id
stringlengths
12
19
title
stringlengths
0
237
description
stringlengths
35
3.87k
patches
listlengths
1
22
cwe
stringlengths
2
440
GHSA-pm9q-xj9p-96pm
@strapi/plugin-upload has a Denial-of-Service via Improper Exception Handling
null
[ { "commit_message": "[PATCH] fix: dont close modal on error (#19946) .../content-releases/admin/src/components/ReleaseModal.tsx | 2 +- .../content-releases/admin/src/pages/ReleaseDetailsPage.tsx | 3 +-- 2 files changed, 2 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSBhMGRhN2U3M2UxNDk2ZDgz...
null
GHSA-fwfg-vprh-97ph
OctoPrint vulnerable to Improper Neutralization of Special Elements Used in a Template Engine
null
[ { "commit_message": "[PATCH] =?UTF-8?q?=F0=9F=94=92=EF=B8=8F=20Use=20sandboxed=20jinja?= =?UTF-8?q?=20env=20for=20gcode=20scripts?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Without this patch, an attacker with admin rights could configure a specially crafted GCOD...
null
GHSA-h44v-883g-x8c3
null
[ { "commit_message": "[PATCH] Services: Captive Portal - safeguard template overlay distribution. .../scripts/OPNsense/CaptivePortal/overlay_template.py | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSA0NDg3NjJkNDQwYjUxNTc0ZjE5MDZjMGVjMmY1ZWE2ZGM0ZjE2ZWIyIE1vbiBTZXA...
null
GHSA-7vjq-m92p-42wp
null
[ { "commit_message": "[PATCH] Fix #522 plugins/codecs/ndlz/ndlz4x4.c | 6 +++++- plugins/codecs/ndlz/ndlz8x8.c | 7 +++++-- 2 files changed, 10 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSBkNTViZmNkNjgwNDY5OWUxNDM1ZGMzZTIzM2ZkNzZjOGE1ZDNmOWUzIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBNYXJ0YSBJYm9y...
null
CVE-2023-29419
An issue was discovered in libbzip3.a in bzip3 before 1.2.3. There is a bz3_decode_block out-of-bounds read.
[ { "commit_message": "[PATCH] mRLE: decoding bounds src/libbz3.c | 17 +++++++++++++---- 1 file changed, 13 insertions(+), 4 deletions(-)", "patch_text_b64": "RnJvbSA4ZWM4Y2U3ZDNkNThiZjQyZGFiYzQ3ZTRjYzUzYWEyNzA1MWJkNjAyIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBLYW1pbGEgU3pld2N6eWsgPGtzcGFsYWlvbG9nb3NAZ21haWw...
n/a
CVE-2022-0387
Cross-site Scripting (XSS) - Stored in livehelperchat/livehelperchat
Cross-site Scripting (XSS) - Stored in Packagist remdex/livehelperchat prior to 3.93v.
[ { "commit_message": "[PATCH] fix lhc_web/design/defaulttheme/tpl/lhdepartment/editgroup.tpl.php | 2 +- .../design/defaulttheme/tpl/lhdepartment/editlimitgroup.tpl.php | 2 +- lhc_web/design/defaulttheme/tpl/lhdepartment/newgroup.tpl.php | 2 +- 3 files changed, 3 insertions(+), 3 deletions(-)", "patch_text...
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
GHSA-97r3-f3fh-2pjg
null
[ { "commit_message": "[PATCH] Fix issue introduced previously whereby php_Self is now used unchecked. introduced previously by john attempting to fix symlinks. Since we now use php 5.2, we can make use of filter_var. This is a simpler version of what we were trying to do previously aka http://git.mantisforge.org...
null
CVE-2022-0938
Stored XSS via file upload in star7th/showdoc
Stored XSS via file upload in GitHub repository star7th/showdoc prior to v2.10.4.
[ { "commit_message": "[PATCH] Update AttachmentModel.class.php server/Application/Api/Model/AttachmentModel.class.php | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBkYTU2ZDFkNjg3MDJhN2E4MDUwNjI0NWMyNTFlNThlYWY4NGNmZjI3IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBBamF5c2VuIFI...
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
GHSA-2pfh-q76x-gwvm
Improper Input Validation and Command Injection in Ansible
null
[ { "commit_message": "[PATCH] fix unsafe preservation across newlines (#74960) (#74973) CVE-2021-3583 ensure we always have unsafe Co-authored-by: Rick Elrod <rick@elrod.me> (cherry picked from commit 4c8c40fd3d4a58defdc80e7d22aa8d26b731353e) changelogs/fragments/fix_unsafe_newline.yml | 2 ++ lib/ansible/templ...
null
CVE-2022-21227
Denial of Service (DoS)
The package sqlite3 before 5.0.3 are vulnerable to Denial of Service (DoS) which will invoke the toString function of the passed parameter. If passed an invalid Function object it will throw and crash the V8 engine.
[ { "commit_message": "[PATCH] bug: fix segfault of invalid toString() object (#1450) * bug: verify toString() returns valid data * test: faulty toString test src/statement.cc | 8 +++++++- test/other_objects.test.js | 9 +++++++++ 2 files changed, 16 insertions(+), 1 deletion(-)", "patch_text_b64": "...
Denial of Service (DoS)
GHSA-q2xp-75m7-gv52
Improper Input Validation in net.sf.robocode:robocode.host allows for external service interaction
null
[ { "commit_message": "[PATCH] Bug-406: DNS interaction is not blocked by Robocode's security manager + test(s) to verify the fix .../security/RobocodeSecurityManager.java | 26 +++++++++-- .../main/java/tested/robots/DnsAttack.java | 18 ++++++++ .../robots/TestConstructorHttpAttack.java | 11 ++--- .../...
null
CVE-2025-68434
opensourcepos has Cross-Site Request Forgery vulnerability that leads to Unauthorized Administrator Creation
Open Source Point of Sale (opensourcepos) is a web based point of sale application written in PHP using CodeIgniter framework. Starting in version 3.4.0 and prior to version 3.4.2, a Cross-Site Request Forgery (CSRF) vulnerability exists in the application's filter configuration. The CSRF protection mechanism was **explicitly disabled**, allowing the application to process state-changing requests (POST) without verifying a valid CSRF token. An unauthenticated remote attacker can exploit this by hosting a malicious web page. If a logged-in administrator visits this page, their browser is forced to send unauthorized requests to the application. A successful exploit allows the attacker to silently create a new Administrator account with full privileges, leading to a complete takeover of the system and loss of confidentiality, integrity, and availability. The vulnerability has been patched in version 3.4.2. The fix re-enables the CSRF filter in `app/Config/Filters.php` and resolves associated AJAX race conditions by adjusting token regeneration settings. As a workaround, administrators can manually re-enable the CSRF filter in `app/Config/Filters.php` by uncommenting the protection line. However, this is not recommended without applying the full patch, as it may cause functionality breakage in the Sales module due to token synchronization issues.
[ { "commit_message": "[PATCH] Enable CSRF using session token (#3632) app/Config/Filters.php | 2 +- app/Config/Security.php | 4 ++-- app/Views/partial/header_js.php | 4 +--- gulpfile.js | 3 --- package-lock.json | 6 ------ package.json | 1 - 6...
CWE-352: Cross-Site Request Forgery (CSRF)
CVE-2014-3122
The try_to_unmap_cluster function in mm/rmap.c in the Linux kernel before 3.14.3 does not properly consider which pages must be locked, which allows local users to cause a denial of service (system crash) by triggering a memory-usage pattern that requires removal of page-table mappings.
[ { "commit_message": "[PATCH] mm: try_to_unmap_cluster() should lock_page() before mlocking A BUG_ON(!PageLocked) was triggered in mlock_vma_page() by Sasha Levin fuzzing with trinity. The call site try_to_unmap_cluster() does not lock the pages other than its check_page parameter (which is already locked). The...
n/a
GHSA-735f-w79p-282x
pimcore/customer-management-framework-bundle Cross-site Scripting vulnerability in Segment name
null
[ { "commit_message": "[PATCH] Fix Xss in the segment name (#490) * Fix Xss in the segment name * Apply php-cs-fixer changes * Fix PHP stan Co-authored-by: aryaantony92 <aryaantony92@users.noreply.github.com> composer.json | 2 +- src/View/Formatter/DefaultViewFormatter.php | 3 ++- 2 ...
null
CVE-2016-8339
A buffer overflow in Redis 3.2.x prior to 3.2.4 causes arbitrary code execution when a crafted command is sent. An out of bounds write vulnerability exists in the handling of the client-output-buffer-limit option during the CONFIG SET command for the Redis data structure store. A crafted CONFIG SET command can lead to an out of bounds write potentially resulting in code execution.
[ { "commit_message": "[PATCH] Security: CONFIG SET client-output-buffer-limit overflow fixed. This commit fixes a vunlerability reported by Cory Duplantis of Cisco Talos, see TALOS-2016-0206 for reference. CONFIG SET client-output-buffer-limit accepts as client class \"master\" which is actually only used to imp...
Arbitrary Code Execution
CVE-2022-24805
net-snmp: A buffer overflow in the handling of the INDEX of NET-SNMP-VACM-MIB can cause an out-of-bounds memory access.
net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a buffer overflow in the handling of the `INDEX` of `NET-SNMP-VACM-MIB` can cause an out-of-bounds memory access. A user with read-only credentials can exploit the issue. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credentials. Those who must use SNMPv1 or SNMPv2c should use a complex community string and enhance the protection by restricting access to a given IP address range.
[ { "commit_message": "[PATCH] updates to CHANGES/NEWS CHANGES | 30 ++++++++++++++++++++++++++---- NEWS | 25 ++++++++++++++++++++++++- 2 files changed, 50 insertions(+), 5 deletions(-)", "patch_text_b64": "RnJvbSBjZTY2ZWI5N2MxN2FhOWE0OGJjMDc5YmU3YjY1ODk1MjY2ZmE2Nzc1IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tO...
CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2023-3551
Code Injection in nilsteampassnet/teampass
Code Injection in GitHub repository nilsteampassnet/teampass prior to 3.0.10.
[ { "commit_message": "[PATCH] 3.0.10 Fix for #3779, #3775 Fix for improper handling of input in admin setting pages includes/js/functions.js | 29 ++++++++++++++--- .../src/voku/helper/AntiXSS.php | 1 + pages/2fa.js.php | 31 ++++--------------- page...
CWE-94 Improper Control of Generation of Code
GHSA-27wf-5967-98gx
Kubernetes kubelet arbitrary command execution
null
[ { "commit_message": "[PATCH] gitRepo volume: directory must be max 1 level deep More details on Hackerone #2266560 pkg/volume/git_repo/git_repo.go | 6 ++++++ pkg/volume/git_repo/git_repo_test.go | 14 ++++++++++++++ 2 files changed, 20 insertions(+)", "patch_text_b64": "RnJvbSBjNzg0NmZkMjRjMTYyNjZhM2Jm...
null
CVE-2018-14682
An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. There is an off-by-one error in the TOLOWER() macro for CHM decompression.
[ { "commit_message": "[PATCH] Fix off-by-one error in chmd TOLOWER() fallback libmspack/ChangeLog | 5 +++++ libmspack/mspack/chmd.c | 2 +- 2 files changed, 6 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA0ZmQ5Y2NhYTU0ZTFhZWJkZTFlNGI5NWZiMDE2M2I2OTlmZDdiY2M4IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGc...
n/a
CVE-2021-29566
Heap OOB access in `Dilation2DBackpropInput`
TensorFlow is an end-to-end open source platform for machine learning. An attacker can write outside the bounds of heap allocated arrays by passing invalid arguments to `tf.raw_ops.Dilation2DBackpropInput`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/afd954e65f15aea4d438d0a219136fc4a63a573d/tensorflow/core/kernels/dilation_ops.cc#L321-L322) does not validate before writing to the output array. The values for `h_out` and `w_out` are guaranteed to be in range for `out_backprop` (as they are loop indices bounded by the size of the array). However, there are no similar guarantees relating `h_in_max`/`w_in_max` and `in_backprop`. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
[ { "commit_message": "[PATCH] Add missing validations in dillation ops. PiperOrigin-RevId: 372037158 Change-Id: I4ee304c84a02550c030288a6534000b934fc1599 tensorflow/core/kernels/dilation_ops.cc | 15 +++++++++++---- 1 file changed, 11 insertions(+), 4 deletions(-)", "patch_text_b64": "RnJvbSAzZjZmZTRkZmVmNmY1...
CWE-787: Out-of-bounds Write
CVE-2023-46852
In Memcached before 1.6.22, a buffer overflow exists when processing multiget requests in proxy mode, if there are many spaces after the "get" substring.
[ { "commit_message": "[PATCH] proxy: fix buffer overflow with multiget syntax \"get[200 spaces]key1 key2\\r\\n\" would overflow a temporary buffer used to process multiget syntax. To exploit this you must first pass the check in try_read_command_proxy: - The request before the first newline must be less than 102...
n/a
CVE-2025-32960
CUBA Generic REST API Vulnerable to Cross-Site Scripting (XSS) in the /files Endpoint
The CUBA REST API add-on performs operations on data and entities. Prior to version 7.2.7, the input parameter, which consists of a file path and name, can be manipulated to return the Content-Type header with text/html if the name part ends with .html. This could allow malicious JavaScript code to be executed in the browser. For a successful attack, a malicious file needs to be uploaded beforehand. This issue has been patched in version 7.2.7. A workaround is provided on the Jmix documentation website.
[ { "commit_message": "[PATCH] Backport REST files fix #147 .../restapi/api/config/RestApiConfig.java | 9 +++++++ .../controllers/FileDownloadController.java | 25 +++++++++++++++++++ 2 files changed, 34 insertions(+)", "patch_text_b64": "RnJvbSBiM2Q1OTlmNjY1N2Q3ZTIxMmZkYjEzNGE2MWFiNWUwODg4NjY5ZWIxIE1vb...
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
GHSA-93vr-9q9m-pj8p
TensorFlow vulnerable to Out-of-Bounds Read in DynamicStitch
null
[ { "commit_message": "[PATCH] Add out of bounds array check to dynamic_stitch_op. PiperOrigin-RevId: 506418249 .../tf2xla/kernels/dynamic_stitch_op.cc | 4 ++++ tensorflow/core/kernels/dynamic_stitch_op.cc | 17 +++++++++++------ .../data_structures/dynamic_stitch_op_test.py | 13 +++++++++++++ 3 file...
null
GHSA-q8wg-hg8m-chwf
null
[ { "commit_message": "[PATCH] (for 4.9.3) CVE-2018-16452/SMB: prevent stack exhaustion Enforce a limit on how many times smb_fdata() can recurse. This fixes a stack exhaustion discovered by Include Security working under the Mozilla SOS program in 2018 by means of code audit. smbutil.c | 9 ++++++++- 1 file chang...
null
GHSA-8jxj-9r5f-w3m2
Puppet allows local users to obtain sensitive configuration information
null
[ { "commit_message": "[PATCH] Tighten permissions on classfile, resourcefile, lastrunfile, and lastrunreport. lib/puppet/defaults.rb | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-)", "patch_text_b64": "RnJvbSBmZDQ0YmY1ZTZkMGQzNjBmNmE0OTNkNjYzYjY1M2MxMjFmYTgzYzNmIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQ...
null
GHSA-4j82-5ccr-4r8v
`CHECK`-failures in `TensorByteSize` in Tensorflow
null
[ { "commit_message": "[PATCH] Use `PartialTensorShape` instead of `TensorShape`. `TensorShape` constructor throws a CHECK-fail if shape is partial/overflows which the other doesn't. We are only determining the number of elements in the shape and partial shape should be used as it returns negative number when nee...
null
CVE-2023-37185
C-blosc2 before 2.9.3 was discovered to contain a NULL pointer dereference via the function zfp_prec_decompress at zfp/blosc2-zfp.c.
[ { "commit_message": "[PATCH] Fix for #519 #520 #521 plugins/codecs/zfp/blosc2-zfp.c | 6 ++++++ 1 file changed, 6 insertions(+)", "patch_text_b64": "RnJvbSA0MjVlOGE5YTU5ZDQ5Mzc4ZDU3ZTIxMTZiNmM5YjAxOTBhNTk4NmY1IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBNYXJ0YSBJYm9ycmEgPG1hcnRhaWJvcnJhMjRAZ21haWwuY29tPgpEYXRl...
n/a
GHSA-cv9j-mg9w-v7wm
Liferay Portal JSONWS API endpoint shares sensitive information
null
[ { "commit_message": "[PATCH] LPD-41243 We need to check whether the user has permissions to assign members of the role instead .../src/com/liferay/portal/service/impl/UserServiceImpl.java | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBlZmRiZGJjZTczNjA1ZWNkMTNiMWE1ZTYwZjU...
null
CVE-2022-0273
Improper Access Control in janeczku/calibre-web
Improper Access Control in Pypi calibreweb prior to 0.6.16.
[ { "commit_message": "[PATCH] Prevent creating a public shelf without permission cps/shelf.py | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAwYzAzMTNmMzc1YmVkN2IwMzVjOGMwNDgyYmJiMDk1OTllMTZiZmNmIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBPenppZSBJc2FhY3MgPG96emllLmZlcm5hbmRle...
CWE-284 Improper Access Control
GHSA-hgrh-qx5j-jfwx
Picklescan Bypasses Unsafe Globals Check using pty.spawn
null
[ { "commit_message": "[PATCH] Fix various vulnerabilities (#53) Fix: - https://github.com/mmaitre314/picklescan/security/advisories/GHSA-m273-6v24-x4m4 - https://github.com/mmaitre314/picklescan/security/advisories/GHSA-4675-36f9-wf6r - https://github.com/mmaitre314/picklescan/security/advisories/GHSA-84r2-jw7c-...
null
GHSA-q3q5-qvh5-cmw5
liufee CMS File Upload vulnerability
null
[ { "commit_message": "[PATCH] fix:backend upload admin user avatar and artice thumb only permit to png/jpg/jpeg/gif/webp backend/models/User.php | 10 ++++++++++ common/models/Article.php | 10 +++++++++- 2 files changed, 19 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBlY2JmYjBjYTc3ODc0ZWFkNWI2ZT...
null
CVE-2020-4072
Log Forging in generator-jhipster-kotlin
In generator-jhipster-kotlin version 1.6.0 log entries are created for invalid password reset attempts. As the email is provided by a user and the api is public this can be used by an attacker to forge log entries. This is vulnerable to https://cwe.mitre.org/data/definitions/117.html This problem affects only application generated with jwt or session authentication. Applications using oauth are not vulnerable. This issue has been fixed in version 1.7.0.
[ { "commit_message": "[PATCH] prevent log forging when doing password reset init request .../src/main/kotlin/package/web/rest/AccountResource.kt.ejs | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSA0MjZjY2FiODVlN2UwZGE1NjI2NDMyMDA2MzdiOTliNmEyYTk5NDQ5IE1vbiBTZXAgMTcgMDA6...
CWE-117 Improper Output Neutralization for Logs
GHSA-7p9f-6x8j-gxxp
CRI-O: Maliciously structured checkpoint file can gain arbitrary node access
null
[ { "commit_message": "[PATCH] Only restore container if all bind mounts are defined To avoid the situation where a container that is restored via a registry mounts unexpected host paths into the container, this changes the restore behaviour of CRI-O. Previously all bind mounted paths in the original container wh...
null
GHSA-qxqc-27pr-wgc8
GoAuthentik vulnerable to Insufficient Authorization for several API endpoints
null
[ { "commit_message": "<98988430+gcp-cherry-pick-bot[bot]@users.noreply.github.com> [PATCH] security: fix CVE-2024-42490 (cherry-pick #11022) (#11024) security: fix CVE-2024-42490 (#11022) CVE-2024-42490 Signed-off-by: Jens Langhammer <jens@goauthentik.io> Co-authored-by: Jens L. <jens@goauthentik.io> authentik/c...
null
CVE-2022-23435
decoding.c in android-gif-drawable before 1.2.24 does not limit the maximum length of a comment, leading to denial of service.
[ { "commit_message": "[PATCH] Limit maximum length of comment android-gif-drawable/src/main/c/decoding.c | 13 +++++++++---- 1 file changed, 9 insertions(+), 4 deletions(-)", "patch_text_b64": "RnJvbSA5ZjBmMGM4OWU2ZmEzODU0ODE2Mzc3MWZlZWI0YmRlODRiODI4ODg3IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiA9P1VURi04P3E/...
n/a
PYSEC-2021-632
null
[ { "commit_message": "[PATCH] Add shape checks to FusedBatchNorm kernels. PiperOrigin-RevId: 399755576 Change-Id: If8049fde109cc33badb5509d174b9b95aee1ea5e .../core/kernels/fused_batch_norm_op.cc | 38 +++++- .../python/ops/nn_fused_batchnorm_test.py | 123 ++++++++++++++++++ 2 files changed, 154 insert...
null
GHSA-78fm-qhh8-8858
Moodle reflected XSS
null
[ { "commit_message": "[PATCH] MDL-70622 mod_lti: Prevent xss on lti 1.3 authentication script Without this, people can craft URLs that other users might use not realising what they do - and as a XSS vulnerability, it could do any number of things the clicking-user has access to do on the site. Change-Id: I82adc7...
null
CVE-2025-48948
Navidrome Transcoding Permission Bypass Vulnerability Report
Navidrome is an open source web-based music collection server and streamer. A permission verification flaw in versions prior to 0.56.0 allows any authenticated regular user to bypass authorization checks and perform administrator-only transcoding configuration operations, including creating, modifying, and deleting transcoding settings. In the threat model where administrators are trusted but regular users are not, this vulnerability represents a significant security risk when transcoding is enabled. Version 0.56.0 patches the issue.
[ { "commit_message": "[PATCH] fix(transcoding): restrict transcoding operations to admin users (#4096) Signed-off-by: Deluan <deluan@navidrome.org> persistence/sql_base_repository.go | 5 ++ persistence/transcoding_repository.go | 12 +++ persistence/transcoding_repository_test.go | 96 ++++++++++++++...
CWE-863: Incorrect Authorization
GHSA-m9jj-p947-m8xv
Jenkins mabl Plugin missing permission check
null
[ { "commit_message": "[PATCH] [SECURITY-3127][SECURITY-3137] (#64) README.md | 8 +- pom.xml | 2 +- .../integration/jenkins/MablStepBuilder.java | 232 ++++++++++++------ .../jenkins/MablStepConstants.java | 6 +- .../valida...
null
PYSEC-2021-482
null
[ { "commit_message": "[PATCH] Fix FPE issue with `tf.raw_ops.DenseCountSparseOutput`. PiperOrigin-RevId: 370946862 Change-Id: I3752584ad04aaecb327ff6793a9640ac56acfe7a tensorflow/core/kernels/count_ops.cc | 3 +++ 1 file changed, 3 insertions(+)", "patch_text_b64": "RnJvbSBkYTVmZjJkYWY2MTg1OTFmNjRiMmI2MmQ5ZDk...
null
GHSA-j8gh-87rx-c7w9
OpenShift Controller Manager Improper Privilege Management
null
[ { "commit_message": "[PATCH] CVE-2024-45496: Reduce Capabilities for Non-Build Containers Reduce the security context permissions to meet the \"baseline\" Pod Security Standard [1] for containers that do not invoke buildah. Currently, image pull, build, and push with buildah requires privileged containers (main...
null
GHSA-6vqp-h455-42mr
Uncontrolled Memory Allocation in Apache PDFBox
null
[ { "commit_message": "[PATCH] PDFBOX-5112: SonarCube fix, throw NoSuchElementException if no more elements are available git-svn-id: https://svn.apache.org/repos/asf/pdfbox/branches/2.0@1887295 13f79535-47bb-0310-9956-ffa450edef68 .../org/apache/pdfbox/pdfparser/PDFXrefStreamParser.java | 5 +++++ 1 file chan...
null
GHSA-fvwh-wv43-8qj5
Stored XSS vulnerability in Validating String Parameter Plugin
null
[ { "commit_message": "[PATCH] [SECURITY-1935] Co-authored-by: Daniel Beck <daniel-beck@users.noreply.github.com> pom.xml | 2 +- .../ValidatingStringParameterDefinition/index.jelly | 2 +- .../ValidatingStringParameterValue/value.jelly ...
null
GHSA-5g3x-8g2v-r8x8
Volcano has insecure permissions
null
[ { "commit_message": "[PATCH 1/2] Remove list and watch secret in controller ClusterRole since it is not used Signed-off-by: mevrin <matthieu.evrin@gmail.com> installer/helm/chart/volcano/templates/controllers.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAxZWY0MDhiZTRh...
null
CVE-2018-10366
An issue was discovered in the Users (aka Front-end user management) plugin 1.4.5 for October CMS. XSS exists in the name field.
[ { "commit_message": "[PATCH] KISS and form_value() doesn't use escaping components/account/update.htm | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-)", "patch_text_b64": "RnJvbSAwOThjMmJjOTA3NDQzZDY3ZTllMTg2NDVmODUwZTNkZTQyOTQxZDIwIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBTYW11ZWwgR2VvcmdlcyA8...
n/a
CVE-2024-51491
Process crash during CRL-based revocation check on OS using separate mount point for temp Directory in notation-go
notion-go is a collection of libraries for supporting sign and verify OCI artifacts. Based on Notary Project specifications. The issue was identified during Quarkslab's security audit on the Certificate Revocation List (CRL) based revocation check feature. After retrieving the CRL, notation-go attempts to update the CRL cache using the os.Rename method. However, this operation may fail due to operating system-specific limitations, particularly when the source and destination paths are on different mount points. This failure could lead to an unexpected program termination. In method `crl.(*FileCache).Set`, a temporary file is created in the OS dedicated area (like /tmp for, usually, Linux/Unix). The file is written and then it is tried to move it to the dedicated `notation` cache directory thanks `os.Rename`. As specified in Go documentation, OS specific restriction may apply. When used with Linux OS, it is relying on rename syscall from the libc and as per the documentation, moving a file to a different mountpoint raises an EXDEV error, interpreted as Cross device link not permitted error. Some Linux distribution, like RedHat use a dedicated filesystem (tmpfs), mounted on a specific mountpoint (usually /tmp) for temporary files. When using such OS, revocation check based on CRL will repeatedly crash notation. As a result the signature verification process is aborted as process crashes. This issue has been addressed in version 1.3.0-rc.2 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
[ { "commit_message": "[PATCH] fix: OS error when setting CRL cache leads to denial of signature verification Signed-off-by: Junjie Gao <junjiegao@microsoft.com> Signed-off-by: Patrick Zheng <patrickzheng@microsoft.com> internal/file/file.go | 11 +++++++++-- internal/file/file_test.go | 14 +++++++------- ver...
CWE-703: Improper Check or Handling of Exceptional Conditions
GHSA-v83h-65mx-qff4
null
[ { "commit_message": "[PATCH] SuiteCRM 7.14.2 Release ModuleInstall/ModuleScanner.php | 2 + README.md | 2 +- composer.lock | 50 +++--- download.php | 2 +- files.md5 ...
null
GHSA-47qp-8v9g-39hp
Code injection in Apache Struts
null
[ { "commit_message": "[PATCH] WW-4140 - Lukasz' patch applied git-svn-id: https://svn.apache.org/repos/asf/struts/struts2/branches/STRUTS_2_3_15_X@1502979 13f79535-47bb-0310-9956-ffa450edef68 .../actionPrefix/actionPrefixExample.ftl | 10 +-- .../mapper/DefaultActionMapper.java | 39 +++-------- ......
null
GHSA-rp6x-ggw6-8g56
Authorization Bypass in Apache InLong
null
[ { "commit_message": "[PATCH] [INLONG-8603][Manager] Fix the vulnerability to security attacks for the MySQL JDBC URL (#8604) .../manager/pojo/sink/mysql/MySQLSinkDTO.java | 6 ++---- .../pojo/sink/mysql/MySQLSinkDTOTest.java | 18 +++++++++--------- 2 files changed, 11 insertions(+), 13 deletions(-)", ...
null
CVE-2025-62369
Xibo CMS: Remote Code Execution through module templates
Xibo is an open source digital signage platform with a web content management system (CMS). Versions 4.3.0 and below contain a Remote Code Execution vulnerability in the CMS Developer menu's Module Templating functionality, allowing authenticated users with "System -> Add/Edit custom modules and templates" permissions to manipulate Twig filters and execute arbitrary server-side functions as the web server user. This issue is fixed in version 4.3.1. To workaround this issue, use the 4.1 and 4.2 patch commits.
[ { "commit_message": "[PATCH] Widget: add missing filter and allowed tags. lib/Widget/Render/WidgetHtmlRenderer.php | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAwZjRlODgzOTYxMTFlYTAyNzc4NWE0OGRkOGY1ZWViMTQ1MzZiZDcxIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBEYW4gR2Fybm...
CWE-94: Improper Control of Generation of Code ('Code Injection')
GHSA-frgf-rv99-862x
Roundup Cross-site Scripting (XSS) vulnerability
null
[ { "commit_message": "[PATCH] fix potential XSS hole roundup/cgi/client.py | 4 ++-- roundup/cgi/templating.py | 4 ++-- 2 files changed, 4 insertions(+), 4 deletions(-)", "patch_text_b64": "RnJvbSBkY2VmMDI0YmFlOGY2M2QyOTA0NTQyNTA3NjdhMzc3ZWIwZTE2NDdiIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBSaWNoYXJkIEpv...
null
GHSA-cvp7-c586-cmf4
Withdrawn: Code Injection in loguru
null
[ { "commit_message": "[PATCH] Remove use of \"pickle.loads()\" to comply with security tools (#563) loguru/_recattrs.py | 18 +++++++----------- tests/test_add_option_enqueue.py | 28 +++++++++++++++++++++++++--- 2 files changed, 32 insertions(+), 14 deletions(-)", "patch_text_b64": "RnJvbSA0YjAwN...
null
CVE-2023-32325
Cross-site scripting in PostHog-js
PostHog-js is a library to interface with the PostHog analytics tool. Versions prior to 1.57.2 have the potential for cross-site scripting. Problem has been patched in 1.57.2. Users are advised to upgrade. Users unable to upgrade should ensure that their Content Security Policy is in place.
[ { "commit_message": "[PATCH] fix: Remove API and JS urls (#630) * remove api url * 1.57.1-alpha.0 * 1.57.2-alpha.0 Co-authored-by: Michael Matloka <dev@twixes.com> package.json | 2 +- src/__tests__/extensions/toolbar.js | 24 ++++++++++++++++-------- src/extensions/toolbar.ts | ...
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-24607
Qt before 6.4.3 allows a denial of service via a crafted string when the SQL ODBC driver plugin is used and the size of SQLTCHAR is 4. The affected versions are 5.x before 5.15.13, 6.x before 6.2.8, and 6.3.x before 6.4.3.
[ { "commit_message": "[PATCH] SQL/ODBC: fix some users of toSQLTCHAR() to not assume identical UTF-8/16/32 string lengths We already fixed the implementation of toSQLTCHAR() in 66767eea46bea0f19f8ae5ad6ebc641d86867701 to not assume that a UTF-8 or UTF-32-encoded string has the same number of code points as the e...
n/a
CVE-2014-5045
The mountpoint_last function in fs/namei.c in the Linux kernel before 3.15.8 does not properly maintain a certain reference count during attempts to use the umount system call in conjunction with a symlink, which allows local users to cause a denial of service (memory consumption or use-after-free) or possibly have unspecified other impact via the umount program.
[ { "commit_message": "[PATCH] fs: umount on symlink leaks mnt count Currently umount on symlink blocks following umount: /vz is separate mount # ls /vz/ -al | grep test drwxr-xr-x. 2 root root 4096 Jul 19 01:14 testdir lrwxrwxrwx. 1 root root 11 Jul 19 01:16 testlink -> /vz/testdir # umount -l /v...
n/a
GHSA-fxvw-26c8-9g9m
null
[ { "commit_message": "[PATCH] Fix RCE in _raw() via $index parameter. $index is passed down from getImageAtIndex($index). Luckily the only official horde code calling it is the PDF preview code with a fixed index of 0. Still code from third party vendors using the Horde framework libs might expose getImageAtInde...
null
GHSA-rcf8-g8jv-vg6p
TensorFlow has Floating Point Exception in AvgPoolGrad with XLA
null
[ { "commit_message": "[PATCH] [tf2xla] Validate that stride and window size are positive PiperOrigin-RevId: 504866231 tensorflow/compiler/tests/pooling_ops_test.py | 30 +++++ .../compiler/tf2xla/kernels/pooling_ops.cc | 108 ++++++++++++------ tensorflow/compiler/xla/client/padding.cc | 10 ++ 3 files cha...
null
CVE-2023-2106
Weak Password Requirements in janeczku/calibre-web
Weak Password Requirements in GitHub repository janeczku/calibre-web prior to 0.6.20.
[ { "commit_message": "[PATCH] ** Be careful, after updating, there is no way back ** ** Please install flask-limiter after updating ** Update Teststatus Bugfix after merge Bugfix generate Metadata backup test/Calibre-Web TestSummary_Linux.html | 2423 +++++------------------ 1 file changed, 546 insertions(+), 187...
CWE-521 Weak Password Requirements
CVE-2011-1078
The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option.
[ { "commit_message": "[PATCH] Bluetooth: sco: fix information leak to userspace struct sco_conninfo has one padding byte in the end. Local variable cinfo of type sco_conninfo is copied to userspace with this uninizialized one byte, leading to old stack contents leak. Signed-off-by: Vasiliy Kulikov <segoon@openw...
n/a
GHSA-j2jg-fq62-7c3h
Gradio Blocked Path ACL Bypass Vulnerability
null
[ { "commit_message": "[PATCH] Blocked Paths Fix (#10304) * add code * add changeset * Fix test * empty Co-authored-by: gradio-pr-bot <gradio-pr-bot@users.noreply.github.com> .changeset/afraid-rats-guess.md | 5 +++++ gradio/utils.py | 3 ++- test/test_routes.py | 18 ++++++++++++++++++...
null
GHSA-9hp6-4448-45g2
Hono's flaw in URL path parsing could cause path confusion
null
[ { "commit_message": "[PATCH] Merge commit from fork src/utils/url.test.ts | 9 +++++++++ src/utils/url.ts | 7 +------ 2 files changed, 10 insertions(+), 6 deletions(-)", "patch_text_b64": "RnJvbSAxZDc5YWVkYzNmODJkOGM5OTY5YjExNWZlNjFiYzRiZDcwNWVjOGRlIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBZdXN1a2UgV2F...
null
CVE-2023-32677
Users who can send invitations can erroneously add users to streams during invitation in Zulip
Zulip is an open-source team collaboration tool with unique topic-based threading. Zulip administrators can configure Zulip to limit who can add users to streams, and separately to limit who can invite users to the organization. In Zulip Server 6.1 and below, the UI which allows a user to invite a new user also allows them to set the streams that the new user is invited to -- even if the inviting user would not have permissions to add an existing user to streams. While such a configuration is likely rare in practice, the behavior does violate security-related controls. This does not let a user invite new users to streams they cannot see, or would not be able to add users to if they had that general permission. This issue has been addressed in version 6.2. Users are advised to upgrade. Users unable to upgrade may limit sending of invitations down to users who also have the permission to add users to streams.
[ { "commit_message": "[PATCH] CVE-2023-32677: Check permission to subscribe other users in invites. This commit updates the API to check the permission to subscribe other users while inviting. The API will error if the user passes the \"stream_ids\" parameter (even when it contains only default streams) and the...
CWE-862: Missing Authorization
GHSA-39pg-x4cc-j86x
null
[ { "commit_message": "[PATCH] Fix #10293 - Use-after-free in r_anal_bb_free() libr/anal/bb.c | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA5MGI3MWMwMTdhN2ZhOTczMmZlNDVmZDIxYjI0NWVlMDUxYjFmNTQ4IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBwYW5jYWtlIDxwYW5jYWtlQG5vcGNvZGUub...
null
PYSEC-2023-69
null
[ { "commit_message": "[PATCH] Disallow using a file URI as model version source (#8126) * Add a test Signed-off-by: harupy <17039389+harupy@users.noreply.github.com> * Add a test Signed-off-by: harupy <17039389+harupy@users.noreply.github.com> * Disallow file URI Signed-off-by: harupy <hkawamura0130@gmail.com> *...
null
GHSA-5gmm-6m36-r7jh
transpose: Buffer overflow due to integer overflow
null
[ { "commit_message": "[PATCH] Use checked_mul instead of raw multiplication. Fixes #11 src/in_place.rs | 2 +- src/out_of_place.rs | 4 ++-- 2 files changed, 3 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSBjNGJjZDM5ZmFiY2E5YTMxYTQwMWQwY2M0MmQ0MDkwODY5YjVhMzdhIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpG...
null
CVE-2023-43256
A path traversal in Gladys Assistant v4.26.1 and below allows authenticated attackers to extract sensitive files in the host machine by exploiting a non-sanitized user input.
[ { "commit_message": "[PATCH] Camera Streaming: Fix validation of session_id and filename (#1847) .../rtsp-camera/api/rtspCamera.controller.js | 8 ++- .../rtsp-camera/utils/validateStreamParams.js | 28 +++++++++++ .../controllers/rtspCamera.controller.test.js | 50 ++++++++++++++++++- 3 files changed, 83 insert...
n/a
PYSEC-2021-868
null
[ { "commit_message": "[PATCH] Fix wrong offset used in split_region qemu/accel/tcg/translate-all.c | 4 +++- uc.c | 3 ++- 2 files changed, 5 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSBjNzMzYmJhZGEzNTZiMDM3M2ZhOGFhNzJjMDQ0NTc0YmI4NTVmZDI0IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAw...
null
CVE-2018-20594
An issue was discovered in hsweb 3.0.4. It is a reflected XSS vulnerability due to the absence of type parameter checking in FlowableModelManagerController.java.
[ { "commit_message": "[PATCH] =?UTF-8?q?fix=20#107=20=20=E4=BF=AE=E5=A4=8D=E5=8F=8D?= =?UTF-8?q?=E5=B0=84=E5=9E=8Bxss?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit .../web/workflow/enums/ModelType.java | 9 +++ .../web/FlowableModelManagerController.java | ...
n/a
GHSA-gmq4-pgww-w7c9
null
[ { "commit_message": "[PATCH] Added validation for contact adding and changed use of prepared statements to avoid SQL injection. src/AddContact.java | 2 +- src/Error.java | 18 +------------ src/Login.java | 2 +- src/Model.java | 60 ++++++++++++++++++++++++++++-------------- src/Searc...
null
CVE-2020-24753
A memory corruption vulnerability in Objective Open CBOR Run-time (oocborrt) in versions before 2020-08-12 could allow an attacker to execute code via crafted Concise Binary Object Representation (CBOR) input to the cbor2json decoder. An uncaught error while decoding CBOR Major Type 3 text strings leads to the use of an attacker-controllable uninitialized stack value. This can be used to modify memory, causing a crash or potentially exploitable heap corruption.
[ { "commit_message": "[PATCH] fixed missing return status test error util/cbor2json.c | 1 + 1 file changed, 1 insertion(+)", "patch_text_b64": "RnJvbSA1Mzk4NTFjNjY3NzhmNjhhMjQ0NjMzOTg1ZjZmOGQwZGY5NGVhM2IzIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBvYmpzeXMgPGVkYXlAb2JqLXN5cy5jb20+CkRhdGU6IFdlZCwgMTIgQXVnIDIwM...
n/a
GHSA-v558-fhw2-v46w
Unsafe entry in Script Security list of approved signatures in Pipeline Remote Loader Plugin
null
[ { "commit_message": "[PATCH] [SECURITY-921] Co-Authored-By: Devin Nusbaum <dwnusbaum@users.noreply.github.com> .../plugins/workflow/remoteloader/FileLoaderDSL.java | 12 ------------ .../FileLoaderDSL/FileLoaderDSLImpl.groovy | 2 -- 2 files changed, 14 deletions(-)", "patch_text_b64": "RnJvbSA2Zjl...
null
GHSA-vh25-5764-9wcr
@conventional-changelog/git-client has Argument Injection vulnerability
null
[ { "commit_message": "[PATCH] fix(git-client)!: ability to pass additional git params is removed by security reasons (#1325) If you need more git options, please open PR with it. BREAKING CHANGE: ability to pass additional git params is removed .../test/index.spec.js | 4 +- .../src/bumper...
null
GHSA-49q3-8867-5wmp
Remote Command Execution in reg-keygen-git-hash-plugin
null
[ { "commit_message": "[PATCH] fix: Escape shell string packages/reg-keygen-git-hash-plugin/package.json | 4 +++- .../reg-keygen-git-hash-plugin/src/git-cmd-client.ts | 9 +++++---- yarn.lock | 10 ++++++++++ 3 files changed, 18 insertions(+), 5 deletions(-)", ...
null
GHSA-4w8p-x6g8-fv64
Server-Side Request Forgery in calibreweb
null
[ { "commit_message": "[PATCH] Deleted book formats remove book from synced to kobo table updated teststatus cps/editbooks.py | 3 +- cps/helper.py | 14 +- cps/kobo_sync_status.py | 13 +- cps/tasks/convert.py | 8 +- cps/ub.py...
null
GHSA-fxxw-25rf-p8p4
null
[ { "commit_message": "[PATCH] Merge pull request from GHSA-m8x6-6r63-qvj2 core-bundle/src/Resources/contao/pages/PageRegular.php | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSAxOTkyMDY4NDlhODdkZGQwZmE1Y2Y2NzRlYjNjNTgyOTJmZDgzNjZjIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOi...
null
CVE-2022-36012
Assertion fail on MLIR empty edge names in TensorFlow
TensorFlow is an open source platform for machine learning. When `mlir::tfg::ConvertGenericFunctionToFunctionDef` is given empty function attributes, it crashes. We have patched the issue in GitHub commit ad069af92392efee1418c48ff561fd3070a03d7b. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
[ { "commit_message": "[PATCH] [tfg][functiondef_import] Error on empty edge names Return an error in the generic function importer if an edge name is empty. PiperOrigin-RevId: 449953062 .../ir/importexport/functiondef_import.cc | 21 ++++++++++++-- ...neric_func_with_empty_control_result.pbtxt | 26 ++++++++++...
CWE-617: Reachable Assertion
CVE-2022-41922
yiisoft/yii before v1.1.27 vulnerable to Remote Code Execution if the application calls `unserialize()` on arbitrary user input
`yiisoft/yii` before version 1.1.27 are vulnerable to Remote Code Execution (RCE) if the application calls `unserialize()` on arbitrary user input. This has been patched in 1.1.27.
[ { "commit_message": "[PATCH 1/2] When unserializing CDbCriteria, check if $params is an array to prevent object Injection framework/db/schema/CDbCriteria.php | 21 ++++++++++++--------- 1 file changed, 12 insertions(+), 9 deletions(-)", "patch_text_b64": "RnJvbSAwY2IyZDdjMDQwMjMyNWZlMmI2YWUwZjBlYzZiZWFhYmE4M...
CWE-502: Deserialization of Untrusted Data
GHSA-g64c-rxmq-vwm7
null
[ { "commit_message": "[PATCH] Fixed some bugs and SQL injection. _login.php | 5 +++-- setup.sql | 1 + users.php | 2 +- 3 files changed, 5 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSBiZmJhMjZiZDM0YWYzMTY0OGExMWFmMzVhMGJiNjZmMTk0ODc1MmE2IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBUcmlzdGFuIE1lbG...
null
GHSA-5m3j-pxh7-455p
Apache CXF: SSRF vulnerability via WADL stylesheet parameter
null
[ { "commit_message": "[PATCH] Only explicitly return the stylesheet in WadlGenerator and not other URLs (#1749) (cherry picked from commit df2241c59481a57aebb1c0693b778a35baaf5570) .../apache/cxf/jaxrs/model/wadl/WadlGenerator.java | 12 ++++++++++-- 1 file changed, 10 insertions(+), 2 deletions(-)", "patch...
null
GHSA-rpp4-w4q5-9vr2
null
[ { "commit_message": "[PATCH] Input: gtco - fix potential out-of-bound access parse_hid_report_descriptor() has a while (i < length) loop, which only guarantees that there's at least 1 byte in the buffer, but the loop body can read multiple bytes which causes out-of-bounds access. Reported-by: Andrey Konovalov <...
null
GHSA-mjhf-5xg4-c757
null
[ { "commit_message": "[PATCH] Verify UntrustedCall output is outside enclave PiperOrigin-RevId: 333781703 Change-Id: I9df55c04dc8b04f4bf0bda8e68cc32bca81b933a asylo/platform/primitives/sgx/trusted_sgx.cc | 5 +++++ 1 file changed, 5 insertions(+)", "patch_text_b64": "RnJvbSA4MzAzNmZkODQxZDMzYmFhN2UwMzlmODQyZD...
null
GHSA-673h-vxq8-f3wr
null
[ { "commit_message": "[PATCH] Added function to replace characters with space and use it to sanitize text Change-Id: I3d14230444fefa0ce739c498eee6d100bcfe276a merlin_model_server/api.js | 13 +++----- merlin_model_server/jasmine.json | 4 ++- merlin_model_server/settings.js | 24 ++++++...
null
GHSA-gpgx-6j76-jh6m
null
[ { "commit_message": "[PATCH] Fix assertion turned into assignment The qassertion is supposed to check the value but the typo makes it an assignment. Hence it is always true, Signed-off-by: Frederic Dalleau <frederic.dalleau@docker.com> src/lib/pci_virtio_block.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion...
null
CVE-2018-25070
polterguy Phosphorus Five CSV Import NonQuery.cs csv.Read sql injection
A vulnerability has been found in polterguy Phosphorus Five up to 8.2 and classified as critical. This vulnerability affects the function csv.Read of the file plugins/extras/p5.mysql/NonQuery.cs of the component CSV Import. The manipulation leads to sql injection. Upgrading to version 8.3 is able to address this issue. The patch is identified as c179a3d0703db55cfe0cb939b89593f2e7a87246. It is recommended to upgrade the affected component. VDB-217606 is the identifier assigned to this vulnerability.
[ { "commit_message": "[PATCH] Sanity checking column names in [p5.mysql.load-from] MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit To avoid a maliciously malformed CSV file from creating SQL injection … plugins/extras/p5.mysql/NonQuery.cs | 10 ++++++++-- 1 file changed, ...
CWE-89 SQL Injection
GHSA-8f78-f6p2-mjw7
null
[ { "commit_message": "[PATCH] Refactor: Safe by default strategy of database string data v2 Call htmlentities() on all string data returned from the database to ensure it is safe to pass to print(). Areas of code that require unsafe HTML symbols will be updated to explicitly call html_entity_decode(). db/SCHEMA....
null
GHSA-838h-jqp6-cf2f
Sandbox bypass leading to arbitrary code execution in Deno
null
[ { "commit_message": "[PATCH] fix(ext/ffi): enforce unstable check on ops (#14115) .github/workflows/ci.yml | 6 +- cli/tests/integration/run_tests.rs | 90 +++++++++++++++++++++++ cli/tests/testdata/unstable_ffi_1.js | 1 + cli/tests/testdata/unstable_ffi_1.js.out | 1 + cli/tests/t...
null
CVE-2017-11721
Buffer overflow in ioquake3 before 2017-08-02 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted packet.
[ { "commit_message": "[PATCH] Fix/improve buffer overflow in MSG_ReadBits/MSG_WriteBits Prevent reading past end of message in MSG_ReadBits. If read past end of msg->data buffer (16348 bytes) the engine could SEGFAULT. Make MSG_WriteBits use an exact buffer overflow check instead of possibly failing with a few b...
n/a
CVE-2023-29418
An issue was discovered in libbzip3.a in bzip3 before 1.2.3. There is an xwrite out-of-bounds read.
[ { "commit_message": "[PATCH] safety checks for decoding/testing when the buffer size and block size are inconsistent, tentative CRC32 version for BE systems (needs further verification on SPARC?) src/libbz3.c | 11 +++++++++-- src/main.c | 19 +++++++++++++++++++ 2 files changed, 28 insertions(+), 2 deletions(-...
n/a
PYSEC-2023-291
null
[ { "commit_message": "<peter@pmrowla.com> [PATCH] Merge pull request from GHSA-v5f6-hjmf-9mc5 pydrive2/settings.py | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSBjNTczNTVkYzIwMzNhZDkwYjcwNTBkNjgxYjJjM2JhNTQ4ZmYwMDA0IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiA9P1VURi04P3...
null
CVE-2020-24881
SSRF exists in osTicket before 1.14.3, where an attacker can add malicious file to server or perform port scanning.
[ { "commit_message": "[PATCH] ssrf: External Inline Images This mitigates an SSRF security vulnerability reported by [Talat Mehmood](https://twitter.com/Blackbatsecuri1) where we do not check if the src URL for external inline images contain a valid image extension when displaying. This means if someone puts som...
n/a
GHSA-6c84-54g6-hcp3
null
[ { "commit_message": "[PATCH] * tools/tiffcp.c: fix read of undefined variable in case of missing required tags. Found on test case of MSVR 35100. * tools/tiffcrop.c: fix read of undefined buffer in readContigStripsIntoBuffer() due to uint16 overflow. Probably not a security issue but I can be wrong. Reported as...
null
CVE-2025-11360
jakowenko double-take API app.js app.use cross site scripting
A vulnerability was detected in jakowenko double-take up to 1.13.1. The impacted element is the function app.use of the file api/src/app.js of the component API. The manipulation of the argument X-Ingress-Path results in cross site scripting. The attack can be executed remotely. Upgrading to version 1.13.2 is sufficient to resolve this issue. The patch is identified as e11de9dd6b4ea6b7ec9a5607a920d48961e9fa50. The affected component should be upgraded.
[ { "commit_message": "[PATCH] fix(api): safely serialize values to prevent XSS api/src/app.js | 7 +++++-- 1 file changed, 5 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSBlMTFkZTlkZDZiNGVhNmI3ZWM5YTU2MDdhOTIwZDQ4OTYxZTlmYTUwIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBEYXZpZCBKYWtvd2Vua28gPGpha293ZW...
Cross Site Scripting
CVE-2024-55629
Suricata generic detection bypass using TCP urgent support
Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to 7.0.8, TCP streams with TCP urgent data (out of band data) can lead to Suricata analyzing data differently than the applications at the TCP endpoints, leading to possible evasions. Suricata 7.0.8 includes options to allow users to configure how to handle TCP urgent data. In IPS mode, you can use a rule such as drop tcp any any -> any any (sid:1; tcp.flags:U*;) to drop all the packets with urgent flag set.
[ { "commit_message": "[PATCH] stream: add TCP urgent handling options TCP urgent handling is a complex topic due to conflicting RFCs and implementations. Until now the URG flag and urgent pointer values were simply ignored, leading to an effective \"inline\" processing of urgent data. Many implementations howeve...
CWE-437: Incomplete Model of Endpoint Features
CVE-2021-21365
Cross-Site Scripting in Content Rendering
Bootstrap Package is a theme for TYPO3. It has been discovered that rendering content in the website frontend is vulnerable to cross-site scripting. A valid backend user account is needed to exploit this vulnerability. Users of the extension, who have overwritten the affected templates with custom code must manually apply the security fix. Update to version 7.1.2, 8.0.8, 9.1.4, 10.0.10 or 11.0.3 of the Bootstrap Package that fix the problem described. Updated version are available from the TYPO3 extension manager, Packagist and at https://extensions.typo3.org/extension/download/bootstrap_package/.
[ { "commit_message": "[PATCH] [SECURITY] Ensure content element subheader is HTML encoded .../ContentElements/Carousel/Item/CallToAction.html | 4 ++-- .../Partials/ContentElements/Carousel/Item/Header.html | 4 ++-- .../Partials/ContentElements/Carousel/Item/Text.html | 4 ++-- .../ContentElements/Carousel...
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2013-0313
The evm_update_evmxattr function in security/integrity/evm/evm_crypto.c in the Linux kernel before 3.7.5, when the Extended Verification Module (EVM) is enabled, allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via an attempted removexattr operation on an inode of a sockfs filesystem.
[ { "commit_message": "[PATCH] evm: checking if removexattr is not a NULL The following lines of code produce a kernel oops. fd = socket(PF_FILE, SOCK_STREAM|SOCK_CLOEXEC|SOCK_NONBLOCK, 0); fchmod(fd, 0666); [ 139.922364] BUG: unable to handle kernel NULL pointer dereference at (null) [ 139.924982] IP: [< (n...
n/a
GHSA-g7mj-wwxq-p2gr
null
[ { "commit_message": "[PATCH] fix(files): fix vulnerabilities in file uploads/deletes (#1130) * fix(vulnerability): fix arbitrary file deletion vuln * fix(uploads): fix vuln during upload * cleanup apps/sim/app/api/files/upload/route.test.ts | 187 ++++++++++ apps/sim/app/api/files/upload/route.ts | 36 ...
null
GHSA-9q9c-vjxh-p795
null
[ { "commit_message": "[PATCH] Fix: Fixed a read(-1) vulnerability caused by boundary handling error in #264 source/decoder.c | 8 +++++++- tests/test_decoder.py | 22 ++++++++++++++++++++++ 2 files changed, 29 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA4NTE0NzM0OTAyODFmODJkODI1NjBiMjM2ODI4N...
null
CVE-2025-32111
The Docker image from acme.sh before 40b6db6 is based on a .github/workflows/dockerhub.yml file that lacks "persist-credentials: false" for actions/checkout.
[ { "commit_message": "[PATCH] minor, just copy necessary files Dockerfile | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBhMWRlMTM2NTdlNzljNTQ3MWRiYzhmYTM1MzllYTM5MTYwOTM3Mzg5IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBuZWlsIDxnaXRwY0BuZWlscGFuZy5jb20+CkRhdGU6IEZyaSwgMjgg...
CWE-260 Password in Configuration File
CVE-2024-38368
Trunk's 'Claim your pod' could be used to obtain un-used pods
trunk.cocoapods.org is the authentication server for the CoacoaPods dependency manager. A vulnerability affected older pods which migrated from the pre-2014 pull request workflow to trunk. If the pods had never been claimed then it was still possible to do so. It was also possible to have all owners removed from a pod, and that made the pod available for the same claiming system. This was patched server-side in commit 71be5440906b6bdfbc0bcc7f8a9fec33367ea0f4 in September 2023.
[ { "commit_message": "[PATCH] Drop the claims feature app/controllers/claims_controller.rb | 57 +--------- app/views/claims/thanks.slim | 2 +- spec/functional/claims_controller_spec.rb | 121 +--------------------- 3 files changed, 3 insertions(+), 177 deletions(-)", "patch_text_b64": "Rn...
CWE-668: Exposure of Resource to Wrong Sphere
PYSEC-2020-118
null
[ { "commit_message": "[PATCH] Fix heap buffer overflow in `tf.raw_ops.SparseFillEmptyRowsGrad`. Also add tests as they were lacking PiperOrigin-RevId: 332566071 Change-Id: I44277578e26ff5fb3fdb0dcbba6e91b2ec3e7859 .../core/kernels/sparse_fill_empty_rows_op.cc | 12 ++++- tensorflow/python/ops/sparse_ops_test.py ...
null