id stringlengths 12 19 | title stringlengths 0 237 | description stringlengths 35 3.87k ⌀ | patches listlengths 1 22 | cwe stringlengths 2 440 ⌀ |
|---|---|---|---|---|
CVE-2022-24829 | Missing authentication in Garden | Garden is an automation platform for Kubernetes development and testing. In versions prior to 0.12.39 multiple endpoints did not require authentication. In some operating modes this allows for an attacker to gain access to the application erroneously. The configuration is leaked through the /api endpoint on the local server that is responsible for serving the Garden dashboard. At the moment, this server is accessible to 0.0.0.0 which makes it accessible to anyone on the same network (or anyone on the internet if they are on a public, static IP). This may lead to the ability to compromise credentials, secrets or environment variables. Users are advised to upgrade to version 0.12.39 as soon as possible. Users unable to upgrade should use a firewall blocking access to port 9777 from all untrusted network machines. | [
{
"commit_message": "[PATCH] fix(core): require auth key for server endpoints core/src/cli/cli.ts | 6 +- core/src/constants.ts | 1 + core/src/events.ts | 2 +- core/src/server/dashboard-event-stream.ts | 6 +- core/src/server/ser... | CWE-306: Missing Authentication for Critical Function |
GHSA-fg52-xjfc-9rh8 | Pterodactyl vulnerable to 2FA Sniffing | null | [
{
"commit_message": "[PATCH] Change 2FA service to generate the secret on our own and use an external QR service to display the image .../Controllers/Base/SecurityController.php | 4 +- app/Services/Users/TwoFactorSetupService.php | 42 ++--- composer.json | 1 - composer.lo... | null |
CVE-2024-29041 | Express.js Open Redirect in malformed URLs | Express.js minimalist web framework for node. Versions of Express.js prior to 4.19.0 and all pre-release alpha and beta versions of 5.0 are affected by an open redirect vulnerability using malformed URLs. When a user of Express performs a redirect using a user-provided URL Express performs an encode [using `encodeurl`](https://github.com/pillarjs/encodeurl) on the contents before passing it to the `location` header. This can cause malformed URLs to be evaluated in unexpected ways by common redirect allow list implementations in Express applications, leading to an Open Redirect via bypass of a properly implemented allow list. The main method impacted is `res.location()` but this is also called from within `res.redirect()`. The vulnerability is fixed in 4.19.2 and 5.0.0-beta.3. | [
{
"commit_message": "[PATCH] Prevent open redirect allow list bypass due to encodeurl Co-authored-by: Jon Church <me@jonchurch.com> lib/response.js | 20 ++++++++++++++++++- test/res.location.js | 46 +++++++++++++++++++++++++++++++++++++++++++- 2 files changed, 64 insertions(+), 2 deletions(-)",
"patch_... | CWE-601: URL Redirection to Untrusted Site ('Open Redirect') |
CVE-2023-48708 | Insertion of Sensitive Information into Log in codeigniter4/shield | CodeIgniter Shield is an authentication and authorization provider for CodeIgniter 4. In affected versions successful login attempts are recorded with the raw tokens stored in the log table. If a malicious person somehow views the data in the log table they can obtain a raw token which can then be used to send a request with that user's authority. This issue has been addressed in version 1.0.0-beta.8. Users are advised to upgrade. Users unable to upgrade should disable logging for successful login attempts by the configuration files. | [
{
"commit_message": "[PATCH 01/10] fix: Access Token Authenticator raw tokens are logged .../Authenticators/AccessTokens.php | 11 +++---- .../AccessTokenAuthenticatorTest.php | 33 +++++++++++++++++++ 2 files changed, 38 insertions(+), 6 deletions(-)",
"patch_text_b64": "RnJvbSAwNDA1ZDMxNj... | CWE-532: Insertion of Sensitive Information into Log File |
GHSA-v977-h4hm-rrff | WWBN AVideo Improper Restriction of Excessive Authentication Attempts vulnerability | null | [
{
"commit_message": "[PATCH] build(deps): bump aws/aws-sdk-php from 3.285.4 to 3.287.0 Bumps [aws/aws-sdk-php](https://github.com/aws/aws-sdk-php) from 3.285.4 to 3.287.0. - [Release notes](https://github.com/aws/aws-sdk-php/releases) - [Commits](https://github.com/aws/aws-sdk-php/compare/3.285.4...3.287.0) upd... | null |
GHSA-97jm-g33h-f46g | silverstripe/framework ReadOnly transformation for formfields exploitable | null | [
{
"commit_message": "[PATCH 1/3] [SS-2016-010] FIX Cast FormField values as Text to prevent readonly fields embeding rogue HTML forms/FormField.php | 8 ++++++++ forms/HtmlEditorField.php | 8 ++++++++ forms/ReadonlyField.php | 16 +++++++++++++++- forms/TextareaField.php ... | null |
CVE-2023-22726 | Unrestricted file upload leading to privilege escalation in act | act is a project which allows for local running of github actions. The artifact server that stores artifacts from Github Action runs does not sanitize path inputs. This allows an attacker to download and overwrite arbitrary files on the host from a Github Action. This issue may lead to privilege escalation. The /upload endpoint is vulnerable to path traversal as filepath is user controlled, and ultimately flows into os.Mkdir and os.Open. The /artifact endpoint is vulnerable to path traversal as the path is variable is user controlled, and the specified file is ultimately returned by the server. This has been addressed in version 0.2.40. Users are advised to upgrade. Users unable to upgrade may, during implementation of Open and OpenAtEnd for FS, ensure to use ValidPath() to check against path traversal or clean the user-provided paths manually. | [
{
"commit_message": "[PATCH] fix: update artifact server to address GHSL-2023-004 (#1565) .vscode/settings.json | 1 + pkg/artifacts/server.go | 82 +++++----- pkg/artifacts/server_test.go | 149 +++++++++++++----- .../testdata/GHSL-2023-004/artifac... | CWE-434: Unrestricted Upload of File with Dangerous Type |
GHSA-g43p-7j43-jpj7 | null | [
{
"commit_message": "[PATCH] Apply CVE fixes for X509 parsing Apply patches developed by Sze Yiu which correct a vulnerability in X509 parsing. See CVE-2018-16150 and CVE-2018-16149 for more info. ssl/os_port.h | 12 ++++++ ssl/x509.c | 102 +++++++++++++++++++++++++++++++------------------- 2 files changed,... | null | |
GHSA-4wjx-42q4-77fh | null | [
{
"commit_message": "[PATCH] scsi: libsas: fix memory leak in sas_smp_get_phy_events() We've got a memory leak with the following producer: while true; do cat /sys/class/sas_phy/phy-1:0:12/invalid_dword_count >/dev/null; done The buffer req is allocated and not freed after we return. Fix it. Fixes: 2908d778ab3e... | null | |
GHSA-9g7r-h55w-795g | null | [
{
"commit_message": "[PATCH] =?UTF-8?q?=F0=9F=AA=90=20refactor:=20Migrate=20Share=20Fu?= =?UTF-8?q?nctionality=20to=20Type-Safe=20Methods=20(#7903)?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit * chore: Update import for isEnabled utility in convoAccess middleware *... | null | |
CVE-2016-7142 | The m_sasl module in InspIRCd before 2.0.23, when used with a service that supports SASL_EXTERNAL authentication, allows remote attackers to spoof certificate fingerprints and consequently log in as another user via a crafted SASL message. | [
{
"commit_message": "[PATCH] m_sasl: don't allow AUTHENTICATE with mechanisms with a space src/modules/m_sasl.cpp | 4 ++++ 1 file changed, 4 insertions(+)",
"patch_text_b64": "RnJvbSA3NGZhZmI3ZjExYjA2NzQ3ZjY5ZjE4MmFkNWUzNzY5YjY2NWVlYTdhIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBBZGFtIDxBZGFtQGFub3BlLm9yZz4K... | n/a | |
GHSA-8xc6-g8xw-h2c4 | YARP Denial of Service Vulnerability | null | [
{
"commit_message": "[PATCH] Attribute request failure blame before determining a destination's health (#1648) .../TransportFailureRateHealthPolicy.cs | 27 ++- .../PassiveHealthCheckTests.cs | 172 ++++++++++++++++++ 2 files changed, 197 insertions(+), 2 deletions(-) create mode 100644 test... | null |
CVE-2024-0765 | Default user role exporting save state of instance | As a default user on a multi-user instance of AnythingLLM, you could execute a call to the `/export-data` endpoint of the system and then unzip and read that export that would enable you do exfiltrate data of the system at that save state.
This would require the attacked to be granted explicit access to the system, but they can do this at any role. Additionally, post-download, the data is deleted so no evidence would exist that the exfiltration occured. | [
{
"commit_message": "[PATCH] Merge pull request from GHSA-xmj6-g32r-fc5q * remove support for import export anythingllm data * remove unused imports remove unused dep update lockfile Co-authored-by: timothycarambat <rambat1010@gmail.com> frontend/src/App.jsx | 7 - .../src/components/S... | CWE-200 Exposure of Sensitive Information to an Unauthorized Actor |
GHSA-246w-56m2-5899 | Cross-site scripting (XSS) vulnerability in the password reset endpoint | null | [
{
"commit_message": "[PATCH] Clean-up the template loading code. (#9200) * Enables autoescape by default for HTML files. * Adds a new read_template method for reading a single template. * Some logic clean-up. UPGRADE.rst | 37 ++++++++++++++++ changelog.d/9200.misc ... | null |
GHSA-h533-q6jc-qx28 | Cloud Foundry Runtime Insufficient Session Expiration vulnerability | null | [
{
"commit_message": "[PATCH] Upon a password change we will expire all HTTP sessions for that user https://www.pivotaltracker.com/story/show/100043648 [#100043648] .../AuthzAuthenticationFilter.java | 2 +- .../authentication/SessionResetFilter.java | 98 ++++++++++ .../uaa/authentication/UaaAuth... | null |
CVE-2017-17852 | kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging mishandling of 32-bit ALU ops. | [
{
"commit_message": "[PATCH] bpf: fix 32-bit ALU op verification 32-bit ALU ops operate on 32-bit values and have 32-bit outputs. Adjust the verifier accordingly. Fixes: f1174f77b50c (\"bpf/verifier: rework value tracking\") Signed-off-by: Jann Horn <jannh@google.com> Signed-off-by: Alexei Starovoitov <ast@kern... | n/a | |
CVE-2023-46249 | authentik potential installation takeover when default admin user is deleted | authentik is an open-source Identity Provider. Prior to versions 2023.8.4 and 2023.10.2, when the default admin user has been deleted, it is potentially possible for an attacker to set the password of the default admin user without any authentication. authentik uses a blueprint to create the default admin user, which can also optionally set the default admin users' password from an environment variable. When the user is deleted, the `initial-setup` flow used to configure authentik after the first installation becomes available again. authentik 2023.8.4 and 2023.10.2 fix this issue. As a workaround, ensure the default admin user (Username `akadmin`) exists and has a password set. It is recommended to use a very strong password for this user, and store it in a secure location like a password manager. It is also possible to deactivate the user to prevent any logins as akadmin. | [
{
"commit_message": "[PATCH] security: fix oobe-flow reuse when akadmin is deleted (#7361) Signed-off-by: Jens Langhammer <jens@goauthentik.io> .../migrations/0027_auto_20231028_1424.py | 34 +++++++++++++++++++ blueprints/default/flow-oobe.yaml | 19 +++++++++++ blueprints/system/bootstrap.yaml ... | CWE-287: Improper Authentication |
CVE-2021-3770 | Heap-based Buffer Overflow in vim/vim | vim is vulnerable to Heap-based Buffer Overflow | [
{
"commit_message": "[PATCH] patch 8.2.3402: invalid memory access when using :retab with large value Problem: Invalid memory access when using :retab with large value. Solution: Check the number is positive. src/indent.c | 34 +++++++++++++++++++++------------- src/option.c | 12... | CWE-122 Heap-based Buffer Overflow |
CVE-2021-21375 | Crash in receiving updated SDP answer after initial SDP negotiation failed | PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In PJSIP version 2.10 and earlier, after an initial INVITE has been sent, when two 183 responses are received, with the first one causing negotiation failure, a crash will occur. This results in a denial of service. | [
{
"commit_message": "[PATCH] Merge pull request from GHSA-hvq6-f89p-frvp pjmedia/src/pjmedia/sdp_neg.c | 14 ++++++++++++-- 1 file changed, 12 insertions(+), 2 deletions(-)",
"patch_text_b64": "RnJvbSA5N2IzZDdhZGRiYWE3MjBiN2RkYjBhZjliZjZmM2U0NDNlNjY0MzY1IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBOYW5hbmcgSXp... | CWE-400 Uncontrolled Resource Consumption |
CVE-2022-29776 | Onlyoffice Document Server v6.0.0 and below and Core 6.1.0.26 and below were discovered to contain a stack overflow via the component DesktopEditor/common/File.cpp. | [
{
"commit_message": "[PATCH] Fix 25 errors DesktopEditor/common/File.cpp | 151 ++++++++++++------ DesktopEditor/cximage/CxImage/xfile.h | 29 +++- DesktopEditor/cximage/CxImage/ximabmp.cpp | 14 +- DesktopEditor/cximage/CxImage/ximage.cpp | 14 +- DesktopEditor/cximage/CxImage/x... | n/a | |
CVE-2026-22588 | Spree API has Authenticated Insecure Direct Object Reference (IDOR) via Order Modification | Spree is an open source e-commerce solution built with Ruby on Rails. Prior to versions 4.10.2, 5.0.7, 5.1.9, and 5.2.5, an Authenticated Insecure Direct Object Reference (IDOR) vulnerability was identified that allows an authenticated user to retrieve other users’ address information by modifying an existing order. By editing an order they legitimately own and manipulating address identifiers in the request, the backend server accepts and processes references to addresses belonging to other users, subsequently associating those addresses with the attacker’s order and returning them in the response. This issue has been patched in versions 4.10.2, 5.0.7, 5.1.9, and 5.2.5. | [
{
"commit_message": "[PATCH] =?UTF-8?q?Fixed=20GHSA-g268-72p7-9j6j=20Authenticated=20I?= =?UTF-8?q?nsecure=20Direct=20Object=20Refere=E2=80=A6=20(#13423)?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Fixed GHSA-g268-72p7-9j6j Authenticated Insecure Direct Object Ref... | CWE-639: Authorization Bypass Through User-Controlled Key |
CVE-2023-23941 | SwagPayPal payment not sent to PayPal correctly | SwagPayPal is a PayPal integration for shopware/platform. If JavaScript-based PayPal checkout methods are used (PayPal Plus, Smart Payment Buttons, SEPA, Pay Later, Venmo, Credit card), the amount and item list sent to PayPal may not be identical to the one in the created order. The problem has been fixed with version 5.4.4. As a workaround, disable the aforementioned payment methods or use the Security Plugin in version >= 1.0.21. | [
{
"commit_message": "[PATCH] Update changelog CHANGELOG.md | 1 + CHANGELOG_de-DE.md | 1 + 2 files changed, 2 insertions(+)",
"patch_text_b64": "RnJvbSA1N2RiNWY0YTU3ZWYwYTE2NDZiNTA5YjQxNWRlOWYwM2JmNDQxYjA4IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBNYXggU3RlZ21leWVyIDxtLnN0ZWdtZXllckBzaG9wd2FyZS5jb20+Ck... | CWE-345: Insufficient Verification of Data Authenticity |
CVE-2025-52477 | Octo-STS Vulnerable to Unauthenticated SSRF with HTTP Response Reflection in OIDC Flow | Octo-STS is a GitHub App that acts like a Security Token Service (STS) for the GitHub API. Octo-STS versions before v0.5.3 are vulnerable to unauthenticated SSRF by abusing fields in OpenID Connect tokens. Malicious tokens were shown to trigger internal network requests which could reflect error logs with sensitive information. Upgrade to v0.5.3 to resolve this issue. This version includes patch sets to sanitize input and redact logging. | [
{
"commit_message": "[PATCH] Merge commit from fork pkg/octosts/octosts.go | 22 +++++++++++++++------- 1 file changed, 15 insertions(+), 7 deletions(-)",
"patch_text_b64": "RnJvbSAwZjE3N2ZkZTU0ZjkzMThlMzNmMGJiYTZhYmFlYTk0NjNhN2MzYWZkIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBDYXJsb3MgVGFkZXUgUGFuYXRvIEp1bml... | CWE-918: Server-Side Request Forgery (SSRF) |
GHSA-3q24-rrgq-j66h | null | [
{
"commit_message": "[PATCH] xss: Organization Search q This mitigates a vulnerability reported by @indevi0us where XSS is possible via the `q` parameter in organization lookups. This sanitizes the parameter value before use as well as htmlchars it before adding to JSON output. include/ajax.orgs.php | 4 ++-- 1 ... | null | |
GHSA-73rg-f94j-xvhx | Plate allows arbitrary DOM attributes in element.attributes and leaf.attributes | null | [
{
"commit_message": "[PATCH 1/5] Mitigate XSS in `element.attributes` .changeset/lovely-taxis-bake.md | 5 + .changeset/olive-shrimps-joke.md | 31 ++++ packages/core/src/lib/plugin/BasePlugin.ts | 31 ++++ .../core/src/react/components/Plate.spec.tsx | 83 ++++++++- .../src/reac... | null |
CVE-2022-37109 | patrickfuller camp up to and including commit bbd53a256ed70e79bd8758080936afbf6d738767 is vulnerable to Incorrect Access Control. Access to the password.txt file is not properly restricted as it is in the root directory served by StaticFileHandler and the Tornado rule to throw a 403 error when password.txt is accessed can be bypassed. Furthermore, it is not necessary to crack the password hash to authenticate with the application because the password hash is also used as the cookie secret, so an attacker can generate his own authentication cookie. | [
{
"commit_message": "[PATCH] Fix vulnerability and add warning README.md | 15 ++++++++------- server.py | 15 +++++---------- client.js => static/client.js | 0 favicon.ico => static/favicon.ico | Bin {img => static/img}/example.png | Bin {img => static/im... | n/a | |
GHSA-fr6p-j5w9-5pc8 | null | [
{
"commit_message": "[PATCH] issue #67: make sure sample rate is specified and non-zero in DFF files cli/dsdiff.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)",
"patch_text_b64": "RnJvbSBiYzZjYmEzZjU1MmM0NDU2NWY3ZjFlNjZkYzE1ODAxODlhZGRiMmI0IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBEYXZpZCBCcnlh... | null | |
GHSA-9q37-6mpp-rv7v | null | [
{
"commit_message": "[PATCH] (cp 917cab5a4) fixes GHSA-7379-w44f-mfw4 and fixes GHSA-8g2g-6f2c-6h7j protect tag name from XSS admin/include/functions.php | 3 +++ 1 file changed, 3 insertions(+)",
"patch_text_b64": "RnJvbSA1MDY5NjEwYWFlYjFkYTZkOTZkMzg5NjUxYTViYTliMzg2OTBjNTgwIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwM... | null | |
CVE-2017-6309 | An issue was discovered in tnef before 1.4.13. Two type confusions have been identified in the parse_file() function. These might lead to invalid read and write operations, controlled by an attacker. | [
{
"commit_message": "[PATCH] Check types to avoid invalid reads/writes. src/file.c | 4 ++++ src/tnef.c | 16 +++++++++------- 2 files changed, 13 insertions(+), 7 deletions(-)",
"patch_text_b64": "RnJvbSA4ZGNjZjc5ODU3Y2VlYjdhNmQzZTQyYzFlNzYyZTdiODY1ZDUzNDRkIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBFcmljIFN... | n/a | |
GHSA-vm74-j4wq-82xj | Sisimai Inefficient Regular Expression Complexity vulnerability | null | [
{
"commit_message": "[PATCH] Prevent Regex Denial of Service in Sisimai::String.to_plain lib/sisimai/string.rb | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)",
"patch_text_b64": "RnJvbSA1MWZlMmU2NTIxYzljMDJiNDIxYjM4Mzk0M2RjOWU0YmJiZTY1ZDRlIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiA9P1VURi04P3E/R29... | null |
CVE-2025-23212 | Tandoor Recipes - Local file disclosure - Users can read the content of any file on the server | Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. The external storage feature allows any user to enumerate the name and content of files on the server. This vulnerability is fixed in 1.5.28. | [
{
"commit_message": "[PATCH] restrict local external recipes to superusers and restrict file path/type cookbook/provider/local.py | 26 +++++++++++++++----------- cookbook/views/edit.py | 2 +- cookbook/views/new.py | 8 +++++++- 3 files changed, 23 insertions(+), 13 deletions(-)",
"patch_text_b64":... | CWE-200: Exposure of Sensitive Information to an Unauthorized Actor |
GHSA-839r-7hhg-xhqr | null | [
{
"commit_message": "[PATCH] Release 4.3.1 CHANGELOG | 4 + docs/conf.py | 2 +- include/lsquic.h | 2 +- qir/run_endpoint.sh | 4 + src/liblsquic/lsquic_alarmset.c | 15 +++ src/liblsquic/lsquic_alarmset.h ... | null | |
GHSA-238g-gw8w-m679 | null | [
{
"commit_message": "[PATCH] https://github.com/ImageMagick/ImageMagick/issues/120 coders/wpg.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSBiZWYxZTRmNjM3ZDhmNjY1YmMxMzNhOWM2ZDMwZGYwOGQ5ODNiYzNhIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBDcmlzdHkgPHVyYmFuLXdhcnJpb3JAaW1hZ2... | null | |
GHSA-g2fr-rq52-c2h3 | null | [
{
"commit_message": "[PATCH] shared/gatt-server: Fix heap overflow when appending prepare writes The code shall check if the prepare writes would append more the allowed maximum attribute length. Fixes https://github.com/bluez/bluez/security/advisories/GHSA-479m-xcq5-9g2q src/shared/gatt-server.c | 22 +++++++++... | null | |
CVE-2016-2044 | libraries/sql-parser/autoload.php in the SQL parser in phpMyAdmin 4.5.x before 4.5.4 allows remote attackers to obtain sensitive information via a crafted request, which reveals the full path in an error message. | [
{
"commit_message": "[PATCH] Avoid invalid invocation of SQL parser MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Signed-off-by: Michal Čihař <michal@cihar.com> libraries/sql-parser/autoload.php | 3 +++ 1 file changed, 3 insertions(+)",
"patch_text_b64": "RnJvbSBj... | n/a | |
GHSA-9rxm-rvcp-xvp2 | null | [
{
"commit_message": "[PATCH] fixes #188 admin/panels/uploader/admin.uploader.php | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSBmNjM5NGVhYzdhMGUwMDFkMmIxYWM2MzhkMzMxM2U1MzFkMTllYTkzIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBhemV0dCA8Z2l0aHVicmVnaXN0cmllcnVuZ0BhemV0dC5jb20... | null | |
GHSA-pj36-9rxw-2h2x | null | [
{
"commit_message": "[PATCH] Skip MNG CLIP chunk with out-of-range object IDs coders/png.c | 3 +++ 1 file changed, 3 insertions(+)",
"patch_text_b64": "RnJvbSBkMDcyZWQ2YWZmODM1YzE3NGU4NTZjZTNhNDI4MTYzYzBkYTllOGY0IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBHbGVubiBSYW5kZXJzLVBlaHJzb24gPGdsZW5ucnBAZ21haWwuY29t... | null | |
PYSEC-2022-43010 | null | [
{
"commit_message": "[PATCH] Make sure that all ssh keys are unique, regardless of the user README.md | 1 + rdiffweb/core/model/__init__.py | 23 ++++++++++++++-- rdiffweb/core/model/_sshkey.py | 6 ++++- rdiffweb/core/model/_user.py | 5 ++-- rdiffweb/core/... | null | |
GHSA-c4q5-6c82-3qpw | Spring Security vulnerable to Authorization Bypass of Static Resources in WebFlux Applications | null | [
{
"commit_message": "[PATCH] Add Firewall for WebFlux Closes gh-15967 docs/modules/ROOT/nav.adoc | 1 + .../pages/reactive/exploits/firewall.adoc | 202 +++++ .../web/server/WebFilterChainProxy.java | 47 +- .../HttpStatusExchangeRejectedHandler.java | 66 ++ .../ServerExchangeRe... | null |
GHSA-wh6m-h6f4-rjf4 | Libredesk has Improper Neutralization of HTML Tags in a Web Page | null | [
{
"commit_message": "[PATCH] fix: use vue-letter to render html in contact notes, command box. This prevents forms from being injected in contact notes, macros etc. Use common message bubble component to render msg bubbles. Delete duplicate contact and agent msg bubbles. Remove vue dompuritfy html dep frontend... | null |
GHSA-pfj7-w373-gqch | Cross-Site Request Forgery in firefly-iii | null | [
{
"commit_message": "[PATCH] Catch CSRF issues .../Controllers/Rule/CreateController.php | 15 +++-- .../Controllers/RuleGroup/EditController.php | 56 +++++++++---------- .../RuleGroup/RuleGroupRepository.php | 3 - public/v1/js/ff/rules/index.js | 29 ++++++++++ resources/views/v1/rul... | null |
CVE-2021-21352 | Predictable tokens used for password resets | Anuko Time Tracker is an open source, web-based time tracking application written in PHP. In TimeTracker before version 1.19.24.5415 tokens used in password reset feature in Time Tracker are based on system time and, therefore, are predictable. This opens a window for brute force attacks to guess user tokens and, once successful, change user passwords, including that of a system administrator. This vulnerability is pathced in version 1.19.24.5415 (started to use more secure tokens) with an additional improvement in 1.19.24.5416 (limited an available window for brute force token guessing). | [
{
"commit_message": "[PATCH] Fixed a critical security vulnerability with password resets. WEB-INF/templates/report.tpl | 4 ++++ initialize.php | 2 +- password_reset.php | 5 ++++- 3 files changed, 9 insertions(+), 2 deletions(-)",
"patch_text_b64": "RnJvbSA0MGYzZDkzNDVhZGMyMGU2ZjI4ZW... | CWE-330: Use of Insufficiently Random Values |
GHSA-vfm6-r2gc-pwww | Symfony2 security issue when the trust proxy mode is enabled | null | [
{
"commit_message": "[PATCH] [HttpFoundation] reverted variable rename Request.php | 16 ++++++++-------- 1 file changed, 8 insertions(+), 8 deletions(-)",
"patch_text_b64": "RnJvbSA1Y2RlNTIyOWZjNzFhMTljZWYyYTBhOTMzYTE4ZTA4ZTQzMjUyZjM0IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBGYWJpZW4gUG90ZW5jaWVyIDxmYWJpZW... | null |
GHSA-c2w9-48qc-qpj4 | Code injection in ansible | null | [
{
"commit_message": "[PATCH] Fix security issue refs #4 * Update version to 1.0.5 * Update to use yaml.safe_load() * Update to tomoh1r .travis.yml | 20 +++++++++++++------- CHANGES.txt | 10 ++++++++++ README.rst | 4 ++-- README_test.rst ... | null |
GHSA-grv7-4qw2-wr4j | null | [
{
"commit_message": "[PATCH] fix: crash when accidental without a note at start of line after K: Issue #84. abcparse.c | 17 ++++++++++------- 1 file changed, 10 insertions(+), 7 deletions(-)",
"patch_text_b64": "RnJvbSAzMTY5YWNlNmQ2M2Y2ZjUxN2E2NGU4ZGYwMjk4ZjQ0YTQ5MGM0YTE1IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpG... | null | |
PYSEC-2012-38 | null | [
{
"commit_message": "[PATCH] Prevent file injection writing to host filesystem. MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Fix bug 1015531, CVE-2012-3360, CVE-2012-3361 This patch prevents the file injection code from writing into the host filesystem if a user spec... | null | |
CVE-2014-1737 | The raw_cmd_copyin function in drivers/block/floppy.c in the Linux kernel through 3.14.3 does not properly handle error conditions during processing of an FDRAWCMD ioctl call, which allows local users to trigger kfree operations and gain privileges by leveraging write access to a /dev/fd device. | [
{
"commit_message": "[PATCH] floppy: ignore kernel-only members in FDRAWCMD ioctl input Always clear out these floppy_raw_cmd struct members after copying the entire structure from userspace so that the in-kernel version is always valid and never left in an interdeterminate state. Signed-off-by: Matthew Daley <... | n/a | |
GHSA-qjr6-p4j5-v4qx | null | [
{
"commit_message": "[PATCH] Strengthen field validations on user Updates (#1201) * Strengthen field validations on user Updates * update writables server/models/user.js | 54 ++++++++++++++++++-- server/utils/AiProviders/openRouter/index.js | 2 +- server/utils/PasswordRecovery/index.js ... | null | |
GHSA-5jp2-vwrj-99rf | Team scope authorization bypass when Post/Put request with :team_name in body, allows HTTP parameter pollution | null | [
{
"commit_message": "[PATCH] fix team_name overwritten bug Signed-off-by: Rui Yang <ruiya@vmware.com> atc/api/auth/check_pipeline_access_handler.go | 4 ++-- .../reject_archived_handler_factory.go | 4 ++-- .../pipelineserver/scoped_handler_factory.go | 4 ++-- .../scoped_handler_factory_test.go ... | null |
PYSEC-2021-205 | null | [
{
"commit_message": "[PATCH] Fix breakage in parameterized_truncated_normal_op.cc PiperOrigin-RevId: 372041718 Change-Id: Iff79e77a2bb27032423eefcb84211627b27dfe81 tensorflow/core/kernels/parameterized_truncated_normal_op.cc | 3 +++ 1 file changed, 3 insertions(+)",
"patch_text_b64": "RnJvbSA1ZTUyZWY1YTQ2MT... | null | |
GHSA-gmhr-6f43-7qpj | Moodle does not properly implement group-based access restrictions | null | [
{
"commit_message": "[PATCH] MDL-51861 enrol: Don't get all parts in get_enrolled_users with groups enrol/externallib.php | 34 ++++++++++++++++++++++++++++------ enrol/upgrade.txt | 4 ++++ 2 files changed, 32 insertions(+), 6 deletions(-)",
"patch_text_b64": "RnJvbSAxMmJjNzEzMDgxZGMyNGI2ZWVkZWE1NDI4MTg... | null |
GHSA-jphj-5g3m-w7x6 | Ignite Realtime Openfire vulnerable to cross-site scripting | null | [
{
"commit_message": "[PATCH] xss filter src/web/audit-policy.jsp | 11 ++--- src/web/available-plugins.jsp | 55 ++++++++++++------------ src/web/clearspace-status.jsp | 11 ++--- src/web/component-session-details.jsp | 13 +++--- src/web/component-session-summary.jsp | ... | null |
CVE-2023-37261 | OpenComputers's SSRF to cloud service metadata services and local IPv6 addresses not blocked by default | OpenComputers is a Minecraft mod that adds programmable computers and robots to the game. This issue affects every version of OpenComputers with the Internet Card feature enabled; that is, OpenComputers 1.2.0 until 1.8.3 in their most common, default configurations. If the OpenComputers mod is installed as part of a Minecraft server hosted on a popular cloud hosting provider, such as AWS, GCP and Azure, those metadata services' API endpoints are not forbidden (aka "blacklisted") by default. As such, any player can gain access to sensitive information exposed via those metadata servers, potentially allowing them to pivot or privilege escalate into the hosting provider. In addition, IPv6 addresses are not correctly filtered at all, allowing broader access into the local IPv6 network. This can allow a player on a server using an OpenComputers computer to access parts of the private IPv4 address space, as well as the whole IPv6 address space, in order to retrieve sensitive information.
OpenComputers v1.8.3 for Minecraft 1.7.10 and 1.12.2 contains a patch for this issue. Some workarounds are also available. One may disable the Internet Card feature completely. If using OpenComputers 1.3.0 or above, using the allow list (`opencomputers.internet.whitelist` option) will prohibit connections to any IP addresses and/or domains not listed; or one may add entries to the block list (`opencomputers.internet.blacklist` option). More information about mitigations is available in the GitHub Security Advisory. | [
{
"commit_message": "[PATCH] Rework Internet Card filtering system. changelog.md | 4 + ...omputersConfigCommentManipulationHook.java | 27 ++++ .../java/li/cil/oc/util/InetAddressRange.java | 64 +++++++++ src/main/resources/application.conf | 57 ++++---- src/main/s... | CWE-918: Server-Side Request Forgery (SSRF) |
GHSA-ww6f-76ff-phhj | ChakraCore RCE Vulnerability | null | [
{
"commit_message": "[PATCH] Chakra Assert : sym->HasScopeSlot() CVE-2016-3202 A let/const bug exposes a bad array indexing operation during bytecode emit. A symbol can fail to get a location due to this bug but then the location is used to offset into an array assuming it is always valid. Fix the array offset... | null |
GHSA-892q-vvcr-v6j5 | null | [
{
"commit_message": "[PATCH] Limit accepted chunk-size to 2^63-1 and be strict about chunk-ext authorized characters. Submitted by: Yann Ylavic git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1684513 13f79535-47bb-0310-9956-ffa450edef68 CHANGES | 3 + docs/log-message-t... | null | |
CVE-2019-18841 | Chartkick.js 3.1.0 through 3.1.3, as used in the Chartkick gem before 3.3.0 for Ruby, allows prototype pollution. | [
{
"commit_message": "[PATCH] Updated Chartkick.js to 3.2.0 CHANGELOG.md | 1 + vendor/assets/javascripts/chartkick.js | 117 +++++++++++++++++++++++-- 2 files changed, 109 insertions(+), 9 deletions(-)",
"patch_text_b64": "RnJvbSBiODEwOTM2YmJmNjg3YmM3NGM1YjZkYmE3MmQyMzk3YTM5OTg4NWZ... | n/a | |
GHSA-hm36-ffrh-c77c | Litestar X-Forwarded-For Header Spoofing Vulnerability Enables Rate Limit Evasion | null | [
{
"commit_message": "[PATCH] Merge commit from fork docs/usage/middleware/builtin-middleware.rst | 19 ++++++++ litestar/middleware/rate_limit.py | 45 +++++++++++++++--- .../test_rate_limit_middleware.py | 46 +++++++++++++++++++ 3 files changed, 103 insertions(+), 7 deletions(-)",
"p... | null |
GHSA-8m6j-p5jv-v69w | TYPO3 Cross-Site Scripting in Online Media Asset Rendering | null | [
{
"commit_message": "[PATCH] [SECURITY] Properly escape videoId for YouTube/Vimeo Resolves: #83184 Releases: master, 8.7, 7.6 Security-Commit: 8da8a3c1609fbd83b025c8a815d9c3b667c7722c Security-Bulletin: TYPO3-CORE-SA-2018-006 Change-Id: Iaab42d0c00d465582cb48fe473cc345c68144031 Reviewed-on: https://review.typo3... | null |
CVE-2023-46928 | GPAC 2.3-DEV-rev605-gfc9e29089-master contains a SEGV in gpac/MP4Box in gf_media_change_pl /afltest/gpac/src/media_tools/isom_tools.c:3293:42. | [
{
"commit_message": "[PATCH] null guard on gf_media_change_pl (fixes #2661) src/media_tools/isom_tools.c | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSAwNzUzYmY2ZDg2NzM0M2E4MGEwNDRiZjQ3YTI3ZDBiN2FjY2M4YmYxIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBBdXJlbGllbiBEYXZpZCA8... | n/a | |
CVE-2018-1002200 | plexus-archiver before 3.6.0 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in an archive entry that is mishandled during extraction. This vulnerability is also known as 'Zip-Slip'. | [
{
"commit_message": "[PATCH] fix: fail when trying to extract outside of dest dir A well crafted zip file may cause the code to extract outside of the destination dir. This PR fails when that happens so that no unexpected behaviour happens. .../plexus/archiver/AbstractUnArchiver.java | 9 +++++++ .../archive... | CWE-22 | |
CVE-2018-9110 | Studio 42 elFinder before 2.1.37 has a directory traversal vulnerability in elFinder.class.php with the zipdl() function that can allow a remote attacker to download files accessible by the web server process and delete files owned by the account running the web server process. NOTE: this issue exists because of an incomplete fix for CVE-2018-9109. | [
{
"commit_message": "[PATCH] [php:security] re-fix directory traversal vulnerability for windows server rel. commit 157f471d7e48f190f74e66eb5bc73360b5352fd3 php/elFinder.class.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSBlNjM1MTU1N2I4NmNjMTBhNzY1MTI1M2QyZDJhZmY3ZjZiOT... | n/a | |
GHSA-c9hm-r59j-h433 | null | [
{
"commit_message": "[PATCH] Limit write requests to at most INT_MAX. This prevents a certain common programming error (passing -1 to write) from leading to other problems deeper in the library. libarchive/archive_write.c | 5 +++++ 1 file changed, 5 insertions(+)",
"patch_text_b64": "RnJvbSAyMjUzMTU0NTUxNDA... | null | |
GHSA-348r-6928-rfcr | null | [
{
"commit_message": "[PATCH] bug fixes (#1790) interface/forms/eye_mag/php/taskman_functions.php | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-)",
"patch_text_b64": "RnJvbSAzZTIyZDExYzcxNzVjMWViYmYzZDg2MjU0NWNlNmZlZTE4ZjcwNjE3IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBCcmFkeSBNaWxsZXIgPG... | null | |
GHSA-grcg-hjg8-mrhw | null | [
{
"commit_message": "[PATCH] ASoC: SOF: ipc: Fix memory leak in sof_set_get_large_ctrl_data In the implementation of sof_set_get_large_ctrl_data() there is a memory leak in case an error. Release partdata if sof_get_ctrl_copy_params() fails. Fixes: 54d198d5019d (\"ASoC: SOF: Propagate sof_get_ctrl_copy_params()... | null | |
CVE-2020-15862 | Net-SNMP through 5.8 has Improper Privilege Management because SNMP WRITE access to the EXTEND MIB provides the ability to run arbitrary commands as root. | [
{
"commit_message": "[PATCH] make the extend mib read-only by default agent/mibgroup/agent/extend.c | 18 ++++++++++++------ 1 file changed, 12 insertions(+), 6 deletions(-)",
"patch_text_b64": "RnJvbSA3N2Y2YzYwZjU3ZGJhMGFhZWE1ZDhlZjFkZDk0YmNkMGM4ZTZkMjA1IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBXZXMgSGFyZG... | n/a | |
CVE-2020-15258 | Insecure use of shell.openExternal in Wire | In Wire before 3.20.x, `shell.openExternal` was used without checking the URL. This vulnerability allows an attacker to execute code on the victims machine by sending messages containing links with arbitrary protocols. The victim has to interact with the link and sees the URL that is opened. The issue was patched by implementing a helper function which checks if the URL's protocol is common. If it is common, the URL will be opened externally. If not, the URL will not be opened and a warning appears for the user informing them that a probably insecure URL was blocked from being executed. The issue is patched in Wire 3.20.x. More technical details about exploitation are available in the linked advisory. | [
{
"commit_message": "[PATCH] Merge pull request from GHSA-5gpx-9976-ggpm electron/html/about.html | 8 ++- electron/src/lib/showDialog.ts | 11 ++++ electron/src/main.ts | 5 +- electron/src/menu/system.ts | 13 ++--- electron/src/window/AboutWindow.ts | 20 +... | {"CWE-20":"Improper Input Validation"} |
GHSA-hpf7-mmqw-g6vq | Cross-site Scripting in Jenkins Plot Plugin | null | [
{
"commit_message": "[PATCH] [SECURITY-2220] Escape plot description (#72) src/main/resources/hudson/plugins/plot/PlotReport/index.jelly | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSA0YjY4MWFmMjg4OGRhNDljNDE4NjNjY2M5ZjZlYWEzZWEyNjM2N2Q4IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGc... | null |
GHSA-fqrg-vmvj-jv3x | Moodle allows attackers obtain full-name information | null | [
{
"commit_message": "[PATCH] MDL-50099 auth: less verbose account confirmed message auth/email/auth.php | 8 ++++---- auth/ldap/auth.php | 8 ++++---- login/confirm.php | 1 - 3 files changed, 8 insertions(+), 9 deletions(-)",
"patch_text_b64": "RnJvbSA0ZjhiNmQ1Njc0OTQzNzUwMTdjNGJjMjIyOGUxNjY4ZDEzYjIxNjQ1IE... | null |
CVE-2023-0549 | YAFNET Private Message PostPrivateMessage cross site scripting | A vulnerability, which was classified as problematic, has been found in YAFNET up to 3.1.10. This issue affects some unknown processing of the file /forum/PostPrivateMessage of the component Private Message Handler. The manipulation of the argument subject/message leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.1.11 is able to address this issue. The identifier of the patch is 2237a9d552e258a43570bb478a92a5505e7c8797. It is recommended to upgrade the affected component. The identifier VDB-219665 was assigned to this vulnerability. | [
{
"commit_message": "[PATCH] [FIXED GHSA-4hwx-678w-9cp5] XSS in pms .../Pages/PostPrivateMessage.ascx.cs | 10 +++++----- yafsrc/YetAnotherForum.NET/Pages/PrivateMessage.ascx | 3 ++- .../YetAnotherForum.NET/Pages/PrivateMessage.ascx.cs | 6 ++++-- 3 files changed, 11 insertions(+), 8 delet... | CWE-79 Cross Site Scripting |
GHSA-gxcr-ff3v-w6r6 | null | [
{
"commit_message": "[PATCH] 2.11.1 updates README.md | 19 +++++++++++++++---- 1 file changed, 15 insertions(+), 4 deletions(-)",
"patch_text_b64": "RnJvbSA5MjIzZGM2YmZjNTAyNTFhOWEzY2JhMDIxMGU3MWJlODBmYzM4ZWNkIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBKb2huIER5ZXIgPGpvaG5keWVyQGdtYWlsLmNvbT4KRGF0ZTogVGh1LCA... | null | |
GHSA-32fh-gwcr-7pmx | null | [
{
"commit_message": "[PATCH] Resolving Issues #2213, #2214, #2215 and Additional Multiple XSS vectors associated with un-escaped strings. Introduce new function, audit all calls, remove inline styles for classes, some i18n missed. CHANGELOG | 3 +++ aggregate_graphs.php | 6 +++--- aggrega... | null | |
GHSA-9hh7-6558-qfp2 | Mattermost allows other users to determine when users had read channels via channel member objects | null | [
{
"commit_message": "[PATCH] Sanatize LastViewedAt and LastUpdateAt for other users on channel member object (#33835) (#33905) Automatic Merge server/channels/api4/channel.go | 27 +++++++ server/channels/api4/channel_test.go | 84 ++++++++++++++++++++++ server/channels/api4/user.go ... | null |
GHSA-mm6v-68qp-f9fw | Crayfish allows Remote Code Execution via Homarus Authorization header | null | [
{
"commit_message": "[PATCH] Merge commit from fork * Rework Homarus CLI invocation to use better escaping. * Bump PHP version in docs. * Point at the newly released/merged code. Homarus/composer.json | 2 +- Homarus/src/Controller/HomarusController.php | 55 +++++++++++++++----- README.md... | null |
GHSA-g64q-v8cm-wr64 | null | [
{
"commit_message": "[PATCH] fix pecl security bug onto the test script test.php | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSA1NDVlMDU4NjMyMGFlNmYxNjIwNGJhNTQ4Y2Y1MzNlZjc1ZGMyZmJkIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBEYW5pZWwgTWFyemluaSA8ZGFuaWVsLm1hcnppbmlAaXViZW... | null | |
GHSA-3xc7-xg67-pw99 | Sensitive Data Exposure in sequelize-cli | null | [
{
"commit_message": "[PATCH] Bug Fix: Special characters in password are not escaped https://github.com/sequelize/cli/issues/172 is stil open when special characters find their way in a password src/helpers/config-helper.js | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSBkYT... | null |
CVE-2024-27938 | SMTP Smuggling in Postal | Postal is an open source SMTP server. Postal versions less than 3.0.0 are vulnerable to SMTP Smuggling attacks which may allow incoming e-mails to be spoofed. This, in conjunction with a cooperative outgoing SMTP service, would allow for an incoming e-mail to be received by Postal addressed from a server that a user has 'authorised' to send mail on their behalf but were not the genuine author of the e-mail. Postal is not affected for sending outgoing e-mails as email is re-encoded with `<CR><LF>` line endings when transmitted over SMTP. This issue has been addressed and users should upgrade to Postal v3.0.0 or higher. Once upgraded, Postal will only accept End of DATA sequences which are explicitly `<CR><LF>.<CR><LF>`. If a non-compliant sequence is detected it will be logged to the SMTP server log. There are no workarounds for this issue. | [
{
"commit_message": "[PATCH] feat: only accept RFC-compliant End-of-DATA sequence Previously Postal was fairly forgiving about line endings. This requires that the end of data sequence is `<CR><LF>.<CR><LF>`. app/lib/smtp_server/client.rb | 19 ++++++++-- app/lib/smtp_server/server.rb ... | CWE-116: Improper Encoding or Escaping of Output |
GHSA-p76j-h4m8-hx5c | Pimcore Demo Allows GraphQL Introspection | null | [
{
"commit_message": "[PATCH] Disable introspection (#437) dump/data-1-settings_store.sql | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-)",
"patch_text_b64": "RnJvbSBhMmE3ZmYzYjU2NTg4MmFlZmI3NTk4MDRhYWM0YTUxYWZiNDU4ZjFmIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBtY29wMSA8ODkwMTE1MjcrbWNvcDFAdXNlc... | null |
CVE-2012-1208 | Multiple cross-site scripting (XSS) vulnerabilities in backend/core/engine/base.php in Fork CMS 3.2.4 and possibly other versions before 3.2.5 allow remote attackers to inject arbitrary web script or HTML via the (1) report parameter to blog/settings or (2) error parameter to users/index. | [
{
"commit_message": "[PATCH] Make sure the error doesn't contain any html tags. backend/core/engine/base.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSBkNjVjMDgzYWRjOTFjODhkMjFiZDlhMGRmNGMyNjg4ZGY2MzRjNmZmIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBCYXVmZm1hbiA8ZGF2eUBzc... | n/a | |
GHSA-6jwp-4wvj-6597 | Apache Pinot Vulnerable to Authentication Bypass | null | [
{
"commit_message": "[PATCH] Strip Matrix parameter from BasePath check (#14383) .../broker/broker/AuthenticationFilter.java | 5 ++++- .../pinot/common/auth/AuthProviderUtils.java | 13 +++++++++++ .../api/access/AuthenticationFilter.java | 4 +++- .../api/access/AuthenticationFilterTest.java | 22 ++++... | null |
GHSA-hfx2-wgxq-fp88 | null | [
{
"commit_message": "[PATCH] Release 4.0.4 src/liblsquic/lsquic_full_conn_ietf.c | 7 +++++-- 1 file changed, 5 insertions(+), 2 deletions(-)",
"patch_text_b64": "RnJvbSA1MTVmNDUzNTU2Yzk5ZDI3YzRkZGRiNTQyNDg5OGRjMWE1NTM3NzA4IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBHZW9yZ2UgV2FuZyA8Z3dhbmdAbGl0ZXNwZWVkdGVjaC... | null | |
GHSA-4225-xq9f-4ww3 | null | [
{
"commit_message": "[PATCH] security: fix SELinux label generation logic MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit A process can access a file if the set of MCS categories for the file is equal-to *or* a subset-of, the set of MCS categories for the process. If th... | null | |
GHSA-w3wh-g4m9-783p | XWiki Rendering is vulnerable to XSS attacks through insecure XHTML syntax | null | [
{
"commit_message": "[PATCH] XRENDERING-660: Get rid of the dependency on the xdom+xml syntax (#230) * Pass the label via an XDOM instance instead of rendering/parsing to xdom+xml syntax. * Remove the dependency on the xdom+xml syntax as it isn't needed anymore. * Move the reference type detection into the XWik... | null |
PYSEC-2021-548 | null | [
{
"commit_message": "[PATCH] Prevent heap OOB in sparse reduction ops. PiperOrigin-RevId: 387934524 Change-Id: I894aa30f1e454f09b471d565b4a325da49322c1a tensorflow/core/kernels/sparse_reduce_op.cc | 13 +++++++++++++ 1 file changed, 13 insertions(+)",
"patch_text_b64": "RnJvbSA4NzE1OGY0M2YwNWYyNzIwYTM3NGYzZT... | null | |
CVE-2014-3183 | Heap-based buffer overflow in the logi_dj_ll_raw_request function in drivers/hid/hid-logitech-dj.c in the Linux kernel before 3.16.2 allows physically proximate attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a crafted device that specifies a large report size for an LED report. | [
{
"commit_message": "[PATCH] HID: logitech: fix bounds checking on LED report size The check on report size for REPORT_TYPE_LEDS in logi_dj_ll_raw_request() is wrong; the current check doesn't make any sense -- the report allocated by HID core in hid_hw_raw_request() can be much larger than DJREPORT_SHORT_LENGT... | n/a | |
GHSA-xm64-phgg-mwc9 | null | [
{
"commit_message": "[PATCH] minissdpd: Fix broken overflow test (p+l > buf+n) thanks to Salva Piero minissdpd/Changelog.txt | 5 ++++- minissdpd/minissdpd.c | 10 +++++----- minissdpd/testminissdpd.c | 12 +++++++++++- 3 files changed, 20 insertions(+), 7 deletions(-)",
"patch_text_b64": "RnJvbSBiMjM4Y... | null | |
GHSA-rmh2-65xw-9m6q | Infinite Loop in jsonparser | null | [
{
"commit_message": "[PATCH] fix issue 188 (#192) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit **Description**: This pr fix issue #188. If `findKeyStart` meets a `[` or `{`, it should not add i with `blockEnd`’s return value directly because it may return -1 if it di... | null |
CVE-2023-23935 | Presence of restricted personal Discourse messages may be leaked if tagged with a tag | Discourse is an open-source messaging platform. In versions 3.0.1 and prior on the `stable` branch and versions 3.1.0.beta2 and prior on the `beta` and `tests-passed` branches, the count of personal messages displayed for a tag is a count of all personal messages regardless of whether the personal message is visible to a given user. As a result, any users can technically poll a sensitive tag to determine if a new personal message is created even if the user does not have access to the personal message.
In the patched versions, the count of personal messages tagged with a given tag is hidden by default. To revert to the old behaviour of displaying the count of personal messages for a given tag, an admin may enable the `display_personal_messages_tag_counts` site setting. | [
{
"commit_message": "[PATCH] SECURITY: Hide PM count for tags by default (#20061) Currently `Topic#pm_topic_count` is a count of all personal messages tagged for a given tag. As a result, any user with access to PM tags can poll a sensitive tag to determine if a new personal message has been created using that ... | CWE-200: Exposure of Sensitive Information to an Unauthorized Actor |
CVE-2025-24030 | Envoy Admin Interface Exposed through prometheus metrics endpoint | Envoy Gateway is an open source project for managing Envoy Proxy as a standalone or Kubernetes-based application gateway. A user with access to the Kubernetes cluster can use a path traversal attack to execute Envoy Admin interface commands on proxies managed by any version of Envoy Gateway prior to 1.2.6. The admin interface can be used to terminate the Envoy process and extract the Envoy configuration (possibly containing confidential data). Version 1.2.6 fixes the issue. As a workaround, the `EnvoyProxy` API can be used to apply a bootstrap config patch that restricts access strictly to the prometheus stats endpoint. Find below an example of such a bootstrap patch. | [
{
"commit_message": "[PATCH] Merge commit from fork Signed-off-by: Guy Daich <guy.daich@sap.com> .../translate/out/default-resources.all.yaml | 12 ++++++++++-- .../translate/out/from-gateway-api-to-xds.all.json | 9 ++++++++- .../translate/out/from-gateway-api-to-xds.all.yaml | 6 +++++- .../out/fro... | CWE-419: Unprotected Primary Channel |
CVE-2023-29209 | org.xwiki.platform:xwiki-platform-legacy-notification-activitymacro Eval Injection vulnerability | XWiki Commons are technical libraries common to several other top level XWiki projects. Any user with view rights on commonly accessible documents including the legacy notification activity macro can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping of the macro parameters of the legacy notification activity macro. This macro is installed by default in XWiki. The vulnerability can be exploited via every wiki page that is editable including the user's profile, but also with just view rights using the HTMLConverter that is part of the CKEditor integration which is bundled with XWiki. The vulnerability has been patched in XWiki 13.10.11, 14.4.7 and 14.10.
| [
{
"commit_message": "[PATCH] XWIKI-20258: Improve escaping in the Legacy ActivityMacro .../Notifications/Code/Legacy/ActivityMacro.xml | 13 +++++++++++-- 1 file changed, 11 insertions(+), 2 deletions(-)",
"patch_text_b64": "RnJvbSA5NDM5MjQ5MDg4NDYzNWMwMjgxOTkyNzVkYjA1OWE0ZjQ3MWU1N2JjIE1vbiBTZXAgMTcgMDA6... | CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') |
CVE-2020-26263 | RSA vulnerability in tslite-ng | tlslite-ng is an open source python library that implements SSL and TLS cryptographic protocols. In tlslite-ng before versions 0.7.6 and 0.8.0-alpha39, the code that performs decryption and padding check in RSA PKCS#1 v1.5 decryption is data dependant. In particular, the code has multiple ways in which it leaks information about the decrypted ciphertext. It aborts as soon as the plaintext doesn't start with 0x00, 0x02. All TLS servers that enable RSA key exchange as well as applications that use the RSA decryption API directly are vulnerable. This is patched in versions 0.7.6 and 0.8.0-alpha39. Note: the patches depend on Python processing the individual bytes in side-channel free manner, this is known to not the case (see reference). As such, users that require side-channel resistance are recommended to use different TLS implementations, as stated in the security policy of tlslite-ng. | [
{
"commit_message": "[PATCH 1/5] stop conversion from bytes to int to bytes with m2crypto with M2Crypto we can process byte strings, and for padding/depadding we need bytes, so don't convert back and forth between the formats also put all the integer to bytes conversion in a single place for the implementations... | CWE-326 Inadequate Encryption Strength |
CVE-2025-32951 | io.jmix.rest:jmix-rest allows XSS in the /files Endpoint of the Generic REST API | Jmix is a set of libraries and tools to speed up Spring Boot data-centric application development. In versions 1.0.0 to 1.6.1 and 2.0.0 to 2.3.4, the input parameter, which consists of a file path and name, can be manipulated to return the Content-Type header with text/html if the name part ends with .html. This could allow malicious JavaScript code to be executed in the browser. For a successful attack, a malicious file needs to be uploaded beforehand. This issue has been patched in versions 1.6.2 and 2.4.0. A workaround is provided on the Jmix documentation website. | [
{
"commit_message": "[PATCH] Backport REST files fixes to 1.6 #3836 .../io/jmix/localfs/LocalFileStorage.java | 38 +++++++++++++++---- .../localfs/LocalFileStorageProperties.java | 18 ++++++++- .../java/io/jmix/rest/RestProperties.java | 14 +++++++ .../controller/FileDownloadController.java | 26 ++... | CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') |
GHSA-q3qx-cp62-f6m7 | Grav Admin Plugin vulnerable to User Enumeration & Email Disclosure | null | [
{
"commit_message": "[PATCH] Fix security vulnerabilities: user enumeration and XSS issues Security fixes: 1. GHSA-q3qx-cp62-f6m7: User Enumeration & Email Disclosure - Changed rate-limiter error message in taskForgot() to not include email - Added generic translation key FORGOT_CANNOT_RESET_RATE_LIMITED - Prev... | null |
CVE-2018-8948 | In MISP before 2.4.89, app/View/Events/resolved_attributes.ctp has multiple XSS issues via a malicious MISP module. | [
{
"commit_message": "[PATCH] fix: Fixed various potential XSS issues in the resolved attributes view - potentially exposed XSS if a malicious MISP module was loaded on the instance - as reported by Christophe Vandeplas (@cvandeplas) app/View/Events/resolved_attributes.ctp | 12 ++++++------ 1 file changed, 6 ins... | n/a | |
CVE-2021-41265 | Improper Authentication in Flask-AppBuilder | Flask-AppBuilder is a development framework built on top of Flask. Verions prior to 3.3.4 contain an improper authentication vulnerability in the REST API. The issue allows for a malicious actor with a carefully crafted request to successfully authenticate and gain access to existing protected REST API endpoints. This only affects non database authentication types and new REST API endpoints. Users should upgrade to Flask-AppBuilder 3.3.4 to receive a patch. | [
{
"commit_message": "[PATCH] chore: improve schema validation (#1712) docs/config.rst | 3 ++ flask_appbuilder/security/api.py | 62 +++++++++++++--------------- flask_appbuilder/security/manager.py | 30 +++++++++----- flask_appbuilder/security/schemas.py | 45 ++++++++++++++++++++ 4 file... | CWE-287: Improper Authentication |
PYSEC-2021-168 | null | [
{
"commit_message": "[PATCH] Fix null CHECK issue with `tf.raw_ops.EncodePng`. PiperOrigin-RevId: 369717714 Change-Id: I24136cd99c20b8466671f4f93b670ef6f6dd1250 tensorflow/core/kernels/image/encode_png_op.cc | 2 ++ 1 file changed, 2 insertions(+)",
"patch_text_b64": "RnJvbSAyNmViMzIzNTU0ZmZjY2QxNzNlOGE3OWE4... | null | |
GHSA-g42g-737j-qx6j | Access Restriction Bypass in kube-apiserver | null | [
{
"commit_message": "[PATCH 1/7] tweak validation to avoid mutation pkg/apis/core/validation/validation.go | 46 +++++++++----------------- 1 file changed, 15 insertions(+), 31 deletions(-)",
"patch_text_b64": "RnJvbSBkMDAwZjJjOGM1MWIyNDkzMzg0MjRjZDgyNjJkNDU2MTNkZjk2ZGExIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm... | null |
PYSEC-2021-462 | null | [
{
"commit_message": "[PATCH] Fix overflow CHECK issue with `tf.raw_ops.AddManySparseToTensorsMap`. PiperOrigin-RevId: 369492969 Change-Id: I1d70d6c0c92e3d7a25bc3b3aa2a0c0ac9688bf81 .../core/kernels/sparse_tensors_map_ops.cc | 26 ++++++++++++++----- 1 file changed, 19 insertions(+), 7 deletions(-)",
"patc... | null | |
CVE-2017-8890 | The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel through 4.10.15 allows attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call. | [
{
"commit_message": "[PATCH] dccp/tcp: do not inherit mc_list from parent syzkaller found a way to trigger double frees from ip_mc_drop_socket() It turns out that leave a copy of parent mc_list at accept() time, which is very bad. Very similar to commit 8b485ce69876 (\"tcp: do not inherit fastopen_req from pare... | n/a | |
GHSA-vg7j-7cwx-8wgw | Mongoose search injection vulnerability | null | [
{
"commit_message": "[PATCH] fix: disallow nested $where in populate match .../populate/getModelsMapForPopulate.js | 41 +++++++++++-------- test/model.populate.test.js | 21 ++++++++-- 2 files changed, 40 insertions(+), 22 deletions(-)",
"patch_text_b64": "RnJvbSA2NGE5Zjk3MDZmMjQyOGM0... | null |
CVE-2012-4506 | Directory traversal vulnerability in gitolite 3.x before 3.1, when wild card repositories and a pattern matching "../" are enabled, allows remote authenticated users to create arbitrary repositories and possibly perform other actions via a .. (dot dot) in a repository name. | [
{
"commit_message": "[PATCH] (security) fix bug in pattern to detect path traversal while we're about it, add the same check to some of the internal routines, so that commands can also be protected. finally, just to make sure we don't lose it again in some other fashion, add a few tests for path traversal... sr... | n/a |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.