id stringlengths 12 19 | title stringlengths 0 237 | description stringlengths 35 3.87k ⌀ | patches listlengths 1 22 | cwe stringlengths 2 440 ⌀ |
|---|---|---|---|---|
GHSA-jp3c-g46v-jg2c | LibreNMS Cross-site Scripting vulnerability | null | [
{
"commit_message": "[PATCH] Fix improperly escaped output in outages page (#15310) Fixes XSS reported by https://huntr.dev/users/hainguyen0207 includes/html/common/outages.inc.php | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)",
"patch_text_b64": "RnJvbSA0OWQ2NmZhMzFiNDNhY2VmMDJlYWEwOWVlOWFmMTVmZ... | null |
GHSA-qqxj-3jqw-xwwx | null | [
{
"commit_message": "[PATCH] CVE-2017-12994/BGP: Move a test inside a loop. MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit The loop can be executed more than once (that's kinda the whole point of a loop), so the check has to be made each time through the loop, not just... | null | |
CVE-2022-39322 | @keystone-6/core vulnerable to field-level access-control bypass for multiselect field | @keystone-6/core is a core package for Keystone 6, a content management system for Node.js. Starting with version 2.2.0 and prior to version 2.3.1, users who expected their `multiselect` fields to use the field-level access control - if configured - are vulnerable to their field-level access control not being used. List-level access control is not affected. Field-level access control for fields other than `multiselect` are not affected. Version 2.3.1 contains a fix for this issue. As a workaround, stop using the `multiselect` field. | [
{
"commit_message": "[PATCH] Fix multiselect field type not propagating common config options (#8007) Co-authored-by: Marek Rybczynski <marek.rybczyn@gmail.com> Co-authored-by: Daniel Cousens <413395+dcousens@users.noreply.github.com> .changeset/two-ghosts-jog.md | 5 +++++ packages/core/s... | CWE-285: Improper Authorization |
GHSA-mh3m-62v7-68xg | TensorFlow vulnerable to `CHECK` fail in `Unbatch` | null | [
{
"commit_message": "[PATCH] Fix check failure in Unbatch Op kernel by checking whether input argument is a scalar before trying to extract value. PiperOrigin-RevId: 461660186 tensorflow/core/kernels/batch_kernels.cc | 7 +++++++ tensorflow/python/ops/batch_ops_test.py | 20 ++++++++++++++++++++ 2 files changed... | null |
PYSEC-2022-155 | null | [
{
"commit_message": "[PATCH] Prevent stack overflow when FunctionLib in GraphDef has a self-recursive function. It is likely that no recursivity is supported, but we should handle this separately. PiperOrigin-RevId: 414860329 Change-Id: I02a2270e86282b37362ddd485eeef16fb986a9e0 tensorflow/cc/saved_model/loader.... | null | |
GHSA-p43c-fp87-rj5p | null | [
{
"commit_message": "[PATCH] Delete CVEs/CVE-2025-33028 (WinZip) directory .../CVE-2025-33028 (WinZip)/CVE-2025-33028.md | 48 ------------------- 1 file changed, 48 deletions(-) delete mode 100644 CVEs/CVE-2025-33028 (WinZip)/CVE-2025-33028.md",
"patch_text_b64": "RnJvbSA1ZTFmZjRlNWY0ZmRiM2YzMmFhYjQ2NWY3YjQ... | null | |
PYSEC-2020-295 | null | [
{
"commit_message": "[PATCH] Prevent segfault in `quantize_and_dequantize` Fixes #42105. If `tf.quantization.quantize_and_dequantize` is called with `axis` argument pointing to outside of the input tensor, we obtain a `CHECK` fail which then aborts the application/interpreter. This change adds a condition check... | null | |
CVE-2020-15270 | Improper session expiration in Parse Server | Parse Server (npm package parse-server) broadcasts events to all clients without checking if the session token is valid. This allows clients with expired sessions to still receive subscription objects. It is not possible to create subscription objects with invalid session tokens. The issue is not patched. | [
{
"commit_message": "[PATCH] Merge pull request from GHSA-2xm2-xj2q-qgpj * Test case and fixes * Change requestTimeout default to 5s * Document new function argument spec/ParseLiveQuery.spec.js | 42 +++++++++++++++++++++++++++ src/LiveQuery/ParseLiveQueryServer.js | 12 ++++---- src/Options/Definitions... | {"CWE-672":"Operation on a Resource after Expiration or Release"} |
CVE-2024-28244 | KaTeX's maxExpand bypassed by Unicode sub/superscripts | KaTeX is a JavaScript library for TeX math rendering on the web. KaTeX users who render untrusted mathematical expressions could encounter malicious input using `\def` or `\newcommand` that causes a near-infinite loop, despite setting `maxExpand` to avoid such loops. KaTeX supports an option named maxExpand which aims to prevent infinitely recursive macros from consuming all available memory and/or triggering a stack overflow error. Unfortunately, support for "Unicode (sub|super)script characters" allows an attacker to bypass this limit. Each sub/superscript group instantiated a separate Parser with its own limit on macro executions, without inheriting the current count of macro executions from its parent. This has been corrected in KaTeX v0.16.10. | [
{
"commit_message": "[PATCH] fix: maxExpand limit with Unicode sub/superscripts * Prevent recursive parser calls from over-expansion * Use this.subparse instead of a recursive parser. * Add maxExpand tests * Lint fix Co-authored-by: Ron Kok <ronkok55@outlook.com> src/Parser.js | 7 ++++--- test/katex-spec.... | CWE-674: Uncontrolled Recursion |
GHSA-vwq9-cmqr-3c8c | Insertion of Sensitive Information into Log File in Jenkins Configuration as Code Plugin | null | [
{
"commit_message": "[PATCH] [SECURITY-1303][SECURITY-1279] integrations/pom.xml | 14 ++ .../jenkins/plugins/casc/CredentialsTest.java | 27 +++ .../io/jenkins/plugins/casc/MailExtTest.java | 46 +++++ .../plugins/casc/SSHCredentialsTest.java | 66 +++++++ .../io/jenkins/plugins/... | null |
GHSA-q485-j897-qc27 | XML External Entity Reference in mchange:c3p0 | null | [
{
"commit_message": "[PATCH] Repair XXE vulnerability at initialization src/java/com/mchange/v2/c3p0/cfg/C3P0ConfigXmlUtils.java | 1 + 1 file changed, 1 insertion(+)",
"patch_text_b64": "RnJvbSAyZWIwZWE5N2Y3NDU3NDBiMThkZDQ1ZTRhOTA5MTEyZDQ2ODVmODdiIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiB6aHV0b3VnZyA8emh1d... | null |
GHSA-w4v7-hwx7-9929 | Cross-site Scripting in tempura | null | [
{
"commit_message": "[PATCH] break: ensure `esc` always returns a string; - prevents a XSS attack within an array docs/api.md | 8 ++++++-- src/$index.js | 2 +- src/index.d.ts | 2 +- test/$index.js | 25 +++++++++++++++---------- 4 files changed, 23 insertions(+), 14 deletions(-)",
"patch_text_b64": "R... | null |
GHSA-fphp-jmfp-4vj9 | null | [
{
"commit_message": "[PATCH] Fix integer overflow in gdImageWebpCtx Integer overflow can be happened in expression gdImageSX(im) * 4 * gdImageSY(im). It could lead to heap buffer overflow in the following code. This issue has been reported to the PHP Bug Tracking System. The proof-of-concept file will be suppli... | null | |
CVE-2023-3532 | Cross-site Scripting (XSS) - Stored in outline/outline | Cross-site Scripting (XSS) - Stored in GitHub repository outline/outline prior to 0.70.1. | [
{
"commit_message": "[PATCH] 0.70.1 package.json | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSA5NDMxZGY0NWMyMTBlODViNzdjZDI3ZjJmZmFmMDM1OGI4MzdhZmEzIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBUb20gTW9vciA8dG9tLm1vb3JAZ21haWwuY29tPgpEYXRlOiBUaHUsIDYgSnVsIDIwMjMgMjI6MDA6MzkgL... | CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') |
GHSA-4cxm-8xrj-7c53 | null | [
{
"commit_message": "[PATCH] TROVE-2017-005: Fix assertion failure in connection_edge_process_relay_cell On an hidden service rendezvous circuit, a BEGIN_DIR could be sent (maliciously) which would trigger a tor_assert() because connection_edge_process_relay_cell() thought that the circuit is an or_circuit_t bu... | null | |
GHSA-38jw-g2qx-4286 | KubeVirt Affected by an Authentication Bypass in Kubernetes Aggregation Layer | null | [
{
"commit_message": "[PATCH] SetupTLSWithCertManager now enforces CN The CNs will be provided by Kubernetes. If empty, any client certificate validated by the authority is allowed. Signed-off-by: Luboslav Pivarc <lpivarc@redhat.com> pkg/util/tls/tls.go | 30 +++++++++++++++++++++++++++++- pkg/util/tls/tls_t... | null |
GHSA-9xqg-wjcv-qqxq | null | [
{
"commit_message": "[PATCH] patch 8.2.4895: buffer overflow with invalid command with composing chars Problem: Buffer overflow with invalid command with composing chars. Solution: Check that the whole character fits in the buffer. src/ex_docmd.c | 4 +++- src/testdir/test_cmdline.vim | 11 ++... | null | |
GHSA-7wph-fc4w-wqp2 | Improper date handling in Django | null | [
{
"commit_message": "[PATCH] [1.1.X] Fix a security issue in the auth system. Disclosure and new release forthcoming. git-svn-id: http://code.djangoproject.com/svn/django/branches/releases/1.1.X@15036 bcc190cf-cafb-0310-a4f2-bffc1f526a37 django/contrib/auth/tests/tokens.py | 5 +++++ django/contrib/auth/urls.py ... | null |
CVE-2015-10093 | Mark User as Spammer Plugin plugin.php user_row_actions cross site scripting | A vulnerability was found in Mark User as Spammer Plugin 1.0.0/1.0.1 on WordPress. It has been declared as problematic. Affected by this vulnerability is the function user_row_actions of the file plugin/plugin.php. The manipulation of the argument url leads to cross site scripting. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. Upgrading to version 1.0.2 is able to address this issue. The identifier of the patch is e7059727274d2767c240c55c02c163eaa4ba6c62. It is recommended to upgrade the affected component. The identifier VDB-222325 was assigned to this vulnerability. | [
{
"commit_message": "[PATCH] Prevent XSS with esc_url() in old WordPress versions and prepare for using URL as href attr. 4.2 pass URL to urlencode() and strip all \"bad\" symbols from URL. plugin/plugin.php | 10 +++++++++- 1 file changed, 9 insertions(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSBlNzA1OTcy... | CWE-79 Cross Site Scripting |
GHSA-g4c6-5qcw-3c6v | null | [
{
"commit_message": "[PATCH] fix unchecked length in stb_vorbis that could crash on corrupt/invalid files stb_vorbis.c | 23 ++++++++++++++++++----- 1 file changed, 18 insertions(+), 5 deletions(-)",
"patch_text_b64": "RnJvbSAyNDRkODNiYzNkODU5MjkzZjU1ODEyZDQ4YjNkYjE2OGU1ODFmNmFiIE1vbiBTZXAgMTcgMDA6MDA6MDAgMj... | null | |
CVE-2014-3535 | include/linux/netdevice.h in the Linux kernel before 2.6.36 incorrectly uses macros for netdev_printk and its related logging implementation, which allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) by sending invalid packets to a VxLAN interface. | [
{
"commit_message": "[PATCH] netdevice.h net/core/dev.c: Convert netdev_<level> logging macros to functions Reduces an x86 defconfig text and data ~2k. text is smaller, data is larger. $ size vmlinux* text\t data\t bss\t dec\t hex\tfilename 7198862\t 720112\t1366288\t9285262\t 8dae8e\tvmlinux 7205273... | n/a | |
GHSA-f352-cwm8-5w9w | null | [
{
"commit_message": "[PATCH] Fix potential buffer overflow in ec_glob (#87) CVE-2023-0341 Co-authored-by: David Fernandez Gonzalez <david.fernandezgonzalez@canonical.com> src/lib/ec_glob.c | 25 ++++++++++++++++--------- 1 file changed, 16 insertions(+), 9 deletions(-)",
"patch_text_b64": "RnJvbSA0MTI4MWVhOD... | null | |
CVE-2025-9300 | saitoha libsixel img2sixel encoder.c sixel_debug_print_palette stack-based overflow | A vulnerability was found in saitoha libsixel up to 1.10.3. Affected by this issue is the function sixel_debug_print_palette of the file src/encoder.c of the component img2sixel. The manipulation results in stack-based buffer overflow. The attack must be initiated from a local position. The exploit has been made public and could be used. The patch is identified as 316c086e79d66b62c0c4bc66229ee894e4fdb7d1. Applying a patch is advised to resolve this issue. | [
{
"commit_message": "[PATCH] Fix a heap-buffer-overflow problem reported by @err2zero Makefile.am | 3 +++ Makefile.in | 5 ++++- converters/Makefile.am | 5 +++-- converters/Makefile.in ... | Stack-based Buffer Overflow |
GHSA-3x6m-jc93-26vq | null | [
{
"commit_message": "[PATCH] Fix crash when mapping a big memory and calling uc_close qemu/exec.c | 21 ++- qemu/include/qemu/atomic.h | 53 +++++++ qemu/include/qemu/rcu_queue.h | 268 ++++++++++++++++++++++++++++++++++ qemu/softmmu/memory.c | 6 +- tests/unit/test_mem.c | ... | null | |
GHSA-wpg8-mf6h-gm92 | Apache Airflow Incorrect Authorization vulnerability | null | [
{
"commit_message": "[PATCH] Add read only validation to read only fields (#33413) * Add read only validation to read only fields Add read only validation to DagRunEditForm and TaskInstanceEditForm read only fields. * Improve docstring Co-authored-by: Hussein Awala <hussein@awala.fr> (cherry picked from commit ... | null |
GHSA-62gc-8jr5-x9pm | Apache InLong Deserialization of Untrusted Data Vulnerability | null | [
{
"commit_message": "[PATCH] [INLONG-11585][Manager] Support JDBC verification under dual write parameters (#11586) .../pojo/util/MySQLSensitiveUrlUtils.java | 18 +++++++++++++++--- .../pojo/sink/mysql/MySQLSinkDTOTest.java | 4 ++++ .../cluster/InlongClusterServiceImpl.java | 4 ++-- .../pulsar... | null |
GHSA-xg73-94fp-g449 | mlflow is vulnerable to remote file access in `mlflow server` and `mlflow ui` CLIs | null | [
{
"commit_message": "[PATCH] Apply suggestions from code review Co-authored-by: Ben Wilson <39283302+BenWilson2@users.noreply.github.com> Signed-off-by: Harutaka Kawamura <hkawamura0130@gmail.com> mlflow/server/handlers.py | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)",
"patch_text_b64": "RnJvbSA... | null |
GHSA-mw39-9qc2-f7mg | Rancher exposes sensitive information through audit logs | null | [
{
"commit_message": "[PATCH] Improve how auditlog handles specific redactions (#52301) pkg/auth/audit/default.go | 2 +- pkg/auth/audit/default_test.go | 590 +++++++++++++++++---------------- pkg/auth/audit/redact.go | 2 +- 3 files changed, 301 insertions(+), 293 deletions(-)",
"patch_text_b64... | null |
GHSA-8982-pcm5-6hpj | null | [
{
"commit_message": "[PATCH] Fixed issue #19099: [security] XSS vulnerability caused by themeOptions/importManifest (#3483) Co-authored-by: Denis Chenu <shnoulle@localhost.localdomain> application/models/TemplateConfiguration.php | 16 ++++++++++------ .../views/admin/globalsettings/_general.php | 8 +... | null | |
GHSA-442w-2rxq-q6gc | null | [
{
"commit_message": "[PATCH] ... MagickCore/draw.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSBlY2Y3YzZiMjg4ZTExZTdlN2Y3NTM4N2M1ZTllOTNlNDIzYjk4Mzk3IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBDcmlzdHkgPHVyYmFuLXdhcnJpb3JAaW1hZ2VtYWdpY2sub3JnPgpEYXRlOiBTdW4sIDE4IEF1ZyAyM... | null | |
CVE-2023-0650 | YAFNET Signature cross site scripting | A vulnerability was found in YAFNET up to 3.1.11 and classified as problematic. This issue affects some unknown processing of the component Signature Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.1.12 is able to address this issue. The identifier of the patch is a1442a2bacc3335461b44c250e81f8d99c60735f. It is recommended to upgrade the affected component. The identifier VDB-220037 was assigned to this vulnerability. | [
{
"commit_message": "[PATCH] [FIXED] Stored XSS in Signature CHANGES.md | 3 ++ yafsrc/YAF.NET-MySql.sln | 48 ------------------- yafsrc/YAF.NET-PostgreSQL.sln | 48 ------------------- yafsrc/YAF.NET-SqlServer.sln | 48 ----... | CWE-79 Cross Site Scripting |
GHSA-qwc8-vjh3-gm2j | YetiForce CRM vulnerable to stored Cross-site Scripting via WorkFlow module | null | [
{
"commit_message": "[PATCH] Improved worflow panel config/version.php | 2 +- .../Workflows/AdvanceFilterCondition.tpl | 8 +- .../Settings/Workflows/CreateEntity.tpl | 50 ++++---- .../modules/Settings/Workflows/EditTask.tpl | 10 +- .../Settings/Workflows/FieldExpres... | null |
CVE-2021-41243 | OS Command Injection Vulnerability and Potential Zip Slip Vulnerability | There is a Potential Zip Slip Vulnerability and OS Command Injection Vulnerability on the management system of baserCMS. Users with permissions to upload files may upload crafted zip files which may execute arbitrary commands on the host operating system. This is a vulnerability that needs to be addressed when the management system is used by an unspecified number of users. If you are eligible, please update to the new version as soon as possible. | [
{
"commit_message": "[PATCH] Merge pull request from GHSA-7rpc-9m88-cf9w MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit * 固定ページプレビュー実行時に入力内容検証を追加 * SimpleZipの利用を停止しZipArchiveの利用に切り替え * 不要コード除去 * BcZip利用時、ZipArchiveをopenしていない場合エラーログが出力される問題を改善 .../admin-third/Installati... | CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') |
CVE-2025-64721 | Sandboxie's Integer Overflow in SbieIniServer::RC4Crypt allows sandbox escape and SYSTEM compromise | Sandboxie is a sandbox-based isolation software for 32-bit and 64-bit Windows NT-based operating systems. In versions 1.16.6 and below, the SYSTEM-level service SbieSvc.exe exposes SbieIniServer::RC4Crypt to sandboxed processes. The handler adds a fixed header size to a caller-controlled value_len without overflow checking. A large value_len (e.g., 0xFFFFFFF0) wraps the allocation size, causing a heap overflow when attacker data is copied into the undersized buffer. This allows sandboxed processes to execute arbitrary code as SYSTEM, fully compromising the host. This issue is fixed in version 1.16.7. | [
{
"commit_message": "[PATCH 1/2] 1.16.7 CHANGELOG.md | 2 ++ Sandboxie/core/svc/sbieiniserver.cpp | 3 +++ 2 files changed, 5 insertions(+)",
"patch_text_b64": "RnJvbSAwOGJjOTgwMzM5OWUwM2UwMDhiNzRjM2FjNGUxYThkZjY4Y2ZjYjllIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBEYXZpZFhhbmF0b3MgPHhhb... | CWE-190: Integer Overflow or Wraparound |
CVE-2022-2309 | NULL Pointer Dereference in lxml/lxml | NULL Pointer Dereference allows attackers to cause a denial of service (or application crash). This only applies when lxml is used together with libxml2 2.9.10 through 2.9.14. libxml2 2.9.9 and earlier are not affected. It allows triggering crashes through forged input data, given a vulnerable code sequence in the application. The vulnerability is caused by the iterwalk function (also used by the canonicalize function). Such code shouldn't be in wide-spread use, given that parsing + iterwalk would usually be replaced with the more efficient iterparse function. However, an XML converter that serialises to C14N would also be vulnerable, for example, and there are legitimate use cases for this code sequence. If untrusted input is received (also remotely) and processed via iterwalk function, a crash can be triggered. | [
{
"commit_message": "[PATCH] Fix a crash when incorrect parser input occurs together with usages of iterwalk() on trees generated by the same parser. src/lxml/apihelpers.pxi | 7 ++++--- src/lxml/iterparse.pxi | 11 ++++++----- src/lxml/tests/test_etree.py | 20 ++++++++++++++++++++ 3 files changed, 30... | CWE-476 NULL Pointer Dereference |
GHSA-f432-537h-hwj6 | null | [
{
"commit_message": "[PATCH] fixed out of bounds writes Thanks to Eric Sesterhenn from X41 D-SEC GmbH for reporting the problems. src/libopensc/card-cac.c | 2 +- src/libopensc/card-epass2003.c | 3 ++- src/libopensc/card-muscle.c | 7 +++++-- src/libopensc/card-tcos.c | 6 +++--- src/libo... | null | |
GHSA-hwjv-mc78-cccj | Moodle multiple cross-site scripting (XSS) vulnerabilities | null | [
{
"commit_message": "[PATCH] MDL-46042 badges: Clean up external badge data Signed-off-by: Yuliya Bozhko <yuliya.bozhko@totaralms.com> badges/renderer.php | 29 +++++++++++++++-------------- 1 file changed, 15 insertions(+), 14 deletions(-)",
"patch_text_b64": "RnJvbSAwMTc0YTBhNTdmNmQ4NGUyNDBkZDBiYzBkZjBmZmE... | null |
CVE-2021-32838 | Regular Expression Denial of Service in flask-restx | Flask-RESTX (pypi package flask-restx) is a community driven fork of Flask-RESTPlus. Flask-RESTX before version 0.5.1 is vulnerable to ReDoS (Regular Expression Denial of Service) in email_regex. This is fixed in version 0.5.1. | [
{
"commit_message": "[PATCH] optimize email regex (credits: @kevinbackhouse, fix: #372) flask_restx/inputs.py | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSBiYWIzMWUwODVmMzU1ZGQ3Mzg1OGZkMzcxNWY3ZWQ3MTg0OTY1NmRhIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiB6aWlyaXNoIDx6aWlyaXNo... | CWE-400 Uncontrolled Resource Consumption |
CVE-2020-26247 | XXE in Nokogiri | Nokogiri is a Rubygem providing HTML, XML, SAX, and Reader parsers with XPath and CSS selector support. In Nokogiri before version 1.11.0.rc4 there is an XXE vulnerability. XML Schemas parsed by Nokogiri::XML::Schema are trusted by default, allowing external resources to be accessed over the network, potentially enabling XXE or SSRF attacks. This behavior is counter to the security policy followed by Nokogiri maintainers, which is to treat all input as untrusted by default whenever possible. This is fixed in Nokogiri version 1.11.0.rc4. | [
{
"commit_message": "[PATCH] feat: XML::Schema and RelaxNG creation accept optional ParseOptions I'm trying out a new pattern, which is that the parsed object carries around the ParseOptions it was created with, which should make some testing a bit easier. I'm also not implementing the \"config block\" pattern ... | CWE-611: Improper Restriction of XML External Entity Reference |
GHSA-qff9-r3c8-wgm2 | null | [
{
"commit_message": "[PATCH] Bug #93, fix for security vulnerability in `Timedtext` controller * https://iet.eu.teamwork.com/desk/#/tickets/366419 application/controllers/timedtext.php | 6 ++++++ 1 file changed, 6 insertions(+)",
"patch_text_b64": "RnJvbSAzZjM5ZjJkNjhkMTE4OTU5MjljMDRmN2I0OWI5N2E3MzRhZTdjZDF... | null | |
GHSA-cj88-88mr-972w | glob-parent 6.0.0 vulnerable to Regular Expression Denial of Service | null | [
{
"commit_message": "[PATCH] fix!: Correct mishandled escaped path separators (#34) Closes #32 index.js | 2 +- test/index.test.js | 8 ++++---- 2 files changed, 5 insertions(+), 5 deletions(-)",
"patch_text_b64": "RnJvbSAzMmY2ZDUyNjYzYjdhZGRhYzM4ZDBkZmY1NzBkODEyN2VkZjAzZjQ3IE1vbiBTZXAgMTcgMDA6MDA6M... | null |
CVE-2025-62426 | vLLM vulnerable to DoS via large Chat Completion or Tokenization requests with specially crafted `chat_template_kwargs` | vLLM is an inference and serving engine for large language models (LLMs). From version 0.5.5 to before 0.11.1, the /v1/chat/completions and /tokenize endpoints allow a chat_template_kwargs request parameter that is used in the code before it is properly validated against the chat template. With the right chat_template_kwargs parameters, it is possible to block processing of the API server for long periods of time, delaying all other requests. This issue has been patched in version 0.11.1. | [
{
"commit_message": "[PATCH] [Frontend] Enforce tokenize=False when applying chat template (#27205) Signed-off-by: Isotr0py <mozf@mail2.sysu.edu.cn> Co-authored-by: Isotr0py <mozf@mail2.sysu.edu.cn> tests/entrypoints/test_chat_utils.py | 12 +++++++++++ vllm/entrypoints/chat_utils.py | 31 +++++++++++++++++... | CWE-770: Allocation of Resources Without Limits or Throttling |
GHSA-2hw3-h8qx-hqqp | OpenList (frontend) allows XSS Attacks in the built-in Markdown Viewer | null | [
{
"commit_message": "[PATCH] fix: XSS issue reported src/pages/home/previews/markdown_with_word_wrap.tsx | 9 ++++++++- 1 file changed, 8 insertions(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSA3YjVlZDIwYzYwOGM3YjliMzZkMTk1MGEzODY2NzhlMGE4OWY4MTc1IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBIYW50b25nIENoZW4gP... | null |
CVE-2020-11071 | False-negative validation results in MINT transactions with invalid baton | SLPJS (npm package slpjs) before version 0.27.2, has a vulnerability where users could experience false-negative validation outcomes for MINT transaction operations. A poorly implemented SLP wallet could allow spending of the affected tokens which would result in the destruction of a user's minting baton. This is fixed in version 0.27.2. | [
{
"commit_message": "[PATCH] fix false negative case for MINT transactions See the newly added unit test case for this issue. Currently there are 151 unit tests. lib/localvalidator.ts | 16 ++++++++++------ 1 file changed, 10 insertions(+), 6 deletions(-)",
"patch_text_b64": "RnJvbSAzNjcxYmUyZmZiNmQ0Y2ZhOTRj... | CWE-697: Incorrect Comparison |
GHSA-8wr4-2wm6-w3pr | B2 Command Line Tool TOCTOU application key disclosure | null | [
{
"commit_message": "[PATCH] Release v3.2.1 CHANGELOG.md | 10 ++++++++-- requirements.txt | 2 +- 2 files changed, 9 insertions(+), 3 deletions(-)",
"patch_text_b64": "RnJvbSBjNzQwMjlmOWY3NTA2NWU4ZjdlM2MzZWM4ZTBhMjNmYjgyMDRmZWViIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBQYXdlbCBQb2xld2ljeiA8cC5wb2xld2lj... | null |
GHSA-vr7q-737x-h8wj | null | [
{
"commit_message": "[PATCH] patch 9.0.1189: invalid memory access with folding and using \"L\" Problem: Invalid memory access with folding and using \"L\". Solution: Prevent the cursor from moving to line zero. src/normal.c | 3 ++- src/testdir/test_fold.vim | 8 ++++++++ src/version.c ... | null | |
CVE-2016-15015 | viafintech Barzahlen Payment Module PHP SDK Webhook.php verify timing discrepancy | A vulnerability, which was classified as problematic, was found in viafintech Barzahlen Payment Module PHP SDK up to 2.0.0. Affected is the function verify of the file src/Webhook.php. The manipulation leads to observable timing discrepancy. The complexity of an attack is rather high. The exploitability is told to be difficult. Upgrading to version 2.0.1 is able to address this issue. The patch is identified as 3e7d29dc0ca6c054a6d6e211f32dae89078594c1. It is recommended to upgrade the affected component. VDB-217650 is the identifier assigned to this vulnerability. | [
{
"commit_message": "[PATCH] Fixed timing attack vulnerability src/Middleware.php | 26 ++++++++++++++++++++++++++ src/Webhook.php | 2 +- tests/MiddlewareTest.php | 24 ++++++++++++++++++++++++ 3 files changed, 51 insertions(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSAzZTdkMjlkYzBjYTZjMDU0YT... | CWE-208 Observable Timing Discrepancy |
GHSA-vx9g-377x-xwxq | Server side request forgery in gibbon | null | [
{
"commit_message": "[PATCH] Ensure we raise if the root domain changed and it was not an expected behavior lib/gibbon/api_request.rb | 2 ++ spec/gibbon/gibbon_spec.rb | 8 +++++++- 2 files changed, 9 insertions(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSBiMmViOTllZDMwNGQ3NDkxYTZkMzQ4YTViYmRjODNhMDA4ZmM2Z... | null |
GHSA-75pc-qvwc-jf3g | Improper Input Validation in HashiCorp Vault | null | [
{
"commit_message": "[PATCH] bug: service account key should use config ttl (#85) * bug: service account key should use config ttl * Use configured TTL unless overridden by request * update makefile * code cleanup Co-authored-by: catsby <clint@ctshryock.com> Makefile | 4 +- plugin... | null |
GHSA-2xc2-rj8c-xgm7 | null | [
{
"commit_message": "[PATCH] fix: [security] Further fixes to the bruteforce handling - resolved a potential failure of the subsystem when the MySQL and the webserver time settings are diverged - as reported by Dawid Czarnecki - several tightenings of the checks to avoid potential foul play app/Controller/Users... | null | |
CVE-2023-34459 | OpenZeppelin Contracts's MerkleProof multiproofs may allow proving arbitrary leaves for specific trees | OpenZeppelin Contracts is a library for smart contract development. Starting in version 4.7.0 and prior to version 4.9.2, when the `verifyMultiProof`, `verifyMultiProofCalldata`, `procesprocessMultiProof`, or `processMultiProofCalldat` functions are in use, it is possible to construct merkle trees that allow forging a valid multiproof for an arbitrary set of leaves.
A contract may be vulnerable if it uses multiproofs for verification and the merkle tree that is processed includes a node with value 0 at depth 1 (just under the root). This could happen inadvertedly for balanced trees with 3 leaves or less, if the leaves are not hashed. This could happen deliberately if a malicious tree builder includes such a node in the tree.
A contract is not vulnerable if it uses single-leaf proving (`verify`, `verifyCalldata`, `processProof`, or `processProofCalldata`), or if it uses multiproofs with a known tree that has hashed leaves. Standard merkle trees produced or validated with the @openzeppelin/merkle-tree library are safe.
The problem has been patched in version 4.9.2.
Some workarounds are available. For those using multiproofs: When constructing merkle trees hash the leaves and do not insert empty nodes in your trees. Using the @openzeppelin/merkle-tree package eliminates this issue. Do not accept user-provided merkle roots without reconstructing at least the first level of the tree. Verify the merkle tree structure by reconstructing it from the leaves. | [
{
"commit_message": "[PATCH] Merge pull request from GHSA-wprv-93r4-jj2p .changeset/shy-crews-teach.md | 5 ++++ contracts/utils/cryptography/MerkleProof.sol | 8 ++++-- test/utils/cryptography/MerkleProof.test.js | 28 +++++++++++++++++--- 3 files changed, 35 insertions(+), 6 deletions(-) create... | CWE-354: Improper Validation of Integrity Check Value |
GHSA-v3q9-2p3m-7g43 | Token reuse in Ory fosite | null | [
{
"commit_message": "[PATCH] Merge pull request from GHSA-v3q9-2p3m-7g43 * u * u client_authentication.go | 26 +++++++++- client_authentication_test.go | 74 ++++++++++++++++++++++++----- client_manager.go | 13 ++++- errors.go | 6 +++ go.mod ... | null |
CVE-2022-3783 | node-red-dashboard ui_text Format ui-component-ctrl.js cross site scripting | A vulnerability, which was classified as problematic, has been found in node-red-dashboard. This issue affects some unknown processing of the file components/ui-component/ui-component-ctrl.js of the component ui_text Format Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. The name of the patch is 9305d1a82f19b235dfad24a7d1dd4ed244db7743. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-212555. | [
{
"commit_message": "[PATCH] Fix ui_text XSS to close #772 CHANGELOG.md | 4 ++ dist/dashboard.appcache | 4 +- dist/js/app.min.js | 4 +- package.json | 2 +- .../ui-component/ui-component-ctrl.js... | CWE-707 Improper Neutralization -> CWE-74 Injection -> CWE-79 Cross Site Scripting |
CVE-2024-8374 | Arbitrary Code Injection in Cura | UltiMaker Cura slicer versions 5.7.0-beta.1 through 5.7.2 are vulnerable to code injection via the 3MF format reader (/plugins/ThreeMFReader.py). The vulnerability arises from improper handling of the drop_to_buildplate property within 3MF files, which are ZIP archives containing the model data. When a 3MF file is loaded in Cura, the value of the drop_to_buildplate property is passed to the Python eval() function without proper sanitization, allowing an attacker to execute arbitrary code by crafting a malicious 3MF file. This vulnerability poses a significant risk as 3MF files are commonly shared via 3D model databases. | [
{
"commit_message": "[PATCH] Drop-to-buildplate/3MF-reading: Simplify boolean parsing. Avoid heavy methods like previously here for a number of reasons. plugins/3MFReader/ThreeMFReader.py | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSAyODVhMjQxZWIyOGRhMzE4OGM5NzdmODVkNjg5... | CWE-94 |
CVE-2022-31890 | SQL Injection vulnerability in audit/class.audit.php in osTicket osTicket-plugins before commit a7842d494889fd5533d13deb3c6a7789768795ae via the order parameter to the getOrder function. | [
{
"commit_message": "[PATCH] security: Audit Log Injection This mitigates a vulnerability discovered by the AppSec Research Team at Checkmarx where it's possible to perform injection via Audit Log plugin. This is due to passing the `order` URL param directly to the select query. This refactors the `getOrder()` ... | n/a | |
GHSA-2vp2-8m5j-4rjx | cnlh nps vulnerable to file overwrite by local user | null | [
{
"commit_message": "[PATCH] Change to 755, fixes #176 lib/install/install.go | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)",
"patch_text_b64": "RnJvbSA3MTc4YjMzODA3MjBlOTEwZDI4MzAzNmE4ZDM5ODc5YTk0MTA1NTE1IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBmZmRmZ2RmZyA8aGV5aW5ndGluZ2FhYUBnbWFpbC5jb20+CkRh... | null |
GHSA-5vp9-2h7g-hxq8 | null | [
{
"commit_message": "[PATCH] daemon: fix read overflow when parsing CDP addresses NEWS | 4 ++++ src/daemon/protocols/cdp.c | 1 + 2 files changed, 5 insertions(+)",
"patch_text_b64": "RnJvbSBhOWFlYWJkZjg3OWMyNWM1ODQ4NTJhMGJiNTUyMzgzNzYzMmYwOTliIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiB... | null | |
CVE-2022-37247 | Craft CMS 4.2.0.1 is vulnerable to stored a cross-site scripting (XSS) via /admin/settings/fields page. | [
{
"commit_message": "[PATCH] More XSS vulnerabilities CHANGELOG.md | 2 +- src/helpers/Cp.php | 4 ++-- src/templates/settings/fields/index.twig | 2 +- 3 files changed, 4 insertions(+), 4 deletions(-)",
"patch_text_b64": "RnJvbSBjZWRlYmEwNjA5ZTRiMTczY2Q1ODRkYW... | n/a | |
GHSA-vvj3-85vf-fgmw | global-modules-path Command Injection vulnerability | null | [
{
"commit_message": "[PATCH] fix: do not allow command injection Due to usage of execSync, callers may inject commands, like getPath(\"something & touch abc\", \"somethingElse & touch def\"). To fix this, replace execSync with spawnSync, which is safe for command injection. lib/index.js | 27 ++++++++++++--- te... | null |
GHSA-pf9q-2ff3-67r4 | null | [
{
"commit_message": "[PATCH] hw/core/loader: Fix possible crash in rom_copy() Both, \"rom->addr\" and \"addr\" are derived from the binary image that can be loaded with the \"-kernel\" paramer. The code in rom_copy() then calculates: d = dest + (rom->addr - addr); and uses \"d\" as destination in a memcpy() som... | null | |
GHSA-wqwf-x5cj-rg56 | Kubernetes Arbitrary Command Injection | null | [
{
"commit_message": "[PATCH] fix smb mount security issue pkg/util/mount/mount_windows.go | 18 ++++++++++++------ 1 file changed, 12 insertions(+), 6 deletions(-)",
"patch_text_b64": "RnJvbSAyN2JjODY1Y2MxYmZmYjk3ZDRkZmYzODQ5MmFhOWY4MzBmODU5ZTQ1IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBhbmR5emhhbmd4IDx4aWF6... | null |
GHSA-2557-x9mg-76w8 | ASA-2024-002: Default `PrepareProposalHandler` may produce invalid proposals when used with default `SenderNonceMempool` | null | [
{
"commit_message": "[PATCH] fix(x/auth/vesting): Add BlockedAddr check in `CreatePeriodicVestingAccount` (#19480) x/auth/vesting/msg_server.go | 4 +++ x/auth/vesting/msg_server_test.go | 56 +++++++++++++++++++++++++++++++ 2 files changed, 60 insertions(+)",
"patch_text_b64": "RnJvbSBjMDU4NTAyNDFlMmQ2... | null |
GHSA-j8g6-2wh7-6439 | Apache Tika allows Java code execution for serialized objects embedded in MATLAB files | null | [
{
"commit_message": "[PATCH] clean up MatParser tika-parsers/pom.xml | 4 ++-- .../src/main/java/org/apache/tika/parser/mat/MatParser.java | 5 +++++ 2 files changed, 7 insertions(+), 2 deletions(-)",
"patch_text_b64": "RnJvbSA4YTY4YjVkNDc0MjA1Y2M5MWNiYmI2MTBkNGExYzA1Y... | null |
CVE-2015-3885 | Integer overflow in the ljpeg_start function in dcraw 7.00 and earlier allows remote attackers to cause a denial of service (crash) via a crafted image, which triggers a buffer overflow, related to the len variable. | [
{
"commit_message": "[PATCH] 0.16.1: fix for dcraw ljpeg_start() vulnerability Changelog.rus | 8 ++++++-- Changelog.txt | 4 ++++ dcraw/dcraw.c | 3 ++- internal/dcraw_common.cpp | 15 ++++++++++++++- internal/dcraw_fileio.cpp | 8 ++++---- libraw/libraw_version.h | 2 +- 6... | n/a | |
GHSA-hjfh-p8f5-24wr | Fides Webserver API is Vulnerable to OAuth Client Privilege Escalation | null | [
{
"commit_message": "[PATCH] Merge commit from fork * working fix * tests and lint fixes * address code duplication * updates per code review * Update CHANGELOG.md * remove uncessary #pylint exception * use constant instead of string for storage:read * fix - should return 403 not 422 * move changelog entries CH... | null |
CVE-2024-0217 | Packagekitd: use-after-free in idle function callback | A use-after-free flaw was found in PackageKitd. In some conditions, the order of cleanup mechanics for a transaction could be impacted. As a result, some memory access could occur on memory regions that were previously freed. Once freed, a memory region can be reused for other allocations and any previously stored data in this memory region is considered lost. | [
{
"commit_message": "[PATCH] pk-transaction: Check that Finished signal is emitted at most once MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit While I haven’t seen it being emitted more than once, the transaction code is quite complex, and it would make things more rob... | Use After Free |
CVE-2015-10086 | OpenCycleCompass server-php login.php sql injection | A vulnerability, which was classified as critical, was found in OpenCycleCompass server-php. Affected is an unknown function of the file api1/login.php. The manipulation of the argument user leads to sql injection. It is possible to launch the attack remotely. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The name of the patch is fa0d9bcf81c711a88172ad0d37a842f029ac3782. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-221808. | [
{
"commit_message": "[PATCH] login.php sql injection prevention api1/login.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSBmYTBkOWJjZjgxYzcxMWE4ODE3MmFkMGQzN2E4NDJmMDI5YWMzNzgyIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBSYXBoYWVsIExlaG1hbm4gPHJhcGhhZWxAcmxlaC5kZT4KRGF0ZTo... | CWE-89 SQL Injection |
CVE-2022-4523 | vexim2 cross site scripting | A vulnerability, which was classified as problematic, has been found in vexim2. This issue affects some unknown processing. The manipulation leads to cross site scripting. The attack may be initiated remotely. The name of the patch is 21c0a60d12e9d587f905cd084b2c70f9b1592065. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-215903. | [
{
"commit_message": "[PATCH] Use `htmlspecialchars()` to escape user-provided vars before output Fixes #271 Fixes #272 vexim/adminaliasadd.php | 2 +- vexim/adminaliasdelete.php | 18 +++++++++--------- vexim/adminfail.php | 2 +- vexim/adminfailadd.php | 2 +- vexim/adminfailchange.php | 4 ++-- ... | CWE-707 Improper Neutralization -> CWE-74 Injection -> CWE-79 Cross Site Scripting |
GHSA-wmh3-2439-2hpr | null | [
{
"commit_message": "[PATCH] Fixed Array.prototype.lastIndexOf() with unicode string as \"this\". Previously, when lastIndexOf() was called with unicode string as \"this\" argument and a negative \"fromIndex\" argument null-pointer dererence might occur because njs_string_offset() was called with invalid index ... | null | |
CVE-2014-125044 | soshtolsus wing-tight index.php file inclusion | A vulnerability, which was classified as critical, was found in soshtolsus wing-tight. This affects an unknown part of the file index.php. The manipulation of the argument p leads to file inclusion. It is possible to initiate the attack remotely. Upgrading to version 1.0.0 is able to address this issue. The patch is named 567bc33e6ed82b0d0179c9add707ac2b257aeaf2. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217515. | [
{
"commit_message": "[PATCH] hardened index against malicious ?p= attacks index.php | 13 ++++++++++++- 1 file changed, 12 insertions(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSA1NjdiYzMzZTZlZDgyYjBkMDE3OWM5YWRkNzA3YWMyYjI1N2FlYWYyIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBhcmhhIDxhcmhhZGV2QGdtYWlsLmNvbT4K... | CWE-73 File Inclusion |
GHSA-6fvx-r7hx-3vh6 | JavaMelody has XXE via parseSoapMethodName in bull/javamelody/PayloadNameRequestWrapper.java. | null | [
{
"commit_message": "[PATCH] fix for security .../java/net/bull/javamelody/PayloadNameRequestWrapper.java | 2 ++ 1 file changed, 2 insertions(+)",
"patch_text_b64": "RnJvbSBlZjExMTgyMjU2MmQwYjkzNjViZDNlNjcxYTc1YjY1YmQwNjEzMzUzIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBldmVybmF0IDxldmVybmF0QGZyZWUuZnI+Ck... | null |
PYSEC-2021-194 | null | [
{
"commit_message": "[PATCH] Fix FPE issue in external Eigen source code issue with `tf.raw_ops.SparseMatMul`. PiperOrigin-RevId: 370992919 Change-Id: Icfb276fef5fb40928b27c3e44608d2aca72c9fd7 tensorflow/core/kernels/sparse_matmul_op.cc | 4 ++++ 1 file changed, 4 insertions(+)",
"patch_text_b64": "RnJvbSA3Z... | null | |
CVE-2023-34104 | Regex Injection via Doctype Entities | fast-xml-parser is an open source, pure javascript xml parser. fast-xml-parser allows special characters in entity names, which are not escaped or sanitized. Since the entity name is used for creating a regex for searching and replacing entities in the XML body, an attacker can abuse it for denial of service (DoS) attacks. By crafting an entity name that results in an intentionally bad performing regex and utilizing it in the entity replacement step of the parser, this can cause the parser to stall for an indefinite amount of time. This problem has been resolved in v4.2.4. Users are advised to upgrade. Users unable to upgrade should avoid using DOCTYPE parsing by setting the `processEntities: false` option. | [
{
"commit_message": "[PATCH] fix security bug spec/entities_spec.js | 18 ++++++++++++++++++ src/xmlparser/DocTypeReader.js | 14 +++++++++++++- 2 files changed, 31 insertions(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSAzOWIwZTA1MGJiOTA5ZTg0OTk0Nzg2NTdmODRhMzA3NmUzOWNlNzZjIE1vbiBTZXAgMTcgMDA6MDA6MD... | CWE-400: Uncontrolled Resource Consumption |
GHSA-gj43-r55q-5h6r | null | [
{
"commit_message": "[PATCH] Added untrusted server fetching control WKHTMLtoPDF provides limited control for external fetching so that will now be disabled by default unless ALLOW_UNTRUSTED_SERVER_FETCHING=true is specifically set. This new option will also control DOMPDF fetching. .env.example.complete ... | null | |
CVE-2018-16974 | An issue was discovered in Elefant CMS before 2.0.7. There is a PHP Code Execution Vulnerability in apps/filemanager/upload/drop.php by using /filemanager/api/rm/.htaccess to remove the .htaccess file, and then using a filename that ends in .php followed by space characters (for bypassing the blacklist). | [
{
"commit_message": "[PATCH] Fixed filemanager file upload validations, re: #287 apps/filemanager/handlers/embed.php | 4 +++- apps/filemanager/handlers/redactor/upload.php | 4 ++-- apps/filemanager/handlers/upload.php | 4 ++-- apps/filemanager/handlers/upload/drop.php | 4 ++-- apps/fi... | n/a | |
CVE-2024-45298 | Disabled user can bypass lockout by requesting password reset in wiki.js | Wiki.js is an open source wiki app built on Node.js. A disabled user can still gain access to a wiki by abusing the password reset function. While setting up SMTP e-mail's on my server, I tested said e-mails by performing a password reset with my test user. To my shock, not only did it let me reset my password, but after resetting my password I can get into the wiki I was locked out of. The ramifications of this bug is a user can **bypass an account disabling by requesting their password be reset**. All users of wiki.js version `2.5.303` who use any account restrictions and have disabled user are affected. This issue has been addressed in version 2.5.304 and all users are advised to upgrade. There are no known workarounds for this vulnerability. | [
{
"commit_message": "[PATCH] fix: prevent password reset on disabled account server/models/users.js | 7 +++++++ 1 file changed, 7 insertions(+)",
"patch_text_b64": "RnJvbSBiOWZiMTdkNGQ0YTA5NTZlYzM1ZThjNzNjYzg1MTkyNTUyZmI4ZDE2IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBOaWNvbGFzIEdpYXJkIDxnaXRodWJAbmdwaXhlbC5... | CWE-670: Always-Incorrect Control Flow Implementation |
GHSA-m6wp-2r29-6958 | null | [
{
"commit_message": "[PATCH] 7488 bcopy and bzero should mind signed bits Reviewed by: Jerry Jelinek <jerry.jelinek@joyent.com> Reviewed by: Patrick Mooney <patrick.mooney@joyent.com> Approved by: Richard Lowe <richlowe@richlowe.net> usr/src/uts/intel/ia32/ml/copy.s | 14 +++++++------- 1 file changed, 7 inserti... | null | |
GHSA-9766-v29c-4vm7 | Apache Airflow ODBC Provider Argument Injection vulnerability | null | [
{
"commit_message": "[PATCH] Disable setting ODBC driver via extra by default (#31713) By default setting driver via extra is disabled by default but we have several more ways to set it. airflow/providers/odbc/CHANGELOG.rst | 11 +++++++ airflow/providers/odbc/hooks/odbc.py | 28 +++++++++++++--- tests/prov... | null |
GHSA-7j98-74jh-cjxh | Privilege escalation for users that can access mock configuration | null | [
{
"commit_message": "[PATCH] Make the TemplatedDictionary objects picklable The jinja2 SandboxedEnvironment objects are not guaranteed to be pickle-serializable (even though they practically are). So let's rather store the environment elsewhere than in the TemplatedDictionary object itself to keep it serializa... | null |
CVE-2020-7791 | Denial of Service (DoS) | This affects the package i18n before 2.1.15. Vulnerability arises out of insufficient handling of erroneous language tags in src/i18n/Concrete/TextLocalizer.cs and src/i18n/LocalizedApplication.cs. | [
{
"commit_message": "[PATCH] FIX - NullReferenceException caused by bad langtag #387 src/i18n/Concrete/TextLocalizer.cs | 3 +++ src/i18n/LocalizedApplication.cs | 6 ++++-- 2 files changed, 7 insertions(+), 2 deletions(-)",
"patch_text_b64": "RnJvbSBjNDE4ZTMzNDUzMTNkYzg5NmMxOTUxZDhjNDZhYjBiOWIxMmZjYmQzIE1v... | Denial of Service (DoS) |
CVE-2022-24771 | Improper Verification of Cryptographic Signature in node-forge | Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. Prior to version 1.3.0, RSA PKCS#1 v1.5 signature verification code is lenient in checking the digest algorithm structure. This can allow a crafted structure that steals padding bytes and uses unchecked portion of the PKCS#1 encoded message to forge a signature when a low public exponent is being used. The issue has been addressed in `node-forge` version 1.3.0. There are currently no known workarounds. | [
{
"commit_message": "[PATCH] Fix signature verification issues. **SECURITY**: Three RSA PKCS#1 v1.5 signature verification issues were reported by Moosa Yahyazadeh (moosa-yahyazadeh@uiowa.edu): - Leniency in checking `digestAlgorithm` structure can lead to signature forgery. - The code is lenient in checking th... | CWE-347: Improper Verification of Cryptographic Signature |
CVE-2026-21881 | Kanboard is Vulnerable to Reverse Proxy Authentication Bypass | Kanboard is project management software focused on Kanban methodology. Versions 1.2.48 and below is vulnerable to a critical authentication bypass when REVERSE_PROXY_AUTH is enabled. The application blindly trusts HTTP headers for user authentication without verifying the request originated from a trusted reverse proxy. An attacker can impersonate any user, including administrators, by simply sending a spoofed HTTP header. This issue is fixed in version 1.2.49. | [
{
"commit_message": "[PATCH] feat: add `TRUSTED_PROXY_NETWORKS` config option Add an IP-based allow list to prevent spoofing of HTTP headers that should only be set by trusted reverse proxies. Note that `TRUSTED_PROXY_NETWORKS` must be configured when `REVERSE_PROXY_AUTH` is enabled. app/Auth/ReverseProxyAuth.p... | CWE-287: Improper Authentication |
CVE-2015-7364 | The HTML_Quickform library, as used in Revive Adserver before 3.2.2, allows remote attackers to bypass the CSRF protection mechanism via an empty token. | [
{
"commit_message": "[PATCH] Fix CVE-2015-7364 Cross-Site Request Forgery (CSRF) Abdullah Hussam Gazi discovered that the CSRF protection mechanism introduced a few years ago to secure the forms generated with the HTML_Quickform library (most fo the forms in Revive Adserver's admin UI) could be easily bypassed ... | n/a | |
CVE-2023-28459 | pretalx 2.3.1 before 2.3.2 allows path traversal in HTML export (a non-default feature). Users were able to upload crafted HTML documents that trigger the reading of arbitrary files. | [
{
"commit_message": "[PATCH] Fix path traversal in static HTML export This vulnerability was discovered by Sonar, https://www.sonarsource.com/, who provided a detailled description of the vulnerability, and also the fix as it is applied here. The fix will be backported to the last release, v2.3.1, and released ... | n/a | |
GHSA-gh5c-3h97-2f3q | Moby Race Condition vulnerability | null | [
{
"commit_message": "[PATCH] pkg/streamformatter: Make `progressOutput` concurrency safe MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sync access to the underlying `io.Writer` with a mutex. Signed-off-by: Paweł Gronowski <pawel.gronowski@docker.com> pkg/streamformatt... | null |
GHSA-vwx8-qpqh-qwm9 | Jenkins Maven Release Plug-in Plugin stored credentials in plain text | null | [
{
"commit_message": "[PATCH] [SECURITY-1435] pom.xml | 18 +++++- .../m2release/M2ReleaseBuildWrapper.java | 15 ++--- .../m2release/M2ReleaseBuildWrapperTest.java | 55 +++++++++++++++++++ .../testMigrationOfNexusPassword/config.xml | 2 + ...lugins.m2release.M2Releas... | null |
GHSA-jrf8-cmgg-gv2m | Error on unsupported architectures in raw-cpuid | null | [
{
"commit_message": "[PATCH] Fix unsound transmutes (fixes #40) Also adding comments explaining why all safety requirements are now met, and explicitly annotating the types of the byte slices. src/lib.rs | 43 ++++++++++++++++++++++--------------------- 1 file changed, 22 insertions(+), 21 deletions(-)",
"pa... | null |
GHSA-rh9f-gr6q-mpc4 | moonshine Stored Cross-Site Scripting Vulnerability in Create Admin | null | [
{
"commit_message": "[PATCH] fix: Security issue Escape select options, belongs/morphto and link component src/Laravel/src/Fields/Relationships/BelongsTo.php | 10 ++++++++-- src/Laravel/src/Fields/Relationships/MorphTo.php | 6 +++++- src/Support/src/DTOs/Select/Option.php | 12 ++++++++++-- src/UI... | null |
CVE-2024-38529 | Admidio Vulnerable to RCE via Arbitrary File Upload in Message Attachment | Admidio is a free, open source user management system for websites of organizations and groups. In Admidio before version 4.3.10, there is a Remote Code Execution Vulnerability in the Message module of the Admidio Application, where it is possible to upload a PHP file in the attachment. The uploaded file can be accessed publicly through the URL `{admidio_base_url}/adm_my_files/messages_attachments/{file_name}`. The vulnerability is caused due to the lack of file extension verification, allowing malicious files to be uploaded to the server and public availability of the uploaded file. This vulnerability is fixed in 4.3.10. | [
{
"commit_message": "[PATCH] implement check for filename and file extension .../modules/messages/messages_send.php | 35 ++++++++++++------- 1 file changed, 22 insertions(+), 13 deletions(-)",
"patch_text_b64": "RnJvbSA0NDU0YmU5Yjk4NTljNjk0MzFiZmQxY2U4NzY1ZDE4YzhiN2NkNzk5IE1vbiBTZXAgMTcgMDA6MDA6MDAgM... | CWE-434: Unrestricted Upload of File with Dangerous Type |
GHSA-56fm-hfp3-x3w3 | Wallabag user can disable 2FA unintentionally | null | [
{
"commit_message": "[PATCH 1/2] ConfigController: move OTP endpoints to POST method only Fixes GHSA-56fm-hfp3-x3w3 Signed-off-by: Kevin Decherf <kevin@kdecherf.com> .../Controller/ConfigController.php | 38 +++++++++---- .../Form/Type/UserInformationType.php | 9 ---- .../Resources/views/Confi... | null |
GHSA-22c2-9gwg-mj59 | Langroid has a Code Injection vulnerability in LanceDocChatAgent through vector_store | null | [
{
"commit_message": "[PATCH] fixes to code-injection mitigation PR #841 (#850) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit * Update SECURITY.md Security notice * Add eval commands sanitizer Mitigation to avoid most common code injection attack vectors * Sanitizer te... | null |
GHSA-wpm6-wgpc-rx23 | null | [
{
"commit_message": "[PATCH] CVE-2019-19775: Close open redirect in thumbnail view. This closes an open redirect vulnerability, one case of which was found by Graham Bleaney and Ibrahim Mohamed using Pysa. Signed-off-by: Anders Kaseorg <anders@zulipchat.com> zerver/lib/bugdown/__init__.py | 3 ++- zerver/lib/th... | null | |
GHSA-v74c-qc46-9gg9 | Apache Submarine Server Core has a SQL Injection Vulnerability | null | [
{
"commit_message": "[PATCH] fix security risk of SQL injection (#1121) .../java/org/apache/submarine/server/SubmarineServer.java | 8 ++++++-- 1 file changed, 6 insertions(+), 2 deletions(-)",
"patch_text_b64": "RnJvbSA0ZTY4ODk0YTFjNTRkNzYzYWMyNjk3ZWExYWM5OTM3OTNkYTQxMDdjIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpG... | null |
CVE-2021-37704 | Exposed phpinfo() in PhpFastCache | PhpFastCache is a high-performance backend cache system (packagist package phpfastcache/phpfastcache). In versions before 6.1.5, 7.1.2, and 8.0.7 the `phpinfo()` can be exposed if the `/vendor` is not protected from public access. This is a rare situation today since the vendor directory is often located outside the web directory or protected via server rule (.htaccess, etc). Only the v6, v7 and v8 will be patched respectively in 8.0.7, 7.1.2, 6.1.5. Older versions such as v5, v4 are not longer supported and will **NOT** be patched. As a workaround, protect the `/vendor` directory from public access. | [
{
"commit_message": "[PATCH] Fixed vulnerability issue that cause exposed phpinfo() in some situations. .gitattributes | 3 ++- docs/examples/phpinfo.php | 3 --- 2 files changed, 2 insertions(+), 4 deletions(-) delete mode 100644 docs/examples/phpinfo.php",
"patch_text_b64": "RnJvbSA4MjAzOThiZTZhZ... | CWE-200: Exposure of Sensitive Information to an Unauthorized Actor |
GHSA-844w-j86r-4x2j | Heap buffer overflow in `UnsortedSegmentSum` in TensorFlow | null | [
{
"commit_message": "[PATCH] Fix heap buffer overflow in UnsortedSegmentSum. When Index=int32, data_size and num_segments were truncated from int64 to int32. This truncation can produce negative numbers, which causes UnsortedSegmentFunctor to access out of bounds memory. Also: - Switches some indexing calculati... | null |
GHSA-cv75-v3vc-j2vj | null | [
{
"commit_message": "[PATCH] Fix kadm5/gssrpc XDR double free [CVE-2014-9421] [MITKRB5-SA-2015-001] In auth_gssapi_unwrap_data(), do not free partial deserialization results upon failure to deserialize. This responsibility belongs to the callers, svctcp_getargs() and svcudp_getargs(); doing it in the unwrap fu... | null | |
GHSA-m79r-r765-5f9j | Lobe Chat Desktop vulnerable to Remote Code Execution via XSS in Chat Messages | null | [
{
"commit_message": "[PATCH] =?UTF-8?q?=F0=9F=90=9B=20fix:=20fix=20svg=20xss=20issue?= =?UTF-8?q?=20(#9313)?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit * fix svg xss * fix svg xss * update * improve * fix packages/utils/package.json | 4 +- pack... | null |
CVE-2019-13310 | ImageMagick 7.0.8-50 Q16 has memory leaks at AcquireMagickMemory because of an error in MagickWand/mogrify.c. | [
{
"commit_message": "[PATCH] https://github.com/ImageMagick/ImageMagick/issues/1616 MagickWand/mogrify.c | 3 +++ MagickWand/operation.c | 5 ++++- 2 files changed, 7 insertions(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSA1ZjIxMjMwYjY1N2NjZDY1NDUyZGQzZDk0YzViNTQwMWJhNjkxYTJkIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjA... | n/a | |
GHSA-p9mj-v5mf-m82x | org.xwiki.platform:xwiki-platform-notifications-ui Eval Injection vulnerability | null | [
{
"commit_message": "[PATCH] XWIKI-20259: Improve escaping in Notification Preferences Macros .../Code/NotificationsApplicationsPreferencesMacro.xml | 2 +- .../Code/NotificationsAutoWatchPreferencesMacro.xml | 4 ++-- .../NotificationsCustomFiltersPreferencesMacro.xml | 2 +- .../Code/NotificationsEmail... | null |
GHSA-cvfg-5hfc-wcq7 | null | [
{
"commit_message": "[PATCH] Use format string Zend/zend_execute_API.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSBiMTAxYTZiYmQ0ZjIxODFjMzYwYmQzOGU3NjgzZGY0YTAzY2JhODNlIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBYaW5jaGVuIEh1aSA8bGFydWVuY2VAZ21haWwuY29tPgpEYXRlOiBTYXQsIDE... | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.