id
stringlengths
12
19
title
stringlengths
0
237
description
stringlengths
35
3.87k
patches
listlengths
1
22
cwe
stringlengths
2
440
CVE-2020-15117
Denial of Service in Synergy
In Synergy before version 1.12.0, a Synergy server can be crashed by receiving a kMsgHelloBack packet with a client name length set to 0xffffffff (4294967295) if the servers memory is less than 4 GB. It was verified that this issue does not cause a crash through the exception handler if the available memory of the Server is more than 4GB.
[ { "commit_message": "[PATCH 1/2] #6716 Added try catch around memory allocation src/lib/synergy/ProtocolUtil.cpp | 10 +++++++++- 1 file changed, 9 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA1OWU2M2Y1ODE4NTMxYzk1MDlmNDJlNWQ1ODI2MjQ2MTQyNzU0ODZkIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBKYW1pZSB...
{"CWE-755":"Improper Handling of Exceptional Conditions"}
GHSA-j2hr-q93x-gxvh
SSOReady has an XML Signature Bypass via differential XML parsing
null
[ { "commit_message": "[PATCH] Merge commit from fork internal/saml/dsig/path.go | 13 +++++++++++++ 1 file changed, 13 insertions(+)", "patch_text_b64": "RnJvbSA3ZjkyYTA2MzA0Mzk5NzJmY2JlZmE4YzdlYWZlOGMxNDRiZDg5OTE1IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBVbHlzc2UgQ2FyaW9uIDx1bHlzc2UuY2FyaW9uQHNzb3JlYWR5LmNv...
null
GHSA-7q7h-gmqw-h5w5
null
[ { "commit_message": "[PATCH] Redo minor cleanup in new_rbtree libr/util/new_rbtree.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSAxNDE4OTcxMDg1OWMyNzk4MWFkYjRjMmMyYWVkMjg2M2MxODU5ZWM1IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBjb25kcmV0IDxjb25kcjN0QHByb3Rvbm1haWwuY29tP...
null
CVE-2023-2102
Cross-site Scripting (XSS) - Stored in alextselegidis/easyappointments
Cross-site Scripting (XSS) - Stored in GitHub repository alextselegidis/easyappointments prior to 1.5.0.
[ { "commit_message": "[PATCH] Escape the user display name in the backend section application/views/components/backend_header.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBiZGRjNWNiZWI3ZmYyMzdhNzI5NDNiMzA0ZGNiMDFjNjUzNzgxNzY3IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBBb...
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
GHSA-vxcv-4xvf-pc22
django CMS Attributes Field Cross-site Scripting
null
[ { "commit_message": "[PATCH] feat: Add form field validation from model field (#56) * Add pypi actions * bump version * feat: Move field validation to form field * Bump version * Fix syntax error in test action * For action fixes * Update pypi actions .github/workflows/lint.yml | 2 +- .github/w...
null
CVE-2020-26268
Write to immutable memory region in TensorFlow
In affected versions of TensorFlow the tf.raw_ops.ImmutableConst operation returns a constant tensor created from a memory mapped file which is assumed immutable. However, if the type of the tensor is not an integral type, the operation crashes the Python interpreter as it tries to write to the memory area. If the file is too small, TensorFlow properly returns an error as the memory area has fewer bytes than what is needed for the tensor it creates. However, as soon as there are enough bytes, the above snippet causes a segmentation fault. This is because the allocator used to return the buffer data is not marked as returning an opaque handle since the needed virtual method is not overridden. This is fixed in versions 1.15.5, 2.0.4, 2.1.3, 2.2.2, 2.3.2, and 2.4.0.
[ { "commit_message": "[PATCH] Mark `MemmappedTensorAllocator` as returning opaque handle. This allocator is used for `ImmutableConstantOp` and it returns a handle to the contents of a memory mapped file which is supposed to represent a tensor. For tensors of complex types (resources, variables and strings), allo...
CWE-471 Modification of Assumed-Immutable Data (MAID)
CVE-2025-32022
Finit has heap based buffer overwrite in urandom.so plugin
Finit provides fast init for Linux systems. Finit's urandom plugin has a heap buffer overwrite vulnerability at boot which leads to it overwriting other parts of the heap, possibly causing random instabilities and undefined behavior. The urandom plugin is enabled by default, so this bug affects everyone using Finit 4.2 or later that do not explicitly disable the plugin at build time. This bug is fixed in Finit 4.12. Those who cannot upgrade or backport the fix to urandom.c are strongly recommended to disable the plugin in the call to the `configure` script.
[ { "commit_message": "[PATCH] plugins: use byte addressing of rand_pool_info data buffer Fix out-of-bounds write in urandom plugin. Signed-off-by: Joachim Wiberg <troglobit@gmail.com> plugins/urandom.c | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAzZmVmZjM3YmE1MWZhMGE2YT...
CWE-787: Out-of-bounds Write
CVE-2021-32434
abcm2ps v8.14.11 was discovered to contain an out-of-bounds read in the function calculate_beam at draw.c.
[ { "commit_message": "[PATCH] fix: array overflow when wrong duration in voice overlay Issue #83, parse.c | 9 +++++++-- 1 file changed, 7 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSAyZjU2ZTExNzljYWI2YWZmZWI4YWZhOWQ2YzMyNDAwOGZlNDBkOGUzIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBKZWFuLUZyYW5jb2lz...
n/a
GHSA-h3fg-h5v3-vf8m
CSRF forgery protection bypass in solidus_frontend
null
[ { "commit_message": "[PATCH] Protect `Spree::OrdersController#populate` against CSRF attacks See https://github.com/solidusio/solidus/security/advisories/GHSA-h3fg-h5v3-vf8m for all the details. Some time ago, all order actions were left out of CSRF protection (see 95ea57058ab1c5e722b327b10747cd41e68a4deb). The...
null
GHSA-xh66-6mj6-94rg
null
[ { "commit_message": "[PATCH] vm.c: create break object before clearing GC arena. Otherwise it possibly cause use-after-free. src/vm.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAzY2YyOTFmNzIyMjQ3MTU5NDJiZWFmODU1M2U0MmJhODg5MWFiM2M2IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9t...
null
PYSEC-2017-15
null
[ { "commit_message": "[PATCH] Fix #11, #12: quote attributes that need escaping in legacy browsers These are mostly out of the market now, so this isn't massively needed any more; nevertheless, avoiding XSS as much as possible is inevitably desirable. This alters the API so that quote_attr_values is now a ternar...
null
GHSA-25m9-4f22-2chr
null
[ { "commit_message": "[PATCH] fixed #1780 (fuzz) src/media_tools/av_parsers.c | 5 +++++ 1 file changed, 5 insertions(+)", "patch_text_b64": "RnJvbSAxMjczY2RjNzA2ZWVlZGY4MzQ2ZDRiOWZhYTViMzM0MzUwNTYwNjFkIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBqZWFubGYgPGplYW5sZkBncGFjLmlvPgpEYXRlOiBNb24sIDEwIE1heSAyMDIxIDEw...
null
CVE-2022-0569
Observable Discrepancy in snipe/snipe-it
Observable Discrepancy in Packagist snipe/snipe-it prior to v5.3.9.
[ { "commit_message": "[PATCH] Updated language string Signed-off-by: snipe <snipe@snipe.net> resources/lang/en/passwords.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAwNWMwODE5Nzc2YjA3NDI1YjI4MzFjZDMxYThhMGY0ZTdhYzMwYzA5IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBzbmlwZS...
CWE-203 Observable Discrepancy
GHSA-ggwg-cmwp-46r5
yiisoft/yii2 Mishandles the Attaching of Behavior Defined by a `__class` Array Key
null
[ { "commit_message": "[PATCH] Fix regression introduced in `GHSA-cjcc-p67m-7qxm` while attaching behavior defined by `__class` array key framework/CHANGELOG.md | 3 +-- framework/base/Component.php | 2 +- tests/framework/base/ComponentTest.php | 3 +++ 3 files changed, 5 insertions(+), 3 ...
null
CVE-2022-0552
A flaw was found in the original fix for the netty-codec-http CVE-2021-21409, where the OpenShift Logging openshift-logging/elasticsearch6-rhel8 container was incomplete. The vulnerable netty-codec-http maven package was not removed from the image content. This flaw affects origin-aggregated-logging versions 3.11.
[ { "commit_message": "[PATCH] Update netty to 4.1.63 elasticsearch/Dockerfile | 4 ++-- elasticsearch/Dockerfile.in | 4 ++-- elasticsearch/fetch-artifacts-koji.yaml | 4 ++-- 3 files changed, 6 insertions(+), 6 deletions(-)", "patch_text_b64": "RnJvbSBkNmI3MmQ2YzMyZTdjMDZiNjUzMjQyOTR...
CWE-444
GHSA-32rx-xvvr-4xv9
easyadmin-extension-bundle action case insensitivity
null
[ { "commit_message": "[PATCH] security breach on action case insensitivity src/Security/AdminAuthorizationChecker.php | 3 ++ tests/Controller/UserRolesTest.php | 47 ++++++++++++++++++++++ 2 files changed, 50 insertions(+)", "patch_text_b64": "RnJvbSA2ODQwN2NhNWJlNjQ0ZDFjNTNmYjg5NDQ1M2RmOTUxMjMwYWZjN...
null
CVE-2017-5669
The do_shmat function in ipc/shm.c in the Linux kernel through 4.9.12 does not restrict the address calculated by a certain rounding operation, which allows local users to map page zero, and consequently bypass a protection mechanism that exists for the mmap system call, by making crafted shmget and shmat system calls in a privileged context.
[ { "commit_message": "[PATCH] ipc/shm: Fix shmat mmap nil-page protection The issue is described here, with a nice testcase: https://bugzilla.kernel.org/show_bug.cgi?id=192931 The problem is that shmat() calls do_mmap_pgoff() with MAP_FIXED, and the address rounded down to 0. For the regular mmap case, the prot...
n/a
GHSA-ph73-qprj-85xp
null
[ { "commit_message": "[PATCH] Fixed #2584 src/scene_manager/loader_bt.c | 26 +++++++++++++++++++------- 1 file changed, 19 insertions(+), 7 deletions(-)", "patch_text_b64": "RnJvbSA2OTE0ZDAxNmUyYjU0MGJhYzJjNDcxYzRhZWExNTZkZGVmOGU4ZTAxIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBqZWFubGYgPGplYW5sZkBncGFjLmlvPgp...
null
GHSA-x7rp-74x2-mjf3
Segfault in Tensorflow
null
[ { "commit_message": "[PATCH] Fix multiple vulnerabilities in `tf.raw_ops.*CountSparseOutput`. Also add tests for these API points, both for the happy paths and for the vulnerable ones. PiperOrigin-RevId: 332563222 Change-Id: Ib3b52116a83a134c2e742a7c66e5e956db8fba05 tensorflow/core/kernels/count_ops.cc | ...
null
CVE-2023-51664
tj-actions/changed-files command injection in output filenames
tj-actions/changed-files is a Github action to retrieve all files and directories. Prior to 41.0.0, the `tj-actions/changed-files` workflow allows for command injection in changed filenames, allowing an attacker to execute arbitrary code and potentially leak secrets. This issue may lead to arbitrary command execution in the GitHub Runner. This vulnerability has been addressed in version 41.0.0. Users are advised to upgrade.
[ { "commit_message": "[PATCH] Merge pull request from GHSA-mcph-m25j-8j63 * feat: add `safe_output` input enabled by default * fix: migrate README to safe uses of interpolation * fix: README `uses` typo * fix: README examples to account for newlines * fix: README examples missing `safe_output` * fix: remove sani...
CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')
CVE-2024-55879
XWiki allows RCE from script right in configurable sections
XWiki Platform is a generic wiki platform. Starting in version 2.3 and prior to versions 15.10.9, 16.3.0, any user with script rights can perform arbitrary remote code execution by adding instances of `XWiki.ConfigurableClass` to any page. This compromises the confidentiality, integrity and availability of the whole XWiki installation. This has been patched in XWiki 15.10.9 and 16.3.0. No known workarounds are available except upgrading.
[ { "commit_message": "[PATCH] XWIKI-21207: Improve the evaluation of ConfigurableClass * Stop evaluating pretty names (which seems like an old feature no longer used anywhere) * Introduce ConfigurableObjectEvaluator to safely evaluate heading and linkPrefix properties .../xwiki-platform-administration/pom.xml ...
CWE-862: Missing Authorization
CVE-2016-9389
The jpc_irct and jpc_iict functions in jpc_mct.c in JasPer before 1.900.14 allow remote attackers to cause a denial of service (assertion failure).
[ { "commit_message": "[PATCH] The component domains must be the same for the ICT/RCT in the JPC codec. This was previously enforced with an assertion. Now, it is handled in a more graceful manner. src/libjasper/base/jas_image.c | 19 +++++++++++++++++++ src/libjasper/include/jasper/jas_image.h | 4 ++++...
n/a
CVE-2023-49294
Asterisk Path Traversal vulnerability
Asterisk is an open source private branch exchange and telephony toolkit. In Asterisk prior to versions 18.20.1, 20.5.1, and 21.0.1, as well as certified-asterisk prior to 18.9-cert6, it is possible to read any arbitrary file even when the `live_dangerously` is not enabled. This allows arbitrary files to be read. Asterisk versions 18.20.1, 20.5.1, and 21.0.1, as well as certified-asterisk prior to 18.9-cert6, contain a fix for this issue.
[ { "commit_message": "[PATCH] manager.c: Prevent path traversal with GetConfig. When using AMI GetConfig, it was possible to access files outside of the Asterisk configuration directory by using filenames with \"..\" and \"./\" even while live_dangerously was not enabled. This change resolves the full path and e...
CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2023-2104
Improper Access Control in alextselegidis/easyappointments
Improper Access Control in GitHub repository alextselegidis/easyappointments prior to 1.5.0.
[ { "commit_message": "[PATCH] Do not return appointments of a different user to the another provider or secretary on the default calendar screen. application/controllers/Calendar.php | 56 ++++++++++++++++++++++++++++ 1 file changed, 56 insertions(+)", "patch_text_b64": "RnJvbSA3NWIyNDczNTc2Nzg2ODM0NDE5M2ZiMm...
CWE-284 Improper Access Control
GHSA-wjvx-jhpj-r54r
sagemaker-python-sdk vulnerable to Deserialization of Untrusted Data
null
[ { "commit_message": "[PATCH] feature: set default allow_pickle param to False (#4557) * breaking: set default allow_pickle param to False * breaking: fix unit tests and linting NumpyDeserializer will not allow deserialization unless allow_pickle flag is set to True explicitly * fix: black-check Co-authored-by: ...
null
CVE-2022-24842
Improper Privilege Management in MinIO
MinIO is a High Performance Object Storage released under GNU Affero General Public License v3.0. A security issue was found where an non-admin user is able to create service accounts for root or other admin users and then is able to assume their access policies via the generated credentials. This in turn allows the user to escalate privilege to that of the root user. This vulnerability has been resolved in pull request #14729 and is included in `RELEASE.2022-04-12T06-55-35Z`. Users unable to upgrade may workaround this issue by explicitly adding a `admin:CreateServiceAccount` deny policy, however, this, in turn, denies the user the ability to create their own service accounts as well.
[ { "commit_message": "[PATCH] Fix service account privilege escalation (#14729) Ensure that a regular unprivileged user is unable to create service accounts for other users/root. cmd/admin-handlers-users.go | 1 - cmd/admin-handlers-users_test.go | 3 +++ cmd/sts-handlers_test.go | 9 +++++++++ 3 files...
CWE-269: Improper Privilege Management
GHSA-fvcq-4x64-hqxr
Jupyter Server Proxy has a reflected XSS issue in host parameter
null
[ { "commit_message": "[PATCH 1/4] Escape invalid host when displayed in html jupyter_server_proxy/handlers.py | 3 ++- tests/test_proxies.py | 8 ++++++++ 2 files changed, 10 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAwOTUwMjUyODhlMzkxMzIwZjc3M2VlYTQ2MjkwOTNlMGY5N2E2ZWMyIE1vbiBTZXAgMTc...
null
CVE-2024-28232
Username Enumeration in CasaOS via bypass of CVE-2024-24766
Go package IceWhaleTech/CasaOS-UserService provides user management functionalities to CasaOS. The Casa OS Login page has disclosed the username enumeration vulnerability in the login page which was patched in version 0.4.7. This issue in CVE-2024-28232 has been patched in version 0.4.8 but that version has not yet been uploaded to Go's package manager.
[ { "commit_message": "[PATCH] Merge pull request from GHSA-hcw2-2r9c-gc6p route/v1/user.go | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBkZDkyN2ZlMWM4MDVlNTM3OTBmNzNjZmUxMGM3YTRkZWQzYmM1YmRiIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBDb3JyZWN0Um9hZCA8YTc3ODkxNzM2OUBnbWFpbC5j...
CWE-204: Observable Response Discrepancy
GHSA-746g-3gfp-hfhw
Devise Gem for Ruby Unauthorized Access Using "Remember Me" Cookie
null
[ { "commit_message": "[PATCH] Store creation timestamp on remember cookies MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Signed-off-by: José Valim <jose.valim@plataformatec.com.br> lib/devise.rb | 1 + lib/devise/controllers/rememberable.rb | ...
null
GHSA-gm45-q3v2-6cf8
Fast-JWT Improperly Validates iss Claims
null
[ { "commit_message": "[PATCH] Merge commit from fork * fix: add stricter validation to ensure claims for jti, iss, sub and nonce in the token are valid * fix: lint updates src/verifier.js | 12 ++++ test/verifier.spec.js | 140 ++++++++++++++++++++++++++++++++++++++++++ 2 files changed, 152 insertions(+)", ...
null
CVE-2017-14608
In LibRaw through 0.18.4, an out of bounds read flaw related to kodak_65000_load_raw has been reported in dcraw/dcraw.c and internal/dcraw_common.cpp. An attacker could possibly exploit this flaw to disclose potentially sensitive memory or cause an application crash.
[ { "commit_message": "[PATCH] CVE-2017-1438 credits; fix for Kodak 65000 out of bounds access Changelog.txt | 6 +++++- dcraw/dcraw.c | 11 +++++++++-- internal/dcraw_common.cpp | 11 +++++++++-- 3 files changed, 23 insertions(+), 5 deletions(-)", "patch_text_b64": "RnJvbSBkMTNlOGY2ZDFl...
n/a
GHSA-rh8q-83xv-8vw7
null
[ { "commit_message": "[PATCH] Don't directly inject $_GET parameters in html. The Search module created a canonical tag containing a directly injected $_GET parameter. This commit makes sure we encode specialcharacters making XSS impossible. Fixes #1018 src/Frontend/Modules/Search/Actions/Index.php | 2 +- 1 file...
null
GHSA-chr6-8347-2cjg
null
[ { "commit_message": "[PATCH] signal: always clear sa_restorer on execve When the new signal handlers are set up, the location of sa_restorer is not cleared, leaking a parent process's address space location to children. This allows for a potential bypass of the parent's ASLR by examining the sa_restorer value ...
null
GHSA-vh7m-p724-62c2
Signature Malleabillity in elliptic
null
[ { "commit_message": "[PATCH] signature: prevent malleability and overflows lib/elliptic/ec/signature.js | 40 ++++++++++++++++++++++++++++++++---- 1 file changed, 36 insertions(+), 4 deletions(-)", "patch_text_b64": "RnJvbSA4NTZmZTRkOTlmZTdiNjIwMDU1NmU2NDAwYjNiZjU4NWIxNzIxYmVjIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAw...
null
CVE-2025-29788
Sylius PayPal Plugin Payment Amount Manipulation Vulnerability
The Syliud PayPal Plugin is the Sylius Core Team’s plugin for the PayPal Commerce Platform. A vulnerability in versions prior to 1.6.1, 1.7.1, and 2.0.1 allows users to manipulate the final payment amount processed by PayPal. If a user modifies the item quantity in their shopping cart after initiating the PayPal Express Checkout process, PayPal will not receive the updated total amount. As a result, PayPal captures only the initially transmitted amount, while Sylius incorrectly considers the order fully paid based on the modified total. This flaw can be exploited both accidentally and intentionally, potentially enabling fraud by allowing customers to pay less than the actual order value. Attackers can intentionally pay less than the actual total order amount, business owners may suffer financial losses due to underpaid orders, and integrity of payment processing is compromised. The issue is fixed in versions 1.6.1, 1.7.1, 2.0.1, and above. To resolve the problem in the end application without updating to the newest patches, there is a need to overwrite `ProcessPayPalOrderAction`, `CompletePayPalOrderFromPaymentPageAction`, and `CaptureAction` with modified logic.
[ { "commit_message": "[PATCH] Fix amount change on checkout UPGRADE.md | 30 ++++ spec/Payum/Action/CaptureActionSpec.php | 1 + ...mpletePayPalOrderFromPaymentPageAction.php | 57 ++++++++ src/Controller/ProcessPayPalOrderAction.php | 51 +++++++ .../PaymentAmountMism...
CWE-472: External Control of Assumed-Immutable Web Parameter
CVE-2023-6546
Kernel: gsm multiplexing race condition leads to privilege escalation
A race condition was found in the GSM 0710 tty multiplexor in the Linux kernel. This issue occurs when two threads execute the GSMIOC_SETCONF ioctl on the same tty file descriptor with the gsm line discipline enabled, and can lead to a use-after-free problem on a struct gsm_dlci while restarting the gsm mux. This could allow a local unprivileged user to escalate their privileges on the system.
[ { "commit_message": "[PATCH] tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux In commit 9b9c8195f3f0 (\"tty: n_gsm: fix UAF in gsm_cleanup_mux\"), the UAF problem is not completely fixed. There is a race condition in gsm_cleanup_mux(), which caused this UAF. The UAF problem is triggered by th...
Use After Free
CVE-2023-40013
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in external-svg-loader
SVG Loader is a javascript library that fetches SVGs using XMLHttpRequests and injects the SVG code in the tag's place. According to the docs, svg-loader will strip all JS code before injecting the SVG file for security reasons but the input sanitization logic is not sufficient and can be trivially bypassed. This allows an attacker to craft a malicious SVG which can result in Cross-site Scripting (XSS). When trying to sanitize the svg the lib removes event attributes such as `onmouseover`, `onclick` but the list of events is not exhaustive. Any website which uses external-svg-loader and allows its users to provide svg src, upload svg files would be susceptible to stored XSS attack. This issue has been addressed in commit `d3562fc08` which is included in releases from 1.6.9. Users are advised to upgrade. There are no known workarounds for this vulnerability.
[ { "commit_message": "[PATCH 1/3] Fix XSS vulnerability svg-loader.js | 7 +++++-- test/icons/svg-xss-2.svg | 3 +++ test/icons/svg-xss.svg | 3 +++ test/index.html | 10 +++++++++- 4 files changed, 20 insertions(+), 3 deletions(-) create mode 100644 test/icons/svg-xss-2.svg create mode 1006...
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2012-1188
Multiple cross-site scripting (XSS) vulnerabilities in Fork CMS before 3.2.7 allow remote attackers to inject arbitrary web script or HTML via the (1) type or (2) querystring parameters to private/en/error or (3) name parameter to private/en/locale/index.
[ { "commit_message": "[PATCH] fix xss vulnerability backend/modules/error/actions/index.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAxMjY5ZmU4YjM4MTNjN2I3ZDU1NTJhMmI4OGJjMmU3YmQ0ZDBjMWY5IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBtbGl0biA8bWF0dGhpYXNAbXVsbGllLmV1PgpEYXR...
n/a
GHSA-p5xg-9chh-rh94
null
[ { "commit_message": "[PATCH] BZ1158017: fix XXE vulnerability when importing a BP from a bpmn2 (XML) file. .../jbpm/designer/bpmn2/resource/JBPMBpmn2ResourceImpl.java | 5 +++++ 1 file changed, 5 insertions(+)", "patch_text_b64": "RnJvbSA1NjQxNTg4YzczMGNjNzVkYzNiNzZjMzRiNzYyNzFmYmQ0MDdmYjg0IE1vbiBTZXAgMTcgM...
null
GHSA-5899-hhfh-hw26
null
[ { "commit_message": "[PATCH] fix XSS issue in log tailing agent/listener/templates/tail.html | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA1YWJiY2Q3YWEyNmUwZmM4MTVlNmIyYjBmZmUxYzE1ZWYzZThmYWI1IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBTdGVwaGVuIFZhbiBEYWhtIDxzdmFuZGFobUBuY...
null
CVE-2018-14881
The BGP parser in tcpdump before 4.9.3 has a buffer over-read in print-bgp.c:bgp_capabilities_print() (BGP_CAPCODE_RESTART).
[ { "commit_message": "[PATCH] (for 4.9.3) CVE-2018-14881/BGP: Fix BGP_CAPCODE_RESTART. Add a bounds check and a comment to bgp_capabilities_print(). This fixes a buffer over-read discovered by Bhargava Shastry, SecT/TU Berlin. Add a test using the capture file supplied by the reporter(s). print-bgp.c ...
n/a
GHSA-ff28-f46g-r9g8
Cross-site Scripting in Gogs
null
[ { "commit_message": "[PATCH] attachment: set CSP header in the serving endpoint (#6926) internal/cmd/web.go | 1 + 1 file changed, 1 insertion(+)", "patch_text_b64": "RnJvbSBiYzc3NDQwYjMwMWFjODc4MDY5OGJlOTFkZmYxYWMzM2I3Y2VlODUwIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBKb2UgQ2hlbiA8amNAdW5rbndvbi5pbz4KRGF0ZT...
null
GHSA-5fh7-7mw7-mmx5
Mattermost allows team admins to promote guests to team admins
null
[ { "commit_message": "[PATCH] MM-56536 Do not update team members scheme roles if user is guest (#25957) (#26447) Automatic Merge server/channels/api4/team_test.go | 4 ++++ server/channels/app/team.go | 16 ++++++++++++---- server/i18n/en.json | 8 ++++++++ 3 files changed, 24 insertions(+), ...
null
GHSA-2xwq-h7r9-6w27
Cross-site Scripting in kimai2
null
[ { "commit_message": "[PATCH] prevent csrf to flush logs (#2930) src/Controller/DoctorController.php | 14 ++++++++++++-- templates/doctor/index.html.twig | 2 +- 2 files changed, 13 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSA2YjQ5NTM1YjUyM2RjZDM2ZWM1OTQ2MmVlNGU2N2UyYjNhOTE1MWYzIE1vbiBTZXAgM...
null
CVE-2025-54071
RomM's authenticated arbitrary file write vulnerability can lead to Remote Code Execution
RomM (ROM Manager) allows users to scan, enrich, browse and play their game collections with a clean and responsive interface. In versions 4.0.0-beta.3 and below, an authenticated arbitrary file write vulnerability exists in the /api/saves endpoint. This can lead to Remote Code Execution on the system. The vulnerability permits arbitrary file write operations, allowing attackers to create or modify files at any filesystem location with user-supplied content. A user with viewer role or Scope.ASSETS_WRITE permission or above is required to pass authentication checks. The vulnerability is fixed in version 4.0.0-beta.4.
[ { "commit_message": "[PATCH 01/25] Create safe filesystem handler backend/endpoints/firmware.py | 7 +- backend/endpoints/platform.py | 1 + backend/endpoints/rom.py | 3 +- backend/endpoints/saves.py | 11 +- backend/endpoints/screensho...
CWE-434: Unrestricted Upload of File with Dangerous Type
GHSA-6gch-63wp-4v5f
Apache Linkis Spark EngineConn: Commons Lang's RandomStringUtils Random string security vulnerability
null
[ { "commit_message": "[PATCH] [MINOR] add util for generating random strings (#5143) LICENSE | 1 + .../executor/SecureRandomStringUtils.java | 221 ++++++++++++++++++ .../spark/executor/SparkPythonExecutor.scala | 5 +- 3 files changed, 224 insertions(+), 3 deletions(...
null
GHSA-9j4f-f249-q5w8
Default installation of `synthetic-monitoring-agent` exposes sensitive information
null
[ { "commit_message": "[PATCH] Fix: allow getting API token from environment Allow the API token to be obtained from the environment variable SM_AGENT_API_TOKEN. If it's passed on the command line, that value takes precedence. For backwards compatibility, in case the user decides to NOT replace the existing confi...
null
GHSA-m7x8-7676-244m
null
[ { "commit_message": "[PATCH] More security fixes: css.php Unfiltered $_POSTs everywhere! Prevent XSS in Create CSS form entry [http://forums.rivetcode.com/viewtopic.php?f=9&t=342&p=1144#p1144] Typo in create css file error message. Needed to connect to database for cleaning function. edit_database.php One line ...
null
CVE-2024-11407
Denial of Service through Data corruption in gRPC-C++
There exists a denial of service through Data corruption in gRPC-C++ - gRPC-C++ servers with transmit zero copy enabled through the channel arg GRPC_ARG_TCP_TX_ZEROCOPY_ENABLED can experience data corruption issues. The data sent by the application may be corrupted before transmission over the network thus leading the receiver to receive an incorrect set of bytes causing RPC requests to fail. We recommend upgrading past commit e9046b2bbebc0cb7f5dc42008f807f6c7e98e791
[ { "commit_message": "[PATCH] [EventEngine] Fix bug in Tx0cp code path in posix endpoint. This fix ensures that the iov_base pointers point to the right address. PiperOrigin-RevId: 673923651 src/core/lib/event_engine/posix_engine/posix_endpoint.cc | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch...
CWE-682 Incorrect Calculation
CVE-2022-47933
Brave Browser before 1.42.51 allowed a remote attacker to cause a denial of service via a crafted HTML file that references the IPFS scheme. This vulnerability is caused by an uncaught exception in the function ipfs::OnBeforeURLRequest_IPFSRedirectWork() in ipfs_redirect_network_delegate_helper.cc.
[ { "commit_message": "[PATCH] Do not proceed loading ipfs resources if ipfs is disabled Resolves https://github.com/brave/brave-browser/issues/23646 .../ipfs_redirect_network_delegate_helper.cc | 19 +++++++- ...direct_network_delegate_helper_unittest.cc | 47 +++++++++++++++++++ 2 files changed, 64 insertions(+)...
n/a
CVE-2019-19384
A cross-site scripting (XSS) vulnerability in app/fax/fax_log_view.php in FusionPBX 4.4.1 allows remote attackers to inject arbitrary web script or HTML via the fax_uuid parameter.
[ { "commit_message": "[PATCH] Update fax_log_view.php app/fax/fax_log_view.php | 48 ++++++++++++++++++++++------------------ 1 file changed, 26 insertions(+), 22 deletions(-)", "patch_text_b64": "RnJvbSBhZWExYWJhZWIxMmY2OWRjMjI5NjczOTVjNTI4ZmIyNDM0ZTMxNmMxIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBGdXNpb25QQ...
n/a
GHSA-f57x-prr8-55vv
null
[ { "commit_message": "[PATCH] multispectral MIFF images renders all channels in arbitrary order coders/miff.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSA4MWFjOGEwZDJlYjIxNzM5ODQyZWQxOGM0OGM3NjQ2YjdlZWY2NWI4IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBDcmlzdHkgPHVyYmF...
null
CVE-2024-6090
Path Traversal Vulnerability in gaizhenbiao/chuanhuchatgpt
A path traversal vulnerability exists in gaizhenbiao/chuanhuchatgpt version 20240410, allowing any user to delete other users' chat histories. This vulnerability can also be exploited to delete any files ending in `.json` on the target system, leading to a denial of service as users are unable to authenticate.
[ { "commit_message": "[PATCH] bugfix: Added additional checks when saving/deleting histories. modules/models/base_model.py | 4 ++++ modules/utils.py | 3 +++ 2 files changed, 7 insertions(+)", "patch_text_b64": "RnJvbSA1MjZjNjE1YzQzNzM3N2VlOWM3MWY4NjZmZDBmMTkwMTE5MTBmNzA1IE1vbiBTZXAgMTcgMDA6MDA6MD...
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
GHSA-x8qg-5w28-wmr9
null
[ { "commit_message": "[PATCH] fix: add extra security to file endpoints (#5090) packages/backend/src/routers/projectRouter.ts | 19 +++++++++---------- packages/backend/src/routers/slackRouter.ts | 12 +++++++++--- 2 files changed, 18 insertions(+), 13 deletions(-)", "patch_text_b64": "RnJvbSBmY2M4MDhjODRjMm...
null
GHSA-hh82-3pmq-7frp
Netty vulnerable to HTTP Response splitting from assigning header value iterator
null
[ { "commit_message": "[PATCH] Avoid including header values in header validation failure exceptions (#12642) Motivation: Exception messages may end up in logs, or other error reporting mechanisms, and we cannot necessarily tell at header validation time if the header value is sensitive information or not. Hence,...
null
CVE-2022-24753
Code injection in Stripe CLI on windows
Stripe CLI is a command-line tool for the Stripe eCommerce platform. A vulnerability in Stripe CLI exists on Windows when certain commands are run in a directory where an attacker has planted files. The commands are `stripe login`, `stripe config -e`, `stripe community`, and `stripe open`. MacOS and Linux are unaffected. An attacker who successfully exploits the vulnerability can run arbitrary code in the context of the current user. The update addresses the vulnerability by throwing an error in these situations before the code can run.Users are advised to upgrade to version 1.7.13. There are no known workarounds for this issue.
[ { "commit_message": "[PATCH] replace exec package (#820) pkg/config/config.go | 3 ++- pkg/open/open.go | 3 ++- 2 files changed, 4 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSBiZTM4ZGE1YzAxOTFhZGI3N2Y2NjFmNzY5ZmZmZjJmYmM3ZGRmNmNkIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBWaW5jZW50IENoZXVuZyA...
CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2019-15167
The VRRP parser in tcpdump before 4.9.3 has a buffer over-read in print-vrrp.c:vrrp_print() for VRRP version 3, a different vulnerability than CVE-2018-14463.
[ { "commit_message": "[PATCH] (for 4.9.3) VRRP: Add a missing bounds check In vrrp_print(). This fixes a buffer over-read discovered by Konrad Rieck and Bhargava Shastry. Add a test using the capture file supplied by the reporter(s) restricted to VRRP packets. print-vrrp.c | 4 +++- tests/T...
n/a
GHSA-gc87-qwmv-7x9x
Stored XSS vulnerability in Jenkins Artifact Repository Parameter Plugin
null
[ { "commit_message": "[PATCH] SECURITY-2168 - Set escape option to explicit true .../artifactrepo/ArtifactRepoParamDefinition/index.jelly | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA4NGI2M2Y3YWYxMDFmNjhkN2NjZDViYzljNTY5ZjQ1M2YxZjgzZjgyIE1vbiBTZXAgMTcgMDA6MDA6MDAgMj...
null
GHSA-fmcf-gvjr-vvf9
null
[ { "commit_message": "[PATCH] Fixing security vunerability Web/Controllers/InvitationsController.cs | 42 +++++++++++++++--------- Web/ViewModels/InvitationViewModel.cs | 2 ++ Web/Views/Invitations/Index.cshtml | 4 +-- 3 files changed, 31 insertions(+), 17 deletions(-)", "patch_text_b64": "RnJvbSA1...
null
GHSA-gvgg-6q8m-jmph
null
[ { "commit_message": "[PATCH] ... coders/mpc.c | 1 - 1 file changed, 1 deletion(-)", "patch_text_b64": "RnJvbSA1MjlmZjI2YjY4ZmViYjJhYzAzMDYyYzU4NDUyZWEwYjRjNmVkYmMxIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBDcmlzdHkgPHVyYmFuLXdhcnJpb3JAaW1hZ2VtYWdpY2sub3JnPgpEYXRlOiBUaHUsIDYgSnVsIDIwMTcgMDY6NDM6MzIgLTA0MDAKU...
null
GHSA-fh37-cx83-q542
Improper Authentication in Apache Airflow
null
[ { "commit_message": "[PATCH] Add authentication to lineage endpoint for experimental API (#13870) (cherry picked from commit 24a54242d56058846c7978130b3f37ca045d5142) airflow/www/api/experimental/endpoints.py | 1 + 1 file changed, 1 insertion(+)", "patch_text_b64": "RnJvbSAyMWNlZGZmMjA1ZTdkNjI2NzU5NDlmZGEyY...
null
GHSA-xw2r-f8xv-c8xp
PrestaShop XSS injection through Validate::isCleanHTML method
null
[ { "commit_message": "[PATCH] add missing html attributes classes/Validate.php | 1 + 1 file changed, 1 insertion(+)", "patch_text_b64": "RnJvbSBhZmY0YmM2MWUwZTBkOTk0MTgyNDFhOTEwNWIxOTg4ZTgwNmIzZWU4IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBtYXR0aGlldS1yb2xsYW5kIDxtYXR0aGlldS5yb2xsYW5kQHByZXN0YXNob3AuY29tPgpE...
null
GHSA-vmhh-8rxq-fp9g
ImageMagick has XMP profile write that triggers hang due to unbounded loop
null
[ { "commit_message": "[PATCH] Added extra checks to make sure we don't get stuck in the while loop. MagickCore/image-private.h | 1 + MagickCore/profile.c | 11 +++++++++++ 2 files changed, 12 insertions(+)", "patch_text_b64": "RnJvbSAyMjlmYTk2YTk4OGEyMWQ3ODMxOGJiY2E2MTI0NWE2ZWQxZWUzM2EwIE1vbiBTZXAgMTcg...
null
GHSA-47pj-q2vm-46xc
Collection.js vulnerable to Prototype Pollution
null
[ { "commit_message": "[PATCH] fix: fixed prototype pollution issue src/iterators/extend.js | 4 ++++ 1 file changed, 4 insertions(+)", "patch_text_b64": "RnJvbSBkM2Q5Mzc2NDVmNjJmMzdkMzExNWQ2YWE5MGJiNTEwZmQ4NTZlNmEyIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBrb2Jlenp6YSA8a29iZXp6emFAZ21haWwuY29tPgpEYXRlOiBGcmks...
null
CVE-2019-25096
soerennb eXtplorer cross site scripting
A vulnerability has been found in soerennb eXtplorer up to 2.1.12 and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross site scripting. The attack can be launched remotely. Upgrading to version 2.1.13 is able to address this issue. The patch is named b8fcb888f4ff5e171c16797a4b075c6c6f50bf46. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217435.
[ { "commit_message": "[PATCH] - fixed various security issues reported by Mario Korth: * potential XSS * Arbitrary file read * Path traversal in listing directory contents * Path traversal in archive feature - added new turkish translations CHANGELOG.txt | 9 +++ admin.extplorer.php ...
CWE-79 Cross Site Scripting
CVE-2025-65781
An issue was discovered in Wekan The Open Source kanban board system up to version 18.15, fixed in 18.16. Attachment upload API treats the Authorization bearer value as a userId and enters a non-terminating body-handling branch for any non-empty bearer token, enabling trivial application-layer DoS and latent identity-spoofing.
[ { "commit_message": "[PATCH] Fix SECURITY ISSUE 5: Attachment API uses bearer value as userId and DoS (Low). Thanks to Siam Thanat Hack (STH) and xet7 ! SECURITY.md | 15 ++ server/lib/tests/attachmentApi.tests.js | 203 ++++++++++++++++++++++++ server/lib/tests/index.js ...
n/a
CVE-2025-58371
Roo Code is vulnerable to command injection via GitHub actions workflow
Roo Code is an AI-powered autonomous coding agent that lives in users' editors. In versions 3.26.6 and below, a Github workflow used unsanitized pull request metadata in a privileged context, allowing an attacker to craft malicious input and achieve Remote Code Execution (RCE) on the Actions runner. The workflow runs with broad permissions and access to repository secrets. It is possible for an attacker to execute arbitrary commands on the runner, push or modify code in the repository, access secrets, and create malicious releases or packages, resulting in a complete compromise of the repository and its associated services. This is fixed in version 3.26.7.
[ { "commit_message": "[PATCH] Delete .github/workflows/discord-pr-notify.yml .github/workflows/discord-pr-notify.yml | 26 ------------------------- 1 file changed, 26 deletions(-) delete mode 100644 .github/workflows/discord-pr-notify.yml", "patch_text_b64": "RnJvbSBhMDM4NGYzNWQ1YWUzYjdmNjY1MDZjYzYyZGRhMjVkO...
CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2019-12981
Ming (aka libming) 0.4.8 has an "fill overflow" vulnerability in the function SWFShape_setLeftFillStyle in blocks/shape.c.
[ { "commit_message": "[PATCH] SWFShape_setLeftFillStyle: prevent fill overflow src/blocks/shape.c | 5 +++++ 1 file changed, 5 insertions(+)", "patch_text_b64": "RnJvbSA2ZTc2ZThjNzFjYjUxYzhiYTBhYTk3MzdhNjM2YjlhYzMwMjk4ODdmIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBZb3VuZyBYaWFvIDxZYW5nWDkyQGhvdG1haWwuY29tPgpE...
n/a
CVE-2013-4509
The default configuration of IBUS 1.5.4, and possibly 1.5.2 and earlier, when IBus.InputPurpose.PASSWORD is not set and used with GNOME 3, does not obscure the entered password characters, which allows physically proximate attackers to obtain a user password by reading the lockscreen.
[ { "commit_message": "[PATCH] Added to check the input purpose for gnome-shell password dialog. engine/engine.py | 14 ++++++++++++++ 1 file changed, 14 insertions(+)", "patch_text_b64": "RnJvbSA2YWFlMGE5ZjE0NWY1MzY1MTVlMjY4ZGQ2YjI1YWE3NDBhNWVkZmU3IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBmdWppd2FyYXQgPHRha2...
n/a
CVE-2023-22730
Improper Input Validation of Clearance sale in cart
Shopware is an open source commerce platform based on Symfony Framework and Vue js. In affected versions It was possible to put the same line item multiple times in the cart using the AP. The Cart Validators checked the line item's individuality and the user was able to bypass quantity limits in sales. This problem has been fixed with version 6.4.18.1. Users on major versions 6.1, 6.2, and 6.3 may also obtain this fix via a plugin.
[ { "commit_message": "[PATCH] NEXT-23325 - Add product line item validator for duplicate line items with stock issues ...-issues-on-duplicate-product-line-items.md | 6 ++ .../Checkout/DependencyInjection/cart.xml | 4 + .../Product/Cart/ProductLineItemValidator.php | 64 +++++++++++ .../Product/Cart/Produ...
CWE-20: Improper Input Validation
CVE-2022-24833
Persistent Cross-site Scripting (XSS) vulnerability in PrivateBin
PrivateBin is minimalist, open source online pastebin clone where the server has zero knowledge of pasted data. In PrivateBin < v1.4.0 a cross-site scripting (XSS) vulnerability was found. The vulnerability is present in all versions from v0.21 of the project, which was at the time still called ZeroBin. The issue is caused by the fact that SVGs can contain JavaScript. This can allow an attacker to execute code, if the user opens a paste with a specifically crafted SVG attachment, and interacts with the preview image and the instance isn't protected by an appropriate content security policy. Users are advised to either upgrade to version 1.4.0 or to ensure the content security policy of their instance is set correctly.
[ { "commit_message": "[PATCH] Sanitize SVG preview, preventing script execution in instance context, while dropping support for attachment download in IE CHANGELOG.md | 2 + js/privatebin.js | 118 +++++++++++++++++++++++++++++++++------------- tpl/bootstrap.php | 2 +- tpl/page.php | 2 +- 4 files ...
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
GHSA-78hm-5hjw-58mh
ua-parser/uap-php ReDoS vulnerability
null
[ { "commit_message": "[PATCH 1/8] safe regexes package.json | 5 +- regexes.yaml | 392 +++++++++++++++++++++++------------------------ tests/regexes.js | 27 ++++ 3 files changed, 226 insertions(+), 198 deletions(-) create mode 100644 tests/regexes.js", "patch_text_b64": "RnJvbSBiZjgwZWIyNWY5NDBmMmM...
null
CVE-2021-41317
XSS Hunter Express before 2021-09-17 does not properly enforce authentication requirements for paths.
[ { "commit_message": "[PATCH] Better path checking api.js | 10 +++++++++- 1 file changed, 9 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA1NmJiNDRlZDkwMjQ4NDlmNjQxNzNmNzE1ODNlY2I3ZDg3M2JhYmEwIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiAiTWF0dGhldyBCcnlhbnQgKG1hbmRhdG9yeSkiIDxtYXR0QHJlZmluZXJ5LmlvPgp...
n/a
GHSA-v67x-89x7-mh47
null
[ { "commit_message": "[PATCH] Build97 - Task Hijacking Via Misconfigured AndroidManifest.xml app/src/main/AndroidManifest.xml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBhMGMzZTY4YjA1NDJiY2Q3MDA3YzkzNjE4ZTBkNTBhNTMzMWRlMDYxIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBIYW16Y...
null
GHSA-r95w-889q-x2gx
org.xwiki.platform:xwiki-platform-notifications-ui is missing checks for notification filter preferences editions
null
[ { "commit_message": "[PATCH] XWIKI-20337: Bad condition for editing notification filter preferences (cherry picked from commit e8acc9d8e6af7dfbfe70716ded431642ae4a6dd4) .../Notifications/Code/NotificationPreferenceService.xml | 7 +++++-- 1 file changed, 5 insertions(+), 2 deletions(-)", "patch_text_b64": ...
null
GHSA-hhcq-ph6w-494g
Shopware vulnerable to Improper Access Control with ManyToMany associations in store-api
null
[ { "commit_message": "[PATCH] NEXT-37397 - Security picks .../Twig/Node/FeatureCallSilentToken.php | 4 ++- Framework/Context.php | 12 ++++---- .../DataAbstractionLayerException.php | 11 +++++++ .../Dbal/EntityAggregator.php | 5 ++++ .../Search/Parser/Aggrega...
null
GHSA-xf5p-87ch-gxw2
Marked ReDoS due to email addresses being evaluated in quadratic time
null
[ { "commit_message": "[PATCH] security: fix regexes vulnerable to catastrophic backtracking Problem: Four regexes were vulnerable to catastrophic backtracking. This leaves markdown servers open to a potential REDOS attack. Solution: Refactor the regexes. For two similar regexes (html) I didn't change the languag...
null
GHSA-mg7w-c9x2-xh7r
Karmada PULL Mode Cluster Privilege Escalation
null
[ { "commit_message": "[PATCH] minimize the RBAC permissions for the pull mode cluster Signed-off-by: zhzhuang-zju <m17799853869@163.com> .../deploy/bootstrap-token-configuration.yaml | 316 +++--------- ..._karmada_bootstrap_token_configuration.tpl | 146 ++---- .../bootstraptoken/agent/tlsbootstrap.go | 30 ...
null
GHSA-pmf5-gx6h-8x53
null
[ { "commit_message": "[PATCH] Fix CSV injection issue if server responds with a malicious Server string & CSV output is opened in Excel or other spreadsheet app. Potentially malicious cell start characters are now prefaced with a ' mark. Thanks to Adam (@bytesoverbombs) for letting me know! Also fixed a crash in...
null
CVE-2023-3075
Cross-Site Request Forgery (CSRF) in tsolucio/corebos
Cross-Site Request Forgery (CSRF) in GitHub repository tsolucio/corebos prior to 8.
[ { "commit_message": "[PATCH] sec(2FA) apply CSRF check Smarty/templates/modules/Utilities/2fa.tpl | 2 +- include/integrations/2fa/settings.php | 1 + 2 files changed, 2 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAyZTQxNWZiNDYxM2JjNDEyMjU3OGRhZDVmNDBjNmY4MTljMjI4YTQ4IE1vbiBTZXAgMTcgMDA6MDA6M...
CWE-352 Cross-Site Request Forgery (CSRF)
CVE-2026-22589
Spree API has Unauthenticated IDOR - Guest Address
Spree is an open source e-commerce solution built with Ruby on Rails. Prior to versions 4.10.2, 5.0.7, 5.1.9, and 5.2.5, an Unauthenticated Insecure Direct Object Reference (IDOR) vulnerability was identified that allows an unauthenticated attacker to access guest address information without supplying valid credentials or session cookies. This issue has been patched in versions 4.10.2, 5.0.7, 5.1.9, and 5.2.5.
[ { "commit_message": "[PATCH] Fixes GHSA-3ghg-3787-w2xr Unauthenticated IDOR - Guest Address (#13422) Fixed ability check for address management in storefront exposing ability for guest users to edit/view other guest users addresses. This required knowing Address ID and internal Spree Address Book URLs. core/app...
CWE-639: Authorization Bypass Through User-Controlled Key
GHSA-6v92-r5mx-h5fx
smolagents has Sandbox Escape Vulnerability in the local_python_executor.py Module
null
[ { "commit_message": "<8515462+albertvillanova@users.noreply.github.com> [PATCH] Prevent submodules through indirect attribute access in LocalPythonExecutor (#1375) src/smolagents/local_python_executor.py | 123 ++++++++++++++++-------- tests/test_local_python_executor.py | 61 +++++++++++- 2 files changed, 1...
null
GHSA-ghq8-mj24-5v6f
null
[ { "commit_message": "[PATCH] mboxlist: fix uninitialised memory use where pattern is \"Other Users\" imap/mboxlist.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA2YmQzMzI3NTM2OGVkZmE3MWFlMTE3ZGU4OTU0ODg1ODQ2NzhhYzc5IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBCcm9uIEdvbmR3Y...
null
CVE-2019-16930
Zcashd in Zcash before 2.0.7-3 allows discovery of the IP address of a full node that owns a shielded address, related to mishandling of exceptions during deserialization of note plaintexts. This affects anyone who has disclosed their zaddr to a third party.
[ { "commit_message": "[PATCH] Ignore exceptions when deserializing note plaintexts src/zcash/Note.cpp | 50 +++++++++++++++++++++++++++++----------------- 1 file changed, 32 insertions(+), 18 deletions(-)", "patch_text_b64": "RnJvbSBjMWZiZjhhYjVkNzNjZmY1ZTFmNDUyMzY5OTU4NTdjNzViYTQxMjhkIE1vbiBTZXAgMTcgMDA6MDA6...
n/a
PYSEC-2023-58
null
[ { "commit_message": "[PATCH 1/3] limit the maximum number of multipart form parts Add a limit to the number of multipart form data parts the parser will attempt to parse. If the limit is exceeded, it raises `RequestEntityTooLargeError`. A default of 1000 seems large enough to allow legitimate use cases while pr...
null
GHSA-xhfx-hgmf-v6vp
October CMS vulnerable to Potential Host Header Poisoning on misconfigured servers
null
[ { "commit_message": "[PATCH] Add trusted hosts support to library (#549) Adds support for a new configuration value app.trustedHosts that defines the allowed hosts for the application. This allows a developer to prevent host header poisoning. Possible values: true: Trust the host specified in app.url, as well a...
null
CVE-2025-6514
OS command injection in mcp-remote when connecting to untrusted MCP servers
mcp-remote is exposed to OS command injection when connecting to untrusted MCP servers due to crafted input from the authorization_endpoint response URL
[ { "commit_message": "[PATCH] Forcibly escape username/pass for basic auth URLs too src/lib/utils.test.ts | 5 +++++ src/lib/utils.ts | 2 ++ 2 files changed, 7 insertions(+)", "patch_text_b64": "RnJvbSA2MDdiMjI2YTM1NmNiNjFhMjM5ZmZhYmEyZmIzZGIxYzlkZWE0YmFjIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBHbGVuIE...
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-15172
Remote Code Execution in Act module
The Act module for Red Discord Bot before commit 6b9f3b86 is vulnerable to Remote Code Execution. With this exploit, Discord users can use specially crafted messages to perform destructive actions and/or access sensitive information. Unloading the Act module with `unload act` can render this exploit inaccessible.
[ { "commit_message": "[PATCH] [act] don't trigger on disabled cmds act/act.py | 72 +++++++++++++++++++++++++++++++++--------------------- 1 file changed, 44 insertions(+), 28 deletions(-)", "patch_text_b64": "RnJvbSA2YjlmM2I4NjJlMWYwYTU0MjljNjJmMzA5MGY4MTRlNTNhMjQyMzQ3IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9t...
{"CWE-502":"Deserialization of Untrusted Data"}
CVE-2022-36068
Discourse moderators can edit themes via the API
Discourse is an open source discussion platform. In versions prior to 2.8.9 on the `stable` branch and prior to 2.9.0.beta10 on the `beta` and `tests-passed` branches, a moderator can create new and edit existing themes by using the API when they should not be able to do so. The problem is patched in version 2.8.9 on the `stable` branch and version 2.9.0.beta10 on the `beta` and `tests-passed` branches. There are no known workarounds.
[ { "commit_message": "[PATCH] SECURITY: moderator shouldn't be able to import a theme via API (#18418) * SECURITY: moderator shouldn't be able to import a theme via API. * DEV: apply `AdminConstraint` for all the \"themes\" routes. Co-authored-by: Vinoth Kannan <svkn.87@gmail.com> app/controllers/admin/themes_co...
CWE-862: Missing Authorization
CVE-2022-25297
Arbitrary File Write
This affects the package drogonframework/drogon before 1.7.5. The unsafe handling of file names during upload using HttpFile::save() method may enable attackers to write files to arbitrary locations outside the designated target folder.
[ { "commit_message": "[PATCH] Prevent malformed upload path causing arbitrary write (#1174) lib/src/HttpFileImpl.cc | 42 +++++++++++----- lib/tests/CMakeLists.txt | 78 +++++++++++++++-------------- lib/tests/unittests/HttpFileTest.cc | 52 +++++++++++++++++++ 3 files changed, 123 insertions...
Arbitrary File Write
GHSA-4pfg-2mw5-f8jx
Cloudflare Vite plugin exposes secrets over the built-in dev server
null
[ { "commit_message": "[PATCH] Restrict access to .dev.vars files (#9513) * Add failing tests * Deny acceess to .dev.vars and .dev.vars.* * Add changeset .changeset/nasty-pots-cheat.md | 5 ++ .../playground/sensitive-files/.dev.vars | 1 + .../sensitive-files/.dev.vars.staging | 1 + ...
null
GHSA-wm5g-p99q-66g4
elFinder vulnerable to path traversal in LocalVolumeDriver connector
null
[ { "commit_message": "[PATCH] [VD:LocalFileSystem] Security fixes, directory traversal vulnerability fixes MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit This issue was found by Michał Majchrowicz & Livio Victoriano AFINE Team. We give them a special thanks. php/elFinde...
null
CVE-2020-15174
Unpreventable top-level navigation in Electron
In Electron before versions 11.0.0-beta.1, 10.0.1, 9.3.0 or 8.5.1 the `will-navigate` event that apps use to prevent navigations to unexpected destinations as per our security recommendations can be bypassed when a sub-frame performs a top-frame navigation across sites. The issue is patched in versions 11.0.0-beta.1, 10.0.1, 9.3.0 or 8.5.1 As a workaround sandbox all your iframes using the sandbox attribute. This will prevent them creating top-frame navigations and is good practice anyway.
[ { "commit_message": "[PATCH] refactor: wire will-navigate up to a navigation throttle instead of OpenURL (#25108) * refactor: wire will-navigate up to a navigation throttle instead of OpenURL (#25065) * refactor: wire will-navigate up to a navigation throttle instead of OpenURL * spec: add test for x-site _top ...
CWE-693 Protection Mechanism Failure
GHSA-hc8h-974x-98hr
null
[ { "commit_message": "[PATCH] MDEV-29644 a potential bug of null pointer dereference in spider_db_mbase::print_warnings() The function spider_db_mbase::print_warnings() can potentially result in a null pointer dereference. Remove the null pointer dereference by cleaning up the function. .../spider/bugfix/r/mdev_...
null
CVE-2025-23220
WeGIA has a SQL Injection endpoint 'adicionar_raca.php' parameter 'raca'
WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. A SQL Injection vulnerability was identified in the WeGIA application, specifically in the adicionar_raca.php endpoint. This vulnerability allows attackers to execute arbitrary SQL commands in the database, allowing unauthorized access to sensitive information. During the exploit, it was possible to perform a complete dump of the application's database, highlighting the severity of the flaw. This vulnerability is fixed in 3.2.10.
[ { "commit_message": "[PATCH] =?UTF-8?q?Resolu=C3=A7=C3=A3o=20SQL=20Injection=20[Securi?= =?UTF-8?q?ty=20https://github.com/LabRedesCefetRJ/WeGIA/security/advisori?= =?UTF-8?q?es/GHSA-425j-h4cf-g52j]?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit dao/pet/adicionar_rac...
CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
GHSA-f4hc-rvh5-8phv
null
[ { "commit_message": "[PATCH] Ignore password attributes for S4U2Self requests For consistency with Windows KDCs, allow protocol transition to work even if the password has expired or needs changing. Also, when looking up an enterprise principal with an AS request, treat ERR_KEY_EXP as confirmation that the clie...
null
CVE-2021-32783
Authorization bypass in Contour
Contour is a Kubernetes ingress controller using Envoy proxy. In Contour before version 1.17.1 a specially crafted ExternalName type Service may be used to access Envoy's admin interface, which Contour normally prevents from access outside the Envoy container. This can be used to shut down Envoy remotely (a denial of service), or to expose the existence of any Secret that Envoy is using for its configuration, including most notably TLS Keypairs. However, it *cannot* be used to get the *content* of those secrets. Since this attack allows access to the administration interface, a variety of administration options are available, such as shutting down the Envoy or draining traffic. In general, the Envoy admin interface cannot easily be used for making changes to the cluster, in-flight requests, or backend services, but it could be used to shut down or drain Envoy, change traffic routing, or to retrieve secret metadata, as mentioned above. The issue will be addressed in Contour v1.18.0 and a cherry-picked patch release, v1.17.1, has been released to cover users who cannot upgrade at this time. For more details refer to the linked GitHub Security Advisory.
[ { "commit_message": "[PATCH] cherrypicks for v1.17.1 (#3909) * Merge pull request from GHSA-5ph6-qq5x-7jwc Signed-off-by: Nick Young <ynick@vmware.com> * Fix spelling and lint errors that slipped into the ExternalName PR (#3908) Signed-off-by: Nick Young <ynick@vmware.com> Co-authored-by: Nick Young <ynick@vmwa...
CWE-441: Unintended Proxy or Intermediary ('Confused Deputy')
GHSA-3xr8-q83f-2wqp
null
[ { "commit_message": "[PATCH] rpm/deb and auth_pam_tool_dir/auth_pam_tool don't let mysql_install_db set SUID bit for auth_pam_tool in rpm/deb packages - instead package files with correct permissions and only fix the ownership of auth_pam_tool_dir (which can only be done after mysql user is created, so in post-...
null
CVE-2023-4898
Authentication Bypass by Primary Weakness in mintplex-labs/anything-llm
Authentication Bypass by Primary Weakness in GitHub repository mintplex-labs/anything-llm prior to 0.0.1.
[ { "commit_message": "[PATCH] patch SQL injection opportunities [LOW RISK] (#234) server/endpoints/admin.js | 18 ++++++++++------- server/endpoints/api/admin/index.js | 8 ++++++-- server/endpoints/api/workspace/index.js | 17 +++++++++------- server/endpoints/chat.js | 5 +++-- s...
CWE-305 Authentication Bypass by Primary Weakness
CVE-2024-52293
Craft has a Potential Remote Code Execution via missing path normalization & Twig SSTI
Craft is a content management system (CMS). Prior to 4.12.2 and 5.4.3, Craft is missing normalizePath in the function FileHelper::absolutePath could lead to Remote Code Execution on the server via twig SSTI. This is a sequel to CVE-2023-40035. This vulnerability is fixed in 4.12.2 and 5.4.3.
[ { "commit_message": "[PATCH] Fixed an RCE vulnerability CHANGELOG.md | 1 + src/helpers/FileHelper.php | 2 +- 2 files changed, 2 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAxMjNlNDhhNjk2ZGUxZTJmNjNhYjUxOWQ0NzMwZWIzYjg3YmVhYTU4IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBicmFuZG9ua2Vs...
CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')