id
stringlengths
12
19
title
stringlengths
0
237
description
stringlengths
35
3.87k
patches
listlengths
1
22
cwe
stringlengths
2
440
GHSA-jp3c-g46v-jg2c
LibreNMS Cross-site Scripting vulnerability
null
[ { "commit_message": "[PATCH] Fix improperly escaped output in outages page (#15310) Fixes XSS reported by https://huntr.dev/users/hainguyen0207 includes/html/common/outages.inc.php | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSA0OWQ2NmZhMzFiNDNhY2VmMDJlYWEwOWVlOWFmMTVmZ...
null
GHSA-qqxj-3jqw-xwwx
null
[ { "commit_message": "[PATCH] CVE-2017-12994/BGP: Move a test inside a loop. MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit The loop can be executed more than once (that's kinda the whole point of a loop), so the check has to be made each time through the loop, not just...
null
CVE-2022-39322
@keystone-6/core vulnerable to field-level access-control bypass for multiselect field
@keystone-6/core is a core package for Keystone 6, a content management system for Node.js. Starting with version 2.2.0 and prior to version 2.3.1, users who expected their `multiselect` fields to use the field-level access control - if configured - are vulnerable to their field-level access control not being used. List-level access control is not affected. Field-level access control for fields other than `multiselect` are not affected. Version 2.3.1 contains a fix for this issue. As a workaround, stop using the `multiselect` field.
[ { "commit_message": "[PATCH] Fix multiselect field type not propagating common config options (#8007) Co-authored-by: Marek Rybczynski <marek.rybczyn@gmail.com> Co-authored-by: Daniel Cousens <413395+dcousens@users.noreply.github.com> .changeset/two-ghosts-jog.md | 5 +++++ packages/core/s...
CWE-285: Improper Authorization
GHSA-mh3m-62v7-68xg
TensorFlow vulnerable to `CHECK` fail in `Unbatch`
null
[ { "commit_message": "[PATCH] Fix check failure in Unbatch Op kernel by checking whether input argument is a scalar before trying to extract value. PiperOrigin-RevId: 461660186 tensorflow/core/kernels/batch_kernels.cc | 7 +++++++ tensorflow/python/ops/batch_ops_test.py | 20 ++++++++++++++++++++ 2 files changed...
null
PYSEC-2022-155
null
[ { "commit_message": "[PATCH] Prevent stack overflow when FunctionLib in GraphDef has a self-recursive function. It is likely that no recursivity is supported, but we should handle this separately. PiperOrigin-RevId: 414860329 Change-Id: I02a2270e86282b37362ddd485eeef16fb986a9e0 tensorflow/cc/saved_model/loader....
null
GHSA-p43c-fp87-rj5p
null
[ { "commit_message": "[PATCH] Delete CVEs/CVE-2025-33028 (WinZip) directory .../CVE-2025-33028 (WinZip)/CVE-2025-33028.md | 48 ------------------- 1 file changed, 48 deletions(-) delete mode 100644 CVEs/CVE-2025-33028 (WinZip)/CVE-2025-33028.md", "patch_text_b64": "RnJvbSA1ZTFmZjRlNWY0ZmRiM2YzMmFhYjQ2NWY3YjQ...
null
PYSEC-2020-295
null
[ { "commit_message": "[PATCH] Prevent segfault in `quantize_and_dequantize` Fixes #42105. If `tf.quantization.quantize_and_dequantize` is called with `axis` argument pointing to outside of the input tensor, we obtain a `CHECK` fail which then aborts the application/interpreter. This change adds a condition check...
null
CVE-2020-15270
Improper session expiration in Parse Server
Parse Server (npm package parse-server) broadcasts events to all clients without checking if the session token is valid. This allows clients with expired sessions to still receive subscription objects. It is not possible to create subscription objects with invalid session tokens. The issue is not patched.
[ { "commit_message": "[PATCH] Merge pull request from GHSA-2xm2-xj2q-qgpj * Test case and fixes * Change requestTimeout default to 5s * Document new function argument spec/ParseLiveQuery.spec.js | 42 +++++++++++++++++++++++++++ src/LiveQuery/ParseLiveQueryServer.js | 12 ++++---- src/Options/Definitions...
{"CWE-672":"Operation on a Resource after Expiration or Release"}
CVE-2024-28244
KaTeX's maxExpand bypassed by Unicode sub/superscripts
KaTeX is a JavaScript library for TeX math rendering on the web. KaTeX users who render untrusted mathematical expressions could encounter malicious input using `\def` or `\newcommand` that causes a near-infinite loop, despite setting `maxExpand` to avoid such loops. KaTeX supports an option named maxExpand which aims to prevent infinitely recursive macros from consuming all available memory and/or triggering a stack overflow error. Unfortunately, support for "Unicode (sub|super)script characters" allows an attacker to bypass this limit. Each sub/superscript group instantiated a separate Parser with its own limit on macro executions, without inheriting the current count of macro executions from its parent. This has been corrected in KaTeX v0.16.10.
[ { "commit_message": "[PATCH] fix: maxExpand limit with Unicode sub/superscripts * Prevent recursive parser calls from over-expansion * Use this.subparse instead of a recursive parser. * Add maxExpand tests * Lint fix Co-authored-by: Ron Kok <ronkok55@outlook.com> src/Parser.js | 7 ++++--- test/katex-spec....
CWE-674: Uncontrolled Recursion
GHSA-vwq9-cmqr-3c8c
Insertion of Sensitive Information into Log File in Jenkins Configuration as Code Plugin
null
[ { "commit_message": "[PATCH] [SECURITY-1303][SECURITY-1279] integrations/pom.xml | 14 ++ .../jenkins/plugins/casc/CredentialsTest.java | 27 +++ .../io/jenkins/plugins/casc/MailExtTest.java | 46 +++++ .../plugins/casc/SSHCredentialsTest.java | 66 +++++++ .../io/jenkins/plugins/...
null
GHSA-q485-j897-qc27
XML External Entity Reference in mchange:c3p0
null
[ { "commit_message": "[PATCH] Repair XXE vulnerability at initialization src/java/com/mchange/v2/c3p0/cfg/C3P0ConfigXmlUtils.java | 1 + 1 file changed, 1 insertion(+)", "patch_text_b64": "RnJvbSAyZWIwZWE5N2Y3NDU3NDBiMThkZDQ1ZTRhOTA5MTEyZDQ2ODVmODdiIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiB6aHV0b3VnZyA8emh1d...
null
GHSA-w4v7-hwx7-9929
Cross-site Scripting in tempura
null
[ { "commit_message": "[PATCH] break: ensure `esc` always returns a string; - prevents a XSS attack within an array docs/api.md | 8 ++++++-- src/$index.js | 2 +- src/index.d.ts | 2 +- test/$index.js | 25 +++++++++++++++---------- 4 files changed, 23 insertions(+), 14 deletions(-)", "patch_text_b64": "R...
null
GHSA-fphp-jmfp-4vj9
null
[ { "commit_message": "[PATCH] Fix integer overflow in gdImageWebpCtx Integer overflow can be happened in expression gdImageSX(im) * 4 * gdImageSY(im). It could lead to heap buffer overflow in the following code. This issue has been reported to the PHP Bug Tracking System. The proof-of-concept file will be suppli...
null
CVE-2023-3532
Cross-site Scripting (XSS) - Stored in outline/outline
Cross-site Scripting (XSS) - Stored in GitHub repository outline/outline prior to 0.70.1.
[ { "commit_message": "[PATCH] 0.70.1 package.json | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA5NDMxZGY0NWMyMTBlODViNzdjZDI3ZjJmZmFmMDM1OGI4MzdhZmEzIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBUb20gTW9vciA8dG9tLm1vb3JAZ21haWwuY29tPgpEYXRlOiBUaHUsIDYgSnVsIDIwMjMgMjI6MDA6MzkgL...
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
GHSA-4cxm-8xrj-7c53
null
[ { "commit_message": "[PATCH] TROVE-2017-005: Fix assertion failure in connection_edge_process_relay_cell On an hidden service rendezvous circuit, a BEGIN_DIR could be sent (maliciously) which would trigger a tor_assert() because connection_edge_process_relay_cell() thought that the circuit is an or_circuit_t bu...
null
GHSA-38jw-g2qx-4286
KubeVirt Affected by an Authentication Bypass in Kubernetes Aggregation Layer
null
[ { "commit_message": "[PATCH] SetupTLSWithCertManager now enforces CN The CNs will be provided by Kubernetes. If empty, any client certificate validated by the authority is allowed. Signed-off-by: Luboslav Pivarc <lpivarc@redhat.com> pkg/util/tls/tls.go | 30 +++++++++++++++++++++++++++++- pkg/util/tls/tls_t...
null
GHSA-9xqg-wjcv-qqxq
null
[ { "commit_message": "[PATCH] patch 8.2.4895: buffer overflow with invalid command with composing chars Problem: Buffer overflow with invalid command with composing chars. Solution: Check that the whole character fits in the buffer. src/ex_docmd.c | 4 +++- src/testdir/test_cmdline.vim | 11 ++...
null
GHSA-7wph-fc4w-wqp2
Improper date handling in Django
null
[ { "commit_message": "[PATCH] [1.1.X] Fix a security issue in the auth system. Disclosure and new release forthcoming. git-svn-id: http://code.djangoproject.com/svn/django/branches/releases/1.1.X@15036 bcc190cf-cafb-0310-a4f2-bffc1f526a37 django/contrib/auth/tests/tokens.py | 5 +++++ django/contrib/auth/urls.py ...
null
CVE-2015-10093
Mark User as Spammer Plugin plugin.php user_row_actions cross site scripting
A vulnerability was found in Mark User as Spammer Plugin 1.0.0/1.0.1 on WordPress. It has been declared as problematic. Affected by this vulnerability is the function user_row_actions of the file plugin/plugin.php. The manipulation of the argument url leads to cross site scripting. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. Upgrading to version 1.0.2 is able to address this issue. The identifier of the patch is e7059727274d2767c240c55c02c163eaa4ba6c62. It is recommended to upgrade the affected component. The identifier VDB-222325 was assigned to this vulnerability.
[ { "commit_message": "[PATCH] Prevent XSS with esc_url() in old WordPress versions and prepare for using URL as href attr. 4.2 pass URL to urlencode() and strip all \"bad\" symbols from URL. plugin/plugin.php | 10 +++++++++- 1 file changed, 9 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBlNzA1OTcy...
CWE-79 Cross Site Scripting
GHSA-g4c6-5qcw-3c6v
null
[ { "commit_message": "[PATCH] fix unchecked length in stb_vorbis that could crash on corrupt/invalid files stb_vorbis.c | 23 ++++++++++++++++++----- 1 file changed, 18 insertions(+), 5 deletions(-)", "patch_text_b64": "RnJvbSAyNDRkODNiYzNkODU5MjkzZjU1ODEyZDQ4YjNkYjE2OGU1ODFmNmFiIE1vbiBTZXAgMTcgMDA6MDA6MDAgMj...
null
CVE-2014-3535
include/linux/netdevice.h in the Linux kernel before 2.6.36 incorrectly uses macros for netdev_printk and its related logging implementation, which allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) by sending invalid packets to a VxLAN interface.
[ { "commit_message": "[PATCH] netdevice.h net/core/dev.c: Convert netdev_<level> logging macros to functions Reduces an x86 defconfig text and data ~2k. text is smaller, data is larger. $ size vmlinux* text\t data\t bss\t dec\t hex\tfilename 7198862\t 720112\t1366288\t9285262\t 8dae8e\tvmlinux 7205273...
n/a
GHSA-f352-cwm8-5w9w
null
[ { "commit_message": "[PATCH] Fix potential buffer overflow in ec_glob (#87) CVE-2023-0341 Co-authored-by: David Fernandez Gonzalez <david.fernandezgonzalez@canonical.com> src/lib/ec_glob.c | 25 ++++++++++++++++--------- 1 file changed, 16 insertions(+), 9 deletions(-)", "patch_text_b64": "RnJvbSA0MTI4MWVhOD...
null
CVE-2025-9300
saitoha libsixel img2sixel encoder.c sixel_debug_print_palette stack-based overflow
A vulnerability was found in saitoha libsixel up to 1.10.3. Affected by this issue is the function sixel_debug_print_palette of the file src/encoder.c of the component img2sixel. The manipulation results in stack-based buffer overflow. The attack must be initiated from a local position. The exploit has been made public and could be used. The patch is identified as 316c086e79d66b62c0c4bc66229ee894e4fdb7d1. Applying a patch is advised to resolve this issue.
[ { "commit_message": "[PATCH] Fix a heap-buffer-overflow problem reported by @err2zero Makefile.am | 3 +++ Makefile.in | 5 ++++- converters/Makefile.am | 5 +++-- converters/Makefile.in ...
Stack-based Buffer Overflow
GHSA-3x6m-jc93-26vq
null
[ { "commit_message": "[PATCH] Fix crash when mapping a big memory and calling uc_close qemu/exec.c | 21 ++- qemu/include/qemu/atomic.h | 53 +++++++ qemu/include/qemu/rcu_queue.h | 268 ++++++++++++++++++++++++++++++++++ qemu/softmmu/memory.c | 6 +- tests/unit/test_mem.c | ...
null
GHSA-wpg8-mf6h-gm92
Apache Airflow Incorrect Authorization vulnerability
null
[ { "commit_message": "[PATCH] Add read only validation to read only fields (#33413) * Add read only validation to read only fields Add read only validation to DagRunEditForm and TaskInstanceEditForm read only fields. * Improve docstring Co-authored-by: Hussein Awala <hussein@awala.fr> (cherry picked from commit ...
null
GHSA-62gc-8jr5-x9pm
Apache InLong Deserialization of Untrusted Data Vulnerability
null
[ { "commit_message": "[PATCH] [INLONG-11585][Manager] Support JDBC verification under dual write parameters (#11586) .../pojo/util/MySQLSensitiveUrlUtils.java | 18 +++++++++++++++--- .../pojo/sink/mysql/MySQLSinkDTOTest.java | 4 ++++ .../cluster/InlongClusterServiceImpl.java | 4 ++-- .../pulsar...
null
GHSA-xg73-94fp-g449
mlflow is vulnerable to remote file access in `mlflow server` and `mlflow ui` CLIs
null
[ { "commit_message": "[PATCH] Apply suggestions from code review Co-authored-by: Ben Wilson <39283302+BenWilson2@users.noreply.github.com> Signed-off-by: Harutaka Kawamura <hkawamura0130@gmail.com> mlflow/server/handlers.py | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSA...
null
GHSA-mw39-9qc2-f7mg
Rancher exposes sensitive information through audit logs
null
[ { "commit_message": "[PATCH] Improve how auditlog handles specific redactions (#52301) pkg/auth/audit/default.go | 2 +- pkg/auth/audit/default_test.go | 590 +++++++++++++++++---------------- pkg/auth/audit/redact.go | 2 +- 3 files changed, 301 insertions(+), 293 deletions(-)", "patch_text_b64...
null
GHSA-8982-pcm5-6hpj
null
[ { "commit_message": "[PATCH] Fixed issue #19099: [security] XSS vulnerability caused by themeOptions/importManifest (#3483) Co-authored-by: Denis Chenu <shnoulle@localhost.localdomain> application/models/TemplateConfiguration.php | 16 ++++++++++------ .../views/admin/globalsettings/_general.php | 8 +...
null
GHSA-442w-2rxq-q6gc
null
[ { "commit_message": "[PATCH] ... MagickCore/draw.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBlY2Y3YzZiMjg4ZTExZTdlN2Y3NTM4N2M1ZTllOTNlNDIzYjk4Mzk3IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBDcmlzdHkgPHVyYmFuLXdhcnJpb3JAaW1hZ2VtYWdpY2sub3JnPgpEYXRlOiBTdW4sIDE4IEF1ZyAyM...
null
CVE-2023-0650
YAFNET Signature cross site scripting
A vulnerability was found in YAFNET up to 3.1.11 and classified as problematic. This issue affects some unknown processing of the component Signature Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.1.12 is able to address this issue. The identifier of the patch is a1442a2bacc3335461b44c250e81f8d99c60735f. It is recommended to upgrade the affected component. The identifier VDB-220037 was assigned to this vulnerability.
[ { "commit_message": "[PATCH] [FIXED] Stored XSS in Signature CHANGES.md | 3 ++ yafsrc/YAF.NET-MySql.sln | 48 ------------------- yafsrc/YAF.NET-PostgreSQL.sln | 48 ------------------- yafsrc/YAF.NET-SqlServer.sln | 48 ----...
CWE-79 Cross Site Scripting
GHSA-qwc8-vjh3-gm2j
YetiForce CRM vulnerable to stored Cross-site Scripting via WorkFlow module
null
[ { "commit_message": "[PATCH] Improved worflow panel config/version.php | 2 +- .../Workflows/AdvanceFilterCondition.tpl | 8 +- .../Settings/Workflows/CreateEntity.tpl | 50 ++++---- .../modules/Settings/Workflows/EditTask.tpl | 10 +- .../Settings/Workflows/FieldExpres...
null
CVE-2021-41243
OS Command Injection Vulnerability and Potential Zip Slip Vulnerability
There is a Potential Zip Slip Vulnerability and OS Command Injection Vulnerability on the management system of baserCMS. Users with permissions to upload files may upload crafted zip files which may execute arbitrary commands on the host operating system. This is a vulnerability that needs to be addressed when the management system is used by an unspecified number of users. If you are eligible, please update to the new version as soon as possible.
[ { "commit_message": "[PATCH] Merge pull request from GHSA-7rpc-9m88-cf9w MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit * 固定ページプレビュー実行時に入力内容検証を追加 * SimpleZipの利用を停止しZipArchiveの利用に切り替え * 不要コード除去 * BcZip利用時、ZipArchiveをopenしていない場合エラーログが出力される問題を改善 .../admin-third/Installati...
CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2025-64721
Sandboxie's Integer Overflow in SbieIniServer::RC4Crypt allows sandbox escape and SYSTEM compromise
Sandboxie is a sandbox-based isolation software for 32-bit and 64-bit Windows NT-based operating systems. In versions 1.16.6 and below, the SYSTEM-level service SbieSvc.exe exposes SbieIniServer::RC4Crypt to sandboxed processes. The handler adds a fixed header size to a caller-controlled value_len without overflow checking. A large value_len (e.g., 0xFFFFFFF0) wraps the allocation size, causing a heap overflow when attacker data is copied into the undersized buffer. This allows sandboxed processes to execute arbitrary code as SYSTEM, fully compromising the host. This issue is fixed in version 1.16.7.
[ { "commit_message": "[PATCH 1/2] 1.16.7 CHANGELOG.md | 2 ++ Sandboxie/core/svc/sbieiniserver.cpp | 3 +++ 2 files changed, 5 insertions(+)", "patch_text_b64": "RnJvbSAwOGJjOTgwMzM5OWUwM2UwMDhiNzRjM2FjNGUxYThkZjY4Y2ZjYjllIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBEYXZpZFhhbmF0b3MgPHhhb...
CWE-190: Integer Overflow or Wraparound
CVE-2022-2309
NULL Pointer Dereference in lxml/lxml
NULL Pointer Dereference allows attackers to cause a denial of service (or application crash). This only applies when lxml is used together with libxml2 2.9.10 through 2.9.14. libxml2 2.9.9 and earlier are not affected. It allows triggering crashes through forged input data, given a vulnerable code sequence in the application. The vulnerability is caused by the iterwalk function (also used by the canonicalize function). Such code shouldn't be in wide-spread use, given that parsing + iterwalk would usually be replaced with the more efficient iterparse function. However, an XML converter that serialises to C14N would also be vulnerable, for example, and there are legitimate use cases for this code sequence. If untrusted input is received (also remotely) and processed via iterwalk function, a crash can be triggered.
[ { "commit_message": "[PATCH] Fix a crash when incorrect parser input occurs together with usages of iterwalk() on trees generated by the same parser. src/lxml/apihelpers.pxi | 7 ++++--- src/lxml/iterparse.pxi | 11 ++++++----- src/lxml/tests/test_etree.py | 20 ++++++++++++++++++++ 3 files changed, 30...
CWE-476 NULL Pointer Dereference
GHSA-f432-537h-hwj6
null
[ { "commit_message": "[PATCH] fixed out of bounds writes Thanks to Eric Sesterhenn from X41 D-SEC GmbH for reporting the problems. src/libopensc/card-cac.c | 2 +- src/libopensc/card-epass2003.c | 3 ++- src/libopensc/card-muscle.c | 7 +++++-- src/libopensc/card-tcos.c | 6 +++--- src/libo...
null
GHSA-hwjv-mc78-cccj
Moodle multiple cross-site scripting (XSS) vulnerabilities
null
[ { "commit_message": "[PATCH] MDL-46042 badges: Clean up external badge data Signed-off-by: Yuliya Bozhko <yuliya.bozhko@totaralms.com> badges/renderer.php | 29 +++++++++++++++-------------- 1 file changed, 15 insertions(+), 14 deletions(-)", "patch_text_b64": "RnJvbSAwMTc0YTBhNTdmNmQ4NGUyNDBkZDBiYzBkZjBmZmE...
null
CVE-2021-32838
Regular Expression Denial of Service in flask-restx
Flask-RESTX (pypi package flask-restx) is a community driven fork of Flask-RESTPlus. Flask-RESTX before version 0.5.1 is vulnerable to ReDoS (Regular Expression Denial of Service) in email_regex. This is fixed in version 0.5.1.
[ { "commit_message": "[PATCH] optimize email regex (credits: @kevinbackhouse, fix: #372) flask_restx/inputs.py | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBiYWIzMWUwODVmMzU1ZGQ3Mzg1OGZkMzcxNWY3ZWQ3MTg0OTY1NmRhIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiB6aWlyaXNoIDx6aWlyaXNo...
CWE-400 Uncontrolled Resource Consumption
CVE-2020-26247
XXE in Nokogiri
Nokogiri is a Rubygem providing HTML, XML, SAX, and Reader parsers with XPath and CSS selector support. In Nokogiri before version 1.11.0.rc4 there is an XXE vulnerability. XML Schemas parsed by Nokogiri::XML::Schema are trusted by default, allowing external resources to be accessed over the network, potentially enabling XXE or SSRF attacks. This behavior is counter to the security policy followed by Nokogiri maintainers, which is to treat all input as untrusted by default whenever possible. This is fixed in Nokogiri version 1.11.0.rc4.
[ { "commit_message": "[PATCH] feat: XML::Schema and RelaxNG creation accept optional ParseOptions I'm trying out a new pattern, which is that the parsed object carries around the ParseOptions it was created with, which should make some testing a bit easier. I'm also not implementing the \"config block\" pattern ...
CWE-611: Improper Restriction of XML External Entity Reference
GHSA-qff9-r3c8-wgm2
null
[ { "commit_message": "[PATCH] Bug #93, fix for security vulnerability in `Timedtext` controller * https://iet.eu.teamwork.com/desk/#/tickets/366419 application/controllers/timedtext.php | 6 ++++++ 1 file changed, 6 insertions(+)", "patch_text_b64": "RnJvbSAzZjM5ZjJkNjhkMTE4OTU5MjljMDRmN2I0OWI5N2E3MzRhZTdjZDF...
null
GHSA-cj88-88mr-972w
glob-parent 6.0.0 vulnerable to Regular Expression Denial of Service
null
[ { "commit_message": "[PATCH] fix!: Correct mishandled escaped path separators (#34) Closes #32 index.js | 2 +- test/index.test.js | 8 ++++---- 2 files changed, 5 insertions(+), 5 deletions(-)", "patch_text_b64": "RnJvbSAzMmY2ZDUyNjYzYjdhZGRhYzM4ZDBkZmY1NzBkODEyN2VkZjAzZjQ3IE1vbiBTZXAgMTcgMDA6MDA6M...
null
CVE-2025-62426
vLLM vulnerable to DoS via large Chat Completion or Tokenization requests with specially crafted `chat_template_kwargs`
vLLM is an inference and serving engine for large language models (LLMs). From version 0.5.5 to before 0.11.1, the /v1/chat/completions and /tokenize endpoints allow a chat_template_kwargs request parameter that is used in the code before it is properly validated against the chat template. With the right chat_template_kwargs parameters, it is possible to block processing of the API server for long periods of time, delaying all other requests. This issue has been patched in version 0.11.1.
[ { "commit_message": "[PATCH] [Frontend] Enforce tokenize=False when applying chat template (#27205) Signed-off-by: Isotr0py <mozf@mail2.sysu.edu.cn> Co-authored-by: Isotr0py <mozf@mail2.sysu.edu.cn> tests/entrypoints/test_chat_utils.py | 12 +++++++++++ vllm/entrypoints/chat_utils.py | 31 +++++++++++++++++...
CWE-770: Allocation of Resources Without Limits or Throttling
GHSA-2hw3-h8qx-hqqp
OpenList (frontend) allows XSS Attacks in the built-in Markdown Viewer
null
[ { "commit_message": "[PATCH] fix: XSS issue reported src/pages/home/previews/markdown_with_word_wrap.tsx | 9 ++++++++- 1 file changed, 8 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA3YjVlZDIwYzYwOGM3YjliMzZkMTk1MGEzODY2NzhlMGE4OWY4MTc1IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBIYW50b25nIENoZW4gP...
null
CVE-2020-11071
False-negative validation results in MINT transactions with invalid baton
SLPJS (npm package slpjs) before version 0.27.2, has a vulnerability where users could experience false-negative validation outcomes for MINT transaction operations. A poorly implemented SLP wallet could allow spending of the affected tokens which would result in the destruction of a user's minting baton. This is fixed in version 0.27.2.
[ { "commit_message": "[PATCH] fix false negative case for MINT transactions See the newly added unit test case for this issue. Currently there are 151 unit tests. lib/localvalidator.ts | 16 ++++++++++------ 1 file changed, 10 insertions(+), 6 deletions(-)", "patch_text_b64": "RnJvbSAzNjcxYmUyZmZiNmQ0Y2ZhOTRj...
CWE-697: Incorrect Comparison
GHSA-8wr4-2wm6-w3pr
B2 Command Line Tool TOCTOU application key disclosure
null
[ { "commit_message": "[PATCH] Release v3.2.1 CHANGELOG.md | 10 ++++++++-- requirements.txt | 2 +- 2 files changed, 9 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSBjNzQwMjlmOWY3NTA2NWU4ZjdlM2MzZWM4ZTBhMjNmYjgyMDRmZWViIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBQYXdlbCBQb2xld2ljeiA8cC5wb2xld2lj...
null
GHSA-vr7q-737x-h8wj
null
[ { "commit_message": "[PATCH] patch 9.0.1189: invalid memory access with folding and using \"L\" Problem: Invalid memory access with folding and using \"L\". Solution: Prevent the cursor from moving to line zero. src/normal.c | 3 ++- src/testdir/test_fold.vim | 8 ++++++++ src/version.c ...
null
CVE-2016-15015
viafintech Barzahlen Payment Module PHP SDK Webhook.php verify timing discrepancy
A vulnerability, which was classified as problematic, was found in viafintech Barzahlen Payment Module PHP SDK up to 2.0.0. Affected is the function verify of the file src/Webhook.php. The manipulation leads to observable timing discrepancy. The complexity of an attack is rather high. The exploitability is told to be difficult. Upgrading to version 2.0.1 is able to address this issue. The patch is identified as 3e7d29dc0ca6c054a6d6e211f32dae89078594c1. It is recommended to upgrade the affected component. VDB-217650 is the identifier assigned to this vulnerability.
[ { "commit_message": "[PATCH] Fixed timing attack vulnerability src/Middleware.php | 26 ++++++++++++++++++++++++++ src/Webhook.php | 2 +- tests/MiddlewareTest.php | 24 ++++++++++++++++++++++++ 3 files changed, 51 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAzZTdkMjlkYzBjYTZjMDU0YT...
CWE-208 Observable Timing Discrepancy
GHSA-vx9g-377x-xwxq
Server side request forgery in gibbon
null
[ { "commit_message": "[PATCH] Ensure we raise if the root domain changed and it was not an expected behavior lib/gibbon/api_request.rb | 2 ++ spec/gibbon/gibbon_spec.rb | 8 +++++++- 2 files changed, 9 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBiMmViOTllZDMwNGQ3NDkxYTZkMzQ4YTViYmRjODNhMDA4ZmM2Z...
null
GHSA-75pc-qvwc-jf3g
Improper Input Validation in HashiCorp Vault
null
[ { "commit_message": "[PATCH] bug: service account key should use config ttl (#85) * bug: service account key should use config ttl * Use configured TTL unless overridden by request * update makefile * code cleanup Co-authored-by: catsby <clint@ctshryock.com> Makefile | 4 +- plugin...
null
GHSA-2xc2-rj8c-xgm7
null
[ { "commit_message": "[PATCH] fix: [security] Further fixes to the bruteforce handling - resolved a potential failure of the subsystem when the MySQL and the webserver time settings are diverged - as reported by Dawid Czarnecki - several tightenings of the checks to avoid potential foul play app/Controller/Users...
null
CVE-2023-34459
OpenZeppelin Contracts's MerkleProof multiproofs may allow proving arbitrary leaves for specific trees
OpenZeppelin Contracts is a library for smart contract development. Starting in version 4.7.0 and prior to version 4.9.2, when the `verifyMultiProof`, `verifyMultiProofCalldata`, `procesprocessMultiProof`, or `processMultiProofCalldat` functions are in use, it is possible to construct merkle trees that allow forging a valid multiproof for an arbitrary set of leaves. A contract may be vulnerable if it uses multiproofs for verification and the merkle tree that is processed includes a node with value 0 at depth 1 (just under the root). This could happen inadvertedly for balanced trees with 3 leaves or less, if the leaves are not hashed. This could happen deliberately if a malicious tree builder includes such a node in the tree. A contract is not vulnerable if it uses single-leaf proving (`verify`, `verifyCalldata`, `processProof`, or `processProofCalldata`), or if it uses multiproofs with a known tree that has hashed leaves. Standard merkle trees produced or validated with the @openzeppelin/merkle-tree library are safe. The problem has been patched in version 4.9.2. Some workarounds are available. For those using multiproofs: When constructing merkle trees hash the leaves and do not insert empty nodes in your trees. Using the @openzeppelin/merkle-tree package eliminates this issue. Do not accept user-provided merkle roots without reconstructing at least the first level of the tree. Verify the merkle tree structure by reconstructing it from the leaves.
[ { "commit_message": "[PATCH] Merge pull request from GHSA-wprv-93r4-jj2p .changeset/shy-crews-teach.md | 5 ++++ contracts/utils/cryptography/MerkleProof.sol | 8 ++++-- test/utils/cryptography/MerkleProof.test.js | 28 +++++++++++++++++--- 3 files changed, 35 insertions(+), 6 deletions(-) create...
CWE-354: Improper Validation of Integrity Check Value
GHSA-v3q9-2p3m-7g43
Token reuse in Ory fosite
null
[ { "commit_message": "[PATCH] Merge pull request from GHSA-v3q9-2p3m-7g43 * u * u client_authentication.go | 26 +++++++++- client_authentication_test.go | 74 ++++++++++++++++++++++++----- client_manager.go | 13 ++++- errors.go | 6 +++ go.mod ...
null
CVE-2022-3783
node-red-dashboard ui_text Format ui-component-ctrl.js cross site scripting
A vulnerability, which was classified as problematic, has been found in node-red-dashboard. This issue affects some unknown processing of the file components/ui-component/ui-component-ctrl.js of the component ui_text Format Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. The name of the patch is 9305d1a82f19b235dfad24a7d1dd4ed244db7743. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-212555.
[ { "commit_message": "[PATCH] Fix ui_text XSS to close #772 CHANGELOG.md | 4 ++ dist/dashboard.appcache | 4 +- dist/js/app.min.js | 4 +- package.json | 2 +- .../ui-component/ui-component-ctrl.js...
CWE-707 Improper Neutralization -> CWE-74 Injection -> CWE-79 Cross Site Scripting
CVE-2024-8374
Arbitrary Code Injection in Cura
UltiMaker Cura slicer versions 5.7.0-beta.1 through 5.7.2 are vulnerable to code injection via the 3MF format reader (/plugins/ThreeMFReader.py). The vulnerability arises from improper handling of the drop_to_buildplate property within 3MF files, which are ZIP archives containing the model data. When a 3MF file is loaded in Cura, the value of the drop_to_buildplate property is passed to the Python eval() function without proper sanitization, allowing an attacker to execute arbitrary code by crafting a malicious 3MF file. This vulnerability poses a significant risk as 3MF files are commonly shared via 3D model databases.
[ { "commit_message": "[PATCH] Drop-to-buildplate/3MF-reading: Simplify boolean parsing. Avoid heavy methods like previously here for a number of reasons. plugins/3MFReader/ThreeMFReader.py | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAyODVhMjQxZWIyOGRhMzE4OGM5NzdmODVkNjg5...
CWE-94
CVE-2022-31890
SQL Injection vulnerability in audit/class.audit.php in osTicket osTicket-plugins before commit a7842d494889fd5533d13deb3c6a7789768795ae via the order parameter to the getOrder function.
[ { "commit_message": "[PATCH] security: Audit Log Injection This mitigates a vulnerability discovered by the AppSec Research Team at Checkmarx where it's possible to perform injection via Audit Log plugin. This is due to passing the `order` URL param directly to the select query. This refactors the `getOrder()` ...
n/a
GHSA-2vp2-8m5j-4rjx
cnlh nps vulnerable to file overwrite by local user
null
[ { "commit_message": "[PATCH] Change to 755, fixes #176 lib/install/install.go | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSA3MTc4YjMzODA3MjBlOTEwZDI4MzAzNmE4ZDM5ODc5YTk0MTA1NTE1IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBmZmRmZ2RmZyA8aGV5aW5ndGluZ2FhYUBnbWFpbC5jb20+CkRh...
null
GHSA-5vp9-2h7g-hxq8
null
[ { "commit_message": "[PATCH] daemon: fix read overflow when parsing CDP addresses NEWS | 4 ++++ src/daemon/protocols/cdp.c | 1 + 2 files changed, 5 insertions(+)", "patch_text_b64": "RnJvbSBhOWFlYWJkZjg3OWMyNWM1ODQ4NTJhMGJiNTUyMzgzNzYzMmYwOTliIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiB...
null
CVE-2022-37247
Craft CMS 4.2.0.1 is vulnerable to stored a cross-site scripting (XSS) via /admin/settings/fields page.
[ { "commit_message": "[PATCH] More XSS vulnerabilities CHANGELOG.md | 2 +- src/helpers/Cp.php | 4 ++-- src/templates/settings/fields/index.twig | 2 +- 3 files changed, 4 insertions(+), 4 deletions(-)", "patch_text_b64": "RnJvbSBjZWRlYmEwNjA5ZTRiMTczY2Q1ODRkYW...
n/a
GHSA-vvj3-85vf-fgmw
global-modules-path Command Injection vulnerability
null
[ { "commit_message": "[PATCH] fix: do not allow command injection Due to usage of execSync, callers may inject commands, like getPath(\"something & touch abc\", \"somethingElse & touch def\"). To fix this, replace execSync with spawnSync, which is safe for command injection. lib/index.js | 27 ++++++++++++--- te...
null
GHSA-pf9q-2ff3-67r4
null
[ { "commit_message": "[PATCH] hw/core/loader: Fix possible crash in rom_copy() Both, \"rom->addr\" and \"addr\" are derived from the binary image that can be loaded with the \"-kernel\" paramer. The code in rom_copy() then calculates: d = dest + (rom->addr - addr); and uses \"d\" as destination in a memcpy() som...
null
GHSA-wqwf-x5cj-rg56
Kubernetes Arbitrary Command Injection
null
[ { "commit_message": "[PATCH] fix smb mount security issue pkg/util/mount/mount_windows.go | 18 ++++++++++++------ 1 file changed, 12 insertions(+), 6 deletions(-)", "patch_text_b64": "RnJvbSAyN2JjODY1Y2MxYmZmYjk3ZDRkZmYzODQ5MmFhOWY4MzBmODU5ZTQ1IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBhbmR5emhhbmd4IDx4aWF6...
null
GHSA-2557-x9mg-76w8
ASA-2024-002: Default `PrepareProposalHandler` may produce invalid proposals when used with default `SenderNonceMempool`
null
[ { "commit_message": "[PATCH] fix(x/auth/vesting): Add BlockedAddr check in `CreatePeriodicVestingAccount` (#19480) x/auth/vesting/msg_server.go | 4 +++ x/auth/vesting/msg_server_test.go | 56 +++++++++++++++++++++++++++++++ 2 files changed, 60 insertions(+)", "patch_text_b64": "RnJvbSBjMDU4NTAyNDFlMmQ2...
null
GHSA-j8g6-2wh7-6439
Apache Tika allows Java code execution for serialized objects embedded in MATLAB files
null
[ { "commit_message": "[PATCH] clean up MatParser tika-parsers/pom.xml | 4 ++-- .../src/main/java/org/apache/tika/parser/mat/MatParser.java | 5 +++++ 2 files changed, 7 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSA4YTY4YjVkNDc0MjA1Y2M5MWNiYmI2MTBkNGExYzA1Y...
null
CVE-2015-3885
Integer overflow in the ljpeg_start function in dcraw 7.00 and earlier allows remote attackers to cause a denial of service (crash) via a crafted image, which triggers a buffer overflow, related to the len variable.
[ { "commit_message": "[PATCH] 0.16.1: fix for dcraw ljpeg_start() vulnerability Changelog.rus | 8 ++++++-- Changelog.txt | 4 ++++ dcraw/dcraw.c | 3 ++- internal/dcraw_common.cpp | 15 ++++++++++++++- internal/dcraw_fileio.cpp | 8 ++++---- libraw/libraw_version.h | 2 +- 6...
n/a
GHSA-hjfh-p8f5-24wr
Fides Webserver API is Vulnerable to OAuth Client Privilege Escalation
null
[ { "commit_message": "[PATCH] Merge commit from fork * working fix * tests and lint fixes * address code duplication * updates per code review * Update CHANGELOG.md * remove uncessary #pylint exception * use constant instead of string for storage:read * fix - should return 403 not 422 * move changelog entries CH...
null
CVE-2024-0217
Packagekitd: use-after-free in idle function callback
A use-after-free flaw was found in PackageKitd. In some conditions, the order of cleanup mechanics for a transaction could be impacted. As a result, some memory access could occur on memory regions that were previously freed. Once freed, a memory region can be reused for other allocations and any previously stored data in this memory region is considered lost.
[ { "commit_message": "[PATCH] pk-transaction: Check that Finished signal is emitted at most once MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit While I haven’t seen it being emitted more than once, the transaction code is quite complex, and it would make things more rob...
Use After Free
CVE-2015-10086
OpenCycleCompass server-php login.php sql injection
A vulnerability, which was classified as critical, was found in OpenCycleCompass server-php. Affected is an unknown function of the file api1/login.php. The manipulation of the argument user leads to sql injection. It is possible to launch the attack remotely. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The name of the patch is fa0d9bcf81c711a88172ad0d37a842f029ac3782. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-221808.
[ { "commit_message": "[PATCH] login.php sql injection prevention api1/login.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBmYTBkOWJjZjgxYzcxMWE4ODE3MmFkMGQzN2E4NDJmMDI5YWMzNzgyIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBSYXBoYWVsIExlaG1hbm4gPHJhcGhhZWxAcmxlaC5kZT4KRGF0ZTo...
CWE-89 SQL Injection
CVE-2022-4523
vexim2 cross site scripting
A vulnerability, which was classified as problematic, has been found in vexim2. This issue affects some unknown processing. The manipulation leads to cross site scripting. The attack may be initiated remotely. The name of the patch is 21c0a60d12e9d587f905cd084b2c70f9b1592065. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-215903.
[ { "commit_message": "[PATCH] Use `htmlspecialchars()` to escape user-provided vars before output Fixes #271 Fixes #272 vexim/adminaliasadd.php | 2 +- vexim/adminaliasdelete.php | 18 +++++++++--------- vexim/adminfail.php | 2 +- vexim/adminfailadd.php | 2 +- vexim/adminfailchange.php | 4 ++-- ...
CWE-707 Improper Neutralization -> CWE-74 Injection -> CWE-79 Cross Site Scripting
GHSA-wmh3-2439-2hpr
null
[ { "commit_message": "[PATCH] Fixed Array.prototype.lastIndexOf() with unicode string as \"this\". Previously, when lastIndexOf() was called with unicode string as \"this\" argument and a negative \"fromIndex\" argument null-pointer dererence might occur because njs_string_offset() was called with invalid index ...
null
CVE-2014-125044
soshtolsus wing-tight index.php file inclusion
A vulnerability, which was classified as critical, was found in soshtolsus wing-tight. This affects an unknown part of the file index.php. The manipulation of the argument p leads to file inclusion. It is possible to initiate the attack remotely. Upgrading to version 1.0.0 is able to address this issue. The patch is named 567bc33e6ed82b0d0179c9add707ac2b257aeaf2. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217515.
[ { "commit_message": "[PATCH] hardened index against malicious ?p= attacks index.php | 13 ++++++++++++- 1 file changed, 12 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA1NjdiYzMzZTZlZDgyYjBkMDE3OWM5YWRkNzA3YWMyYjI1N2FlYWYyIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBhcmhhIDxhcmhhZGV2QGdtYWlsLmNvbT4K...
CWE-73 File Inclusion
GHSA-6fvx-r7hx-3vh6
JavaMelody has XXE via parseSoapMethodName in bull/javamelody/PayloadNameRequestWrapper.java.
null
[ { "commit_message": "[PATCH] fix for security .../java/net/bull/javamelody/PayloadNameRequestWrapper.java | 2 ++ 1 file changed, 2 insertions(+)", "patch_text_b64": "RnJvbSBlZjExMTgyMjU2MmQwYjkzNjViZDNlNjcxYTc1YjY1YmQwNjEzMzUzIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBldmVybmF0IDxldmVybmF0QGZyZWUuZnI+Ck...
null
PYSEC-2021-194
null
[ { "commit_message": "[PATCH] Fix FPE issue in external Eigen source code issue with `tf.raw_ops.SparseMatMul`. PiperOrigin-RevId: 370992919 Change-Id: Icfb276fef5fb40928b27c3e44608d2aca72c9fd7 tensorflow/core/kernels/sparse_matmul_op.cc | 4 ++++ 1 file changed, 4 insertions(+)", "patch_text_b64": "RnJvbSA3Z...
null
CVE-2023-34104
Regex Injection via Doctype Entities
fast-xml-parser is an open source, pure javascript xml parser. fast-xml-parser allows special characters in entity names, which are not escaped or sanitized. Since the entity name is used for creating a regex for searching and replacing entities in the XML body, an attacker can abuse it for denial of service (DoS) attacks. By crafting an entity name that results in an intentionally bad performing regex and utilizing it in the entity replacement step of the parser, this can cause the parser to stall for an indefinite amount of time. This problem has been resolved in v4.2.4. Users are advised to upgrade. Users unable to upgrade should avoid using DOCTYPE parsing by setting the `processEntities: false` option.
[ { "commit_message": "[PATCH] fix security bug spec/entities_spec.js | 18 ++++++++++++++++++ src/xmlparser/DocTypeReader.js | 14 +++++++++++++- 2 files changed, 31 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAzOWIwZTA1MGJiOTA5ZTg0OTk0Nzg2NTdmODRhMzA3NmUzOWNlNzZjIE1vbiBTZXAgMTcgMDA6MDA6MD...
CWE-400: Uncontrolled Resource Consumption
GHSA-gj43-r55q-5h6r
null
[ { "commit_message": "[PATCH] Added untrusted server fetching control WKHTMLtoPDF provides limited control for external fetching so that will now be disabled by default unless ALLOW_UNTRUSTED_SERVER_FETCHING=true is specifically set. This new option will also control DOMPDF fetching. .env.example.complete ...
null
CVE-2018-16974
An issue was discovered in Elefant CMS before 2.0.7. There is a PHP Code Execution Vulnerability in apps/filemanager/upload/drop.php by using /filemanager/api/rm/.htaccess to remove the .htaccess file, and then using a filename that ends in .php followed by space characters (for bypassing the blacklist).
[ { "commit_message": "[PATCH] Fixed filemanager file upload validations, re: #287 apps/filemanager/handlers/embed.php | 4 +++- apps/filemanager/handlers/redactor/upload.php | 4 ++-- apps/filemanager/handlers/upload.php | 4 ++-- apps/filemanager/handlers/upload/drop.php | 4 ++-- apps/fi...
n/a
CVE-2024-45298
Disabled user can bypass lockout by requesting password reset in wiki.js
Wiki.js is an open source wiki app built on Node.js. A disabled user can still gain access to a wiki by abusing the password reset function. While setting up SMTP e-mail's on my server, I tested said e-mails by performing a password reset with my test user. To my shock, not only did it let me reset my password, but after resetting my password I can get into the wiki I was locked out of. The ramifications of this bug is a user can **bypass an account disabling by requesting their password be reset**. All users of wiki.js version `2.5.303` who use any account restrictions and have disabled user are affected. This issue has been addressed in version 2.5.304 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
[ { "commit_message": "[PATCH] fix: prevent password reset on disabled account server/models/users.js | 7 +++++++ 1 file changed, 7 insertions(+)", "patch_text_b64": "RnJvbSBiOWZiMTdkNGQ0YTA5NTZlYzM1ZThjNzNjYzg1MTkyNTUyZmI4ZDE2IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBOaWNvbGFzIEdpYXJkIDxnaXRodWJAbmdwaXhlbC5...
CWE-670: Always-Incorrect Control Flow Implementation
GHSA-m6wp-2r29-6958
null
[ { "commit_message": "[PATCH] 7488 bcopy and bzero should mind signed bits Reviewed by: Jerry Jelinek <jerry.jelinek@joyent.com> Reviewed by: Patrick Mooney <patrick.mooney@joyent.com> Approved by: Richard Lowe <richlowe@richlowe.net> usr/src/uts/intel/ia32/ml/copy.s | 14 +++++++------- 1 file changed, 7 inserti...
null
GHSA-9766-v29c-4vm7
Apache Airflow ODBC Provider Argument Injection vulnerability
null
[ { "commit_message": "[PATCH] Disable setting ODBC driver via extra by default (#31713) By default setting driver via extra is disabled by default but we have several more ways to set it. airflow/providers/odbc/CHANGELOG.rst | 11 +++++++ airflow/providers/odbc/hooks/odbc.py | 28 +++++++++++++--- tests/prov...
null
GHSA-7j98-74jh-cjxh
Privilege escalation for users that can access mock configuration
null
[ { "commit_message": "[PATCH] Make the TemplatedDictionary objects picklable The jinja2 SandboxedEnvironment objects are not guaranteed to be pickle-serializable (even though they practically are). So let's rather store the environment elsewhere than in the TemplatedDictionary object itself to keep it serializa...
null
CVE-2020-7791
Denial of Service (DoS)
This affects the package i18n before 2.1.15. Vulnerability arises out of insufficient handling of erroneous language tags in src/i18n/Concrete/TextLocalizer.cs and src/i18n/LocalizedApplication.cs.
[ { "commit_message": "[PATCH] FIX - NullReferenceException caused by bad langtag #387 src/i18n/Concrete/TextLocalizer.cs | 3 +++ src/i18n/LocalizedApplication.cs | 6 ++++-- 2 files changed, 7 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSBjNDE4ZTMzNDUzMTNkYzg5NmMxOTUxZDhjNDZhYjBiOWIxMmZjYmQzIE1v...
Denial of Service (DoS)
CVE-2022-24771
Improper Verification of Cryptographic Signature in node-forge
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. Prior to version 1.3.0, RSA PKCS#1 v1.5 signature verification code is lenient in checking the digest algorithm structure. This can allow a crafted structure that steals padding bytes and uses unchecked portion of the PKCS#1 encoded message to forge a signature when a low public exponent is being used. The issue has been addressed in `node-forge` version 1.3.0. There are currently no known workarounds.
[ { "commit_message": "[PATCH] Fix signature verification issues. **SECURITY**: Three RSA PKCS#1 v1.5 signature verification issues were reported by Moosa Yahyazadeh (moosa-yahyazadeh@uiowa.edu): - Leniency in checking `digestAlgorithm` structure can lead to signature forgery. - The code is lenient in checking th...
CWE-347: Improper Verification of Cryptographic Signature
CVE-2026-21881
Kanboard is Vulnerable to Reverse Proxy Authentication Bypass
Kanboard is project management software focused on Kanban methodology. Versions 1.2.48 and below is vulnerable to a critical authentication bypass when REVERSE_PROXY_AUTH is enabled. The application blindly trusts HTTP headers for user authentication without verifying the request originated from a trusted reverse proxy. An attacker can impersonate any user, including administrators, by simply sending a spoofed HTTP header. This issue is fixed in version 1.2.49.
[ { "commit_message": "[PATCH] feat: add `TRUSTED_PROXY_NETWORKS` config option Add an IP-based allow list to prevent spoofing of HTTP headers that should only be set by trusted reverse proxies. Note that `TRUSTED_PROXY_NETWORKS` must be configured when `REVERSE_PROXY_AUTH` is enabled. app/Auth/ReverseProxyAuth.p...
CWE-287: Improper Authentication
CVE-2015-7364
The HTML_Quickform library, as used in Revive Adserver before 3.2.2, allows remote attackers to bypass the CSRF protection mechanism via an empty token.
[ { "commit_message": "[PATCH] Fix CVE-2015-7364 Cross-Site Request Forgery (CSRF) Abdullah Hussam Gazi discovered that the CSRF protection mechanism introduced a few years ago to secure the forms generated with the HTML_Quickform library (most fo the forms in Revive Adserver's admin UI) could be easily bypassed ...
n/a
CVE-2023-28459
pretalx 2.3.1 before 2.3.2 allows path traversal in HTML export (a non-default feature). Users were able to upload crafted HTML documents that trigger the reading of arbitrary files.
[ { "commit_message": "[PATCH] Fix path traversal in static HTML export This vulnerability was discovered by Sonar, https://www.sonarsource.com/, who provided a detailled description of the vulnerability, and also the fix as it is applied here. The fix will be backported to the last release, v2.3.1, and released ...
n/a
GHSA-gh5c-3h97-2f3q
Moby Race Condition vulnerability
null
[ { "commit_message": "[PATCH] pkg/streamformatter: Make `progressOutput` concurrency safe MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sync access to the underlying `io.Writer` with a mutex. Signed-off-by: Paweł Gronowski <pawel.gronowski@docker.com> pkg/streamformatt...
null
GHSA-vwx8-qpqh-qwm9
Jenkins Maven Release Plug-in Plugin stored credentials in plain text
null
[ { "commit_message": "[PATCH] [SECURITY-1435] pom.xml | 18 +++++- .../m2release/M2ReleaseBuildWrapper.java | 15 ++--- .../m2release/M2ReleaseBuildWrapperTest.java | 55 +++++++++++++++++++ .../testMigrationOfNexusPassword/config.xml | 2 + ...lugins.m2release.M2Releas...
null
GHSA-jrf8-cmgg-gv2m
Error on unsupported architectures in raw-cpuid
null
[ { "commit_message": "[PATCH] Fix unsound transmutes (fixes #40) Also adding comments explaining why all safety requirements are now met, and explicitly annotating the types of the byte slices. src/lib.rs | 43 ++++++++++++++++++++++--------------------- 1 file changed, 22 insertions(+), 21 deletions(-)", "pa...
null
GHSA-rh9f-gr6q-mpc4
moonshine Stored Cross-Site Scripting Vulnerability in Create Admin
null
[ { "commit_message": "[PATCH] fix: Security issue Escape select options, belongs/morphto and link component src/Laravel/src/Fields/Relationships/BelongsTo.php | 10 ++++++++-- src/Laravel/src/Fields/Relationships/MorphTo.php | 6 +++++- src/Support/src/DTOs/Select/Option.php | 12 ++++++++++-- src/UI...
null
CVE-2024-38529
Admidio Vulnerable to RCE via Arbitrary File Upload in Message Attachment
Admidio is a free, open source user management system for websites of organizations and groups. In Admidio before version 4.3.10, there is a Remote Code Execution Vulnerability in the Message module of the Admidio Application, where it is possible to upload a PHP file in the attachment. The uploaded file can be accessed publicly through the URL `{admidio_base_url}/adm_my_files/messages_attachments/{file_name}`. The vulnerability is caused due to the lack of file extension verification, allowing malicious files to be uploaded to the server and public availability of the uploaded file. This vulnerability is fixed in 4.3.10.
[ { "commit_message": "[PATCH] implement check for filename and file extension .../modules/messages/messages_send.php | 35 ++++++++++++------- 1 file changed, 22 insertions(+), 13 deletions(-)", "patch_text_b64": "RnJvbSA0NDU0YmU5Yjk4NTljNjk0MzFiZmQxY2U4NzY1ZDE4YzhiN2NkNzk5IE1vbiBTZXAgMTcgMDA6MDA6MDAgM...
CWE-434: Unrestricted Upload of File with Dangerous Type
GHSA-56fm-hfp3-x3w3
Wallabag user can disable 2FA unintentionally
null
[ { "commit_message": "[PATCH 1/2] ConfigController: move OTP endpoints to POST method only Fixes GHSA-56fm-hfp3-x3w3 Signed-off-by: Kevin Decherf <kevin@kdecherf.com> .../Controller/ConfigController.php | 38 +++++++++---- .../Form/Type/UserInformationType.php | 9 ---- .../Resources/views/Confi...
null
GHSA-22c2-9gwg-mj59
Langroid has a Code Injection vulnerability in LanceDocChatAgent through vector_store
null
[ { "commit_message": "[PATCH] fixes to code-injection mitigation PR #841 (#850) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit * Update SECURITY.md Security notice * Add eval commands sanitizer Mitigation to avoid most common code injection attack vectors * Sanitizer te...
null
GHSA-wpm6-wgpc-rx23
null
[ { "commit_message": "[PATCH] CVE-2019-19775: Close open redirect in thumbnail view. This closes an open redirect vulnerability, one case of which was found by Graham Bleaney and Ibrahim Mohamed using Pysa. Signed-off-by: Anders Kaseorg <anders@zulipchat.com> zerver/lib/bugdown/__init__.py | 3 ++- zerver/lib/th...
null
GHSA-v74c-qc46-9gg9
Apache Submarine Server Core has a SQL Injection Vulnerability
null
[ { "commit_message": "[PATCH] fix security risk of SQL injection (#1121) .../java/org/apache/submarine/server/SubmarineServer.java | 8 ++++++-- 1 file changed, 6 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSA0ZTY4ODk0YTFjNTRkNzYzYWMyNjk3ZWExYWM5OTM3OTNkYTQxMDdjIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpG...
null
CVE-2021-37704
Exposed phpinfo() in PhpFastCache
PhpFastCache is a high-performance backend cache system (packagist package phpfastcache/phpfastcache). In versions before 6.1.5, 7.1.2, and 8.0.7 the `phpinfo()` can be exposed if the `/vendor` is not protected from public access. This is a rare situation today since the vendor directory is often located outside the web directory or protected via server rule (.htaccess, etc). Only the v6, v7 and v8 will be patched respectively in 8.0.7, 7.1.2, 6.1.5. Older versions such as v5, v4 are not longer supported and will **NOT** be patched. As a workaround, protect the `/vendor` directory from public access.
[ { "commit_message": "[PATCH] Fixed vulnerability issue that cause exposed phpinfo() in some situations. .gitattributes | 3 ++- docs/examples/phpinfo.php | 3 --- 2 files changed, 2 insertions(+), 4 deletions(-) delete mode 100644 docs/examples/phpinfo.php", "patch_text_b64": "RnJvbSA4MjAzOThiZTZhZ...
CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
GHSA-844w-j86r-4x2j
Heap buffer overflow in `UnsortedSegmentSum` in TensorFlow
null
[ { "commit_message": "[PATCH] Fix heap buffer overflow in UnsortedSegmentSum. When Index=int32, data_size and num_segments were truncated from int64 to int32. This truncation can produce negative numbers, which causes UnsortedSegmentFunctor to access out of bounds memory. Also: - Switches some indexing calculati...
null
GHSA-cv75-v3vc-j2vj
null
[ { "commit_message": "[PATCH] Fix kadm5/gssrpc XDR double free [CVE-2014-9421] [MITKRB5-SA-2015-001] In auth_gssapi_unwrap_data(), do not free partial deserialization results upon failure to deserialize. This responsibility belongs to the callers, svctcp_getargs() and svcudp_getargs(); doing it in the unwrap fu...
null
GHSA-m79r-r765-5f9j
Lobe Chat Desktop vulnerable to Remote Code Execution via XSS in Chat Messages
null
[ { "commit_message": "[PATCH] =?UTF-8?q?=F0=9F=90=9B=20fix:=20fix=20svg=20xss=20issue?= =?UTF-8?q?=20(#9313)?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit * fix svg xss * fix svg xss * update * improve * fix packages/utils/package.json | 4 +- pack...
null
CVE-2019-13310
ImageMagick 7.0.8-50 Q16 has memory leaks at AcquireMagickMemory because of an error in MagickWand/mogrify.c.
[ { "commit_message": "[PATCH] https://github.com/ImageMagick/ImageMagick/issues/1616 MagickWand/mogrify.c | 3 +++ MagickWand/operation.c | 5 ++++- 2 files changed, 7 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA1ZjIxMjMwYjY1N2NjZDY1NDUyZGQzZDk0YzViNTQwMWJhNjkxYTJkIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjA...
n/a
GHSA-p9mj-v5mf-m82x
org.xwiki.platform:xwiki-platform-notifications-ui Eval Injection vulnerability
null
[ { "commit_message": "[PATCH] XWIKI-20259: Improve escaping in Notification Preferences Macros .../Code/NotificationsApplicationsPreferencesMacro.xml | 2 +- .../Code/NotificationsAutoWatchPreferencesMacro.xml | 4 ++-- .../NotificationsCustomFiltersPreferencesMacro.xml | 2 +- .../Code/NotificationsEmail...
null
GHSA-cvfg-5hfc-wcq7
null
[ { "commit_message": "[PATCH] Use format string Zend/zend_execute_API.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBiMTAxYTZiYmQ0ZjIxODFjMzYwYmQzOGU3NjgzZGY0YTAzY2JhODNlIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBYaW5jaGVuIEh1aSA8bGFydWVuY2VAZ21haWwuY29tPgpEYXRlOiBTYXQsIDE...
null