id
stringlengths
12
19
title
stringlengths
0
237
description
stringlengths
35
3.87k
patches
listlengths
1
22
cwe
stringlengths
2
440
CVE-2025-24882
regclient may ignore pinned manifest digests
regclient is a Docker and OCI Registry Client in Go. A malicious registry could return a different digest for a pinned manifest without detection. This vulnerability is fixed in 0.7.1.
[ { "commit_message": "[PATCH] Fix: Validate the digest of the ref when provided This prefers the user provided digest for the manifest over the registry header when it is available. Signed-off-by: Brandon Mitchell <git@bmitch.net> scheme/reg/referrer.go | 2 +- types/manifest/manifest.go | 12 +++++...
CWE-20: Improper Input Validation
GHSA-f6gj-7592-5jxm
Directory Traversal
null
[ { "commit_message": "[PATCH] version 0.10.1 Fixed directory traversal vulnerability lib/router.js | 14 +++++++++++--- package.json | 2 +- src/router.coffee | 10 ++++++++++ 3 files changed, 22 insertions(+), 4 deletions(-)", "patch_text_b64": "RnJvbSBkZmRkNTJlMmU4MDYwN2FmNDMzMDk3ZDk0MGIzODM0ZmQ5NmR...
null
CVE-2015-7513
arch/x86/kvm/x86.c in the Linux kernel before 4.4 does not reset the PIT counter values during state restoration, which allows guest OS users to cause a denial of service (divide-by-zero error and host OS crash) via a zero value, related to the kvm_vm_ioctl_set_pit and kvm_vm_ioctl_set_pit2 functions.
[ { "commit_message": "[PATCH] KVM: x86: Reload pit counters for all channels when restoring state Currently if userspace restores the pit counters with a count of 0 on channels 1 or 2 and the guest attempts to read the count on those channels, then KVM will perform a mod of 0 and crash. This will ensure that 0 ...
n/a
CVE-2022-1815
Exposure of Sensitive Information to an Unauthorized Actor in jgraph/drawio
Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository jgraph/drawio prior to 18.1.2.
[ { "commit_message": "[PATCH] 18.1.2 release ChangeLog | 4 +++ VERSION | 2 +- .../mxgraph/online/ExportProxyServlet.java | 9 +++-- src/main/webapp/js/app.min.js | 18 +++++----- src/main/webapp/js/diagramly/Minimal.js ...
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
CVE-2020-12103
In Tiny File Manager 2.4.1 there is a vulnerability in the ajax file backup copy functionality which allows authenticated users to create backup copies of files (with .bak extension) outside the scope in the same directory in which they are stored.
[ { "commit_message": "[PATCH] Security fix #357 Download file causes timeout #353 Download Restart @ 88% #312 download large file issues #259 File upload issue #354 FIle Upload URL error #360 Bug in .tar archive extraction when destination(s) file(s) already exist (HTTP error 500) #332 Backup File return false #...
n/a
CVE-2021-3743
An out-of-bounds (OOB) memory read flaw was found in the Qualcomm IPC router protocol in the Linux kernel. A missing sanity check allows a local attacker to gain access to out-of-bounds memory, leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability.
[ { "commit_message": "[PATCH] net: qrtr: fix another OOB Read in qrtr_endpoint_post This check was incomplete, did not consider size is 0: if (len != ALIGN(size, 4) + hdrlen) goto err; if size from qrtr_hdr is 0, the result of ALIGN(size, 4) will be 0, In case of len == hdrlen and size == 0 in header this check ...
CWE-125 - Out-of-bounds Read
CVE-2025-21628
Chatwoot has a Blind SQL-injection in Conversation and Contacts filters
Chatwoot is a customer engagement suite. Prior to 3.16.0, conversation and contact filters endpoints did not sanitize the input of query_operator passed from the frontend or the API. This provided any actor who is authenticated, an attack vector to run arbitrary SQL within the filter query by adding a tautological WHERE clause. This issue is patched with v3.16.0.
[ { "commit_message": "[PATCH] feat: validate query conditions (#10595) Query conditions can take in arbitrary values, this can cause SQL errors. This PR fixes it .../api/v1/accounts/contacts_controller.rb | 1 + .../v1/accounts/conversations_controller.rb | 1 + app/helpers/filter_helper.rb ...
CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
GHSA-35fc-9hrj-3585
Apache Superset: Lower privilege users are able to create Role when FAB_ADD_SECURITY_API is enabled
null
[ { "commit_message": "[PATCH] fix: Gamma users shouldn't be able to create roles (#29687) superset/security/manager.py | 6 ++ tests/integration_tests/security/api_tests.py | 62 +++++++++++++++++++ .../integration_tests/superset_test_config.py | 2 + 3 files changed, 70 insertions(+)", "patc...
null
GHSA-jwf8-mjj8-r8hq
DOMPDF Information Disclosure
null
[ { "commit_message": "[PATCH] Restrict access to sensitive www content to authenticated users www/debugger.php | 4 +++- www/demo.php | 6 ++++-- www/setup.php | 11 +++++++++++ 3 files changed, 18 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSBjYzA2MDA4Zjc1MjYyNTEwZWUxMzViOGNiYjE0ZTMzM2EzMD...
null
GHSA-wjxh-hxxv-h4vm
null
[ { "commit_message": "[PATCH] patch 8.2.3409: reading beyond end of line with invalid utf-8 character Problem: Reading beyond end of line with invalid utf-8 character. Solution: Check for NUL when advancing. src/regexp_nfa.c | 3 ++- src/testdir/test_regexp_utf8.vim | 8 ++++++++ src/version.c...
null
CVE-2025-29773
Froxlor allows Multiple Accounts to Share the Same Email Address Leading to Potential Privilege Escalation or Account Takeover
Froxlor is open-source server administration software. A vulnerability in versions prior to 2.2.6 allows users (such as resellers or customers) to create accounts with the same email address as an existing account. This creates potential issues with account identification and security. This vulnerability can be exploited by authenticated users (e.g., reseller, customer) who can create accounts with the same email address that has already been used by another account, such as the admin. The attack vector is email-based, as the system does not prevent multiple accounts from registering the same email address, leading to possible conflicts and security issues. Version 2.2.6 fixes the issue.
[ { "commit_message": "[PATCH] force admin email addresses to be unique and not be used for customers, fixes GHSA-7j6w-p859-464f Signed-off-by: Michael Kaufmann <d00p@froxlor.org> composer.lock | 148 ++++++++++++------------- lib/Froxlor/Api/Commands/Admins.php | 23 ++++ lib/Froxlor/A...
CWE-287: Improper Authentication
GHSA-733f-44f3-3frw
gopkg.in/macaron.v1 Open Redirect vulnerability
null
[ { "commit_message": "[PATCH] static: clean the path URL before redirecting (#199) static.go | 5 +++-- static_test.go | 12 ++++++++++++ 2 files changed, 15 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSBhZGRjNzQ2MWMzYTkwYTA0MGU3OWFhNzViZmQyNDUxMDdhMjEwMjQ1IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpG...
null
CVE-2024-26142
Rails possible ReDoS vulnerability in Accept header parsing in Action Dispatch
Rails is a web-application framework. Starting in version 7.1.0, there is a possible ReDoS vulnerability in the Accept header parsing routines of Action Dispatch. This vulnerability is patched in 7.1.3.1. Ruby 3.2 has mitigations for this problem, so Rails applications using Ruby 3.2 or newer are unaffected.
[ { "commit_message": "[PATCH] Fix ReDoS in accept header scanning Thanks svalkanov for the patch! [CVE-2024-26142] actionpack/CHANGELOG.md | 4 ++++ actionpack/lib/action_dispatch/http/mime_type.rb | 4 ++-- 2 files changed, 6 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSBi...
CWE-1333: Inefficient Regular Expression Complexity
GHSA-pp7p-q8fx-2968
vite-plugin-static-copy files not included in `src` are possible to access with a crafted request
null
[ { "commit_message": "[PATCH] fix: only serve files under `src` (#195) .changeset/long-pillows-arrive.md | 5 +++++ .gitignore | 3 --- src/middleware.ts | 17 +++++++++++++-- test/fixtures/.env | 1 + test/tests.test.ts | 24 ++++++++++++++++++-...
null
GHSA-762h-vpvw-3rcx
Overflow in `FusedResizeAndPadConv2D`
null
[ { "commit_message": "[PATCH] Fix tensor shape overflow in FusedResizeAndPadConv2D. Replaced TensorShape constructor by Factory method with status. PiperOrigin-RevId: 477742686 .../kernels/conv_ops_fused_image_transform.cc | 7 +++-- tensorflow/core/ops/nn_ops.cc | 4 +-- .../kernel_tests/nn_ops/...
null
GHSA-xrcq-533q-8rxw
TYPO3 Bookmark Toolbar vulnerable to denial of service
null
[ { "commit_message": "[PATCH] [SECURITY] Properly catch FAL exceptions in ShortcutRepository Resolves: #105935 Releases: main, 13.4, 12.4 Change-Id: I6388989c2016e50be3146b3516bb144b0544394d Security-Bulletin: TYPO3-CORE-SA-2025-018 Security-References: CVE-2025-59014 Reviewed-on: https://review.typo3.org/c/Pack...
null
CVE-2024-40640
Usage of non-constant time base64 decoder could lead to leakage of secret key material in vodozemac
vodozemac is an open source implementation of Olm and Megolm in pure Rust. Versions before 0.7.0 of vodozemac use a non-constant time base64 implementation for importing key material for Megolm group sessions and `PkDecryption` Ed25519 secret keys. This flaw might allow an attacker to infer some information about the secret key material through a side-channel attack. The use of a non-constant time base64 implementation might allow an attacker to observe timing variations in the encoding and decoding operations of the secret key material. This could potentially provide insights into the underlying secret key material. The impact of this vulnerability is considered low because exploiting the attacker is required to have access to high precision timing measurements, as well as repeated access to the base64 encoding or decoding processes. Additionally, the estimated leakage amount is bounded and low according to the referenced paper. This has been patched in commit 734b6c6948d4b2bdee3dd8b4efa591d93a61d272 which has been included in release version 0.7.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
[ { "commit_message": "[PATCH] fix: Use a constant-time Base64 encoder for secret key material This patch fixes a security issue around a side-channel vulnerability[1] when decoding secret key material using Base64. In some circumstances an attacker can obtain information about secret secret key material via a co...
CWE-208: Observable Timing Discrepancy
GHSA-7gcf-2wg8-c4pq
null
[ { "commit_message": "[PATCH] Fix compile warning introduced in commit c6247a9 Commit c6247a9 - \"Add command line and configuration option to set umask\" introduced a compile warning, although the code would have worked OK. Signed-off-by: Quentin Armitage <quentin@armitage.org.uk> keepalived/core/main.c | 2 +- ...
null
GHSA-2vfx-6mjq-9ccv
null
[ { "commit_message": "[PATCH] convert consumer register to bindings bindings/pulp/bindings/bindings.py | 2 + bindings/pulp/bindings/consumer.py | 8 +- bindings/pulp/bindings/server.py | 35 +++--- bindings/pulp/bindings/static.py | 16 +++ bindings/test/unit/test_stati...
null
CVE-2022-21676
Uncaught Exception in engine.io
Engine.IO is the implementation of transport-based cross-browser/cross-device bi-directional communication layer for Socket.IO. A specially crafted HTTP request can trigger an uncaught exception on the Engine.IO server, thus killing the Node.js process. This impacts all the users of the `engine.io` package starting from version `4.0.0`, including those who uses depending packages like `socket.io`. Versions prior to `4.0.0` are not impacted. A fix has been released for each major branch, namely `4.1.2` for the `4.x.x` branch, `5.2.1` for the `5.x.x` branch, and `6.1.1` for the `6.x.x` branch. There is no known workaround except upgrading to a safe version.
[ { "commit_message": "[PATCH] fix: properly handle invalid data sent by a malicious websocket client **IMPORTANT SECURITY FIX** A malicious client could send a specially crafted HTTP request, triggering an uncaught exception and killing the Node.js process: > RangeError: Invalid WebSocket frame: RSV2 and RSV3 mu...
CWE-754: Improper Check for Unusual or Exceptional Conditions
GHSA-9mrv-456v-pf22
Cross-site Scripting in vis-timeline
null
[ { "commit_message": "[PATCH] fix: xss security (#840) lib/shared/Configurator.js | 8 ++++---- lib/shared/Popup.js | 3 ++- lib/timeline/Timeline.js | 2 +- lib/timeline/component/CustomTime.js | 2 +- lib/timeline/component/DataAxis.js | 7 ++++--- lib/timeline/componen...
null
CVE-2022-36009
Incorrect parsing of access level in gomatrixserverlib and dendrite
gomatrixserverlib is a Go library for matrix protocol federation. Dendrite is a Matrix homeserver written in Go, an alternative to Synapse. The power level parsing within gomatrixserverlib was failing to parse the `"events_default"` key of the `m.room.power_levels` event, defaulting the event default power level to zero in all cases. Power levels are the matrix terminology for user access level. In rooms where the `"events_default"` power level had been changed, this could result in events either being incorrectly authorised or rejected by Dendrite servers. gomatrixserverlib contains a fix as of commit `723fd49` and Dendrite 0.9.3 has been updated accordingly. Matrix rooms where the `"events_default"` power level has not been changed from the default of zero are not vulnerable. Users are advised to upgrade. There are no known workarounds for this issue.
[ { "commit_message": "[PATCH] Fix parsing of `\"events_default\"` level in `m.room.power_levels` events eventauth_test.go | 59 +++++++++++++++++++++++++++++++++++++++++++++++ eventcontent.go | 2 +- 2 files changed, 60 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA3MjNmZDQ5NWRkZTgzNWQwNzhiOWYyMD...
CWE-863: Incorrect Authorization
GHSA-7hfx-h3j3-rwq4
D-Tale server-side request forgery through Web uploads
null
[ { "commit_message": "[PATCH] Updated web data uploads to be turned off by default .circleci/config.yml | 4 + README.md | 13 +++ docs/CONFIGURATION.md | 1 + dtale/__init__.py | 1 + dtale/app.py ...
null
CVE-2022-2845
Improper Validation of Specified Quantity in Input in vim/vim
Improper Validation of Specified Quantity in Input in GitHub repository vim/vim prior to 9.0.0218.
[ { "commit_message": "[PATCH] patch 9.0.0218: reading before the start of the line Problem: Reading before the start of the line. Solution: When displaying \"$\" check the column is not negative. src/edit.c | 3 ++- src/proto/edit.pro | 2 +- src/testdir/test_cmdwin.vim | 8 ++++++++ ...
CWE-1284 Improper Validation of Specified Quantity in Input
CVE-2020-26273
sqlite ATTACH allows some filesystem access
osquery is a SQL powered operating system instrumentation, monitoring, and analytics framework. In osquery before version 4.6.0, by using sqlite's ATTACH verb, someone with administrative access to osquery can cause reads and writes to arbitrary sqlite databases on disk. This _does_ allow arbitrary files to be created, but they will be sqlite databases. It does not appear to allow existing non-sqlite files to be overwritten. This has been patched in osquery 4.6.0. There are several mitigating factors and possible workarounds. In some deployments, the people with access to these interfaces may be considered administrators. In some deployments, configuration is managed by a central tool. This tool can filter for the `ATTACH` keyword. osquery can be run as non-root user. Because this also limits the desired access levels, this requires deployment specific testing and configuration.
[ { "commit_message": "[PATCH] Merge pull request from GHSA-4g56-2482-x7q8 * Proposed fix for attach tables vulnerability * Add authorizer to ATC tables and cleanups - Add unit test for authorizer function osquery/sql/sqlite_util.cpp | 25 +++++++++++++++ osquery/sql/sqlite_util.h | 41 ++...
CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')
GHSA-543c-wff7-pg59
null
[ { "commit_message": "[PATCH] escape userId before setting it as HTML attribute src/static/js/chat.js | 1 + 1 file changed, 1 insertion(+)", "patch_text_b64": "RnJvbSBhNzk2ODExNTU4MWUyMGVmNDdhNTMzZTAzMGY1OWY4MzA0ODZiZGZhIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiB3ZWJ6d28waSA8d2ViendvMGlAYzNkMi5kZT4KRGF0ZTogV...
null
GHSA-6q3r-7qmf-2jrm
null
[ { "commit_message": "[PATCH] fix: REQUEST_URI sanitization, solves #278 Kernel/System/Web/InterfaceAgent.pm | 11 ++++++++++- Kernel/System/Web/InterfaceCustomer.pm | 11 ++++++++++- Kernel/System/Web/InterfacePublic.pm | 11 ++++++++++- 3 files changed, 30 insertions(+), 3 deletions(-)", "patch_text_b64"...
null
CVE-2017-14107
The _zip_read_eocd64 function in zip_open.c in libzip before 1.3.0 mishandles EOCD records, which allows remote attackers to cause a denial of service (memory allocation failure in _zip_cdir_grow in zip_dirent.c) via a crafted ZIP archive.
[ { "commit_message": "[PATCH] Make eocd checks more consistent between zip and zip64 cases. lib/zip_open.c | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA5YjQ2OTU3ZWM5OGQ4NWE1NzJlOWVmOTgzMDEyNDdmMzkzMzhhM2I1IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBUaG9tYXMgS2xhdXNuZX...
n/a
GHSA-269f-c6h8-6gv2
null
[ { "commit_message": "[PATCH] Return index.html for directory req's and prevent directory traversal req's http-server.js | 23 ++++++++++++++++++++--- 1 file changed, 20 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSAzNGI4YjBjY2UyODA3YjExOWY0Y2ZmZGEyYWM0OGZjOGY0MjdkNjlhIE1vbiBTZXAgMTcgMDA6MDA6MDAgM...
null
GHSA-vcqx-6wc6-5ghv
null
[ { "commit_message": "[PATCH] Improve - Add a utility function to calculate the number of hosts in a range or subnet. code_igniter/application/controllers/util.php | 16 ++++++++++++++++ 1 file changed, 16 insertions(+)", "patch_text_b64": "RnJvbSBjNzU5NWNiYjA5MmU0MTBhNDg3ZjAzYzBlYjUzNmNmMTllNTM4ODYwIE1vbiBTZ...
null
GHSA-8fw5-h4p6-hgg5
null
[ { "commit_message": "[PATCH] FMC-495 FMC susceptible to cross site scripting issues .../src/main/webapp/app/controllers/patches_page.coffee | 4 ++-- .../main/webapp/app/controllers/profile_details_page.coffee | 4 ++-- .../src/main/webapp/app/controllers/users_page.coffee | 2 +- 3 files changed, ...
null
CVE-2025-43971
An issue was discovered in GoBGP before 3.35.0. pkg/packet/bgp/bgp.go allows attackers to cause a panic via a zero value for softwareVersionLen.
[ { "commit_message": "[PATCH] pkg/packet/bgp: fix SoftVersion capability parser to check the input length func (c *CapSoftwareVersion) DecodeFromBytes(data []byte) error { c.DefaultParameterCapability.DecodeFromBytes(data) data = data[2:] if len(data) < 2 { return NewMessageError(BGP_ERROR_OPEN_MESSAGE_ERROR, BG...
CWE-193 Off-by-one Error
GHSA-5f77-76r3-qf34
null
[ { "commit_message": "[PATCH] Fix SEGV in onig_error_code_to_str() (Fix #132) When onig_new(ONIG_SYNTAX_PERL) fails with ONIGERR_INVALID_GROUP_NAME, onig_error_code_to_str() crashes. onig_scan_env_set_error_string() should have been used when returning ONIGERR_INVALID_GROUP_NAME. regparse.c | 6 +++++- testpy.py ...
null
PYSEC-2021-503
null
[ { "commit_message": "[PATCH] Add missing validations to reverse_sequence_op PiperOrigin-RevId: 372178683 Change-Id: Iac97ebab5b342f1262c77a7d9bcb4267b305ce5b tensorflow/core/kernels/reverse_sequence_op.cc | 4 ++++ 1 file changed, 4 insertions(+)", "patch_text_b64": "RnJvbSBlY2Y3NjhjYmU1MGNlZGMwYTQ1Y2UxZWUyM...
null
CVE-2022-25978
All versions of the package github.com/usememos/memos/server are vulnerable to Cross-site Scripting (XSS) due to insufficient checks on external resources, which allows malicious actors to introduce links starting with a javascript: scheme.
[ { "commit_message": "[PATCH] chore: validate external link (#1069) server/resource.go | 23 +++++++++------------ web/src/components/CreateResourceDialog.tsx | 2 +- 2 files changed, 11 insertions(+), 14 deletions(-)", "patch_text_b64": "RnJvbSBiMTFkMjEzMGEwODQzODVlYjY1YzM3NjFhM2M4ND...
Cross-site Scripting (XSS)
PYSEC-2024-17
null
[ { "commit_message": "[PATCH] fix GHSA-pgpj-v85q-h5fm security advisory (2) src/pyload/webui/app/__init__.py | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAxMzc0YzgyNDI3MWNiN2U5Mjc3NDA2NjRkMDZkMmU1Nzc2MjRjYTNlIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBHYW1tYUMwZGUgPGdhbW1hYz...
null
GHSA-m6gj-h9gm-gw44
Django Incorrect Default Permissions
null
[ { "commit_message": "[PATCH] Fixed CVE-2020-24583, #31921 -- Fixed permissions on intermediate-level static and storage directories on Python 3.7+. Thanks WhiteSage for the report. django/core/files/storage.py | 6 +-- docs/releases/2.2.16.txt | 13 ++++- docs/releases/3.0.1...
null
GHSA-qv34-qvqq-q583
null
[ { "commit_message": "[PATCH] Reject cpio symlinks that exceed 1MB libarchive/archive_read_support_format_cpio.c | 5 +++++ 1 file changed, 5 insertions(+)", "patch_text_b64": "RnJvbSBmZDdlMGMwMmUyNzI5MTNhMGE4YjZkNDkyYzcyNjBkZmNhMGIxNDA4IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBUaW0gS2llbnR6bGUgPGtpZW50emxlQ...
null
GHSA-6cf9-gr3m-fgc8
null
[ { "commit_message": "[PATCH] fixed #1719 src/filters/reframe_av1.c | 3 +++ 1 file changed, 3 insertions(+)", "patch_text_b64": "RnJvbSAxM2RhZDdkNWVmNzRjYTJlNmZlNDAxMGY1YjAzZWIxMmU5YmJlMGVjIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBqZWFubGYgPGplYW5sZkBncGFjLmlvPgpEYXRlOiBNb24sIDI5IE1hciAyMDIxIDA5OjIxOjUxICsw...
null
GHSA-5q8m-mqmx-pxp9
Spring Data Commons contain a property path parser vulnerability caused by unlimited resource allocation
null
[ { "commit_message": "[PATCH] DATACMNS-1285 - PropertyPath now limits the depth of its parsing to 1000 segments. .../data/mapping/PropertyPath.java | 6 ++++ .../data/mapping/PropertyPathUnitTests.java | 30 ++++++++++++++++++- 2 files changed, 35 insertions(+), 1 deletion(-)", "patch_text_b64": ...
null
GHSA-2r4h-8jxv-w2j8
CKAN vulnerable to stored XSS in resource description
null
[ { "commit_message": "[PATCH] helpers: strip tags with bleach only ckan/lib/helpers.py | 7 +------ 1 file changed, 1 insertion(+), 6 deletions(-)", "patch_text_b64": "RnJvbSAxMTJhZmZmZmE3NGIxNGZjOTdjNTRhYmNmMTgzMTVkZjk3MTE0OTE3IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBJYW4gV2FyZCA8aWFuQGV4Y2Vzcy5vcmc+CkRhdG...
null
PYSEC-2018-27
null
[ { "commit_message": "[PATCH] CVE-2018-10895: Fix CSRF issues with qute://settings/set URL In ffc29ee043ae7336d9b9dcc029a05bf7a3f994e8 (part of v1.0.0), a qute://settings/set URL was added to change settings. Contrary to what I apparently believed at the time, it *is* possible for websites to access `qute://*` U...
null
CVE-2023-43645
Denial of service from circular relationship definitions in OpenFGA
OpenFGA is an authorization/permission engine built for developers and inspired by Google Zanzibar. OpenFGA is vulnerable to a denial of service attack when certain Check calls are executed against authorization models that contain circular relationship definitions. When the call is made, it's possible for the server to exhaust resources and die. Users are advised to upgrade to v1.3.2 and update any offending models. There are no known workarounds for this vulnerability. Note that for models which contained cycles or a relation definition that has the relation itself in its evaluation path, checks and queries that require evaluation will no longer be evaluated on v1.3.2+ and will return errors instead. Users who do not have cyclic models are unaffected.
[ { "commit_message": "[PATCH] Merge pull request from GHSA-2hm9-h873-pgqh * fix: avoid revisiting computed relations in cycles * Revert \"fix: avoid revisiting computed relations in cycles\" This reverts commit 5d51d4fdcca1eb240310037c92d9085381866ed4. * fix: validate against cyclical model definitions more accu...
CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop')
PYSEC-2021-483
null
[ { "commit_message": "[PATCH] Fix FPE issue with `tf.raw_ops.FusedBatchNorm`. PiperOrigin-RevId: 370948185 Change-Id: If0c8e0320062ed6363e94ff5fe38e6a301f69ac2 tensorflow/core/kernels/fused_batch_norm_op.cc | 3 +++ 1 file changed, 3 insertions(+)", "patch_text_b64": "RnJvbSAxYTJhODcyMjlkMWQ2MWUyM2EzOTM3Mzc3N...
null
CVE-2023-35163
Vega's validators able to submit duplicate transactions
Vega is a decentralized trading platform that allows pseudo-anonymous trading of derivatives on a blockchain. Prior to version 0.71.6, a vulnerability exists that allows a malicious validator to trick the Vega network into re-processing past Ethereum events from Vega’s Ethereum bridge. For example, a deposit to the collateral bridge for 100USDT that credits a party’s general account on Vega, can be re-processed 50 times resulting in 5000USDT in that party’s general account. This is without depositing any more than the original 100USDT on the bridge. Despite this exploit requiring access to a validator's Vega key, a validator key can be obtained at the small cost of 3000VEGA, the amount needed to announce a new node onto the network. A patch is available in version 0.71.6. No known workarounds are available, however there are mitigations in place should this vulnerability be exploited. There are monitoring alerts for `mainnet1` in place to identify any issues of this nature including this vulnerability being exploited. The validators have the ability to stop the bridge thus stopping any withdrawals should this vulnerability be exploited.
[ { "commit_message": "[PATCH] Merge pull request from GHSA-8rc9-vxjh-qjf2 fix: on-chain verification comparison core/banking/asset_action.go | 10 ++--- core/banking/erc20.go | 10 ++--- core/banking/mocks/mocks.go | 40 +++++++++---------- core/bridges/erc...
CWE-20: Improper Input Validation
GHSA-rgvj-c7cw-xr3r
null
[ { "commit_message": "[PATCH] null-pointer check in debug output (fixes #426) libde265/slice.cc | 11 ++++++++++- 1 file changed, 10 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBlMzZiNGExYjBiYWZhNTNkZjQ3NTE0YzQxOWQ1YmUzZTg5MTZlYmM3IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBEaXJrIEZhcmluIDxkaXJrLmZ...
null
GHSA-xq9w-j69v-6chc
null
[ { "commit_message": "[PATCH] Patched the RCE (#636) I have patched the file upload directory traversal to Authenticated Remote Code Execution Vulnerability. tinyfilemanager.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAyMDQ2YmJkZTcyZWQ3NmFmMGNmZGNhZTA4MmRlNjI5YmNjNGI0N...
null
CVE-2016-10166
Integer underflow in the _gdContributionsAlloc function in gd_interpolation.c in the GD Graphics Library (aka libgd) before 2.2.4 allows remote attackers to have unspecified impact via vectors related to decrementing the u variable.
[ { "commit_message": "[PATCH] Fix potential unsigned underflow No need to decrease `u`, so we don't do it. While we're at it, we also factor out the overflow check of the loop, what improves performance and readability. This issue has been reported by Stefan Esser to security@libgd.org. src/gd_interpolation.c | ...
n/a
CVE-2022-31163
TZInfo relative path traversal vulnerability allows loading of arbitrary files
TZInfo is a Ruby library that provides access to time zone data and allows times to be converted using time zone rules. Versions prior to 0.36.1, as well as those prior to 1.2.10 when used with the Ruby data source tzinfo-data, are vulnerable to relative path traversal. With the Ruby data source, time zones are defined in Ruby files. There is one file per time zone. Time zone files are loaded with `require` on demand. In the affected versions, `TZInfo::Timezone.get` fails to validate time zone identifiers correctly, allowing a new line character within the identifier. With Ruby version 1.9.3 and later, `TZInfo::Timezone.get` can be made to load unintended files with `require`, executing them within the Ruby process. Versions 0.3.61 and 1.2.10 include fixes to correctly validate time zone identifiers. Versions 2.0.0 and later are not vulnerable. Version 0.3.61 can still load arbitrary files from the Ruby load path if their name follows the rules for a valid time zone identifier and the file has a prefix of `tzinfo/definition` within a directory in the load path. Applications should ensure that untrusted files are not placed in a directory on the load path. As a workaround, the time zone identifier can be validated before passing to `TZInfo::Timezone.get` by ensuring it matches the regular expression `\A[A-Za-z0-9+\-_]+(?:\/[A-Za-z0-9+\-_]+)*\z`.
[ { "commit_message": "[PATCH] Fix directory traversal in Timezone.get lib/tzinfo/timezone.rb | 2 +- test/in_load_path/payload.rb | 1 + test/tc_timezone.rb | 7 ++++++- 3 files changed, 8 insertions(+), 2 deletions(-) create mode 100644 test/in_load_path/payload.rb", "patch_text_b64": "RnJvbSA5Z...
CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
PYSEC-2021-793
null
[ { "commit_message": "[PATCH] Fix a null pointer exception caused by branching on uninitialized data. This is due to not checking that the params for the quantization exists. If there is no quantization, we should not access the `.params` field. PiperOrigin-RevId: 385163909 Change-Id: I2beb8d50649b6542db224c1630...
null
CVE-2022-35940
Int overflow in `RaggedRangeOp` in Tensoflow
TensorFlow is an open source platform for machine learning. The `RaggedRangOp` function takes an argument `limits` that is eventually used to construct a `TensorShape` as an `int64`. If `limits` is a very large float, it can overflow when converted to an `int64`. This triggers an `InvalidArgument` but also throws an abort signal that crashes the program. We have patched the issue in GitHub commit 37cefa91bee4eace55715eeef43720b958a01192. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
[ { "commit_message": "[PATCH] [security] Fix int overflow in RaggedRangeOp. PiperOrigin-RevId: 461749624 tensorflow/core/kernels/ragged_range_op.cc | 35 +++++++++++-------- .../core/kernels/ragged_range_op_test.cc | 12 +++++++ .../python/ops/ragged/ragged_range_op_test.py | 7 ++-- 3 files changed, 37 in...
CWE-190: Integer Overflow or Wraparound
CVE-2023-52558
OpenBSD 7.4 and 7.3 m_split() network buffer kernel crash
In OpenBSD 7.4 before errata 002 and OpenBSD 7.3 before errata 019, a network buffer that had to be split at certain length that could crash the kernel after receiving specially crafted escape sequences.
[ { "commit_message": "[PATCH] Avoid assertion failure when splitting mbuf cluster. m_split() calls m_align() to initialize the data pointer of newly allocated mbuf. If the new mbuf will be converted to a cluster, this is not necessary. If additionally the new mbuf is larger than MLEN, this can lead to a panic....
CWE-131 Incorrect Calculation of Buffer Size
PYSEC-2021-543
null
[ { "commit_message": "[PATCH] Prevent memory overflow in ParseAttrValue from nested tensors. PiperOrigin-RevId: 370108442 Change-Id: I84d64a5e8895a6aeffbf4749841b4c54d51b5889 tensorflow/core/framework/attr_value_util.cc | 58 +++++++++++++++++++- 1 file changed, 57 insertions(+), 1 deletion(-)", "patch_text_b...
null
CVE-2020-28037
is_blog_installed in wp-includes/functions.php in WordPress before 5.5.2 improperly determines whether WordPress is already installed, which might allow an attacker to perform a new installation, leading to remote code execution (as well as a denial of service for the old installation).
[ { "commit_message": "[PATCH] Upgrade/install: Improve logic check when determining installation status. Improve handling of ambiguous return values to determine if a blog is installed. Props zieladam, xknown. Merges [49377] to trunk. git-svn-id: https://develop.svn.wordpress.org/trunk@49386 602fd350-edb4-49c9-b...
n/a
CVE-2024-53900
Mongoose before 8.8.3 can improperly use $where in match, leading to search injection.
[ { "commit_message": "[PATCH] fix: disallow using $where in match Fix CVE-2024-53900 lib/helpers/populate/assignVals.js | 6 +-- .../populate/getModelsMapForPopulate.js | 19 ++++++++ test/model.populate.test.js | 46 +++++++++++++++++++ 3 files changed, 66 insertions(+), 5 delet...
n/a
CVE-2025-64187
OctoPrint is vulnerable to XSS through Action Command Notifications and Prompts
OctoPrint provides a web interface for controlling consumer 3D printers. Versions 1.11.3 and below are affected by a vulnerability that allows injection of arbitrary HTML and JavaScript into Action Command notifications and prompts popups generated by the printer. An attacker who successfully convinces a victim to print a specially crafted file could exploit this issue to disrupt ongoing prints, extract information (including sensitive configuration settings, if the targeted user has the necessary permissions for that), or perform other actions on behalf of the targeted user within the OctoPrint instance. This issue is fixed in version 1.11.4.
[ { "commit_message": "[PATCH] fix: XSS in Action Command Notification & Prompt plugin See GHSA-crvm-xjhm-9h29 .../static/js/action_command_notification.js | 2 +- .../static/js/action_command_prompt.js | 6 ++++-- 2 files changed, 5 insertions(+), 3 deletions(-)", "patch_tex...
CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
CVE-2022-39189
An issue was discovered the x86 KVM subsystem in the Linux kernel before 5.18.17. Unprivileged guest users can compromise the guest kernel because TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED situations.
[ { "commit_message": "[PATCH] KVM: x86: do not report a vCPU as preempted outside instruction boundaries If a vCPU is outside guest mode and is scheduled out, it might be in the process of making a memory access. A problem occurs if another vCPU uses the PV TLB flush feature during the period when the vCPU is s...
n/a
CVE-2017-15277
ReadGIFImage in coders/gif.c in ImageMagick 7.0.6-1 and GraphicsMagick 1.3.26 leaves the palette uninitialized when processing a GIF file that has neither a global nor local palette. If the affected product is used as a library loaded into a process that operates on interesting data, this data sometimes can be leaked via the uninitialized palette.
[ { "commit_message": "[PATCH] https://github.com/ImageMagick/ImageMagick/issues/592 coders/gif.c | 2 ++ 1 file changed, 2 insertions(+)", "patch_text_b64": "RnJvbSA5ZmQxMGNmNjMwODMyYjM2YTU4OGMxNTQ1ZDg3MzY1MzliMmYxZmI1IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBDcmlzdHkgPHVyYmFuLXdhcnJpb3JAaW1hZ2VtYWdpY2sub3Jn...
n/a
GHSA-7vr7-cghh-ch63
XWiki Platform may retrieve email addresses of all users
null
[ { "commit_message": "[PATCH] XWIKI-20333: Improved filtering and sorting of emails in Livetable .../xwiki-platform-livetable-ui/pom.xml | 14 +++ .../XWiki/LiveTableResultsMacros.xml | 7 +- .../xwiki/livetable/LiveTableResultsTest.java | 114 +++++++++++++++++- .../xwiki-platform-mail-script/pom...
null
GHSA-r4w2-hjmr-36m7
Infinispan REST Server's cache retrieval endpoints do not properly evaluate the necessary admin permissions
null
[ { "commit_message": "[PATCH] ISPN-14986 CVE-2023-3629 Non-admins should not be able to retrieve cache configuration .../rest/resources/CacheResourceV2.java | 26 +++++++++++++-- .../rest/resources/CacheResourceV2Test.java | 32 +++++++++---------- .../authorization/RESTAuthorizationTest.java | 22 +++++++...
null
CVE-2023-46731
Remote code execution through the section parameter in Administration as guest in XWiki Platform
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. XWiki doesn't properly escape the section URL parameter that is used in the code for displaying administration sections. This allows any user with read access to the document `XWiki.AdminSheet` (by default, everyone including unauthenticated users) to execute code including Groovy code. This impacts the confidentiality, integrity and availability of the whole XWiki instance. This vulnerability has been patched in XWiki 14.10.14, 15.6 RC1 and 15.5.1. Users are advised to upgrade. Users unablr to upgrade may apply the fix in commit `fec8e0e53f9` manually. Alternatively, to protect against attacks from unauthenticated users, view right for guests can be removed from this document (it is only needed for space and wiki admins).
[ { "commit_message": "[PATCH] XWIKI-21110: Improve section name display in administration .../src/main/resources/XWiki/AdminSheet.xml | 2 +- .../administration/AdminSheetPageTest.java | 60 +++++++++++++++++++ 2 files changed, 61 insertions(+), 1 deletion(-) create mode 100644 xwiki-platform-core/xwiki-plat...
CWE-94: Improper Control of Generation of Code ('Code Injection')
CVE-2022-1199
A flaw was found in the Linux kernel. This flaw allows an attacker to crash the Linux kernel by simulating amateur radio from the user space, resulting in a null-ptr-deref vulnerability and a use-after-free vulnerability.
[ { "commit_message": "[PATCH] ax25: improve the incomplete fix to avoid UAF and NPD bugs The previous commit 1ade48d0c27d (\"ax25: NPD bug when detaching AX25 device\") introduce lock_sock() into ax25_kill_by_device to prevent NPD bug. But the concurrency NPD or UAF bug will occur, when lock_sock() or release_so...
CWE-416 - Use After Free, CWE-476 - NULL Pointer Dereference.
GHSA-jggw-2q6g-c3m6
Out-of-bounds Read in OpenCV
null
[ { "commit_message": "[PATCH] video:fixed DISOpticalFlow segfault from small img modules/video/src/dis_flow.cpp | 67 ++++++++++++++++++++++++- modules/video/test/test_OF_accuracy.cpp | 28 +++++++++++ 2 files changed, 93 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSBkMTYxNWJhMTFhOTMwNjJiM...
null
CVE-2022-3324
Stack-based Buffer Overflow in vim/vim
Stack-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0598.
[ { "commit_message": "[PATCH] patch 9.0.0598: using negative array index with negative width window Problem: Using negative array index with negative width window. Solution: Make sure the window width does not become negative. src/testdir/test_cmdwin.vim | 22 ++++++++++++++++++++++ src/version.c ...
CWE-121 Stack-based Buffer Overflow
CVE-2023-49803
@koa/cors has overly permissive origin policy
@koa/cors npm provides Cross-Origin Resource Sharing (CORS) for koa, a web framework for Node.js. Prior to version 5.0.0, the middleware operates in a way that if an allowed origin is not provided, it will return an `Access-Control-Allow-Origin` header with the value of the origin from the request. This behavior completely disables one of the most crucial elements of browsers - the Same Origin Policy (SOP), this could cause a very serious security threat to the users of this middleware. If such behavior is expected, for instance, when middleware is used exclusively for prototypes and not for production applications, it should be heavily emphasized in the documentation along with an indication of the risks associated with such behavior, as many users may not be aware of it. Version 5.0.0 fixes this vulnerability.
[ { "commit_message": "[PATCH] Merge pull request from GHSA-qxrj-hx23-xp82 This is a security update for the Same Origin Policy (SOP), and also a BREAKING CHANGE. closes https://github.com/koajs/cors/security/advisories/GHSA-qxrj-hx23-xp82 .github/workflows/nodejs.yml | 4 +- README.md | 18 +++...
CWE-346: Origin Validation Error
GHSA-vj2j-6g3w-4662
Silverstripe Missing CSRF protection in login form
null
[ { "commit_message": "[PATCH] [SS-2016-006] FIX dont disable XSS for login forms docs/en/04_Changelogs/3.1.19.md | 37 +++++++++++++++++++++++++++++++++ security/LoginForm.php | 5 ----- 2 files changed, 37 insertions(+), 5 deletions(-) create mode 100644 docs/en/04_Changelogs/3.1.19.md", "patch_text...
null
CVE-2021-32664
Reflected XSS in Combodo/iTop
Combodo iTop is an open source web based IT Service Management tool. In affected versions there is a XSS vulnerability on "run query" page when logged as administrator. This has been resolved in versions 2.6.5 and 2.7.5.
[ { "commit_message": "[PATCH] =?UTF-8?q?N=C2=B04002=20-=20code=20hardening?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit pages/run_query.php | 1 - 1 file changed, 1 deletion(-)", "patch_text_b64": "RnJvbSA0ZjVjOTg3ZDhiMWJkMTI4MTRkYzYwNmVhNjliNmNmYjg4NDkwNzA0IE1vb...
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
GHSA-3wcp-fjfh-pw9r
null
[ { "commit_message": "[PATCH] (MCOP-600) Prevent public key overwriting attack via identity When using two-way automatic public key distribution, each end writes the others `identity` as a public key file locally. No validation was done on the `identity`, so it could trigger directory traversal and allow the att...
null
CVE-2015-10077
webbuilders-group silverstripe-kapost-bridge KapostService.php getPreview sql injection
A vulnerability was found in webbuilders-group silverstripe-kapost-bridge 0.3.3. It has been declared as critical. Affected by this vulnerability is the function index/getPreview of the file code/control/KapostService.php. The manipulation leads to sql injection. The attack can be launched remotely. Upgrading to version 0.4.0 is able to address this issue. The patch is named 2e14b0fd0ea35034f90890f364b130fb4645ff35. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-220471.
[ { "commit_message": "[PATCH] Fixed potential sql injection points code/control/KapostService.php | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-)", "patch_text_b64": "RnJvbSAyZTE0YjBmZDBlYTM1MDM0ZjkwODkwZjM2NGIxMzBmYjQ2NDVmZjM1IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBVbmRlZmluZWRPZmZzZXQgPGVja...
CWE-89 SQL Injection
GHSA-qr42-82qj-mw65
Improper Limitation of a Pathname to a Restricted Directory in Jenkins
null
[ { "commit_message": "[PATCH] [SECURITY-1424] .../java/hudson/model/FileParameterValue.java | 4 +- .../hudson/model/FileParameterValueTest.java | 117 +++++++++++++++++- 2 files changed, 118 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSAxOGZjN2MwYjQ2NjU1M2NiZDRmNzkwZGIzMjcwOTY0MzA1YmVlN2Y5IE1vb...
null
GHSA-ffgg-vphh-v273
Incomplete List of Disallowed Inputs in Jenkins
null
[ { "commit_message": "[PATCH] [SECURITY-358] Restrict access to metadata used by WorkflowRun. .../jenkins/security/s2m/filepath-filter.conf | 3 + .../security/s2m/AdminFilePathFilterTest.java | 60 +++++++++++++++++++ .../{ => s2m}/DefaultFilePathFilterTest.java | 12 +--- 3 files changed, 64 insertions(+), 11 d...
null
GHSA-h246-cgh4-7475
`CHECK` fail in `BCast` overflow
null
[ { "commit_message": "[PATCH] Fix crash caused by large broadcasting error. There was an int32 overflow. PiperOrigin-RevId: 475677838 tensorflow/core/util/bcast.h | 4 ++-- tensorflow/core/util/bcast_test.cc | 7 +++++++ 2 files changed, 9 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSA4MzEwY...
null
GHSA-m658-p24x-p74r
Duplicate Advisory: TLS certificate validation error in mellium.im/xmpp
null
[ { "commit_message": "[PATCH] websocket: fix incorrect TLS host verification Previously after fetching a websocket connection endpoint from a DNS TXT record we were verifying the certificate against the name fetched from the record. This is incorrect and results in the ability to MITM the connection because if D...
null
CVE-2019-17177
libfreerdp/codec/region.c in FreeRDP through 1.1.x and 2.x through 2.0.0-rc4 has memory leaks because a supplied realloc pointer (i.e., the first argument to realloc) is also used for a realloc return value.
[ { "commit_message": "[PATCH] Fixed #5645: realloc return handling client/X11/generate_argument_docbook.c | 33 +++++++++++++++++++++----- libfreerdp/codec/region.c | 17 ++++++++++--- winpr/libwinpr/utils/lodepng/lodepng.c | 6 ++++- 3 files changed, 46 insertions(+), 10 deletions(-)", "patch_tex...
n/a
CVE-2012-0973
Multiple SQL injection vulnerabilities in OSClass before 2.3.5 allow remote attackers to execute arbitrary SQL commands via the sCategory parameter to index.php, which is not properly handled by the (1) osc_search_category_id function in oc-includes/osclass/helpers/hSearch.php and (2) findBySlug function oc-includes/osclass/model/Category.php. NOTE: some of these details are obtained from third party information.
[ { "commit_message": "[PATCH 01/35] new version on hotfixes oc-includes/osclass/installer/basic_data.sql | 2 +- oc-load.php | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSBhNzQ1YWFmNDQzNzIzMmZmMmUzZTU1ZTBjMzczY2NlYmM0NGY2NDk1IE1vbiBTZXAgMTc...
n/a
CVE-2012-5967
SQL injection vulnerability in menuXML.php in Centreon 2.3.3 through 2.3.9-4 (fixed in Centreon web 2.6.0) allows remote authenticated users to execute arbitrary SQL commands via the menu parameter.
[ { "commit_message": "[PATCH] * Better SQL escape www/include/common/javascript/autologoutXMLresponse.php | 4 ++-- .../common/javascript/commandGetArgs/cmdGetExample.php | 4 ++-- .../reporting/dashboard/xmlInformations/GetXmlHost.php | 6 +++--- .../reporting/dashboard/xmlInformations/GetXmlHostGrou...
n/a
GHSA-2fc2-6r4j-p65h
Numpy arbitrary file write via symlink attack
null
[ { "commit_message": "[PATCH] ENH: remove insecure mktemp use mktemp only returns a filename, a malicous user could replace it before it gets used. numpy/core/tests/test_memmap.py | 34 ++++++++++++++--------------- numpy/core/tests/test_multiarray.py | 13 +++-------- numpy/f2py/__init__.py | 26 ...
null
CVE-2020-26257
Denial of service attack via incorrect parameters to federation APIs
Matrix is an ecosystem for open federated Instant Messaging and VoIP. Synapse is a reference "homeserver" implementation of Matrix. A malicious or poorly-implemented homeserver can inject malformed events into a room by specifying a different room id in the path of a `/send_join`, `/send_leave`, `/invite` or `/exchange_third_party_invite` request. This can lead to a denial of service in which future events will not be correctly sent to other servers over federation. This affects any server which accepts federation requests from untrusted servers. The Matrix Synapse reference implementation before version 1.23.1 the implementation is vulnerable to this injection attack. Issue is fixed in version 1.23.1. As a workaround homeserver administrators could limit access to the federation API to trusted servers (for example via `federation_domain_whitelist`).
[ { "commit_message": "[PATCH] Consistently use room_id from federation request body (#8776) * Consistently use room_id from federation request body Some federation APIs have a redundant `room_id` path param (see https://github.com/matrix-org/matrix-doc/issues/2330). We should make sure we consistently use either...
CWE-400 Uncontrolled Resource Consumption
GHSA-gw6g-3r38-pg33
null
[ { "commit_message": "[PATCH] * libtiff/tif_next.c: fix potential out-of-bound write in NeXTDecode() triggered by http://lcamtuf.coredump.cx/afl/vulns/libtiff5.tif (bugzilla #2508) ChangeLog | 6 ++++++ libtiff/tif_next.c | 10 ++++++++-- 2 files changed, 14 insertions(+), 2 deletions(-)", "patch_tex...
null
CVE-2024-22421
Potential authentication and CSRF tokens leak in JupyterLab
JupyterLab is an extensible environment for interactive and reproducible computing, based on the Jupyter Notebook and Architecture. Users of JupyterLab who click on a malicious link may get their `Authorization` and `XSRFToken` tokens exposed to a third party when running an older `jupyter-server` version. JupyterLab versions 4.1.0b2, 4.0.11, and 3.6.7 are patched. No workaround has been identified, however users should ensure to upgrade `jupyter-server` to version 2.7.2 or newer which includes a redirect vulnerability fix.
[ { "commit_message": "<5832902+krassowski@users.noreply.github.com> [PATCH] Merge pull request from GHSA-44cc-43rp-5947 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Co-authored-by: Frédéric Collonval <fcollonval@users.noreply.github.com> .../src/workspacesplugin.ts ...
CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
GHSA-38rv-5jqc-m2cv
Recurly vulnerable to SSRF
null
[ { "commit_message": "[PATCH] Fix SSRF: do not use urljoin, quote uuids recurly/resource.py | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-)", "patch_text_b64": "RnJvbSAwNDljNzQ2OTljZTkzY2YxMjZmZWZmMDZkNjMyZWE2M2ZiYTM2NzQyIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBCZW5qYW1pbiBFY2tlbCA8YmhlbH...
null
CVE-2024-29859
In MISP before 2.4.187, add_misp_export in app/Controller/EventsController.php does not properly check for a valid file upload.
[ { "commit_message": "[PATCH] fix: [security] properly check for valid file upload MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit - as kindly reported by Rémi Matasse and Raphael Lob from Synacktiv (https://www.synacktiv.com) app/Controller/EventsController.php | 9 ++++...
n/a
GHSA-43w4-4j3c-jx29
Winter CMS Stored XSS through Backend ColorPicker FormWidget
null
[ { "commit_message": "[PATCH] Escape output of colorpicker values .../backend/formwidgets/colorpicker/partials/_colorpicker.php | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSA1MTdmNjVkZmFlNjc5YjU3NTc1YjA0N2RlMTNjNWFmNDg5MTVhNWJhIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiB...
null
CVE-2019-5484
Bower before 1.8.8 has a path traversal vulnerability permitting file write in arbitrary locations via install command, which allows attackers to write arbitrary files when a malicious package is extracted.
[ { "commit_message": "[PATCH] Fix .tar.gz extract vulnerability lib/util/extract.js | 4 ++-- package.json | 2 +- 2 files changed, 3 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSA0NWM2YmZhODZmNmU1NzczMWIxNTNiYWNhOWUwYjQxYTFjYzY5OWUzIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBBZGFtIFN0YW5raWV...
Path Traversal (CWE-22)
GHSA-r6hf-gj32-7rc9
null
[ { "commit_message": "[PATCH] Avoid buffer read overflow on vcl_error and -sfile The file stevedore may return a buffer larger than asked for when requesting storage. Due to lack of check for this condition, the code to copy the synthetic error memory buffer from vcl_error would overrun the buffer. Patch by @sha...
null
GHSA-h773-7gf7-9m2x
NeuVector is shipping cryptographic material into its binary
null
[ { "commit_message": "[PATCH] NVSHAS-9553-9979-9987 controller/api/apis.go | 15 +- controller/api/apis.yaml | 8 + controller/api/internal_apis.go | 1 + controller/api/log_apis.go | 4 + controller/cache/cache.go | 95 ++++- c...
null
GHSA-jh3w-6jp2-vqqm
Missing permission check of canView in GridFieldPrintButton
null
[ { "commit_message": "[PATCH] [CVE-2023-22728] Check canView before printing from GridField src/Forms/GridField/GridFieldPrintButton.php | 24 ++++++++++--------- .../GridField/GridFieldPrintButtonTest.php | 16 +++++++++++-- .../GridFieldPrintButtonTest/TestObject.php | 7 ++++++ 3 files changed, 34 inserti...
null
GHSA-j3rw-fx6g-q46j
Apptainer ineffectively applies selinux and apparmor --security options
null
[ { "commit_message": "[PATCH] fix: use pathrs-lite/procfs when writing apparmor profile When an apparmor profile is writtend into the attr/exec in procfs, we must ensure we are writing into a genuine attr/exec inside a genuins procfs. This is necessary to block attacks that redirect the write somewhere that it i...
null
GHSA-qh4q-fwf8-qqrw
Zope Denial of Service (DoS) vulnerability in ZServer
null
[ { "commit_message": "[PATCH] Prevent uncaught exceptions from killing ZServer worker threads. See https://bugs.launchpad.net/zope2/+bug/627988. doc/CHANGES.txt | 3 ++ .../ZServer/PubCore/ZServerPublisher.py | 46 +++++++++++-------- 2 files changed, 30 insertions(+), 19 delet...
null
GHSA-v8rh-c9vm-p8g7
null
[ { "commit_message": "[PATCH] common: [security fix] Make sure sockets only listen locally common/socket.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSBkZjFmNWM0ZDcwZDBjMTlhZDQwMDcyZjUyNDZjYTQ1N2U3Zjk4NDllIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBKb3NodWEgSGlsbCA8cG9z...
null
CVE-2023-24828
Use of Cryptographically Weak Pseudo-Random Number Generator in Onedev
Onedev is a self-hosted Git Server with CI/CD and Kanban. In versions prior to 7.9.12 the algorithm used to generate access token and password reset keys was not cryptographically secure. Existing normal users (or everyone if it allows self-registration) may exploit this to elevate privilege to obtain administrator permission. This issue is has been addressed in version 7.9.12. Users are advised to upgrade. There are no known workarounds for this vulnerability.
[ { "commit_message": "[PATCH] Fix issue #1179 - OneDev should use crypto strong random string for access token and password reset .../io/onedev/server/git/hook/HookUtils.java | 22 ++++---- .../onedev/server/migration/DataMigrator.java | 19 +++++-- .../io/onedev/server/model/EmailAddress.java | 22 +++----- .../...
CWE-338: Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
GHSA-4cvm-5776-jx9f
Ansible Arbitrary Code Execution
null
[ { "commit_message": "[PATCH] When parsing json from untrusted sources, remove templating tags lib/ansible/inventory/script.py | 2 +- lib/ansible/runner/__init__.py | 2 +- lib/ansible/runner/return_data.py | 3 +-- lib/ansible/utils/__init__.py | 42 ++++++++++++++++++++++++++++--- lib/ansible/utils/te...
null
GHSA-c5f4-p5wv-2475
xwiki.platform:xwiki-platform-panels-ui Eval Injection vulnerability
null
[ { "commit_message": "[PATCH] XWIKI-20293: Improved IncludedDocuments panel escaping .../xwiki-platform-panels-ui/pom.xml | 8 ++ .../IncludedPagesDocumentInformation.xml | 42 +----- ...ludedPagesDocumentInformationPageTest.java | 134 ++++++++++++++++++ 3 files changed, 146 insertions(+), 38 dele...
null
GHSA-6w82-v552-wjw2
Shopware Storefront Reflected XSS in Storefront Login Page
null
[ { "commit_message": "[PATCH 1/2] fix: input validation of request paramteres in account login page src/Storefront/Controller/AuthController.php | 10 +++++++--- .../views/storefront/component/account/login.html.twig | 4 ++-- 2 files changed, 9 insertions(+), 5 deletions(-)", "patch_text_b64": "RnJ...
null
GHSA-w38g-hj45-mjjp
Contao SQL injection in the backend and listing module
null
[ { "commit_message": "[PATCH] [Core] Prevent SQL injections in the back end search panel (see CVE-2017-16558). core-bundle/CHANGELOG.md | 1 + core-bundle/src/Resources/contao/drivers/DC_Table.php | 10 ++++++++-- 2 files changed, 9 insertions(+), 2 deletions(-)", "patch_text_b64"...
null
CVE-2014-0083
The Ruby net-ldap gem before 0.11 uses a weak salt when generating SSHA passwords.
[ { "commit_message": "[PATCH] Use SecureRandam to generate salt lib/net/ldap/password.rb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBiNDEyY2EwNWY2YjQzMGVhYTFjZTk3YWM5NTg4NWI0Y2YxODdiMDRhIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBUYXRzdXlhIFNhdG8gPHRhdHN1eWEuYi5zYXRvQG1haW...
Password
GHSA-3rmv-2pg5-xvqj
Spring Framework has Improperly Implemented Security Check for Standard
null
[ { "commit_message": "[PATCH] Re-use EvaluationContext in DefaultSubscriptionRegistry Rather than create a new EvaluationContext instance per evaluation, we now create a statically shared instance, without the root object in it, and re-use it for all evalutations. .../broker/DefaultSubscriptionRegistry.java | ...
null
GHSA-3x59-vrmc-5mx6
@webiny/react-rich-text-renderer vulnerable to insecure rendering of rich text content
null
[ { "commit_message": "[PATCH] fix(react-rich-text-renderer): sanitize HTML before rendering (#3477) packages/react-rich-text-renderer/README.md | 146 +++++++++++------- .../react-rich-text-renderer/package.json | 4 +- .../react-rich-text-renderer/src/index.tsx | 88 +++++++++-- yarn.lock ...
null
CVE-2022-1222
Inf loop in gpac/gpac
Inf loop in GitHub repository gpac/gpac prior to 2.1.0-DEV.
[ { "commit_message": "[PATCH] fixed #2159 src/media_tools/avilib.c | 7 +++++-- 1 file changed, 5 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSA3ZjA2MGJiYjcyOTY2Y2FlODBkNmZlZTMzOGQwYjA3ZmEzZmMwNmUxIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBqZWFubGYgPGplYW5sZkBncGFjLmlvPgpEYXRlOiBUaHUsIDMxIE1hciAyM...
CWE-835 Loop with Unreachable Exit Condition
GHSA-w7wr-8ggv-cvqw
null
[ { "commit_message": "[PATCH] media: rc: prevent memory leak in cx23888_ir_probe In cx23888_ir_probe if kfifo_alloc fails the allocated memory for state should be released. Signed-off-by: Navid Emamdoost <navid.emamdoost@gmail.com> Signed-off-by: Sean Young <sean@mess.org> Signed-off-by: Mauro Carvalho Chehab <m...
null