camera streaming application. Versions 1.8.5 and prior are vulnerable to Cross-Site Request Forgery. The `/api/config` endpoint allows one to modify the existing configuration with user-supplied values. While the API is only allowing localhost to interact without authentication, an attacker may be able to achieve that depending on how go2rtc is set up on the upstream application, and given that this endpoint is not protected against CSRF, it allows requests from any origin (e.g. a "drive-by" attack) . The `exec` handler allows for any stream to execute arbitrary commands. An attacker may add a custom stream through `api/config`, which may lead to arbitrary command execution. In the event of a victim visiting the server in question, their browser will execute the requests against the go2rtc instance. Commit 8793c3636493c5efdda08f3b5ed5c6e1ea594fd9 adds a warning about secure API access. | [
{
"commit_message": "[PATCH] Add warning about secure access for API to docs README.md | 2 ++ 1 file changed, 2 insertions(+)",
"patch_text_b64": "RnJvbSA4NzkzYzM2MzY0OTNjNWVmZGRhMDhmM2I1ZWQ1YzZlMWVhNTk0ZmQ5IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBBbGV4IFggPGFsZXhleS5raGl0QGdtYWlsLmNvbT4KRGF0ZTogVGh1LCAxM... | CWE-352: Cross-Site Request Forgery (CSRF) |
GHSA-vc3v-ppc7-v486 | vantage6-server node accepts non-whitelisted algorithms from malicious server | null | [
{
"commit_message": "[PATCH] Remove lines that skip checking if algorithm is allowed when parent id is set This is a security vulnerability when the server is adapted to set a parent_id for each task. In such cases, any algorithm image would be run vantage6-node/vantage6/node/docker/docker_manager.py | 5 ----- ... | null |
CVE-2018-8795 | rdesktop versions up to and including v1.8.3 contain an Integer Overflow that leads to a Heap-Based Buffer Overflow in function process_bitmap_updates() and results in a memory corruption and probably even a remote code execution. | [
{
"commit_message": "[PATCH] Malicious RDP server security fixes This commit includes fixes for a set of 21 vulnerabilities in rdesktop when a malicious RDP server is used. All vulnerabilities was identified and reported by Eyal Itkin. * Add rdp_protocol_error function that is used in several fixes * Refactor o... | CWE-680: Integer Overflow to Buffer Overflow | |
CVE-2024-39690 | Capsule tenant owner with "patch namespace" permission can hijack system namespaces | Capsule is a multi-tenancy and policy-based framework for Kubernetes. In Capsule v0.7.0 and earlier, the tenant-owner can patch any arbitrary namespace that has not been taken over by a tenant (i.e., namespaces without the ownerReference field), thereby gaining control of that namespace. Version 0.7.1 contains a patch. | [
{
"commit_message": "[PATCH] Merge commit from fork MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Signed-off-by: Oliver Bähler <oliverbaehler@hotmail.com> .../templates/configuration-default.yaml | 3 +- e2e/namespace_hijacking_test.go | 119 ++++++... | CWE-863: Incorrect Authorization |
GHSA-2m39-62fm-q8r3 | Regular Expression Denial of Service in sshpk | null | [
{
"commit_message": "[PATCH] joyent/node-sshpk#44 Performance issues parsing long SSH public keys Reviewed by: Cody Peter Mello <cody.mello@joyent.com> lib/formats/ssh.js | 6 +++--- package.json | 2 +- test/horrors.js | 24 ++++++++++++++++++++++++ 3 files changed, 28 insertions(+), 4 deletions(-)",
... | null |
GHSA-6fvq-23cw-5628 | vLLM: Resource-Exhaustion (DoS) through Malicious Jinja Template in OpenAI-Compatible Server | null | [
{
"commit_message": "[PATCH] Add filtering for chat template kwargs (#25794) Signed-off-by: Isotr0py <mozf@mail2.sysu.edu.cn> Co-authored-by: Isotr0py <mozf@mail2.sysu.edu.cn> tests/entrypoints/test_chat_utils.py | 85 +++++++++++++++++++++++++ vllm/entrypoints/chat_utils.py | 54 +++++++++++++++- vll... | null |
GHSA-h93h-48cq-mpcw | null | [
{
"commit_message": "[PATCH] issue #30 issue #31 issue #32: no multiple format chunks in WAV or W64 cli/riff.c | 7 ++++++- cli/wave64.c | 6 ++++++ 2 files changed, 12 insertions(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSAyNmNiNDdmOTlkNDgxYWQ5YjkzZWVmZjgwZDI2ZTZiNjNiYmQ3ZTE1IE1vbiBTZXAgMTcgMDA6MDA6MDAgM... | null | |
CVE-2023-3521 | Cross-site Scripting (XSS) - Reflected in fossbilling/fossbilling | Cross-site Scripting (XSS) - Reflected in GitHub repository fossbilling/fossbilling prior to 0.5.4. | [
{
"commit_message": "[PATCH] Prevent exceptions from being interpreted as HTML (#1394) src/library/FOSSBilling/ErrorPage.php | 2 +- src/load.php | 9 +++++---- 2 files changed, 6 insertions(+), 5 deletions(-)",
"patch_text_b64": "RnJvbSA1ZWI1MTZkNGViY2I3NjRkYjFiMmVkZjljOGQwNTM5ZTc2ZW... | CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') |
GHSA-qppg-v75c-r5ff | S3Scanner allows Directory Traversal | null | [
{
"commit_message": "[PATCH 1/4] Verify object will land in output dir when downloading S3Scanner/S3Service.py | 25 ++++++++++++++++++++++--- 1 file changed, 22 insertions(+), 3 deletions(-)",
"patch_text_b64": "RnJvbSBmMDNjOGVlNjY3M2I2ZDUzMzViOGJlMjM1NGE2MTFkNWJlNDA3ZjRjIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpG... | null |
GHSA-8gvg-8vhf-h26g | Out-of-bounds write | null | [
{
"commit_message": "[PATCH] [CVE-2019-0937] lib/Runtime/ByteCode/ByteCodeEmitter.cpp | 10 ++++++++++ 1 file changed, 10 insertions(+)",
"patch_text_b64": "RnJvbSA3ODI3ZTExNzc1MzA1MmQ0NzlmYWJlMTlhMjVjZmVjZTg4MDU5YmNhIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBQYXVsIExlYXRoZXJzIDxwbGVhdGhAbWljcm9zb2Z0LmNvbT4K... | null |
CVE-2015-10127 | PlusCaptcha Plugin cross site scripting | A vulnerability was found in PlusCaptcha Plugin up to 2.0.6 on WordPress and classified as problematic. Affected by this issue is some unknown functionality. The manipulation leads to cross site scripting. The attack may be launched remotely. Upgrading to version 2.0.14 is able to address this issue. The patch is identified as 1274afc635170daafd38306487b6bb8a01f78ecd. It is recommended to upgrade the affected component. VDB-248954 is the identifier assigned to this vulnerability. | [
{
"commit_message": "[PATCH] Solver XSS git-svn-id: https://plugins.svn.wordpress.org/pluscaptcha/trunk@1094241 b8457f37-d9ea-0310-8a92-e5e31aec5664 PlusCaptcha.php | 14 +++- external/comment-form-inline-errors.php | 4 +- library/admin.php | 90 +++++++++++++-------... | CWE-79 Cross Site Scripting |
CVE-2015-4715 | The fetch function in OAuth/Curl.php in Dropbox-PHP, as used in ownCloud Server before 6.0.8, 7.x before 7.0.6, and 8.x before 8.0.4 when an external Dropbox storage has been mounted, allows remote administrators of Dropbox.com to read arbitrary files via an @ (at sign) character in unspecified POST values. | [
{
"commit_message": "[PATCH] Revert custom patch that can cause problems apps/files_external/3rdparty/Dropbox/OAuth/Curl.php | 10 ++++++++-- 1 file changed, 8 insertions(+), 2 deletions(-)",
"patch_text_b64": "RnJvbSBiZjBmMWE1MDkyNmE3NWEyNmE0MmEzZGE0ZDYyZTg0YTQ4OWVlNzdhIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm... | n/a | |
GHSA-5w4j-f78p-4wh9 | Libcontainer is affected by capabilities elevation similar to GHSA-f3fp-gc8g-vw66 | null | [
{
"commit_message": "[PATCH] Merge commit from fork * fix the way we set capapbilities on tenant container Signed-off-by: Yashodhan Joshi <yjdoc2@gmail.com> * add tests and extract a function Signed-off-by: Yashodhan Joshi <yjdoc2@gmail.com> * fix: format and typo fix Signed-off-by: Yashodhan Joshi <yjdoc2@gmai... | null |
CVE-2025-32969 | org.xwiki.platform:xwiki-platform-rest-server allows SQL injection in query endpoint of REST API | XWiki is a generic wiki platform. In versions starting from 1.8 and prior to 15.10.16, 16.4.6, and 16.10.1, it is possible for a remote unauthenticated user to escape from the HQL execution context and perform a blind SQL injection to execute arbitrary SQL statements on the database backend, including when "Prevent unregistered users from viewing pages, regardless of the page rights" and "Prevent unregistered users from editing pages, regardless of the page rights" options are enabled. Depending on the used database backend, the attacker may be able to not only obtain confidential information such as password hashes from the database, but also execute UPDATE/INSERT/DELETE queries. This issue has been patched in versions 16.10.1, 16.4.6 and 15.10.16. There is no known workaround, other than upgrading XWiki. | [
{
"commit_message": "[PATCH] XWIKI-22718, XWIKI-22691: Improve query validation .../hibernate/query/HqlQueryExecutor.java | 36 +++++++++++++------ .../hibernate/query/HqlQueryUtilsTest.java | 2 ++ .../hibernate/query/HqlQueryExecutorTest.java | 11 +++--- .../search/AbstractDatabaseSearchSource.java | ... | CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') |
GHSA-2xpp-rgp2-5r6f | null | [
{
"commit_message": "[PATCH] update controller/generalization_controller.go | 2 +- controller/sys_dict_controller.go | 14 ++++++- controller/sys_menu_controller.go | 12 +++++- controller/sys_table_controller.go | 53 ++++++++++++++++++++++--- controller/sys_user_controller.go | 12 +++++- ... | null | |
CVE-2020-15203 | Denial of Service in Tensorflow | In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, by controlling the `fill` argument of tf.strings.as_string, a malicious attacker is able to trigger a format string vulnerability due to the way the internal format use in a `printf` call is constructed. This may result in segmentation fault. The issue is patched in commit 33be22c65d86256e6826666662e40dbdfe70ee83, and is released in TensorFlow versions 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1. | [
{
"commit_message": "[PATCH] Prevent format string vulnerability in `tf.strings.as_string`. The `printf` format specifier only allows `#`, `0`, `-`, `+` and space as flag characters. Others are interpreted as width/precision/length modifier or conversion specifiers. If a character does not fit into any of these... | {"CWE-20":"Improper Input Validation"} |
CVE-2021-46876 | An issue was discovered in eZ Publish Ibexa Kernel before 7.5.15.1. The /user/sessions endpoint can be abused to determine account existence. | [
{
"commit_message": "[PATCH] Merge pull request from GHSA-gmrf-99gw-vvwj Co-authored-by: Bartek Wajda <bartlomiej.wajda@ibexa.co> .../Resources/config/default_settings.yml | 4 ++++ .../Resources/config/security.yml | 2 ++ .../Server/Controller/SessionController.php | 2 +- .../Server/Securit... | n/a | |
CVE-2026-22705 | RustCrypto: Signatures has timing side-channel in ML-DSA decomposition | RustCrypto: Signatures offers support for digital signatures, which provide authentication of data using public-key cryptography. Prior to version 0.1.0-rc.2, a timing side-channel was discovered in the Decompose algorithm which is used during ML-DSA signing to generate hints for the signature. This issue has been patched in version 0.1.0-rc.2. | [
{
"commit_message": "[PATCH] ml-dsa: use Barrett reduction instead of integer division to prevent side-channels (#1144) ml-dsa/src/algebra.rs | 52 ++++++++++++++++++++++- ml-dsa/src/ntt.rs | 99 ++++++++++++++++++++++++++++++------------- 2 files changed, 119 insertions(+), 32 deletions(-)",
"patch_text_... | CWE-1240: Use of a Cryptographic Primitive with a Risky Implementation |
CVE-2022-39387 | XWiki OIDC Authenticator vulnerable to OpenID login bypass due to improper authentication | XWiki OIDC has various tools to manipulate OpenID Connect protocol in XWiki. Prior to version 1.29.1, even if a wiki has an OpenID provider configured through its xwiki.properties, it is possible to provide a third party provider its details through request parameters. One can then bypass the XWiki authentication altogether by specifying its own provider through the oidc.endpoint.* request parameters (or by using an XWiki-based OpenID provider with oidc.xwikiprovider. With the same approach, one could also provide a specific group mapping through oidc.groups.mapping that would make his user automatically part of the XWikiAdminGroup. This issue has been patched, please upgrade to 1.29.1. There is no workaround, an upgrade of the authenticator is required. | [
{
"commit_message": "[PATCH] OIDC-118: Fix bad handling of request parameters .../internal/OIDCClientConfiguration.java | 42 +++++++++------ .../internal/OIDCClientConfigurationTest.java | 52 +++++++++++++++++++ 2 files changed, 79 insertions(+), 15 deletions(-)",
"patch_text_b64": "RnJvbSAwMjQ3YWYxNDE3... | CWE-287: Improper Authentication |
CVE-2024-51498 | [@imput/cobalt-web] Cross-site Scripting when downloading picker image from malicious instance | cobalt is a media downloader that doesn't piss you off. A malicious cobalt instance could serve links with the `javascript:` protocol, resulting in Cross-site Scripting (XSS) when the user tries to download an item from a picker. This issue has been present since commit `66bac03e`, was mitigated in commit `97977efa` (correctly configured web instances were no longer vulnerable) and fully fixed in commit `c4be1d3a` (included in release version 10.2.1). Users are advised to upgrade. Users unable to upgrade should enable a content-security-policy. | [
{
"commit_message": "[PATCH] web/dialogs: add picker dialog & clean up small dialog web/i18n/en/a11y/dialog.json | 3 + web/i18n/en/dialog.json | 9 +- .../dialog/DialogBackdropClose.svelte | 18 ++ .../components/dialog/DialogButtons.svelte | 61 +++++ web/sr... | CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') |
GHSA-2vv7-7crh-jr74 | null | [
{
"commit_message": "[PATCH] ALSA: control: Fix replacing user controls There are two issues with the current implementation for replacing user controls. The first is that the code does not check if the control is actually a user control and neither does it check if the control is owned by the process that trie... | null | |
GHSA-r78q-qgx6-64pp | Memory usage graphs accessible to anyone with Overall/Read | null | [
{
"commit_message": "[PATCH] [SECURITY-1650] core/src/main/java/hudson/diagnosis/MemoryUsageMonitor.java | 2 ++ 1 file changed, 2 insertions(+)",
"patch_text_b64": "RnJvbSA3ZDQ0ODM2ZmFkMGY0OTM0MWFlMmE2MWRlMDZkYmI1NTYwMTRhMmRmIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBEYW5pZWwgQmVjayA8ZGFuaWVsLWJlY2tAdXNlcnM... | null |
CVE-2023-42465 | Sudo before 1.9.15 might allow row hammer attacks (for authentication bypass or privilege escalation) because application logic sometimes is based on not equaling an error value (instead of equaling a success value), and because the values do not resist flips of a single bit. | [
{
"commit_message": "[PATCH] Try to make sudo less vulnerable to ROWHAMMER attacks. We now use ROWHAMMER-resistent values for ALLOW, DENY, AUTH_SUCCESS, AUTH_FAILURE, AUTH_ERROR and AUTH_NONINTERACTIVE. In addition, we explicitly test for expected values instead of using a negated test against an error value. ... | n/a | |
GHSA-85ch-44w7-rf32 | TYPO3 Cross-Site Scripting in Fluid ViewHelpers | null | [
{
"commit_message": "[PATCH] [SECURITY] XSS issues in Fluid view helpers * HtmlentitiesViewHelper * UrlencodeViewHelper * StripTagsViewHelper Resolves: #85764 Releases: master, 9.5, 8.7 Security-Commit: 27d959e4dfcfb4b4b9c395d1fb619c8fe4d9f4cd Security-Bulletin: TYPO3-CORE-SA-2019-005 Change-Id: If22e4a4959ee67... | null |
GHSA-q95w-c7qg-hrff | Django vulnerable to partial directory traversal via archives | null | [
{
"commit_message": "[PATCH] Added CVE-2025-59681 and CVE-2025-59682 to security archive. docs/releases/security.txt | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+)",
"patch_text_b64": "RnJvbSA0M2Q4NGFlZjA0YTllNzExNjRjMjFhNzQ4ODU5OTY5ODE4NTdlNjZlIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBKYWN... | null |
CVE-2025-43973 | An issue was discovered in GoBGP before 3.35.0. pkg/packet/rtr/rtr.go does not verify that the input length corresponds to a situation in which all bytes are available for an RTR message. | [
{
"commit_message": "[PATCH] pkg/packet/rtr: fix parser to check the input length pkg/packet/rtr/rtr.go | 3 +++ 1 file changed, 3 insertions(+)",
"patch_text_b64": "RnJvbSA1NjkzYzU4YTQ4MTVjYzYzMjdiOGQzYjY5ODBmMGU1YWNlZDI4YWJlIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBJdmFuIEdvdG92Y2hpdHMgPGl2Z0BtYXloZW0uc2V... | CWE-193 Off-by-one Error | |
GHSA-f8hv-rx9p-f9r4 | generator-hottowel Cross-site Scripting vulnerability | null | [
{
"commit_message": "[PATCH] Mitigate against reflected XSS attacks Mitigate against reflected XSS attacks in production by returning the custom 404 response object instead of express' default 404 response This was discovered using the Burp pen test tool and successfully tested by passing an arbitrary url param... | null |
CVE-2022-25298 | Path Traversal | This affects the package sprinfall/webcc before 0.3.0. It is possible to traverse directories to fetch arbitrary files from the server. | [
{
"commit_message": "[PATCH] fix static file serving security issue; fix url path encoding issue examples/CMakeLists.txt | 2 +- examples/encoding.cc | 60 -------------------------- examples/encoding.h | 12 ------ examples/url_unicode.cc | Bin 1244 -> 1256 bytes webcc/body.cc | 2 +- webcc/... | Path Traversal |
CVE-2025-65091 | XWiki Full Calendar Macro vulnerable to SQL injection through Calendar.JSONService | XWiki Full Calendar Macro displays objects from the wiki on the calendar. Prior to version 2.4.5, users with the right to view the Calendar.JSONService page (including guest users) can exploit a SQL injection vulnerability by accessing database info or starting a DoS attack. This issue has been patched in version 2.4.5. | [
{
"commit_message": "[PATCH] Merge commit from fork * security fix * security fix * security fix * security fix * security fix .../src/main/resources/Calendar/JSONService.xml | 12 ++++-------- 1 file changed, 4 insertions(+), 8 deletions(-)",
"patch_text_b64": "RnJvbSA1ZmRjZjA2YTA1MDE1Nzg2NDkyZmRhNjliN... | CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') |
GHSA-fpgg-qjcj-58g7 | null | [
{
"commit_message": "[PATCH] dont allow directory traversal #2 src/node/utils/Minify.js | 1 - 1 file changed, 1 deletion(-)",
"patch_text_b64": "RnJvbSAwZmE3NjUwZGY4Zjk0MGVkNmI1NzdkNzk4MzZhNzhlYjA5NzI2YzRiIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBsb3VpcyA8bG91aXNAc3lzdGVtbGkub3JnPgpEYXRlOiBTdW4sIDEyIEFwciA... | null | |
CVE-2019-13275 | An issue was discovered in the VeronaLabs wp-statistics plugin before 12.6.7 for WordPress. The v1/hit endpoint of the API, when the non-default "use cache plugin" setting is enabled, is vulnerable to unauthenticated blind SQL Injection. | [
{
"commit_message": "[PATCH] Check Prepare Parameter in CURD wpdb #286 includes/class-wp-statistics-pages.php | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)",
"patch_text_b64": "RnJvbSBiZDQ2NzIxYjk3Nzk0YTFiMTUyMGUyNGZmNTAyM2I2ZGE3MzhkZDc1IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBNZWhyc2hhZCBEYXJ6... | n/a | |
CVE-2023-1067 | Cross-site Scripting (XSS) - Stored in pimcore/pimcore | Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.5.18. | [
{
"commit_message": "[PATCH] [Task] Improve GDPR email search (#14410) * improved email in toolbar * added validator to email search input .../js/pimcore/settings/gdpr/dataproviders/sentMail.js | 2 +- .../public/js/pimcore/settings/gdpr/gdprPanel.js | 9 ++++++++- 2 files changed, 9 insertions(+), 2 de... | CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') |
GHSA-wfcc-pff6-rgc5 | Jetty vulnerable to exposure of sensitive information due to observable discrepancy | null | [
{
"commit_message": "[PATCH] Fixes #1556 - A timing channel in Password.java. .../jaspi/modules/DigestAuthModule.java | 3 +- .../authentication/DigestAuthenticator.java | 2 +- .../jetty/util/security/Credential.java | 57 ++++++++++++++----- .../eclipse/jetty/util/security/Password.java | 25 ++++... | null |
CVE-2018-14016 | The r_bin_mdmp_init_directory_entry function in mdmp.c in radare2 2.7.0 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted Mini Crash Dump file. | [
{
"commit_message": "[PATCH] Fix #10464 - oobread crash in mdmp (#10683) libr/bin/format/mdmp/mdmp.c | 15 ++++++++------- 1 file changed, 8 insertions(+), 7 deletions(-)",
"patch_text_b64": "RnJvbSBlYjdkZWIyODFkZjU0NzcxZmI4ZWNmNTg5MGRjMzI1YTdkMjJkM2UyIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiByYWRhcmUgPHBhb... | n/a | |
CVE-2023-4750 | Use After Free in vim/vim | Use After Free in GitHub repository vim/vim prior to 9.0.1857. | [
{
"commit_message": "[PATCH] patch 9.0.1857: [security] heap-use-after-free in is_qf_win() Problem: heap-use-after-free in is_qf_win() Solution: Check buffer is valid before accessing it Signed-off-by: Christian Brabandt <cb@256bit.org> src/main.c | 2 +- src/quickfix.c ... | CWE-416 Use After Free |
CVE-2016-15010 | University of Cambridge django-ucamlookup Lookup cross site scripting | ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as problematic was found in University of Cambridge django-ucamlookup up to 1.9.1. Affected by this vulnerability is an unknown functionality of the component Lookup Handler. The manipulation leads to cross site scripting. The attack can be launched remotely. Upgrading to version 1.9.2 is able to address this issue. The identifier of the patch is 5e25e4765637ea4b9e0bf5fcd5e9a922abee7eb3. It is recommended to upgrade the affected component. The identifier VDB-217441 was assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. | [
{
"commit_message": "[PATCH] Fix lack of escaping (and so XSS vuln.) in select2 calls The invocation of Jquery select2 to provide searchable dropdowns didn't sanitise data coming fom lookup, with the result that any HTML markup it contained, including <script>...</script>, was interpreted. The documentation is ... | CWE-79 Cross Site Scripting |
GHSA-3jh2-wmv7-m932 | LibreNMS stored Cross-site Scripting via Schedule Maintenance `Title` parameter | null | [
{
"commit_message": "[PATCH] Fix scheduled maintenance xss (#14360) Fix for fields title, notes, and maybe recurring_day. Other fields can't store html. https://huntr.dev/bounties/bcb6ee68-1452-4fdb-932a-f1031d10984f/ app/Http/Controllers/Table/AlertScheduleController.php | 6 +++--- 1 file changed, 3 insertions... | null |
GHSA-8cxx-7fx3-j6xj | null | [
{
"commit_message": "[PATCH] Fix for #519 #520 #521 plugins/codecs/zfp/blosc2-zfp.c | 6 ++++++ 1 file changed, 6 insertions(+)",
"patch_text_b64": "RnJvbSA0MjVlOGE5YTU5ZDQ5Mzc4ZDU3ZTIxMTZiNmM5YjAxOTBhNTk4NmY1IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBNYXJ0YSBJYm9ycmEgPG1hcnRhaWJvcnJhMjRAZ21haWwuY29tPgpEYXRl... | null | |
GHSA-6673-4983-2vx5 | fonttools XML External Entity Injection (XXE) Vulnerability | null | [
{
"commit_message": "[PATCH] subset: parse OT-SVG with resolve_entities=False to guard against XXE attacks as recommended in https://codeql.github.com/codeql-query-help/python/py-xxe/ Lib/fontTools/subset/svg.py | 3 +++ 1 file changed, 3 insertions(+)",
"patch_text_b64": "RnJvbSA5ZjYxMjcxZGMxY2E4MmVkOTFmNTI... | null |
CVE-2021-29549 | Division by 0 in `QuantizedAdd` | TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a runtime division by zero error and denial of service in `tf.raw_ops.QuantizedBatchNormWithGlobalNormalization`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/6f26b3f3418201479c264f2a02000880d8df151c/tensorflow/core/kernels/quantized_add_op.cc#L289-L295) computes a modulo operation without validating that the divisor is not zero. Since `vector_num_elements` is determined based on input shapes(https://github.com/tensorflow/tensorflow/blob/6f26b3f3418201479c264f2a02000880d8df151c/tensorflow/core/kernels/quantized_add_op.cc#L522-L544), a user can trigger scenarios where this quantity is 0. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | [
{
"commit_message": "[PATCH] Validate work in `QuantizedAdd`, ensure at least one element. PiperOrigin-RevId: 370127996 Change-Id: I57c6f3e01afdeada84737820a131590137463855 tensorflow/core/kernels/quantized_add_op.cc | 2 ++ 1 file changed, 2 insertions(+)",
"patch_text_b64": "RnJvbSA3NDQwMDljOWU1Y2M1ZDA0NDd... | CWE-369: Divide By Zero |
CVE-2020-23915 | An issue was discovered in cpp-peglib through v0.1.12. peg::resolve_escape_sequence() in peglib.h has a heap-based buffer over-read. | [
{
"commit_message": "[PATCH] Fix #122 peglib.h | 6 +++--- test/test1.cc | 11 +++++++++++ 2 files changed, 14 insertions(+), 3 deletions(-)",
"patch_text_b64": "RnJvbSBiM2IyOWNlOGYzYWNmM2EzMjczM2Q5MzAxMDVhMTdkN2IwYmEzNDdlIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiB5aGlyb3NlIDx5dWppLmhpcm9zZS5idWdAZ21haW... | n/a | |
CVE-2024-4030 | tempfile.mkdtemp() may be readable and writeable by all users on Windows | On Windows a directory returned by tempfile.mkdtemp() would not always have permissions set to restrict reading and writing to the temporary directory by other users, instead usually inheriting the correct permissions from the default location. Alternate configurations or users without a profile directory may not have the intended permissions.
If you’re not using Windows or haven’t changed the temporary directory location then you aren’t affected by this vulnerability. On other platforms the returned directory is consistently readable and writable only by the current user.
This issue was caused by Python not supporting Unix permissions on Windows. The fix adds support for Unix “700” for the mkdir function on Windows which is used by mkdtemp() to ensure the newly created directory has the proper permissions. | [
{
"commit_message": "[PATCH] gh-118486: Support mkdir(mode=0o700) on Windows (GH-118488) Doc/library/os.rst | 7 + Lib/test/test_os.py | 19 +++ Lib/test/test_tempfile.py | 28 ++++ ...-05-01-20-57-09.gh-issue-118486.K44KJG.rst | 2 + Mo... | CWE-276 Incorrect Default Permissions |
CVE-2025-67724 | Tornado vulnerable to Header Injection and XSS via reason argument | Tornado is a Python web framework and asynchronous networking library. In versions 6.5.2 and below, the supplied reason phrase is used unescaped in HTTP headers (where it could be used for header injection) or in HTML in the default error page (where it could be used for XSS) and can be exploited by passing untrusted or malicious data into the reason argument. Used by both RequestHandler.set_status and tornado.web.HTTPError, the argument is designed to allow applications to pass custom "reason" phrases (the "Not Found" in HTTP/1.1 404 Not Found) to the HTTP status line (mainly for non-standard status codes). This issue is fixed in version 6.5.3. | [
{
"commit_message": "[PATCH] web: Harden against invalid HTTP reason phrases We allow applications to set custom reason phrases for the HTTP status line (to support custom status codes), but if this were exposed to untrusted data it could be exploited in various ways. This commit guards against invalid reason p... | CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') |
CVE-2016-6271 | The Bzrtp library (aka libbzrtp) 1.0.x before 1.0.4 allows man-in-the-middle attackers to conduct spoofing attacks by leveraging a missing HVI check on DHPart2 packet reception. | [
{
"commit_message": "[PATCH] Add ZRTP Commit packet hvi check on DHPart2 packet reception include/packetParser.h | 1 + src/packetParser.c | 28 ++++++++++++++++++++++- test/bzrtpParserTest.c | 51 ++++++++++++++++++++++++++++++++++++++++-- test/bzrtpParserTest.h | 1 + test/bzrtpTest.c | 1 + 5 files c... | n/a | |
CVE-2016-9387 | Integer overflow in the jpc_dec_process_siz function in libjasper/jpc/jpc_dec.c in JasPer before 1.900.13 allows remote attackers to have unspecified impact via a crafted file, which triggers an assertion failure. | [
{
"commit_message": "[PATCH] Fixed another integer overflow problem. src/libjasper/jpc/jpc_dec.c | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSBkOTExOThhYmQwMGZjNDM1YTM5N2ZlNmJhZDkwNmE0YzE3NDhlOWNmIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBNaWNoYWVsIEFkYW1zIDxtZGFkYW1z... | n/a | |
PYSEC-2021-655 | null | [
{
"commit_message": "[PATCH] Fix heap buffer overflow caused by rounding. This was hard to fix. Due to the way we compute the pixels that influence an output pixel in resized images, for certain input configuration we might have issued a read to a pixel that is outside of boundary of the original image. This is... | null | |
GHSA-2cpx-427x-q2c6 | CHECK-fail in AddManySparseToTensorsMap | null | [
{
"commit_message": "[PATCH] Fix overflow CHECK issue with `tf.raw_ops.AddManySparseToTensorsMap`. PiperOrigin-RevId: 369492969 Change-Id: I1d70d6c0c92e3d7a25bc3b3aa2a0c0ac9688bf81 .../core/kernels/sparse_tensors_map_ops.cc | 26 ++++++++++++++----- 1 file changed, 19 insertions(+), 7 deletions(-)",
"patc... | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.