id
stringlengths
12
19
title
stringlengths
0
237
description
stringlengths
35
3.87k
patches
listlengths
1
22
cwe
stringlengths
2
440
GHSA-v7qf-22rw-chph
MantisBT XSS via adm_config_report.php's action parameter
null
[ { "commit_message": "[PATCH] Fix XSS in adm_config_report.php's action parameter Yelin and Zhangdongsheng from VenusTech http://www.venustech.com.cn/ reported a vulnerability in the Configuration Report page, allowing an attacker to inject arbitrary code through a crafted 'action' parameter. Define a new set of...
null
GHSA-fcr8-4r9f-r66m
nbgrader's `frame-ancestors: self` grants all users access to formgrader
null
[ { "commit_message": "[PATCH] Revert #1915 for security reason (#1947) * Revert \"Set CSP frame-ancestors 'self' for nbgrader handlers (#1915)\" This reverts commit ba1e70b6afa50f5a7fb38df89fc1634c8764e472. * Update demos to set frame-ancestor 'self' * Update documentation on installation with jupyterhub>=4.1 * ...
null
CVE-2025-34438
AVideo < 20.1 IDOR Arbitrary Video Rotation
AVideo versions prior to 20.1 contain an insecure direct object reference vulnerability allowing users with upload permissions to modify the rotation metadata of any video. The endpoint verifies upload capability but fails to enforce ownership or management rights for the targeted video.
[ { "commit_message": "[PATCH] Security hardening: resolve reported vulnerabilities (AVideo v20) This PR upgrades AVideo to version 20, which includes a full remediation of all security issues reported in the recent vulnerability disclosure AVideo-Security-Vulnerabilities . Summary of fixes: Critical RCE & Crypto...
CWE-639 Authorization Bypass Through User-Controlled Key
GHSA-xhjq-w7xm-p8qj
golang.org/x/crypto/ssh Man-in-the-Middle attack
null
[ { "commit_message": "[PATCH] ssh: require host key checking in the ClientConfig This change breaks existing behavior. Before, a missing ClientConfig.HostKeyCallback would cause host key checking to be disabled. In this configuration, establishing a connection to any host just works, so today, most SSH client co...
null
CVE-2019-16124
In YouPHPTube 7.4, the file install/checkConfiguration.php has no access control, which leads to everyone being able to edit the configuration file, and insert malicious PHP code.
[ { "commit_message": "[PATCH] secury fix to not allow recreate the config file install/checkConfiguration.php | 4 ++++ 1 file changed, 4 insertions(+)", "patch_text_b64": "RnJvbSBiMzJiNDEwYzkxOTFjM2M1ZGI4ODg1MTRjMjlkNzkyMWYxMjRkODgzIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBkYW5pZWwgPGRhbmllbEBkYW5pZWwtREMxQ...
n/a
CVE-2024-27093
Minder trusts client-provided mapping from repo name to upstream ID
Minder is a Software Supply Chain Security Platform. In version 0.0.31 and earlier, it is possible for an attacker to register a repository with a invalid or differing upstream ID, which causes Minder to report the repository as registered, but not remediate any future changes which conflict with policy (because the webhooks for the repo do not match any known repository in the database). When attempting to register a repo with a different repo ID, the registered provider must have admin on the named repo, or a 404 error will result. Similarly, if the stored provider token does not have repo access, then the remediations will not apply successfully. Lastly, it appears that reconciliation actions do not execute against repos with this type of mismatch. This appears to primarily be a potential denial-of-service vulnerability. This vulnerability is patched in version 0.20240226.1425+ref.53868a8.
[ { "commit_message": "[PATCH] Fix client crash with fix for GHSA-q6h8-4j2v-pjg4 (#2432) internal/controlplane/handlers_githubwebhooks.go | 6 ++++++ 1 file changed, 6 insertions(+)", "patch_text_b64": "RnJvbSA1Mzg2OGE4NzhlOTNmMjljNDM0MzdmOTZkYmM5OTBiNTQ4ZTQ4ZDFkIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBFdmFu...
CWE-20: Improper Input Validation
CVE-2021-29475
PDF export allows arbitrary file reads
HedgeDoc (formerly known as CodiMD) is an open-source collaborative markdown editor. An attacker is able to receive arbitrary files from the file system when exporting a note to PDF. Since the code injection has to take place as note content, there fore this exploit requires the attackers ability to modify a note. This will affect all instances, which have pdf export enabled. This issue has been fixed by https://github.com/hedgedoc/hedgedoc/commit/c1789474020a6d668d616464cb2da5e90e123f65 and is available in version 1.5.0. Starting the CodiMD/HedgeDoc instance with `CMD_ALLOW_PDF_EXPORT=false` or set `"allowPDFExport": false` in config.json can mitigate this issue for those who cannot upgrade. This exploit works because while PhantomJS doesn't actually render the `file:///` references to the PDF file itself, it still uses them internally, and exfiltration is possible, and easy through JavaScript rendering. The impact is pretty bad, as the attacker is able to read the CodiMD/HedgeDoc `config.json` file as well any other files on the filesystem. Even though the suggested Docker deploy option doesn't have many interesting files itself, the `config.json` still often contains sensitive information, database credentials, and maybe OAuth secrets among other things.
[ { "commit_message": "[PATCH] Disable PDF export due to security issue As a temporary fix, to keep you and your users save, this patch disables the PDF export feature. Details of the attack along with a fix for future versions of CodiMD will be released in future. I hope you can live with this solution for this ...
{"CWE-94":"Improper Control of Generation of Code ('Code Injection')"}
GHSA-m3px-vjxr-fx4m
Filament Excel Vulnerable to Path Traversal Attack on Export Download Endpoint
null
[ { "commit_message": "[PATCH] security: fix CVE-2024-42485 for 1.x routes/web.php | 9 ++++++++- 1 file changed, 8 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBhZjM2ZjkzM2IwMzJhZWZjY2M4N2QxNzQzMWI2ZTc0NjczYjA0YWY1IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBEZW5uaXMgS29jaCA8aW5mb0BwaXhlbGFyYmVpdC5kZ...
null
CVE-2025-64163
DataEase's DB2 is vulnerable to SSRF
DataEase is an open source data visualization analysis tool. In versions 2.10.14 and below, the vendor added a blacklist to filter ldap:// and ldaps://. However, omission of protection for the dns:// protocol results in an SSRF vulnerability. This issue is fixed in version 2.10.15.
[ { "commit_message": "[PATCH] =?UTF-8?q?fix:=20=E3=80=90=E6=95=B0=E6=8D=AE=E6=BA=90?= =?UTF-8?q?=E3=80=91jdbc=20=E6=BC=8F=E6=B4=9E?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit .../java/io/dataease/datasource/type/Db2.java | 2 +- .../java/io/dataease/datasource/t...
CWE-918: Server-Side Request Forgery (SSRF)
CVE-2025-59040
Tuleap backlog item representations do not verify the permissions of the child trackers
Tuleap is an Open Source Suite to improve management of software developments and collaboration. Backlog item representations do not verify the permissions of the child trackers. Users might see tracker names they should not have access to. This vulnerability is fixed in Tuleap Community Edition 16.11.99.1757427600 and Tuleap Enterprise Edition 16.11-6 and 16.10-8.
[ { "commit_message": "[PATCH] fix: request #44489: Backlog item representations do not verify the permissions of the child trackers Also adjusted the overall tracker permission handling, it should return a 404 when the tracker is not accessible. Change-Id: I28fc6fc962c8e2b793f228ac003c0cf8902b09e2 .../REST/v1/Ba...
CWE-280: Improper Handling of Insufficient Permissions or Privileges
GHSA-cfx4-r6f2-m2mc
null
[ { "commit_message": "[PATCH] upstream commit Unregister the KEXINIT handler after message has been received. Otherwise an unauthenticated peer can repeat the KEXINIT and cause allocation of up to 128MB -- until the connection is closed. Reported by shilei-c at 360.cn Upstream-ID: 43649ae12a27ef94290db16d1a98294...
null
GHSA-f3mf-hm6v-jfhh
Mesop Class Pollution vulnerability leads to DoS and Jailbreak attacks
null
[ { "commit_message": "[PATCH] Harden dataclass utils (#1171) mesop/dataclass_utils/dataclass_utils.py | 4 ++++ mesop/dataclass_utils/dataclass_utils_test.py | 19 +++++++++++++++++++ 2 files changed, 23 insertions(+)", "patch_text_b64": "RnJvbSA3NDhlMjBkNGEzNjNkODliODQxZDYyMjEzZjViMGM2YjRiZWQ3ODhmIE1vbi...
null
GHSA-w2pf-g6r8-pg22
auth0-lock vulnerable to XSS via unsanitized placeholder property
null
[ { "commit_message": "[PATCH] support for placeholderHTML (#1788) placehlderhtml no verify... . Support for placeholderHTML Co-authored-by: Steve Hobbs <steve.hobbs.mail@gmail.com> README.md | 4 +- .../__snapshots__/sign_up_pane.test.jsx.snap | 2 + .../__snapshots__/custom_...
null
CVE-2021-40576
The binary MP4Box in Gpac 1.0.1 has a null pointer dereference vulnerability in the gf_isom_get_payt_count function in hint_track.c, which allows attackers to cause a denial of service.
[ { "commit_message": "[PATCH] fixed #1904 src/isomedia/hint_track.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBhZDE4ZWNlOTVmYTA2NGVmYzA5OTVjNGFiMmM5ODVmNzdmYjE2NmVjIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBqZWFubGYgPGplYW5sZkBncGFjLmlvPgpEYXRlOiBXZWQsIDEgU2VwIDIwMjEgMTM...
n/a
CVE-2017-6799
A cross-site scripting (XSS) vulnerability in view_filters_page.php in MantisBT before 2.2.1 allows remote attackers to inject arbitrary JavaScript via the 'view_type' parameter.
[ { "commit_message": "[PATCH] Fix XSS in view_filters_page.php The value of the view_type parameter was not sanitized before being displayed as a hidden input. This vulnerability was reported by Etienne Landais. Fixes #22497 view_filters_page.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_...
n/a
GHSA-cc5r-x8fh-jwv3
null
[ { "commit_message": "[PATCH] ALSA: seq: Fix use-after-free at creating a port There is a potential race window opened at creating and deleting a port via ioctl, as spotted by fuzzing. snd_seq_create_port() creates a port object and returns its pointer, but it doesn't take the refcount, thus it can be deleted i...
null
GHSA-w9v7-r27g-jrmx
null
[ { "commit_message": "[PATCH] win32port: zlib: upstream bugfix patch on inftrees.c From 6a043145ca6e9c55184013841a67b2fef87e44c0 Mon Sep 17 00:00:00 2001 [PATCH] Remove offset pointer optimization in inftrees.c. inftrees.c was subtracting an offset from a pointer to an array, in order to provide a pointer that a...
null
GHSA-xrqm-fpgr-6hhx
Overflow/crash in `tf.range`
null
[ { "commit_message": "[PATCH] Fix crash with tf.range when start is large/negative This PR tries to address the issue raised in 46899 where tf.range will crash when start is large/negative. This PR fixes 46899. Signed-off-by: Yong Tang <yong.tang.github@outlook.com> tensorflow/core/kernels/sequence_ops.cc ...
null
GHSA-w68r-5p45-5rqp
Improper Input Validation in Laravel
null
[ { "commit_message": "[PATCH] [6.x] Verify column names are actual columns when using guarded (#33777) * verify column names are actual columns when using guarded * Apply fixes from StyleCI (#33778) * remove json check .../Eloquent/Concerns/GuardsAttributes.php | 31 +++++++++++++++++-- tests/Database/Database...
null
GHSA-9f63-6gmg-2983
null
[ { "commit_message": "[PATCH] Remove loop that kept reading the same offset (Jan Kaluza) src/cdf.c | 20 ++++++-------------- 1 file changed, 6 insertions(+), 14 deletions(-)", "patch_text_b64": "RnJvbSBiOGFjYzgzNzgxZDVhMjRjYzUxMDFlNTI1ZDE1ZWZlMDQ4MmMyODBkIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBDaHJpc3Rvcy...
null
GHSA-7pr5-w74r-jjj7
Mezzanine CMS has a Stored Cross-Site Scripting (XSS) vulnerability in the displayable_links_js function
null
[ { "commit_message": "[PATCH] fix: [security] fix XSS in admin mezzanine/core/views.py | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA4OTg2MzBkOGRmNDhjZjNkZGI4Yjk5NDJmNTkxNjhiOTMyMTZlM2Y4IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBIZW5yaSBIdWxza2kgPGhlbnJpLmh1bHNraUBnYXpldG...
null
GHSA-6jm8-x3g6-r33j
Soft Serve is missing an authorization check in LFS lock deletion
null
[ { "commit_message": "[PATCH] Merge commit from fork * fix: require admin privileges for force delete of LFS locks Move user context retrieval before the force flag check to ensure proper authorization. Force deletions now require admin privileges, preventing non-admin users from deleting locks owned by others. ...
null
GHSA-m86r-wr74-693h
null
[ { "commit_message": "[PATCH] Addressing Issue #2228 - Heap-use-after-free in OpenColorIO::ThrowInvalidRegex This turned out to be not a UAF issue but an out-of-bounds-access issue where the throw was accessing the incorrect (and potentially shorter) string with an index derived from another (and potentially lon...
null
GHSA-f624-83xq-9xr8
null
[ { "commit_message": "[PATCH] Fix possible stack corruption with XM instrument headers claiming a size of less than 4 Closes #275 src/milkyplay/LoaderXM.cpp | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAzYTU0NzRmOTEwMmNiZGMxMGZiZDllN2IxYjJjOGQzZjNmNDVkOTFiIE1vbiBTZXAgMTcgMD...
null
PYSEC-2021-740
null
[ { "commit_message": "[PATCH] Fix `tf.io.decode_raw` bugs and update documentation. Fixes cases where specifying `fixed_length` resulted in data loss and even segfault and corruption of the Python interpreter. The fix is subtle but needed due to pointer arithmetic rules. Makes sure that `fixed_length` does not c...
null
GHSA-627q-g293-49q7
Abort caused by allocating a vector that is too large in Tensorflow
null
[ { "commit_message": "[PATCH] Fix abort caused by allocating a too large vector. We need to make sure that the number of dimensions in a shape is within limits. PiperOrigin-RevId: 408997911 Change-Id: If59e1c23f2ec9c2d4ff4d8632fd62b2a7773a4eb tensorflow/core/framework/shape_inference.cc | 15 +++++++++++++++ 1 fi...
null
CVE-2017-15054
An arbitrary file upload vulnerability, present in TeamPass before 2.1.27.9, allows remote authenticated users to upload arbitrary files leading to Remote Command Execution. To exploit this vulnerability, an authenticated attacker has to tamper with parameters of a request to upload.files.php, in order to select the correct branch and be able to upload any arbitrary file. From there, it can simply access the file to execute code on the server.
[ { "commit_message": "[PATCH] 2.1.27 Improved security regarding uploading files Fixed issue while restoring DB from administration page admin.settings.load.php | 25 +++++-- admin.settings.php | 2 +- api/functions.php | 115 +++++++++++++++++++++++------- changelog.md ...
n/a
CVE-2023-30619
XSS in the tooltip via an artifact title
Tuleap Open ALM is a Libre and Open Source tool for end to end traceability of application and system developments. The title of an artifact is not properly escaped in the tooltip. A malicious user with the capability to create an artifact or to edit a field title could force victim to execute uncontrolled code. This issue has been patched in version 14.7.99.143.
[ { "commit_message": "[PATCH] Fix request #31586: XSS in the tooltip via an artifact title Next step for the current story #26777 is to display the xref on top of the title so in order to prepare the field we use mustache to escape the title instead of DOMPurifier. Part of story #26777: have artifact tooltips on...
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
GHSA-c72r-87h5-77h5
null
[ { "commit_message": "[PATCH] Fix oobread crash in java parser ##crash * Reported by @bet4it via @huntrdev * BountyID: 229a2e0d-9e5c-402f-9a24-57fa2eb1aaa7 * Reproducer: poc4java shlr/java/class.c | 14 +++++++++----- 1 file changed, 9 insertions(+), 5 deletions(-)", "patch_text_b64": "RnJvbSAwOTI3ZWQzYWU5OTQ...
null
GHSA-66x7-2r56-fj77
Buildbot CRLF Injection
null
[ { "commit_message": "[PATCH] redirects: strip everything after a CR or a LF master/buildbot/test/unit/test_www_auth.py | 12 ++++++++++-- master/buildbot/test/unit/test_www_avatar.py | 8 ++++---- master/buildbot/test/unit/test_www_oauth.py | 6 +++--- master/buildbot/test/unit/test_www_resource.py | 6...
null
GHSA-5xvc-rwv8-86p7
Ignite Realtime Openfire privilege escalation vulnerability
null
[ { "commit_message": "[PATCH] OF-2758: Remove admin flag when deleting user When a user is being deleted, that user should no longer be marked as an admin. .../openfire/admin/AdminManager.java | 17 ++++++++++++++++- 1 file changed, 16 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA1YzAyM...
null
GHSA-2q8q-8fgw-9p6p
OpenBao LDAP MFA Enforcement Bypass When Using Username As Alias
null
[ { "commit_message": "[PATCH] Address login plugin lookahead contract failures (#1632) * Address login plugin lookahead contract failures As part of HCSEC-2025-16, various plugins lacked did not conform to the entity alias lookahead contract; a different alias was returned in the login request as what is ultimat...
null
CVE-2018-25098
blockmason credit-protocol UCAC CreditProtocol.sol executeUcacTx denial of service
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in blockmason credit-protocol. It has been declared as problematic. Affected by this vulnerability is the function executeUcacTx of the file contracts/CreditProtocol.sol of the component UCAC Handler. The manipulation leads to denial of service. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The patch is named 082e01f18707ef995e80ebe97fcedb229a55efc5. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-252799. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
[ { "commit_message": "[PATCH] =?UTF-8?q?=F0=9F=94=92=20Fix=20DoS=20vulnerability=20in?= =?UTF-8?q?=20Credit=20Protocol=20contract?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit `#executeUcacTx` is an inexpensive and unauthenticated function that increases the transact...
CWE-404 Denial of Service
CVE-2017-7871
trollepierre/tdm before 2017-04-13 is vulnerable to a reflected XSS in tdm-master/webhook.php (challenge parameter).
[ { "commit_message": "[PATCH] fix(TDM-1) : fix issue #1 src/Webhook.php | 10 +++++----- webhook.php | 2 +- 2 files changed, 6 insertions(+), 6 deletions(-)", "patch_text_b64": "RnJvbSAyZTg5MDE5ZDZhNDkxZjBhNWFjM2RiODczMjE4MWY2ZWIxZDIxOWFhIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiA9P1VURi04P3E/UGllcnJlPTI...
n/a
CVE-2025-54575
ImageSharp Triggers an Infinite Loop in its GIF Decoder When Skipping Malformed Comment Extension Blocks
ImageSharp is a 2D graphics library. In versions below 2.1.11 and 3.0.0 through 3.1.10, a specially crafted GIF file containing a malformed comment extension block (with a missing block terminator) can cause the ImageSharp GIF decoder to enter an infinite loop while attempting to skip the block. This leads to a denial of service. Applications processing untrusted GIF input should upgrade to a patched version. This issue is fixed in versions 2.1.11 and 3.1.11.
[ { "commit_message": "[PATCH] Fix #2953 .gitattributes | 1 - src/ImageSharp/Formats/Gif/GifDecoderCore.cs | 5 +++ .../Formats/Gif/GifDecoderTests.cs | 33 +++++++++++++------ tests/ImageSharp.Tests/TestImages.cs | 1 + tests/Images/Input/Gif/issues/issue_2953....
CWE-400: Uncontrolled Resource Consumption
CVE-2022-0777
Weak Password Recovery Mechanism for Forgotten Password in microweber/microweber
Weak Password Recovery Mechanism for Forgotten Password in GitHub repository microweber/microweber prior to 1.3.
[ { "commit_message": "[PATCH] forgot password add throttle config/auth.php | 1 + src/MicroweberPackages/User/routes/api.php | 4 +++- src/MicroweberPackages/User/routes/web.php | 4 +++- 3 files changed, 7 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSBhMzk0NGNmOWQxZDhjNDF...
CWE-640 Weak Password Recovery Mechanism for Forgotten Password
GHSA-h3m7-rqc4-7h9p
Integer overflow in chunking helper causes dispatching to miss elements or panic
null
[ { "commit_message": "<vroldanbet@authzed.com> [PATCH 1/4] reproduce integer overflow in ForEachChunk This may cause 2 issues: - server panic due to slice bounds out of range - incorrect slicing, which leads to incorrect usages across the server, like missing elements to be dispatched pkg/genutil/slicez/chunking...
null
PYSEC-2023-107
null
[ { "commit_message": "[PATCH] Merge pull request from GHSA-r25m-cr6v-p9hq * fix for vuln * Apply suggestions from code review Use correct spelling of malicious. Co-authored-by: Adam Sachs <adam@ethyca.com> * Update src/fides/api/main.py Verbiage Co-authored-by: Thomas <thomas.lapiana+github@pm.me> Co-authored-by...
null
CVE-2018-25052
Catalyst-Plugin-Session Session ID Session.pm _load_sessionid cross site scripting
A vulnerability has been found in Catalyst-Plugin-Session up to 0.40 and classified as problematic. This vulnerability affects the function _load_sessionid of the file lib/Catalyst/Plugin/Session.pm of the component Session ID Handler. The manipulation of the argument sid leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 0.41 is able to address this issue. The name of the patch is 88d1b599e1163761c9bd53bec53ba078f13e09d4. It is recommended to upgrade the affected component. VDB-216958 is the identifier assigned to this vulnerability.
[ { "commit_message": "[PATCH] Session: encode HTML entities in error Without this, it's possible to self-XSS by trying to set a session id to something like `</script><svg/onload='alert(\"xss\")'>`. lib/Catalyst/Plugin/Session.pm | 2 ++ 1 file changed, 2 insertions(+)", "patch_text_b64": "RnJvbSA4OGQxYjU5OWU...
CWE-79 Cross Site Scripting
GHSA-vh22-6c6h-rm8q
jte's HTML templates containing Javascript template strings are subject to XSS
null
[ { "commit_message": "[PATCH] Merge commit from fork * Fix xss vulnerability in javascript template strings * Escape dollar signs to prevent undesired interpolation .../main/java/gg/jte/html/escape/Escape.java | 4 + ...TemplateEngine_HtmlOutputEscapingTest.java | 82 +++++++++++++++++++ 2 files changed, 86 inse...
null
CVE-2021-43138
In Async before 2.6.4 and 3.x before 3.2.2, a malicious user can obtain privileges via the mapValues() method, aka lib/internal/iterator.js createObjectIterator prototype pollution.
[ { "commit_message": "[PATCH] Fix prototype pollution vulnerability lib/internal/iterator.js | 3 +++ test/mapValues.js | 11 +++++++++++ 2 files changed, 14 insertions(+)", "patch_text_b64": "RnJvbSBlMWVjZGJmNzkyNjRmOWFiNDg4Yzc3OTlmNGM3Njk5NmQ1ZGNhNjZkIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBBbGV4YW...
n/a
GHSA-6p6f-w7vp-pv39
null
[ { "commit_message": "[PATCH] =?UTF-8?q?XXE=20Sicherheitsl=C3=BCcke=20beim=20ZUGFeRD=20?= =?UTF-8?q?parsen=20(XML)=20vermeiden?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit SL/XMLInvoice.pm | 2 +- SL/ZUGFeRD.pm | 2 +- doc/changelog | 2 ++ 3 files changed, 4 ins...
null
CVE-2023-31137
MaraDNS Integer Underflow Vulnerability in DNS Packet Decompression
MaraDNS is open-source software that implements the Domain Name System (DNS). In version 3.5.0024 and prior, a remotely exploitable integer underflow vulnerability in the DNS packet decompression function allows an attacker to cause a Denial of Service by triggering an abnormal program termination. The vulnerability exists in the `decomp_get_rddata` function within the `Decompress.c` file. When handling a DNS packet with an Answer RR of qtype 16 (TXT record) and any qclass, if the `rdlength` is smaller than `rdata`, the result of the line `Decompress.c:886` is a negative number `len = rdlength - total;`. This value is then passed to the `decomp_append_bytes` function without proper validation, causing the program to attempt to allocate a massive chunk of memory that is impossible to allocate. Consequently, the program exits with an error code of 64, causing a Denial of Service. One proposed fix for this vulnerability is to patch `Decompress.c:887` by breaking `if(len <= 0)`, which has been incorporated in version 3.5.0036 via commit bab062bde40b2ae8a91eecd522e84d8b993bab58.
[ { "commit_message": "[PATCH] Fix long standing issue in this code from 2002 dns/Decompress.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSBiYWIwNjJiZGU0MGIyYWU4YTkxZWVjZDUyMmU4NGQ4Yjk5M2JhYjU4IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBTYW0gVHJlbmhvbG1lIDxnaXRAc2FtaWFtL...
CWE-191: Integer Underflow (Wrap or Wraparound)
GHSA-3hg2-rh4r-8qf6
Apache StreamPark: Use the user’s password as the secret key Vulnerability
null
[ { "commit_message": "[PATCH] [Improve] Improve login authentication .../streampark/common/util/FileUtils.scala | 42 ++++++ .../src/main/assembly/bin/mvnw | 2 +- .../console/base/util/EncryptUtils.java | 73 --------- .../system/authentication/JWTFilter.java | 4 +- .../system/au...
null
CVE-2025-54939
LiteSpeed QUIC (LSQUIC) Library before 4.3.1 has an lsquic_engine_packet_in memory leak.
[ { "commit_message": "[PATCH] Release 4.3.1 CHANGELOG | 4 + docs/conf.py | 2 +- include/lsquic.h | 2 +- qir/run_endpoint.sh | 4 + src/liblsquic/lsquic_alarmset.c | 15 +++ src/liblsquic/lsquic_alarmset.h ...
CWE-770 Allocation of Resources Without Limits or Throttling
CVE-2014-9422
The check_rpcsec_auth function in kadmin/server/kadm_rpc_svc.c in kadmind in MIT Kerberos 5 (aka krb5) through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 allows remote authenticated users to bypass a kadmin/* authorization check and obtain administrative access by leveraging access to a two-component principal with an initial "kadmind" substring, as demonstrated by a "ka/x" principal.
[ { "commit_message": "[PATCH] Fix kadmind server validation [CVE-2014-9422] [MITKRB5-SA-2015-001] In kadmind's check_rpcsec_auth(), use data_eq_string() instead of strncmp() to check components of the server principal, so that we don't erroneously match left substrings of \"kadmin\", \"history\", or the realm. t...
n/a
CVE-2012-5368
phpMyAdmin 3.5.x before 3.5.3 uses JavaScript code that is obtained through an HTTP session to phpmyadmin.net without SSL, which allows man-in-the-middle attackers to conduct cross-site scripting (XSS) attacks by modifying this code.
[ { "commit_message": "[PATCH] Escape json reply received from server js/functions.js | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSBhNTQ3ZjNkM2UyY2YzNmM2YTkwNGZhM2UwNTNmZDhiZGRkM2ZiYmIwIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiA9P1VURi04P3E/TWljaGFsPTIwPUM0PThDaWhhPUM1PT...
n/a
GHSA-xvwp-h6jv-7472
FractionalMaxPool and FractionalAVGPool heap out-of-bounds acess
null
[ { "commit_message": "[PATCH] Fix security vulnerability with FractionalMax(AVG)Pool with illegal pooling_ratio PiperOrigin-RevId: 483486453 .../core/kernels/fractional_avg_pool_op.cc | 14 ++++++-- .../core/kernels/fractional_max_pool_op.cc | 6 ++++ tensorflow/core/ops/nn_ops.cc | 7 ++++ ...
null
CVE-2022-0358
A flaw was found in the QEMU virtio-fs shared file system daemon (virtiofsd) implementation. This flaw is strictly related to CVE-2018-13405. A local guest user can create files in the directories shared by virtio-fs with unintended group ownership in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of the group. This could allow a malicious unprivileged user inside the guest to gain access to resources accessible to the root group, potentially escalating their privileges within the guest. A malicious local user in the host might also leverage this unexpected executable file created by the guest to escalate their privileges on the host system.
[ { "commit_message": "[PATCH] virtiofsd: Drop membership of all supplementary groups (CVE-2022-0358) At the start, drop membership of all supplementary groups. This is not required. If we have membership of \"root\" supplementary group and when we switch uid/gid using setresuid/setsgid, we still retain membershi...
CWE-273 - Improper Check for Dropped Privileges.
CVE-2021-4050
Cross-site Scripting (XSS) - Stored in livehelperchat/livehelperchat
livehelperchat is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
[ { "commit_message": "[PATCH] Clean SVG and adjust file size lhc_web/lib/core/lhcore/lhfileupload.php | 9 +++++++-- lhc_web/lib/core/lhcore/lhfileuploadadmin.php | 17 ++++++++++++++++- 2 files changed, 23 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSAwY2UxZGQyYTEzNTA5NzQ3YzI0MGM4NDg0MjI4YTV...
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
GHSA-cpv8-6xgr-rmf6
Dolibarr Cross-site Scripting vulnerability
null
[ { "commit_message": "[PATCH] Enhance the sanitizing. htdocs/core/lib/functions.lib.php | 8 ++++++-- htdocs/main.inc.php | 9 +++++---- test/phpunit/SecurityTest.php | 10 +++++----- 3 files changed, 16 insertions(+), 11 deletions(-)", "patch_text_b64": "RnJvbSA3OTZiMmQyMDFhY2I5OTM4YjkwM2Zi...
null
PYSEC-2021-705
null
[ { "commit_message": "[PATCH] Prevent heap OOB error in `MaxPoolGrad` PiperOrigin-RevId: 372424854 Change-Id: Idac0f23867ad8b0601cafbaaa52d5e64269e63a7 tensorflow/core/kernels/maxpooling_op.cc | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBhNzQ3NjhmOGU0ZWZiZGE0ZGVmOWYxNmV...
null
CVE-2017-13658
In ImageMagick before 6.9.9-3 and 7.x before 7.0.6-3, there is a missing NULL check in the ReadMATImage function in coders/mat.c, leading to a denial of service (assertion failure and application exit) in the DestroyImageInfo function in MagickCore/image.c.
[ { "commit_message": "[PATCH] https://github.com/ImageMagick/ImageMagick/issues/598 coders/mat.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBlNWMwNjNhMTAwNzUwNmJhNjllOTdhMzVlZmZjZGVmOTQ0NDIxYzg5IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBDcmlzdHkgPHVyYmFuLXdhcnJpb3JAaW1h...
n/a
CVE-2012-3501
The squidclamav_check_preview_handler function in squidclamav.c in SquidClamav 5.x before 5.8 and 6.x before 6.7 passes an unescaped URL to a system command call, which allows remote attackers to cause a denial of service (daemon crash) via a URL with certain characters, as demonstrated using %0D or %0A.
[ { "commit_message": "[PATCH] Add a workaround for a squidGuard bug that unescape the URL and send it back unescaped. This could conduct in wrong result and ssquidclamav crash especially with URL containing the %0D or %0A character. John Xue src/squidclamav.c | 45 +++++++++++++++++++++++++++++++++++++++++++-- 1 ...
n/a
CVE-2025-66311
Grav vulnerable to Cross-Site Scripting (XSS) Stored endpoint `/admin/pages/[page]` in Multiples parameters
This admin plugin for Grav is an HTML user interface that provides a convenient way to configure Grav and easily create and modify pages. Prior to 1.11.0-beta.1, a Stored Cross-Site Scripting (XSS) vulnerability was identified in the /admin/pages/[page] endpoint of the Grav application. This vulnerability allows attackers to inject malicious scripts into the data[header][metadata], data[header][taxonomy][category], and data[header][taxonomy][tag] parameters. These scripts are stored in the page frontmatter and executed automatically whenever the affected page is accessed or rendered in the administrative interface. This vulnerability is fixed in 1.11.0-beta.1.
[ { "commit_message": "[PATCH] Fix security vulnerabilities: user enumeration and XSS issues Security fixes: 1. GHSA-q3qx-cp62-f6m7: User Enumeration & Email Disclosure - Changed rate-limiter error message in taskForgot() to not include email - Added generic translation key FORGOT_CANNOT_RESET_RATE_LIMITED - Prev...
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
GHSA-866w-wm4h-95c6
thlorenz browserify-shim vulnerable to prototype pollution
null
[ { "commit_message": "[PATCH] resolve-shims: prevent prototype manipulation (#246) lib/resolve-shims.js | 5 +++++ 1 file changed, 5 insertions(+)", "patch_text_b64": "RnJvbSA5Nzg1NWU2MjJiNmRjZDExN2M3N2U2NTgzNzAxOTYyZmY0NWU3MzM4IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBCZW4gRHJ1Y2tlciA8YnZkcnVja2VyQGdtYWlsLm...
null
CVE-2025-54384
CKAN stored XSS vulnerability in Markdown description fields
CKAN is an open-source DMS (data management system) for powering data hubs and data portals. Prior to 2.10.9 and 2.11.4, the helpers.markdown_extract() function did not perform sufficient sanitization of input data before wrapping in an HTML literal element. This helper is used to render user-provided data on dataset, resource, organization or group pages (plus any page provided by an extension that used that helper function), leading to a potential XSS vector. This vulnerability has been fixed in CKAN 2.10.9 and 2.11.4.
[ { "commit_message": "[PATCH 1/2] helpers: strip tags with bleach only ckan/lib/helpers.py | 7 +------ 1 file changed, 1 insertion(+), 6 deletions(-)", "patch_text_b64": "RnJvbSAxMTJhZmZmZmE3NGIxNGZjOTdjNTRhYmNmMTgzMTVkZjk3MTE0OTE3IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBJYW4gV2FyZCA8aWFuQGV4Y2Vzcy5vcmc+Ck...
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2017-6391
An issue was discovered in Kaltura server Lynx-12.11.0. The vulnerability exists due to insufficient filtration of user-supplied data passed to the "admin_console/web/tools/SimpleJWPlayer.php" URL, the "admin_console/web/tools/AkamaiBroadcaster.php" URL, the "admin_console/web/tools/bigRedButton.php" URL, and the "admin_console/web/tools/bigRedButtonPtsPoc.php" URL. An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website.
[ { "commit_message": "[PATCH] call strip_tags on all values extracted from $_GET[]. admin_console/web/tools/AkamaiBroadcaster.php | 10 +++++----- admin_console/web/tools/SimpleJWPlayer.php | 4 ++-- admin_console/web/tools/XmlJWPlayer.php | 4 ++-- admin_console/web/tools/bigRedButton.php | 10 ...
n/a
GHSA-rgf9-j7gv-rq22
Microweber Cross-site Scripting vulnerability
null
[ { "commit_message": "[PATCH] update .../editor_tools/rte_image_editor/index.php | 76 +++++++++---------- 1 file changed, 34 insertions(+), 42 deletions(-)", "patch_text_b64": "RnJvbSAxY2I4NDZmOGY1NGZmNmY1YzY2OGYzYWU2NGRkODE3NDBhN2U4OTY4IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBQZXRlciBJdmFub3YgPHBldGVyQG...
null
GHSA-hr5p-hr33-m6qp
null
[ { "commit_message": "[PATCH] fix: [security] Fix to a reflected XSS in the default layout template - as reported by Tuscany Internet eXchange | Misp Team | TIX CyberSecurity app/View/Layouts/default.ctp | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSA1ODZjY2EzODRiZTY3MTB...
null
GHSA-hhpj-6pj7-wpx5
OpenStack Neutron Race condition vulnerability
null
[ { "commit_message": "[PATCH] Stop device_owner from being set to 'network:*' This patch adjusts the FieldCheck class in the policy engine to allow a regex rule. It then leverages that to prevent users from setting the device_owner field to anything that starts with 'network:' on networks which they do not own. ...
null
CVE-2018-0429
Stack-based buffer overflow in the Cisco Thor decoder before commit 18de8f9f0762c3a542b1122589edb8af859d9813 allows local users to cause a denial of service (segmentation fault) and execute arbitrary code via a crafted non-conformant Thor bitstream.
[ { "commit_message": "[PATCH] Fix possible stack overflows in decoder for illegal bit streams Fixes CVE-2018-0429 A vulnerability in the Thor decoder (available at: https://github.com/cisco/thor) could allow an authenticated, local attacker to cause segmentation faults and stack overflows when using a non-confor...
n/a
GHSA-rg7p-wmgj-f374
Magento stored Cross-Site Scripting (XSS) vulnerability
null
[ { "commit_message": "[PATCH] Magento Release 2.3.7-p4 app/code/Magento/AdminAnalytics/composer.json | 36 +- .../Magento/AdminAnalytics/i18n/en_US.csv | 3 + .../layout/adminhtml_dashboard_index.xml | 2 +- .../ui_component/admin_usage_notification.xml | 8 +- .../Magento/AdminNotification/composer....
null
GHSA-j772-hpmw-32rm
OpenStack Horizon Cross-site scripting (XSS) vulnerability
null
[ { "commit_message": "[PATCH] html escape the console log in refresh fixes bug 977944 (cherry picked from commit ab2e27522aaeb0268fcc121bd3eff5a4485f313c) Change-Id: Ic6135ebc58b6c45d6336f0833717086e43d7cccb horizon/static/horizon/js/horizon.js | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_te...
null
CVE-2019-11924
A peer could send empty handshake fragments containing only padding which would be kept in memory until a full handshake was received, resulting in memory exhaustion. This issue affects versions v2019.01.28.00 and above of fizz, until v2019.08.05.00.
[ { "commit_message": "[PATCH] Reject zero length handshake records. Summary: Zero length (all padding) handshake are forbidden by RFC. Allowing these was a regression in D13754697 (2c6f78a). This is a partial fix for CVE-2019-11924 Reviewed By: xybu Differential Revision: D16285100 fbshipit-source-id: 05a19d31ad...
Uncontrolled Resource Consumption (CWE-ID 400)
GHSA-x46g-cxp8-8wjm
null
[ { "commit_message": "[PATCH] Ticket #2779 cmc plugin default change base/ca/shared/conf/CS.cfg | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSA4NzZkMTNjNmQyMGU3ZTEyMzViOWVmYmQ2MDFiNDczMTVkZWJiNDkyIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBDaHJpc3RpbmEgRnUgPGNmdUByZWRoYXQ...
null
GHSA-rx2m-xr4x-54hh
usememos/memos vulnerable to Improper Authorization
null
[ { "commit_message": "[PATCH] fix: access control (#870) api/memo.go | 8 +- api/memo_organizer.go | 10 +- api/memo_resource.go | 2 +- api/resource.go | 2 +- api/shortcut.go | 2 +- api/tag.go | 2 +- api/user_setting.go | 2 +- server/auth.go | 6 +- server/m...
null
CVE-2025-6442
Ruby WEBrick read_header HTTP Request Smuggling Vulnerability
Ruby WEBrick read_header HTTP Request Smuggling Vulnerability. This vulnerability allows remote attackers to smuggle arbitrary HTTP requests on affected installations of Ruby WEBrick. This issue is exploitable when the product is deployed behind an HTTP proxy that fulfills specific conditions. The specific flaw exists within the read_headers method. The issue results from the inconsistent parsing of terminators of HTTP headers. An attacker can leverage this vulnerability to smuggle arbitrary HTTP requests. Was ZDI-CAN-21876.
[ { "commit_message": "[PATCH] Require CRLF line endings in request line and headers Disallow bare CR, LF, NUL in header and request lines. Tighten parsing of request lines to only allow single spaces, as specified in the RFCs. Forcing this RFC-compliant behavior breaks a lot of tests, so fix the tests to correct...
CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
CVE-2015-2311
Integer underflow in Sandstorm Cap'n Proto before 0.4.1.1 and 0.5.x before 0.5.1.1 might allow remote peers to cause a denial of service or possibly obtain sensitive information from memory or execute arbitrary code via a crafted message.
[ { "commit_message": "[PATCH] SECURITY: Integer underflow in pointer validation. Details: https://github.com/sandstorm-io/capnproto/tree/master/security-advisories/2014-03-02-1-c++-integer-underflow.md c++/src/capnp/layout.c++ | 10 ++++++++-- 1 file changed, 8 insertions(+), 2 deletions(-)", "patch_text_b64"...
n/a
GHSA-gqvf-3hgp-5hxv
Gradio Exposure of Sensitive Information to an Unauthorized Actor vulnerability
null
[ { "commit_message": "[PATCH] remove echo (#6305) .github/workflows/generate-changeset.yml | 2 -- 1 file changed, 2 deletions(-)", "patch_text_b64": "RnJvbSA1YjVhZjE4OTlkZDk4ZDYzZTFmOWI0OGE5MzYwMWMyZGIxZjU2NTIwIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBwbmd3biA8aGVsbG9AcG5nd24uaW8+CkRhdGU6IE1vbiwgNiBOb3YgMjA...
null
CVE-2025-64749
Directus Vulnerable to Information Leakage in Existing Collections
Directus is a real-time API and App dashboard for managing SQL database content. An observable difference in error messaging was found in the Directus REST API in versions of Directus prior to version 11.13.0. The `/items/{collection}` API returns different error messages for two cases: when a user tries to access an existing collection which they are not authorized to access, and when user tries to access a non-existing collection. The two differing error messages leak the existence of collections to users which are not authorized to access these collections. Version 11.13.0 fixes the issue.
[ { "commit_message": "[PATCH] Merge from fork (#26109) * Use the same error for non-existent collections * unifi error creation * changeset * prettier * updated changeset .changeset/late-cobras-report.md | 5 +++++ api/src/middleware/collection-exists.ts | 4 ++-- .../modules/process-payload...
CWE-203: Observable Discrepancy
CVE-2025-55013
Assemblyline 4 Service Client: Arbitrary Write through path traversal in Client code
The Assemblyline 4 Service Client interfaces with the API to fetch tasks and publish the result for a service in Assemblyline 4. In versions below 4.6.1.dev138, the Assemblyline 4 Service Client (task_handler.py) accepts a SHA-256 value returned by the service server and uses it directly as a local file name.A malicious or compromised server (or any MITM that can speak to client) can return a path-traversal payload such as `../../../etc/cron.d/evil` and force the client to write the downloaded bytes to an arbitrary location on disk. This is fixed in version 4.6.1.dev138.
[ { "commit_message": "[PATCH] Validate input given from service-server before attempting to download file assemblyline_service_client/task_handler.py | 10 +++++++++- 1 file changed, 9 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA4Mjc3YWQ2MTUzNGU0M2Y3YWQ5OWFiZGQ2ZjNhY2M3MjkxMzY0NjMzIE1vbiBTZXAgMTc...
CWE-23: Relative Path Traversal
GHSA-g344-hcph-8vgg
Picklescan has a missing detection when calling built-in python trace.Trace.runctx
null
[ { "commit_message": "[PATCH] Missing detection when calling Python functions Address: - Missing detection when calling built-in python trace.Trace.run https://github.com/mmaitre314/picklescan/security/advisories/GHSA-5qwp-399c-mjwf - Missing detection when calling built-in python trace.Trace.runctx https://gith...
null
GHSA-rw3x-fqfm-qr37
null
[ { "commit_message": "[PATCH] dm snapshot: fix data corruption This patch fixes a particular type of data corruption that has been encountered when loading a snapshot's metadata from disk. When we allocate a new chunk in persistent_prepare, we increment ps->next_free and we make sure that it doesn't point to a m...
null
CVE-2020-5288
Improper access control on product attributes page in PrestaShop
"In PrestaShop between versions 1.7.0.0 and 1.7.6.5, there is improper access controls on product attributes page. The problem is fixed in 1.7.6.5.
[ { "commit_message": "[PATCH] Add @AdminSecurity annotation on AttributeController .../Controller/Admin/AttributeController.php | 21 ++++++++++++++----- 1 file changed, 16 insertions(+), 5 deletions(-)", "patch_text_b64": "RnJvbSBlNmZkNThkYzg5ZjFjN2IyM2ViNmM0OWQ1MjgwODc5ODc2ZjE2NTE2IE1vbiBTZXAgMTcgMDA6MDA6M...
CWE-284: Improper Access Control
GHSA-9f66-54xg-pc2c
Jupyter Server open redirect vulnerability
null
[ { "commit_message": "[PATCH] sync _redirect_safe with upstream jupyter_server/auth/login.py | 19 +++++--- tests/auth/test_login.py | 95 ++++++++++++++++++++++++++++++++++++ 2 files changed, 108 insertions(+), 6 deletions(-) create mode 100644 tests/auth/test_login.py", "patch_text_b64": "RnJvbSAyMGM4NGU...
null
GHSA-27wp-jvhw-v4xp
Shopware vulnerable to Server Side Template Injection in Twig using deprecation silence tag
null
[ { "commit_message": "[PATCH] NEXT-37397 - Security picks .../Twig/Node/FeatureCallSilentToken.php | 4 ++- Framework/Context.php | 12 ++++---- .../DataAbstractionLayerException.php | 11 +++++++ .../Dbal/EntityAggregator.php | 5 ++++ .../Search/Parser/Aggrega...
null
CVE-2020-27829
A heap based buffer overflow in coders/tiff.c may result in program crash and denial of service in ImageMagick before 7.0.10-45.
[ { "commit_message": "[PATCH] possible TIFF related-heap buffer overflow (alert & POC by Hardik Shah) ChangeLog | 6 ++++++ coders/tiff.c | 2 +- 2 files changed, 7 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA2ZWU1MDU5Y2QzYWM4ZDgyNzE0YTFhYjEzMjEzOTliODg1MzlhYmYwIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAw...
CWE-122
CVE-2013-7490
An issue was discovered in the DBI module before 1.632 for Perl. Using many arguments to methods for Callbacks may lead to memory corruption.
[ { "commit_message": "[PATCH] Fixed risk of memory corruption with many arguments to methods RT#86744 Changes | 3 +++ DBI.xs | 12 +++++++----- t/70callbacks.t | 10 ++++++++++ 3 files changed, 20 insertions(+), 5 deletions(-)", "patch_text_b64": "RnJvbSBhOGI5OGU5ODhkNmVhMjk0NmY1ZjU2NjkxZDZkN...
n/a
CVE-2022-0285
Cross-site Scripting (XSS) - Stored in pimcore/pimcore
Cross-site Scripting (XSS) - Stored in Packagist pimcore/pimcore prior to 10.2.9.
[ { "commit_message": "[PATCH] [Thumbnails] Escape group text properly bundles/AdminBundle/Controller/Admin/SettingsController.php | 6 +++--- .../Resources/public/js/pimcore/settings/thumbnail/item.js | 1 + 2 files changed, 4 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSBiNDMyMjI1OTUyZTJhNWFiMDI2...
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-62185
In Ankitects Anki before 25.02.5, a crafted shared deck can place a YouTube downloader executable in the media folder, and this is executed for a YouTube link in the deck. The executable name could be youtube-dl.exe or yt-dlp.exe or yt-dlp_x86.exe.
[ { "commit_message": "[PATCH] Disable YouTube DL in mpv mpv looks for ytdl on the path, which includes the CWD on Windows. A malicious shared deck could place an executable called yt-dlp.exe in the media folder, which mpv would then helpfully invoke the first time a YouTube link was encountered. A big thank you ...
CWE-427 Uncontrolled Search Path Element
PYSEC-2021-149
null
[ { "commit_message": "[PATCH] Fix an invalid address vulnerability in `tf.raw_ops.RaggedBincount`. PiperOrigin-RevId: 368293153 Change-Id: I4b4e493d3fd05e7dc55a55de3a041a80a4f275c3 tensorflow/core/kernels/bincount_op.cc | 9 +++++++++ 1 file changed, 9 insertions(+)", "patch_text_b64": "RnJvbSBlZWJiOTZjMjgzMG...
null
GHSA-c72r-fqqv-r8jm
null
[ { "commit_message": "[PATCH] KVM: unmap pages from the iommu when slots are removed commit 32f6daad4651a748a58a3ab6da0611862175722f upstream. We've been adding new mappings, but not destroying old mappings. This can lead to a page leak as pages are pinned using get_user_pages, but only unpinned with put_page if...
null
GHSA-g95c-2jgm-hqc6
Fides Webserver Vulnerable to Zip Bomb File Uploads
null
[ { "commit_message": "[PATCH] Merge pull request from GHSA-g95c-2jgm-hqc6 Co-authored-by: Dave Quinlan <83430497+daveqnet@users.noreply.github.com> .../saas/connector_registry_service.py | 4 +++ src/fides/api/util/unsafe_file_util.py | 34 +++++++++++++++++++ tests/ops/util/test_unsafe_file_util.py...
null
PYSEC-2024-66
null
[ { "commit_message": "[PATCH] deprecate materialization overrides from imported packages (#9971) (#10008) .../unreleased/Features-20231218-195854.yaml | 6 + .../unreleased/Features-20240422-173703.yaml | 6 + .../Under the Hood-20240418-172528.yaml | 6 + core/dbt/cli/flags.py ...
null
GHSA-fc43-xqx9-fhvj
null
[ { "commit_message": "[PATCH] SuiteCRM 7.12.5 Release README.md | 2 +- files.md5 | 72 ++++++++++--------- .../AOR_Scheduled_Reports.php | 28 ++++++-- modules/Calendar/CalendarActivity.php | 5 +- modules/Employees/Em...
null
PYSEC-2017-46
null
[ { "commit_message": "[PATCH] Set content type in json_error to application/json IPython/html/base/handlers.py | 2 ++ 1 file changed, 2 insertions(+)", "patch_text_b64": "RnJvbSBjMjA3OGE1MzU0M2VkNTAyZWZkOTY4NjQ5ZmVlMTEyNWUwZWI1NDljIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBLeWxlIEtlbGxleSA8cmdia3JrQGdtYWlsLm...
null
CVE-2024-3029
Improper Input Validation in mintplex-labs/anything-llm
In mintplex-labs/anything-llm, an attacker can exploit improper input validation by sending a malformed JSON payload to the '/system/enable-multi-user' endpoint. This triggers an error that is caught by a catch block, which in turn deletes all users and disables the 'multi_user_mode'. The vulnerability allows an attacker to remove all existing users and potentially create a new admin user without requiring a password, leading to unauthorized access and control over the application.
[ { "commit_message": "[PATCH] sec: fix enable-multi-user preflight check to prevent error loop server/endpoints/system.js | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSA5OWNmZWUxZTcwMjVmZTlhMDkxOWE0ZDUwNmJhMWUxYjgxOWY2MDczIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiB0aW1v...
CWE-20 Improper Input Validation
CVE-2023-42439
GeoNode SSRF Bypass to return internal host data
GeoNode is an open source platform that facilitates the creation, sharing, and collaborative use of geospatial data. A SSRF vulnerability exists starting in version 3.2.0, bypassing existing controls on the software. This can allow a user to request internal services for a full read SSRF, returning any data from the internal network. The application is using a whitelist, but the whitelist can be bypassed. The bypass will trick the application that the first host is a whitelisted address, but the browser will use `@` or `%40` as a credential to the host geoserver on port 8080, this will return the data to that host on the response. Version 4.1.3.post1 is the first available version that contains a patch.
[ { "commit_message": "[PATCH] Merge pull request from GHSA-pxg5-h34r-7q8p * fixes advisory * - fix tests geonode/proxy/tests.py | 10 ++++++++++ geonode/utils.py | 21 +++++++++++++++++++-- 2 files changed, 29 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSA3OWFjNmU3MDQxOWMyZTAyNjE1NDhiZWQ5MWMx...
CWE-918: Server-Side Request Forgery (SSRF)
CVE-2025-15506
AcademySoftwareFoundation OpenColorIO FileRules.cpp ConvertToRegularExpression out-of-bounds
A vulnerability was found in AcademySoftwareFoundation OpenColorIO up to 2.5.0. This issue affects the function ConvertToRegularExpression of the file src/OpenColorIO/FileRules.cpp. Performing a manipulation results in out-of-bounds read. The attack needs to be approached locally. The exploit has been made public and could be used. The patch is named ebdbb75123c9d5f4643e041314e2bc988a13f20d. To fix this issue, it is recommended to deploy a patch. The fix was added to the 2.5.1 milestone.
[ { "commit_message": "[PATCH] Addressing Issue #2228 - Heap-use-after-free in OpenColorIO::ThrowInvalidRegex This turned out to be not a UAF issue but an out-of-bounds-access issue where the throw was accessing the incorrect (and potentially shorter) string with an index derived from another (and potentially lon...
Out-of-Bounds Read
CVE-2018-19045
keepalived 2.0.8 used mode 0666 when creating new temporary files upon a call to PrintData or PrintStats, potentially leaking sensitive information.
[ { "commit_message": "[PATCH] Fix compile warning introduced in commit c6247a9 Commit c6247a9 - \"Add command line and configuration option to set umask\" introduced a compile warning, although the code would have worked OK. Signed-off-by: Quentin Armitage <quentin@armitage.org.uk> keepalived/core/main.c | 2 +- ...
n/a
GHSA-wmx6-vxcf-c3gr
Validation Bypass in slp-validate
null
[ { "commit_message": "[PATCH] 1.0.1 updates: * add ts linting * include gs++ validation example .vscode/settings.json | 5 + README.md | 6 +- lib/crypto.ts | 8 +- lib/script.ts | 2 +- lib/slp.ts | 352 +++++++++++++++++++++++------------------- package-lock.json |...
null
GHSA-q8vv-4hq4-vm9q
null
[ { "commit_message": "[PATCH] [api] support binary package upload for the admin src/api/app/controllers/build_controller.rb | 31 +++++++++---------- .../test/functional/build_controller_test.rb | 26 ++++++++++++++++ 2 files changed, 40 insertions(+), 17 deletions(-)", "patch_text_b64": "RnJvbSA1MjgxZTRiZm...
null
CVE-2020-36768
rl-institut NESP2 database.py sql injection
A vulnerability was found in rl-institut NESP2 Initial Release/1.0. It has been classified as critical. Affected is an unknown function of the file app/database.py. The manipulation leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The patch is identified as 07c0cdf36cf6a4345086d07b54423723a496af5e. It is recommended to apply a patch to fix this issue. VDB-246642 is the identifier assigned to this vulnerability.
[ { "commit_message": "[PATCH] Protect user input against sql injection All fields which are provided by the user are now checked converted to numerical values in python to prevent SQL injection. Best would be to use ORM, but SQLAlchemy does not handle it great for materialized views, and I wanted to patch the vu...
CWE-89 SQL Injection
GHSA-w42g-7vfc-xf37
Introspection in schema validation in Apollo Server
null
[ { "commit_message": "[PATCH 1/4] security: Pass all validation rules to the `SubscriptionServer`. Co-authored-by: Jesse Rosenberger <git@jro.cc> CHANGELOG.md | 12 +- .../apollo-server-core/src/ApolloServer.ts | 1 + .../src/ApolloServer.ts | 113 ++++++...
null
CVE-2018-1000119
Sinatra rack-protection versions 1.5.4 and 2.0.0.rc3 and earlier contains a timing attack vulnerability in the CSRF token checking that can result in signatures can be exposed. This attack appear to be exploitable via network connectivity to the ruby application. This vulnerability appears to have been fixed in 1.5.5 and 2.0.0.
[ { "commit_message": "[PATCH] Use secure_compare when checking CSRF token Since string comparisions may return early we want to use a constant time comparsion function to protect the CSRF token against timing attacks. Rack::Utils provides a such function. rack-protection/lib/rack/protection/authenticity_token.rb...
n/a
PYSEC-2020-293
null
[ { "commit_message": "[PATCH] [tflite] Validate segment ids for segment_sum. Segment identifiers in segment_sum should be in a 1-D tensor of same size as the first dimension of the input. The values of the tensor should be integers from {0, 1, 2, ... k-1}, where k is the first dimension of the input. The segment...
null
GHSA-rc8x-jrrc-frfv
Laravel does not properly constrain the host portion of a password-reset URL
null
[ { "commit_message": "[PATCH] force host on password reset notification src/Illuminate/Auth/Notifications/ResetPassword.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBjZWYxMDU1MTgyMDUzMDYzMmE4NmZhNmYxMzA2ZmVlOTVjNWNhYzQzIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBUYXlsb3I...
null
GHSA-mjjp-xjfg-97wg
null
[ { "commit_message": "[PATCH] Fix #1277 src/ELF/Parser.tcc | 4 +++- tests/elf/test_issues.py | 4 ++++ 2 files changed, 7 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA4MWJkNWQ3ZWEwYzM5MDU2M2YxYzRjMDE3YzkwMTlkMTU0ODAyOTc4IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBSb21haW4gVGhvbWFzIDxtZUByb21h...
null
CVE-2015-3010
ceph-deploy before 1.5.23 uses weak permissions (644) for ceph/ceph.client.admin.keyring, which allows local users to obtain sensitive information by reading the file.
[ { "commit_message": "[PATCH] Fix: keyring permissions where world readable Reported in https://bugzilla.suse.com/show_bug.cgi?id=920926 by Andreas Stieger <astieger@suse.com> Before thsi fix to umask for keyring handling, After execution of ceph-deploy, all keyrings have mode 644. The documented ceph-deploy pr...
n/a