id
stringlengths
12
19
title
stringlengths
0
237
description
stringlengths
35
3.87k
patches
listlengths
1
22
cwe
stringlengths
2
440
GHSA-pw39-f3m5-cxfc
Elasticsearch Uncaught Exception leading to crash
null
[ { "commit_message": "[PATCH] Improving tika PDF handling (#101486) Correctly handling PDF files with public key encryption in attachment processor docs/changelog/101486.yaml | 5 +++++ .../ingest/attachment/TikaImpl.java | 9 +++++++++ .../attachment/AttachmentProcessorTests.j...
null
GHSA-w2xg-49x3-6w59
null
[ { "commit_message": "[PATCH] nestack: use cryptographically secure RNG when appropriate This addresses an issue discovered by Inon Kaplan (PhD candidate in the Hebrew University School of Computer Science and Engineering), Ron Even (BSc graduate of Bar Ilan University) and Amit Klein (faculty member in the Hebr...
null
GHSA-vwr6-qp4q-2wj7
XWiki Platform vulnerable to privilege escalation via async macro and IconThemeSheet from the user profile
null
[ { "commit_message": "[PATCH] XWIKI-19731: Fix escaping * better fix (thanks @michitux for the warning) .../xwiki/icon/test/ui/IconThemesSheetIT.java | 61 ------------------- .../IconThemesCode/IconThemeSheet.xml | 7 +-- 2 files changed, 3 insertions(+), 65 deletions(-) delete mode 100644 xwiki-platform...
null
CVE-2026-21894
n8n's Missing Stripe-Signature Verification Allows Unauthenticated Forged Webhooks
n8n is an open source workflow automation platform. In versions from 0.150.0 to before 2.2.2, an authentication bypass vulnerability in the Stripe Trigger node allows unauthenticated parties to trigger workflows by sending forged Stripe webhook events. The Stripe Trigger creates and stores a Stripe webhook signing secret when registering the webhook endpoint, but incoming webhook requests were not verified against this secret. As a result, any HTTP client that knows the webhook URL could send a POST request containing a matching event type, causing the workflow to execute as if a legitimate Stripe event had been received. This issue affects n8n users who have active workflows using the Stripe Trigger node. An attacker could potentially fake payment or subscription events and influence downstream workflow behavior. The practical risk is reduced by the fact that the webhook URL contains a high-entropy UUID; however, authenticated n8n users with access to the workflow can view this webhook ID. This issue has been patched in version 2.2.2. A temporary workaround for this issue involves users deactivating affected workflows or restricting access to workflows containing Stripe Trigger nodes to trusted users only.
[ { "commit_message": "[PATCH] fix(Stripe Trigger Node): Add Stripe signature verification (#22764) .../credentials/StripeApi.credentials.ts | 21 ++ .../nodes/Stripe/StripeTrigger.node.ts | 10 +- .../nodes/Stripe/StripeTriggerHelpers.ts | 74 ++++++ .../__tests__/StripeTrigger.node.test.ts ...
CWE-290: Authentication Bypass by Spoofing
CVE-2016-10507
Integer overflow vulnerability in the bmp24toimage function in convertbmp.c in OpenJPEG before 2.2.0 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted bmp file.
[ { "commit_message": "[PATCH] Fix issue 833. Add some overflow check operations. src/bin/jp2/convertbmp.c | 18 ++++++++++++++++++ 1 file changed, 18 insertions(+)", "patch_text_b64": "RnJvbSA4OTMxNDNjOGUxM2U0OTFkMGU4ODRlYjc1NzU4MGVjOTU3NWJiYzhmIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiB0cnlsYWIgPHRyeWxhYkB1c...
n/a
GHSA-26fg-v32r-h663
Moodle Exposure of Sensitive Information to an Unauthorized Actor vulnerability
null
[ { "commit_message": "[PATCH] MDL-78820 h5p: use fullname of current user as the xAPI actor name. h5p/classes/helper.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAxMDBhYzdjNjQ2N2E3ZGUyYzA1NzEzYTBhOTI0OTg0ZmYxNTkzZDUzIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBQYXVsIEhvbG...
null
GHSA-75x7-w445-5gwr
Liferay Portal Vulnerable to XSS via a Knowledge Base Article Title
null
[ { "commit_message": "[PATCH] LPS-72090 XSS in KB article's and template's title when printing .../resources/META-INF/resources/admin/common/print_article.jsp | 2 +- .../META-INF/resources/admin/common/print_template.jsp | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-)", "patch_text_b64": "Rn...
null
CVE-2025-57809
XGrammar affected by Denial of Service by infinite recursion grammars
XGrammar is an open-source library for efficient, flexible, and portable structured generation. Prior to version 0.1.21, XGrammar has an infinite recursion issue in the grammar. This issue has been resolved in version 0.1.21.
[ { "commit_message": "[PATCH] [Feature] Use an earley parser to replace the current pushdown automata (#308) At present, xgrammar adopts a non-deterministic pushdown automata (NPDA) in matching. This PR manages to use an Earley Parser, to reduce the time complexity. Moreover, some optimizations are implemented t...
CWE-674: Uncontrolled Recursion
CVE-2019-17426
Automattic Mongoose through 5.7.4 allows attackers to bypass access control (in some applications) because any query object with a _bsontype attribute is ignored. For example, adding "_bsontype":"a" can sometimes interfere with a query filter. NOTE: this CVE is about Mongoose's failure to work around this _bsontype special case that exists in older versions of the bson parser (aka the mongodb/js-bson project).
[ { "commit_message": "[PATCH] fix(query): delete top-level `_bsontype` property in queries to prevent silent empty queries Fix #8222 lib/cast.js | 6 ++++++ 1 file changed, 6 insertions(+)", "patch_text_b64": "RnJvbSBmM2VjYTViOTRkODIyMjI1YzA0ZTk2Y2JlZWQ5ZjA5NWFmYjNjMzFjIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9t...
n/a
CVE-2023-22457
org.xwiki.contrib:application-ckeditor-ui vulnerable to Remote Code Execution via Cross-Site Request Forgery
CKEditor Integration UI adds support for editing wiki pages using CKEditor. Prior to versions 1.64.3,t he `CKEditor.HTMLConverter` document lacked a protection against Cross-Site Request Forgery (CSRF), allowing to execute macros with the rights of the current user. If a privileged user with programming rights was tricked into executing a GET request to this document with certain parameters (e.g., via an image with a corresponding URL embedded in a comment or via a redirect), this would allow arbitrary remote code execution and the attacker could gain rights, access private information or impact the availability of the wiki. The issue has been patched in the CKEditor Integration version 1.64.3. This has also been patched in the version of the CKEditor integration that is bundled starting with XWiki 14.6 RC1. There are no known workarounds for this other than upgrading the CKEditor integration to a fixed version.
[ { "commit_message": "[PATCH] CKEDITOR-475: Add form token check to HTMLConverter .../src/main/resources/xwiki-source/plugin.js | 3 ++- .../src/main/resources/CKEditor/HTMLConverter.xml | 2 +- 2 files changed, 3 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSA2YjEwNTMx...
CWE-352: Cross-Site Request Forgery (CSRF)
PYSEC-2022-175
null
[ { "commit_message": "[PATCH] Replaced use of tempfile.mktemp() with tempfile.mkstemp() (#3358) Signed-off-by: Abin Shahab <ashahab@linkedin.com> horovod/runner/js_run.py | 7 ++++++- test/single/test_run.py | 2 +- test/utils/common.py | 9 +++------ 3 files changed, 10 insertions(+), 8 deletions(-)", "pa...
null
CVE-2022-25878
Prototype Pollution
The package protobufjs before 6.11.3 are vulnerable to Prototype Pollution which can allow an attacker to add/modify properties of the Object.prototype. This vulnerability can occur in multiple ways: 1. by providing untrusted user input to util.setProperty or to ReflectionObject.setParsedOption functions 2. by parsing/loading .proto files
[ { "commit_message": "[PATCH] fix: do not let setProperty change the prototype (#1731) src/util.js | 3 +++ 1 file changed, 3 insertions(+)", "patch_text_b64": "RnJvbSBiNWYxMzkxZGZmNTUxNTg5NDgzMGE2NTcwZTZkNzNmNTUxMWIyZThmIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBBbGV4YW5kZXIgRmVuc3RlciA8ZmVuc3RlckBnb29nbGUuY...
Prototype Pollution
CVE-2025-2713
Improper File Permission Handling in Google gVisor runsc
Google gVisor's runsc component exhibited a local privilege escalation vulnerability due to incorrect handling of file access permissions, which allowed unprivileged users to access restricted files. This occurred because the process initially ran with root-like permissions until the first fork.
[ { "commit_message": "[PATCH] Apply a image's file capabilities when creating a process from the image. PiperOrigin-RevId: 616237209 images/basic/filecap/Dockerfile | 5 + pkg/abi/linux/capability.go | 2 + pkg/sentry/kernel/auth/BUILD | 5 +- pkg/sentry/kernel...
CWE-266 Incorrect Privilege Assignment
CVE-2020-5216
Limited header injection when using dynamic overrides with user input in RubyGems secure_headers
In Secure Headers (RubyGem secure_headers), a directive injection vulnerability is present in versions before 3.9.0, 5.2.0, and 6.3.0. If user-supplied input was passed into append/override_content_security_policy_directives, a newline could be injected leading to limited header injection. Upon seeing a newline in the header, rails will silently create a new Content-Security-Policy header with the remaining value of the original string. It will continue to create new headers for each newline. This has been fixed in 6.3.0, 5.2.0, and 3.9.0.
[ { "commit_message": "[PATCH] Filter and warn on newlines lib/secure_headers/headers/content_security_policy.rb | 6 +++--- .../secure_headers/headers/content_security_policy_spec.rb | 7 ++++++- 2 files changed, 9 insertions(+), 4 deletions(-)", "patch_text_b64": "RnJvbSAzYTJiNTQ4MjIzZGU4NTRhYjk3NjhhZTA3...
CWE-113 Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting')
GHSA-88gp-qchm-x67w
null
[ { "commit_message": "[PATCH] Improved sanitization and escaping of the 'align' attribute to prevent potential XSS attacks. .../core/src/blocks/core/separator/index.js | 17 ++++++++++++----- .../core/src/blocks/core/separator/init.php | 4 ++-- 2 files changed, 14 insertions(+), 7 deletions(-)", "pat...
null
GHSA-4j93-fm92-rp4m
ASA-2024-003: Missing `BlockedAddressed` Validation in Vesting Module
null
[ { "commit_message": "[PATCH] fix(x/auth/vesting): Add BlockedAddr check in `CreatePeriodicVestingAccount` (#19480) x/auth/vesting/msg_server.go | 4 +++ x/auth/vesting/msg_server_test.go | 56 +++++++++++++++++++++++++++++++ 2 files changed, 60 insertions(+)", "patch_text_b64": "RnJvbSBjMDU4NTAyNDFlMmQ2...
null
GHSA-vrxc-79fp-6683
null
[ { "commit_message": "[PATCH] fs: prevent page refcount overflow in pipe_buf_get Change pipe_buf_get() to return a bool indicating whether it succeeded in raising the refcount of the page (if the thing in the pipe is a page). This removes another mechanism for overflowing the page refcount. All callers converte...
null
GHSA-rgw3-fq9h-vvg7
null
[ { "commit_message": "[PATCH] ocfs2: subsystem.su_mutex is required while accessing the item->ci_parent The subsystem.su_mutex is required while accessing the item->ci_parent, otherwise, NULL pointer dereference to the item->ci_parent will be triggered in the following situation: add node del...
null
CVE-2024-35228
Improper Handling of Insufficient Permissions in Wagtail
Wagtail is an open source content management system built on Django. Due to an improperly applied permission check in the `wagtail.contrib.settings` module, a user with access to the Wagtail admin and knowledge of the URL of the edit view for a settings model can access and update that setting, even when they have not been granted permission over the model. The vulnerability is not exploitable by an ordinary site visitor without access to the Wagtail admin. Patched versions have been released as Wagtail 6.0.5 and 6.1.2. Wagtail releases prior to 6.0 are unaffected. Users are advised to upgrade. Site owners who are unable to upgrade to a patched version can avoid the vulnerability in `ModelViewSet` by registering the model as a snippet instead. No workaround is available for `wagtail.contrib.settings`.
[ { "commit_message": "[PATCH] Restore permission check on settings EditView .../settings/tests/generic/test_admin.py | 160 ++++++++++++++++-- .../tests/site_specific/test_admin.py | 159 +++++++++++++++-- wagtail/contrib/settings/views.py | 3 + 3 files changed, 289 insertions(+), 33 del...
CWE-280: Improper Handling of Insufficient Permissions or Privileges
GHSA-8m9g-647g-5pxw
Infinite loop in Yubico yubihsm-connector
null
[ { "commit_message": "[PATCH] Check content-length to avoid denial-of-service api.go | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-)", "patch_text_b64": "RnJvbSA4MmJkZjIwMmM1MzQ2MGJhYzkxMDZjYzliNGIzNGEwYTE2Y2FlMGVkIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBQZXIgTmlsc3NvbiA8cGVyLm5pbHNzb25Ae...
null
GHSA-j87m-7c2j-m929
null
[ { "commit_message": "[PATCH] netfilter: x_tables: make sure e->next_offset covers remaining blob size Otherwise this function may read data beyond the ruleset blob. Signed-off-by: Florian Westphal <fw@strlen.de> Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org> net/ipv4/netfilter/arp_tables.c | 6 ++++-- ne...
null
CVE-2025-5175
erdogant pypickle pypickle.py save improper authorization
A vulnerability was found in erdogant pypickle up to 1.1.5. It has been classified as critical. This affects the function Save of the file pypickle/pypickle.py. The manipulation leads to improper authorization. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. Upgrading to version 2.0.0 is able to address this issue. The patch is named 14b4cae704a0bb4eb6723e238f25382d847a1917. It is recommended to upgrade the affected component.
[ { "commit_message": "[PATCH] adding allowlist and validate parameter pypickle/__init__.py | 3 + pypickle/pypickle.py | 314 ++++++++++++++++++++++++++++++++----------- 2 files changed, 240 insertions(+), 77 deletions(-)", "patch_text_b64": "RnJvbSAxNGI0Y2FlNzA0YTBiYjRlYjY3MjNlMjM4ZjI1MzgyZDg0N2ExOTE3IE1vbi...
Improper Authorization
GHSA-m926-jvmq-wcrf
null
[ { "commit_message": "[PATCH] fixed #2520 src/media_tools/vobsub.c | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSA2NDIwMWEyNjQ3NmMxMmE3ZGJkN2ZmYjU3NTc3NDNhZjY5NTRkYjk2IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBqZWFubGYgPGplYW5sZkBncGFjLmlvPgpEYXRlOiBUaHUsIDYgSnVsIDIwMj...
null
GHSA-9f8f-2vmf-885j
Data exposure via ZeroMQ on multi-node vLLM deployment
null
[ { "commit_message": "[PATCH] [Security] Don't bind tcp zmq socket to all interfaces (#17197) Signed-off-by: Russell Bryant <rbryant@redhat.com> docs/source/serving/distributed_serving.md | 4 ++++ vllm/distributed/device_communicators/shm_broadcast.py | 2 +- 2 files changed, 5 insertions(+), 1 deleti...
null
CVE-2025-25184
Possible Log Injection in Rack::CommonLogger
Rack provides an interface for developing web applications in Ruby. Prior to versions 2.2.11, 3.0.12, and 3.1.10, Rack::CommonLogger can be exploited by crafting input that includes newline characters to manipulate log entries. The supplied proof-of-concept demonstrates injecting malicious content into logs. When a user provides the authorization credentials via Rack::Auth::Basic, if success, the username will be put in env['REMOTE_USER'] and later be used by Rack::CommonLogger for logging purposes. The issue occurs when a server intentionally or unintentionally allows a user creation with the username contain CRLF and white space characters, or the server just want to log every login attempts. If an attacker enters a username with CRLF character, the logger will log the malicious username with CRLF characters into the logfile. Attackers can break log formats or insert fraudulent entries, potentially obscuring real activity or injecting malicious data into log files. Versions 2.2.11, 3.0.12, and 3.1.10 contain a fix.
[ { "commit_message": "[PATCH] Escape non-printable characters when logging. lib/rack/common_logger.rb | 5 +++-- test/spec_common_logger.rb | 7 ++++++- 2 files changed, 9 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSAwNzRhZTI0NDQzMGNkYTA1YzI3Y2E5MWNkYTY5OTcwOWNmYjNhZDhlIE1vbiBTZXAgMTcgMDA6MDA6MDA...
CWE-93: Improper Neutralization of CRLF Sequences ('CRLF Injection')
GHSA-j3v8-v77f-fvgm
Grav Server-side Template Injection (SSTI) via Denylist Bypass Vulnerability
null
[ { "commit_message": "[PATCH] also handle SSTI in reduce twig filter + function CHANGELOG.md | 3 +- .../Common/Twig/Extension/GravExtension.php | 32 ++++++++++++++++--- 2 files changed, 29 insertions(+), 6 deletions(-)", "patch_text_b64": "RnJvbSAyNDQ3NThkNDM4MzAzNGZlNGNkM...
null
GHSA-w3pj-v9jr-v2wc
Jenkins ElectricFlow Plugin is vulnerable to reflected cross site scripting vulnerability
null
[ { "commit_message": "[PATCH] [SECURITY-1420] .../electricflow/ElectricFlowDeployApplication/config.jelly | 4 ++-- .../electricflow/ElectricFlowPipelinePublisher/config.jelly | 4 ++-- .../electricflow/ElectricFlowRunProcedure/config.jelly | 4 ++-- .../electricflow/ElectricFlowTriggerRelease/config.jel...
null
GHSA-3g75-q268-r9r6
Amazon S3 Encryption Client has a Key Commitment Issue
null
[ { "commit_message": "[PATCH] feat!: updates to the S3 Encryption Client (#70) * Updates to the S3 Encryption Client ## Breaking Changes The S3 Encryption Client now requires key committing algorithm suites by default. See migration guide: https://docs.aws.amazon.com/amazon-s3-encryption-client/latest/developerg...
null
GHSA-jmvv-524f-hj5j
Improper Handling of Exceptional Conditions in Apache Tomcat
null
[ { "commit_message": "[PATCH] Use a more reliable mechanism for the DefaultServlet when determining if the current request is for custom error page or not. git-svn-id: https://svn.apache.org/repos/asf/tomcat/tc8.0.x/trunk@1793470 13f79535-47bb-0310-9956-ffa450edef68 java/org/apache/catalina/servlets/DefaultServl...
null
CVE-2021-3744
A memory leak flaw was found in the Linux kernel in the ccp_run_aes_gcm_cmd() function in drivers/crypto/ccp/ccp-ops.c, which allows attackers to cause a denial of service (memory consumption). This vulnerability is similar with the older CVE-2019-18808.
[ { "commit_message": "[PATCH] crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd() MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit There are three bugs in this code: 1) If we ccp_init_data() fails for &src then we need to free aad. Use goto e_aad instead of goto e_c...
CWE-401
GHSA-jj5v-2f8v-5cg8
null
[ { "commit_message": "[PATCH] security: fix stored xss in sharing groups view as reported by Nicolas Vidal from TEHTRIS. app/View/SharingGroups/view.ctp | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAwMTUyMWQ2MTRjYjU3OGRlNzVhNDA2Mzk0YjRmMDQyNmY2MDM2YmE3IE1vbiBTZXAgMTcgMDA6MD...
null
GHSA-q25h-fm3c-jgp6
null
[ { "commit_message": "[PATCH] Don't feed anything but regular iovec's to blk_rq_map_user_iov In theory we could map other things, but there's a reason that function is called \"user_iov\". Using anything else (like splice can do) just confuses it. Reported-and-tested-by: Johannes Thumshirn <jthumshirn@suse.de> ...
null
GHSA-w6q2-48ch-fj26
Allegro Tech BigFlow vulnerable to Missing SSL Certificate Validation
null
[ { "commit_message": "[PATCH] Add CLI tests bigflow/cli.py | 3 +- requirements.in | 3 +- requirements.txt | 12 +- test/cli/test_cli.py | 313 ++++++++++++++++++++++++++++++------------- 4 files changed, 229 insertions(+), 102 deletions(-)", "patch_text_b64": "RnJvbSA0Y2UxOTdmZjk5YmQzODY5M2...
null
GHSA-mrww-q696-jcq2
null
[ { "commit_message": "[PATCH] Add warning when using radiff2 -T libr/main/radiff2.c | 1 + 1 file changed, 1 insertion(+)", "patch_text_b64": "RnJvbSA1NzA1ZDk5Y2MxZjIzZjM2ZjlhODRhYWIyNmQxNzI0MDEwYjk3Nzk4IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBwYW5jYWtlIDxwYW5jYWtlQG5vcGNvZGUub3JnPgpEYXRlOiBGcmksIDMwIE1heSA...
null
CVE-2019-25051
objstack in GNU Aspell 0.60.8 has a heap-based buffer overflow in acommon::ObjStack::dup_top (called from acommon::StringMap::add and acommon::Config::lookup_list).
[ { "commit_message": "[PATCH] objstack: assert that the alloc size will fit within a chunk to prevent a buffer overflow Bug found using OSS-Fuze. common/objstack.hpp | 18 ++++++++++++++---- 1 file changed, 14 insertions(+), 4 deletions(-)", "patch_text_b64": "RnJvbSAwNzE4YjM3NTQyNWFhZDhlNTRlMTE1MDMxM2I4NjJlN...
n/a
CVE-2023-28430
OneSignal repository github action command injection
OneSignal is an email, sms, push notification, and in-app message service for mobile apps.The Zapier.yml workflow is triggered on issues (types: [closed]) (i.e., when an Issue is closed). The workflow starts with full write-permissions GitHub repository token since the default workflow permissions on Organization/Repository level are set to read-write. This workflow runs the following step with data controlled by the comment `(${{ github.event.issue.title }} – the full title of the Issue)`, allowing an attacker to take over the GitHub Runner and run custom commands, potentially stealing any secret (if used), or altering the repository. This issue was found with CodeQL using javascript’s Expression injection in Actions query. This issue has been addressed in the repositories github action. No actions are required by users. This issue is also tracked as `GHSL-2023-051`.
[ { "commit_message": "[PATCH] Update Zapier.yml .github/workflows/Zapier.yml | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBmY2Q4ZmYzOWRkOTg5NmNjMjE5ZTRjZmRhZGJjNWYzYjU0ODJlMjZlIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBKb3NoIEthc3RlbiA8am9zaEBvbmVzaWduYWwuY29tPgpEYXRl...
CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')
GHSA-3v9v-m657-f3rh
null
[ { "commit_message": "[PATCH] sctp: fix race on protocol/netns initialization Consider sctp module is unloaded and is being requested because an user is creating a sctp socket. During initialization, sctp will add the new protocol type and then initialize pernet subsys: status = sctp_v4_protosw_init(); if (statu...
null
CVE-2018-14015
The sdb_set_internal function in sdb.c in radare2 2.7.0 allows remote attackers to cause a denial of service (invalid read and application crash) via a crafted ELF file because of missing input validation in r_bin_dwarf_parse_comp_unit in libr/bin/dwarf.c.
[ { "commit_message": "[PATCH] Fix #10465 - Avoid string on low addresses (workaround) for corrupted dwarf (#10478) libr/bin/dwarf.c | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBkMzdkMmI4NThhYzQ3ZjJmMTA4MDM0YmUwYmNlY2FkYWRkZmJjOGIzIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm...
n/a
GHSA-h3g7-crqm-323f
null
[ { "commit_message": "[PATCH] 877387 - Candlepin CA certificate mode in RPM File mode is set to 0644 when RPM is generated. katello-configure/modules/certs/manifests/config.pp | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA2NWYxZTQyYjdiZGEwZjM0MTA5MzFjNTA1OTg1NDBkOTQ0ZDhiZjB...
null
CVE-2023-2554
External Control of File Name or Path in unilogies/bumsys
External Control of File Name or Path in GitHub repository unilogies/bumsys prior to 2.2.0.
[ { "commit_message": "[PATCH] Fix security issue assets/js/bms.js | 17 +- assets/js/bms.min.js | 2 +- assets/js/events.js | 6 +- assets/js/events.min.js | 2 +- core/ajax/ajax_data.php ...
CWE-73 External Control of File Name or Path
GHSA-rvpw-p7vw-wj3m
OpenNext for Cloudflare (opennextjs-cloudflare) has a SSRF vulnerability via /_next/image endpoint
null
[ { "commit_message": "[PATCH] Enforce remotePatterns when fetching external images (#727) .changeset/plain-beds-win.md | 5 + packages/cloudflare/package.json | 2 + .../src/cli/build/open-next/compile-init.ts | 25 ++ packages/cloudflare/src/cli/templates/init.ts | 98 ++++++ ....
null
CVE-2024-5998
Deserialization of Untrusted Data in langchain-ai/langchain
A vulnerability in the FAISS.deserialize_from_bytes function of langchain-ai/langchain allows for pickle deserialization of untrusted data. This can lead to the execution of arbitrary commands via the os.system function. The issue affects the latest version of the product.
[ { "commit_message": "[PATCH] community[patch]: Force opt-in for WebResearchRetriever (CVE-2024-3095) (#24451) This PR addresses the issue raised by (CVE-2024-3095) https://huntr.com/bounties/e62d4895-2901-405b-9559-38276b6a5273 Unfortunately, we didn't do a good job writing the initial report. It's pointing at ...
CWE-502 Deserialization of Untrusted Data
GHSA-mvj8-53vv-j9ff
null
[ { "commit_message": "[PATCH] Don't allow reports via API when disabled via web #661 * Check allow_reports setting in Report API * Also fix PHP errors when missing person params from API request application/helpers/reports.php | 17 +++++++++++++++-- application/libraries/Api_Service.php ...
null
GHSA-58w6-w55x-6wq8
Mattermost fails to validate user permissions in Boards
null
[ { "commit_message": "[PATCH] Sanatize LastViewedAt and LastUpdateAt for other users on channel member object (#33835) server/channels/api4/channel.go | 27 +++++++ server/channels/api4/channel_test.go | 84 ++++++++++++++++++++++ server/channels/api4/user.go | 9 +++ server/public/m...
null
CVE-2022-29777
Onlyoffice Document Server v6.0.0 and below and Core 6.1.0.26 and below were discovered to contain a heap overflow via the component DesktopEditor/fontengine/fontconverter/FontFileBase.h.
[ { "commit_message": "[PATCH] Fix 34, 35, 37 .../fontengine/fontconverter/FontFileBase.h | 53 ++++++++++--------- .../fontconverter/FontFileType1.cpp | 5 +- 2 files changed, 30 insertions(+), 28 deletions(-)", "patch_text_b64": "RnJvbSBiMTdkNWU4NjBmMzBlOGJlMmNhZWIwMDIyYjYzYmU0Yzc2NjYwMTc4IE1vbiB...
n/a
GHSA-qwg2-rf9c-v87f
null
[ { "commit_message": "[PATCH] Preventing manipulation with $_SERVER['HTTP_HOST'] web/reset/index.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBjM2M0ZGU0M2Q2NzAxNTYwZjYwNGNhNzk5NmY3MTdiMDhlM2Q3ZDFkIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBkcGVjYSA8cGVjYUBteWNpdHkucnM+Ck...
null
GHSA-4x5f-xw5j-gv58
null
[ { "commit_message": "[PATCH] [CVE-2020-1732] Adjust JASPIC integration to create a new ServerAuthModule for each request. .../jaspic/DefaultAuthConfigProvider.java | 15 ++-- .../jaspic/DefaultServerAuthConfig.java | 11 +-- .../jaspic/DefaultServerAuthContext.java | 7 +- .../soteria/mechanisms/ja...
null
GHSA-cx3w-xqmc-84g5
Git LFS can execute a Git binary from the current directory on Windows
null
[ { "commit_message": "[PATCH 1/2] Use subprocess for invoking all commands The fix for CVE-2020-27955 was incomplete because we did not consider places outside of the subprocess code that invoke binaries. As a result, there are still some places where an attacker can execute arbitrary code by placing a maliciou...
null
GHSA-5pj8-j8jm-vm7w
null
[ { "commit_message": "[PATCH] Avoid uninitialized memory As reported by https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16856 src/mat4.c | 2 ++ 1 file changed, 2 insertions(+)", "patch_text_b64": "RnJvbSA2NTFhOGUyODA5OWVkYjVmYmI5ZTRlMWQ0ZDMyMzg4NDhmNDQ2YzlhIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiB0Ym...
null
GHSA-pfjf-vfqg-5r4q
null
[ { "commit_message": "[PATCH] Fix a crash that could occur if a sub-select that uses both DISTINCT and window functions also used an ORDER BY that is the same as its select list. FossilOrigin-Name: bcdd66c1691955c697f3d756c2b035acfe98f6aad72e90b0021bab6e9023b3ba manifest | 16 ++++++++-------- manifest.u...
null
CVE-2025-67505
Race condition in the Okta Java SDK
Okta Java Management SDK facilitates interactions with the Okta management API. In versions 11.0.0 through 20.0.0, race conditions may arise from concurrent requests using the ApiClient class. This could cause a status code or response header from one request’s response to influence another request’s response. This issue is fixed in version 20.0.1.
[ { "commit_message": "<61501885+arvindkrishnakumar-okta@users.noreply.github.com> [PATCH] Fix race condition in ApiClient::invokeApi() (#1580) api/src/main/resources/custom_templates/ApiClient.mustache | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBhYmY0ZjEyOGEwNDQxZjkwY2I3Z...
CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
GHSA-cc6x-8cc7-9953
OctoPrint has API key access in settings without reauthentication
null
[ { "commit_message": "[PATCH] fix: remove various reauth bypasses - API key in user settings was visible with reauth, added reveal button - QR code of global API key was visible right after login, added reveal button - generate/delete of both global and user API key didn't require reauth, fixed - own key in acce...
null
PYSEC-2024-115
null
[ { "commit_message": "[PATCH] multiple: pydantic 2 compatibility, v0.3 (#26443) Signed-off-by: ChengZi <chen.zhang@zilliz.com> Co-authored-by: Eugene Yurtsev <eyurtsev@gmail.com> Co-authored-by: Bagatur <22008038+baskaryan@users.noreply.github.com> Co-authored-by: Dan O'Donovan <dan.odonovan@gmail.com> Co-author...
null
CVE-2022-2900
Server-Side Request Forgery (SSRF) in ionicabizau/parse-url
Server-Side Request Forgery (SSRF) in GitHub repository ionicabizau/parse-url prior to 8.1.0.
[ { "commit_message": "[PATCH] Throw if url is invalid. Add a length limit. lib/index.js | 20 +++++++++++++++++--- test/index.js | 42 ++++++++++++++++++++++++++++++++---------- 2 files changed, 49 insertions(+), 13 deletions(-)", "patch_text_b64": "RnJvbSBiODhjODFkZjhmNGM1MTY4YWY0NTRlYWE0ZjkyYWZhOTM0OWU0ZTEz...
CWE-918 Server-Side Request Forgery (SSRF)
GHSA-4vgm-5r69-wvp8
null
[ { "commit_message": "[PATCH] KDC TGS-REQ null deref [CVE-2013-1416] By sending an unusual but valid TGS-REQ, an authenticated remote attacker can cause the KDC process to crash by dereferencing a null pointer. prep_reprocess_req() can cause a null pointer dereference when processing a service principal name. C...
null
CVE-2024-22049
httparty Multipart/Form-Data Request Tampering Vulnerability
httparty before 0.21.0 is vulnerable to an assumed-immutable web parameter vulnerability. A remote and unauthenticated attacker can provide a crafted filename parameter during multipart/form-data uploads which could result in attacker controlled filenames being written.
[ { "commit_message": "[PATCH] escape filename in the multipart/form-data Content-Disposition header lib/httparty/request/body.rb | 9 ++++++++- spec/httparty/request/body_spec.rb | 32 ++++++++++++++++++++++++++++++ 2 files changed, 40 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAwNTFjMTgxZW...
CWE-472 External Control of Assumed-Immutable Web Parameter
CVE-2022-0145
Cross-site Scripting (XSS) - Stored in forkcms/forkcms
Cross-site Scripting (XSS) - Stored in GitHub repository forkcms/forkcms prior to 5.11.1.
[ { "commit_message": "[PATCH] Fix xss though the description in the info.xml file of a theme or module src/Backend/Modules/Extensions/Engine/Model.php | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSA5ODE3MzBmMWEzZDU5YjQyM2NhOTAzYjFmNGJmNzliODQ4YTE3NjZlIE1vbiBTZXAgMTcgMDA6...
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-29769
libvips has a potential heap-based buffer overflow when attempting to convert multiband TIFF input to HEIF output
libvips is a demand-driven, horizontally threaded image processing library. The heifsave operation could incorrectly determine the presence of an alpha channel in an input when it was not possible to determine the colour interpretation, known internally within libvips as "multiband". There aren't many ways to create a "multiband" input, but it is possible with a well-crafted TIFF image. If a "multiband" TIFF input image had 4 channels and HEIF-based output was requested, this led to libvips creating a 3 channel HEIF image without an alpha channel but then attempting to write 4 channels of data. This caused a heap buffer overflow, which could crash the process. This vulnerability is fixed in 8.16.1.
[ { "commit_message": "[PATCH] heifsave: reject multiband images (#4392) ChangeLog | 1 + libvips/foreign/heifsave.c | 9 +++++++++ 2 files changed, 10 insertions(+)", "patch_text_b64": "RnJvbSA5YWI2Nzg0ZjY5M2RlNTBiMDBmYTUzNWI5ZWZiYmU5ZDJjYmY3MWYyIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBMb3Zl...
CWE-122: Heap-based Buffer Overflow
GHSA-vgvg-x9g3-gvpf
null
[ { "commit_message": "[PATCH] Fix document name XSS src/components/appSearchSuper..ts | 3 +- src/components/audio.ts | 2 +- src/components/chat/audio.ts | 2 +- src/components/popups/newMedia.ts | 2 + src/components/sidebarLeft/index.ts ...
null
CVE-2024-50353
ICG.AspNetCore.Utilities.CloudStorage's Secure Token Durations Different Than Expected
ICG.AspNetCore.Utilities.CloudStorage is a collection of cloud storage utilities to assist with the management of files for cloud upload. Users of this library that set a duration for a SAS Uri with a value other than 1 hour may have generated a URL with a duration that is longer, or shorter than desired. Users not implemented SAS Uri's are unaffected. This issue was resolved in version 8.0.0 of the library.
[ { "commit_message": "[PATCH] Addressed an issue with token duration usage. .../AzureCloudStorageProvider.cs | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA4ZWE1MzQ0ODExODFhMDYzMTc1ZjQ1NzA4MjY2MmZkY2FkOWE0MWZmIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQp...
CWE-284: Improper Access Control
GHSA-fvch-763v-4hwx
null
[ { "commit_message": "[PATCH] Enforce a maximum entry limit during append operations (#36843) * Enforce a maximum entry limit during append operations * Add test for this change .../user-label-server/user-label-server.cpp | 1 + .../TestUserLabelClusterConstraints.yaml | 32 +++++++++++++++++++ src/platfor...
null
GHSA-h4hr-7fg3-h35w
Denial of service in prismjs
null
[ { "commit_message": "[PATCH] Fixed multiple cases of vulnerable regexes (#2584) components/prism-asciidoc.js | 6 +++--- components/prism-asciidoc.min.js | 2 +- components/prism-bash.js | 2 +- components/prism-bash.min.js | 2 +- components/prism-batch.js | 6 +++---...
null
GHSA-45w7-7g63-2m5w
Drop of uninitialized memory in stack_dst
null
[ { "commit_message": "[PATCH] Avoid double-drops when `clone` panics in slice push. Fixes #5 src/stack.rs | 35 ++++++++++++++++++++++++----------- tests/stack.rs | 31 +++++++++++++++++++++++++++++++ 2 files changed, 55 insertions(+), 11 deletions(-)", "patch_text_b64": "RnJvbSAyYTRkNTM4MDllMzAwMGY0MDA4NWYy...
null
GHSA-5vxx-c285-pcq4
In Cilium, packets from terminating endpoints may not be encrypted in Wireguard-enabled clusters
null
[ { "commit_message": "[PATCH] bpf: wireguard: avoid ipcache lookup for source's security identity When the wireguard hook in to-netdev decides whether the packet should be encrypted, it considers the source's security identity. For this it currently looks up the source IP in the ipcache. But for a typical packet...
null
GHSA-m63h-q4x3-6hwj
Moodle is vulnerable to Improper Input Validation in MoodleQuickForm class
null
[ { "commit_message": "[PATCH] MDL-38885 form: Recursively clean parameters based on right type lib/formslib.php | 88 ++++++++++++++++++++++++++++++++++++++++++------ 1 file changed, 77 insertions(+), 11 deletions(-)", "patch_text_b64": "RnJvbSAzYzBiYTk0ZTg3OTcwMmIzYzJmMjBkNGNiNGY5MTIwYTBiZmRkOWZjIE1vbiBTZXAg...
null
CVE-2019-16179
Limesurvey before 3.17.14 does not enforce SSL/TLS usage in the default configuration.
[ { "commit_message": "[PATCH] Release 3.17.14+190902 application/config/version.php | 4 ++-- docs/release_notes.txt | 40 ++++++++++++++++++++++++++++++++++ 2 files changed, 42 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSA1ODcwZmQxMDM3MDU4YmM0ZTQzY2NjZjg5M2I1NzZjNzIyOTMzNzFlIE1vbiBTZXAgM...
n/a
CVE-2011-0469
Code injection in openSUSE when running some source services used in the open build service 2.1 before March 11 2011.
[ { "commit_message": "[PATCH] [backend] verify file names return by source service (do not allow files with new lines #679151) src/backend/bs_srcserver | 1 + 1 file changed, 1 insertion(+)", "patch_text_b64": "RnJvbSAyM2M4ZDIxYzc1MjQyOTk5ZTI5Mzc5ZTZjYTg0MThhMTRjODcyNWM2IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9...
remote code execution
GHSA-5jh5-7283-3xvx
null
[ { "commit_message": "[PATCH] fix bug #64660 - yyparse can return 2, not only 1 NEWS | 6 ++++-- Zend/tests/bug64660.phpt | 11 +++++++++++ Zend/zend_language_scanner.c | 6 +++--- Zend/zend_language_scanner.l | 4 ++-- 4 files changed, 20 insertions(+), 7 deletions(-) create mode 1006...
null
GHSA-wrrh-g7h3-gqmx
Exposure of Sensitive Information to an Unauthorized Actor in RESTEasy
null
[ { "commit_message": "[PATCH] RESTEASY-637 .../plugins/providers/DocumentProvider.java | 22 +++- .../servlet/ResteasyContextParameters.java | 1 + .../server/tjws/TJWSEmbeddedJaxrsServer.java | 17 ++- .../server/tjws/TJWSServletServer.java | 28 ++++- .../resteasy/test/EmbeddedContainer.java ...
null
GHSA-4mmh-5vw7-rgvj
Venice vulnerable to Partial Path Traversal issue within the functions `load-file` and `load-resource`
null
[ { "commit_message": "[PATCH] vuln-fix: Partial Path Traversal Vulnerability This fixes a partial path traversal vulnerability. Replaces `dir.getCanonicalPath().startsWith(parent.getCanonicalPath())`, which is vulnerable to partial path traversal attacks, with the more secure `dir.getCanonicalFile().toPath().sta...
null
GHSA-r248-wpg2-5hw4
null
[ { "commit_message": "[PATCH] ext4: convert to mbcache2 The conversion is generally straightforward. The only tricky part is that xattr block corresponding to found mbcache entry can get freed before we get buffer lock for that block. So we have to check whether the entry is still valid after getting buffer lock...
null
CVE-2019-14668
Firefly III 4.7.17.3 is vulnerable to stored XSS due to the lack of filtration of user-supplied data in the transaction description field. The JavaScript code is executed during deletion of a transaction link.
[ { "commit_message": "[PATCH] Fix #2364 resources/views/v1/transactions/links/delete.twig | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSAzYWQ0ZTA0ZTJhZTUwZTYwNTY0YjYwYjY4ZGZhYzA4M2U1Njg0ODgyIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBKYW1lcyBDb2xlIDx0aGVncnVtcHlkaWN0YXRvc...
n/a
CVE-2010-3978
Spree 0.11.x before 0.11.2 and 0.30.x before 0.30.0 exchanges data using JavaScript Object Notation (JSON) without a mechanism for validating requests, which allows remote attackers to obtain sensitive information via vectors involving (1) admin/products.json, (2) admin/users.json, or (3) admin/overview/get_report_data, related to a "JSON hijacking" issue.
[ { "commit_message": "[PATCH] SECURITY FIX: Do not allow access to REST API without valid token in request header. See http://haacked.com/archive/2009/06/25/json-hijacking.aspx vendor/extensions/api/app/controllers/api/base_controller.rb | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-)", "patch_text...
n/a
GHSA-4v5p-v5h9-6xjx
`CHECK`-failures in Tensorflow
null
[ { "commit_message": "[PATCH] Remove a `DCHECK`-fail, log an error instead. `DCHECK` in debug mode results in crashes. TensorFlow has had multiple vulnerabilities due to this. Outside of debug mode, `DCHECK` is a no-op. A better alternative is to report an error to the log buffer and continue. This should happen...
null
GHSA-8xjm-4hrh-pmh2
null
[ { "commit_message": "[PATCH] bridge: netfilter: fix information leak Struct tmp is copied from userspace. It is not checked whether the \"name\" field is NULL terminated. This may lead to buffer overflow and passing contents of kernel stack as a module name to try_then_request_module() and, consequently, to m...
null
GHSA-jgrh-5m3h-9c5f
Web Cache Poisoning in find-my-way
null
[ { "commit_message": "[PATCH] Enable versioning on demand (#172) README.md | 4 +++- index.js | 5 ++++- lib/accept-version.js | 19 +++++++++++++++---- test/version.default-versioning.test.js | 25 +++++++++++++++++++++++++ 4 files cha...
null
GHSA-7ff8-qfwx-8gx5
Improper masking of some secrets in Jenkins Credentials Binding Plugin
null
[ { "commit_message": "[PATCH] [SECURITY-1835] .../masking/DollarSecretPatternFactory.java | 45 +++++++++++++ .../DollarSecretPatternFactoryTest.java | 67 +++++++++++++++++++ 2 files changed, 112 insertions(+) create mode 100644 src/main/java/org/jenkinsci/plugins/credentialsbinding/masking/DollarSecretPa...
null
GHSA-9f46-w24h-69w4
new-api is vulnerable to SSRF Bypass
null
[ { "commit_message": "[PATCH] feat: pplx channel dto/openai_request.go | 6 ++++++ relay/channel/perplexity/adaptor.go | 14 +++++--------- relay/channel/perplexity/constants.go | 1 + relay/channel/perplexity/relay-perplexity.go | 19 +++++++++++++------ .../channels/mod...
null
CVE-2016-3952
web2py before 2.14.1, when using the standalone version, allows remote attackers to obtain environment variable values via a direct request to examples/template_examples/beautify. NOTE: this issue can be leveraged by remote attackers to gain administrative access.
[ { "commit_message": "[PATCH] DO NOT LEAK GLOBALS SETTINGS INTO request object gluon/globals.py | 2 -- 1 file changed, 2 deletions(-)", "patch_text_b64": "RnJvbSA5NzA2ZDEyNWI0MjQ4MTE3OGQyYjQyM2RlMjQ1ZjVkMmZhYWRiZjQwIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBtZGlwaWVycm8gPG1hc3NpbW8uZGlwaWVycm9AZ21haWwuY29tPg...
n/a
GHSA-48m7-cf7p-jqm7
null
[ { "commit_message": "[PATCH] fix autofs/afs/etc. magic mountpoint breakage We end up trying to kfree() nd.last.name on open(\"/mnt/tmp\", O_CREAT) if /mnt/tmp is an autofs direct mount. The reason is that nd.last_type is bogus here; we want LAST_BIND for everything of that kind and we get LAST_NORM left over f...
null
CVE-2020-15211
Out of bounds access in tensorflow-lite
In TensorFlow Lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, saved models in the flatbuffer format use a double indexing scheme: a model has a set of subgraphs, each subgraph has a set of operators and each operator has a set of input/output tensors. The flatbuffer format uses indices for the tensors, indexing into an array of tensors that is owned by the subgraph. This results in a pattern of double array indexing when trying to get the data of each tensor. However, some operators can have some tensors be optional. To handle this scenario, the flatbuffer model uses a negative `-1` value as index for these tensors. This results in special casing during validation at model loading time. Unfortunately, this means that the `-1` index is a valid tensor index for any operator, including those that don't expect optional inputs and including for output tensors. Thus, this allows writing and reading from outside the bounds of heap allocated arrays, although only at a specific offset from the start of these arrays. This results in both read and write gadgets, albeit very limited in scope. The issue is patched in several commits (46d5b0852, 00302787b7, e11f5558, cd31fd0ce, 1970c21, and fff2c83), and is released in TensorFlow versions 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1. A potential workaround would be to add a custom `Verifier` to the model loading code to ensure that only operators which accept optional inputs use the `-1` special value and only for the tensors that they expect to be optional. Since this allow-list type approach is erro-prone, we advise upgrading to the patched code.
[ { "commit_message": "[PATCH] [tflite] Test for `kTfLiteOptionalTensor` in `GetInput`. `GetInput`, `GetVariableInput` and `GetOutput` all fail to check for the case where `node->inputs->data[index]` is the special `kTfLiteOptionalTensor` value (-1) which then causes `context->tensors[node->inputs->data[index]]` ...
{"CWE-125":"Out-of-bounds Read"}
CVE-2020-26245
Prototype Pollution leading to Command Injection in systeminformation
npm package systeminformation before version 4.30.5 is vulnerable to Prototype Pollution leading to Command Injection. The issue was fixed with a rewrite of shell sanitations to avoid prototyper pollution problems. The issue is fixed in version 4.30.5. If you cannot upgrade, be sure to check or sanitize service parameter strings that are passed to si.inetChecksite().
[ { "commit_message": "[PATCH] adapted security update (prototype pollution prevention) CHANGELOG.md | 1 + docs/history.html | 5 +++++ docs/index.html | 2 +- lib/index.js | 3 --- lib/internet.js | 1 + lib/network.js | 9 +++++++-- lib/processes.js | 13 ++++++++++++- lib/util.js | 20 +...
{"CWE-78":"Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')"}
CVE-2020-35149
lib/utils.js in mquery before 3.2.3 allows a pollution attack because a special property (e.g., __proto__) can be copied during a merge or clone operation.
[ { "commit_message": "[PATCH] fix(utils): avoid copying special properties like `__proto__` when merging and cloning lib/utils.js | 11 +++++++++++ test/utils.test.js | 18 ++++++++++++++++++ 2 files changed, 29 insertions(+)", "patch_text_b64": "RnJvbSA3OTJlNjlmZDBhNzI4MWEwMzAwYmU1Y2FkZTVhNmQ3YzFkNDY4YW...
n/a
GHSA-7jrv-2x6r-vjmr
null
[ { "commit_message": "[PATCH] CVE-2017-13025/IPv6 mobility: Add a bounds check before fetching data This fixes a buffer over-read discovered by Bhargava Shastry, SecT/TU Berlin. Add a test using the capture file supplied by the reporter(s), modified so the capture file won't cause 'tcpdump: pcap_loop: truncated ...
null
GHSA-6rqh-8465-2xcw
Mattermost vulnerable to Incorrect Implementation of Authentication Algorithm
null
[ { "commit_message": "[PATCH] [AI assisted] MM-62837: (#30268) (#30288) Automatic Merge server/channels/api4/user_test.go | 19 +++++++++++++++++++ server/channels/app/bot.go | 1 + 2 files changed, 20 insertions(+)", "patch_text_b64": "RnJvbSAxMjQ1NDdhOWVmNDI0NDMxZTFlNmNmMDliZGJhNmMxMDk5ZDQxNWRlIE1vbi...
null
GHSA-7fc2-rm35-2pp7
IPython vulnerable to cross site request forgery (CSRF)
null
[ { "commit_message": "[PATCH] check origin of API requests protects agains CSRF on POST endpoints via forms. IPython/html/base/handlers.py | 49 ++++++++++++++++++++++++++++++++++- 1 file changed, 48 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAxNDE1YTk3MTA0MDdlN2MxNDkwMDUzMTgxM2MxNWJhNjE2NWYwODE2...
null
CVE-2022-33068
An integer overflow in the component hb-ot-shape-fallback.cc of Harfbuzz v4.3.0 allows attackers to cause a Denial of Service (DoS) via unspecified vectors.
[ { "commit_message": "[PATCH] [sbix] Limit glyph extents Fixes https://github.com/harfbuzz/harfbuzz/issues/3557 src/hb-ot-color-sbix-table.hh | 6 ++++++ test/fuzzing/fonts/sbix-extents.ttf | Bin 0 -> 582 bytes 2 files changed, 6 insertions(+) create mode 100644 test/fuzzing/fonts/sbix-extents.ttf", "...
n/a
CVE-2020-10378
In libImaging/PcxDecode.c in Pillow before 7.1.0, an out-of-bounds read can occur when reading PCX files where state->shuffle is instructed to read beyond state->buffer.
[ { "commit_message": "[PATCH] Fix OOB Access on PcxDecode.c src/libImaging/PcxDecode.c | 5 +---- 1 file changed, 1 insertion(+), 4 deletions(-)", "patch_text_b64": "RnJvbSA2YTgzZTQzMjQ3MzhiYjA0NTJmYmU4MDc0YTk5NWIxYzczZjA4ZGU3IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBFcmljIFNvcm9vcyA8ZXJpYy1naXRodWJAc29yb29z...
n/a
GHSA-f82m-w3p3-cgp3
OpenStack Identity Keystone Improper Access Control
null
[ { "commit_message": "[PATCH] Fix fernet audit ids for v2.0 The fernet token provider was doing some weird things with audit ids that caused token rescoping to not work because audit ids were never pulled from the original token. This commit also enables some tests for v2.0 authentication with the Fernet as the ...
null
GHSA-wggx-8wf7-vg3g
null
[ { "commit_message": "[PATCH] sd-bus: introduce API for re-enqueuing incoming messages When authorizing via PolicyKit we want to process incoming method calls twice: once to process and figure out that we need PK authentication, and a second time after we aquired PK authentication to actually execute the operati...
null
GHSA-x7p4-v8mj-6fxx
Liferay Portal Username Enumeration Vulnerability
null
[ { "commit_message": "[PATCH] LPD-43475 DRY, simplify tests .../service/test/UserLocalServiceTest.java | 158 +++++++----------- 1 file changed, 61 insertions(+), 97 deletions(-)", "patch_text_b64": "RnJvbSBmMjViYjk1ODNmMDU5Zjg2OTM3NjQ5ZmRhY2Y5NDA5MjhjYTM3NjdiIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBSYWZ...
null
GHSA-97x9-59rv-q5pm
Hyperledger Aries Cloud Agent Python result of presentation verification not checked for LDP-VC
null
[ { "commit_message": "[PATCH 1/4] fix: report presentation result Signed-off-by: Daniel Bluhm <dbluhm@pm.me> aries_cloudagent/vc/vc_ld/verify.py | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSBjOThhZWRkNDlmNjZkOTA3ZWZmYzQwM2NhMzg2Yzg4NjQzNTg3MjQyIE1vbiBTZXAgMTcgMDA6MDA6MD...
null
GHSA-376v-xgjx-7mfr
fastify-bearer-auth vulnerable to Timing Attack Vector
null
[ { "commit_message": "[PATCH] Merge pull request from GHSA-376v-xgjx-7mfr * Correctly use crypto.timingSafeEqual Signed-off-by: Matteo Collina <hello@matteocollina.com> Co-Authored-By: Uzlopak <aras.abbasi@googlemail.com> * apply requested change Co-authored-by: Uzlopak <aras.abbasi@googlemail.com> plugin.js ...
null
CVE-2023-30861
Flask vulnerable to possible disclosure of permanent session cookie due to missing Vary: Cookie header
Flask is a lightweight WSGI web application framework. When all of the following conditions are met, a response containing data intended for one client may be cached and subsequently sent by the proxy to other clients. If the proxy also caches `Set-Cookie` headers, it may send one client's `session` cookie to other clients. The severity depends on the application's use of the session and the proxy's behavior regarding cookies. The risk depends on all these conditions being met. 1. The application must be hosted behind a caching proxy that does not strip cookies or ignore responses with cookies. 2. The application sets `session.permanent = True` 3. The application does not access or modify the session at any point during a request. 4. `SESSION_REFRESH_EACH_REQUEST` enabled (the default). 5. The application does not set a `Cache-Control` header to indicate that a page is private or should not be cached. This happens because vulnerable versions of Flask only set the `Vary: Cookie` header when the session is accessed or modified, not when it is refreshed (re-sent to update the expiration) without being accessed or modified. This issue has been fixed in versions 2.3.2 and 2.2.5.
[ { "commit_message": "[PATCH] set `Vary: Cookie` header consistently for session src/flask/sessions.py | 10 ++++++---- tests/test_basic.py | 23 +++++++++++++++++++++++ 2 files changed, 29 insertions(+), 4 deletions(-)", "patch_text_b64": "RnJvbSA4NzA1ZGQzOWM0ZmE1NjNlYTBmZTBiZjg0Yzg1ZGE4ZmNjOThiODhkIE1vbiBT...
CWE-539: Use of Persistent Cookies Containing Sensitive Information
PYSEC-2021-173
null
[ { "commit_message": "[PATCH] Validate arguments to `QuantizedReshape`. Ensure that validations from `Reshape` also terminate `QuantizedReshape` on failure. PiperOrigin-RevId: 369775421 Change-Id: If8c5342267aceea65b7cb83a4b183304886f1ce8 .../core/kernels/quantized_reshape_op.cc | 25 +++++++++++++++++-- 1 f...
null
GHSA-92qf-8gh3-gwcm
Apache Superset: Improper SQL authorisation, parse not checking for specific postgres functions
null
[ { "commit_message": "[PATCH] fix: add more disallowed pg functions (#29454) superset/config.py | 11 ++++++++++- 1 file changed, 10 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAwZTAwMjgyNjBmYzhhMjA5OTI1MDcwMTUyNGE0ODlmM2M5YWExNDZmIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBEYW5pZWwgVmF6IEdhc3BhciA...
null
GHSA-fmx4-26r3-wxpf
Integer overflow in cmark-gfm table parsing extension leads to heap memory corruption
null
[ { "commit_message": "[PATCH 1/2] Update cmark-upstream to https://github.com/github/cmark-gfm/commit/ff164f188bc1eb23391c85436ab418463e7a030f ext/commonmarker/cmark-gfm_version.h | 4 ++-- ext/commonmarker/cmark-upstream | 2 +- ext/commonmarker/table.c | 30 ++++++++++++++++++++++++++-- 3 files...
null
CVE-2025-52471
ESP-NOW Integer Underflow Vulnerability Advisory
ESF-IDF is the Espressif Internet of Things (IOT) Development Framework. An integer underflow vulnerability has been identified in the ESP-NOW protocol implementation within the ESP Wi-Fi component of versions 5.4.1, 5.3.3, 5.2.5, and 5.1.6 of the ESP-IDF framework. This issue stems from insufficient validation of user-supplied data length in the packet receive function. Under certain conditions, this may lead to out-of-bounds memory access and may allow arbitrary memory write operations. On systems without a memory protection scheme, this behavior could potentially be used to achieve remote code execution (RCE) on the target device. In versions 5.4.2, 5.3.4, 5.2.6, and 5.1.6, ESP-NOW has added more comprehensive validation logic on user-supplied data length during packet reception to prevent integer underflow caused by negative value calculations. For ESP-IDF v5.3 and earlier, a workaround can be applied by validating that the `data_len` parameter received in the RX callback (registered via `esp_now_register_recv_cb()`) is a positive value before further processing. For ESP-IDF v5.4 and later, no application-level workaround is available. Users are advised to upgrade to a patched version of ESP-IDF to take advantage of the built-in mitigation.
[ { "commit_message": "[PATCH] fix(wifi): Added more check when receiving espnow data components/esp_wifi/lib | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBiMWEzNzlkNTc0MzBkMjY1YTUzYWNhMTNkNTlkZGZiZjJlN2FjNDA5IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiB6aGFuZ3lhbmppYW8gPHpoYW...
CWE-191: Integer Underflow (Wrap or Wraparound)
CVE-2025-69261
WasmEdge integer wrap in MemoryInstance::getSpan()'s memory size check
WasmEdge is a WebAssembly runtime. Prior to version 0.16.0-alpha.3, a multiplication in `WasmEdge/include/runtime/instance/memory.h` can wrap, causing `checkAccessBound()` to incorrectly allow the access. This leads to a segmentation fault. Version 0.16.0-alpha.3 contains a patch for the issue.
[ { "commit_message": "[PATCH] fix(runtime): refine the overflow detection when wrapping memory instance Signed-off-by: YiYing He <yiying@secondstate.io> include/runtime/instance/memory.h | 24 +++++++++++++++++++----- 1 file changed, 19 insertions(+), 5 deletions(-)", "patch_text_b64": "RnJvbSAzN2NjOWZhMTliZD...
CWE-190: Integer Overflow or Wraparound
CVE-2015-7337
The editor in IPython Notebook before 3.2.2 and Jupyter Notebook 4.0.x before 4.0.5 allows remote attackers to execute arbitrary JavaScript code via a crafted file, which triggers a redirect to files/, related to MIME types.
[ { "commit_message": "[PATCH 1/4] set mime-type on /files/ IPython/html/files/handlers.py | 5 +++++ 1 file changed, 5 insertions(+)", "patch_text_b64": "RnJvbSBkNzI5Y2U3YzIwNjNjMGRlNzQ2YTdjMmVhMzk2OTcwNDBkMGFmNWJmIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBNaW4gUksgPGJlbmphbWlucmtAZ21haWwuY29tPgpEYXRlOiBNb24s...
n/a