id
stringlengths
12
19
title
stringlengths
0
237
description
stringlengths
35
3.87k
patches
listlengths
1
22
cwe
stringlengths
2
440
CVE-2022-24829
Missing authentication in Garden
Garden is an automation platform for Kubernetes development and testing. In versions prior to 0.12.39 multiple endpoints did not require authentication. In some operating modes this allows for an attacker to gain access to the application erroneously. The configuration is leaked through the /api endpoint on the local server that is responsible for serving the Garden dashboard. At the moment, this server is accessible to 0.0.0.0 which makes it accessible to anyone on the same network (or anyone on the internet if they are on a public, static IP). This may lead to the ability to compromise credentials, secrets or environment variables. Users are advised to upgrade to version 0.12.39 as soon as possible. Users unable to upgrade should use a firewall blocking access to port 9777 from all untrusted network machines.
[ { "commit_message": "[PATCH] fix(core): require auth key for server endpoints core/src/cli/cli.ts | 6 +- core/src/constants.ts | 1 + core/src/events.ts | 2 +- core/src/server/dashboard-event-stream.ts | 6 +- core/src/server/ser...
CWE-306: Missing Authentication for Critical Function
GHSA-fg52-xjfc-9rh8
Pterodactyl vulnerable to 2FA Sniffing
null
[ { "commit_message": "[PATCH] Change 2FA service to generate the secret on our own and use an external QR service to display the image .../Controllers/Base/SecurityController.php | 4 +- app/Services/Users/TwoFactorSetupService.php | 42 ++--- composer.json | 1 - composer.lo...
null
CVE-2024-29041
Express.js Open Redirect in malformed URLs
Express.js minimalist web framework for node. Versions of Express.js prior to 4.19.0 and all pre-release alpha and beta versions of 5.0 are affected by an open redirect vulnerability using malformed URLs. When a user of Express performs a redirect using a user-provided URL Express performs an encode [using `encodeurl`](https://github.com/pillarjs/encodeurl) on the contents before passing it to the `location` header. This can cause malformed URLs to be evaluated in unexpected ways by common redirect allow list implementations in Express applications, leading to an Open Redirect via bypass of a properly implemented allow list. The main method impacted is `res.location()` but this is also called from within `res.redirect()`. The vulnerability is fixed in 4.19.2 and 5.0.0-beta.3.
[ { "commit_message": "[PATCH] Prevent open redirect allow list bypass due to encodeurl Co-authored-by: Jon Church <me@jonchurch.com> lib/response.js | 20 ++++++++++++++++++- test/res.location.js | 46 +++++++++++++++++++++++++++++++++++++++++++- 2 files changed, 64 insertions(+), 2 deletions(-)", "patch_...
CWE-601: URL Redirection to Untrusted Site ('Open Redirect')
CVE-2023-48708
Insertion of Sensitive Information into Log in codeigniter4/shield
CodeIgniter Shield is an authentication and authorization provider for CodeIgniter 4. In affected versions successful login attempts are recorded with the raw tokens stored in the log table. If a malicious person somehow views the data in the log table they can obtain a raw token which can then be used to send a request with that user's authority. This issue has been addressed in version 1.0.0-beta.8. Users are advised to upgrade. Users unable to upgrade should disable logging for successful login attempts by the configuration files.
[ { "commit_message": "[PATCH 01/10] fix: Access Token Authenticator raw tokens are logged .../Authenticators/AccessTokens.php | 11 +++---- .../AccessTokenAuthenticatorTest.php | 33 +++++++++++++++++++ 2 files changed, 38 insertions(+), 6 deletions(-)", "patch_text_b64": "RnJvbSAwNDA1ZDMxNj...
CWE-532: Insertion of Sensitive Information into Log File
GHSA-v977-h4hm-rrff
WWBN AVideo Improper Restriction of Excessive Authentication Attempts vulnerability
null
[ { "commit_message": "[PATCH] build(deps): bump aws/aws-sdk-php from 3.285.4 to 3.287.0 Bumps [aws/aws-sdk-php](https://github.com/aws/aws-sdk-php) from 3.285.4 to 3.287.0. - [Release notes](https://github.com/aws/aws-sdk-php/releases) - [Commits](https://github.com/aws/aws-sdk-php/compare/3.285.4...3.287.0) upd...
null
GHSA-97jm-g33h-f46g
silverstripe/framework ReadOnly transformation for formfields exploitable
null
[ { "commit_message": "[PATCH 1/3] [SS-2016-010] FIX Cast FormField values as Text to prevent readonly fields embeding rogue HTML forms/FormField.php | 8 ++++++++ forms/HtmlEditorField.php | 8 ++++++++ forms/ReadonlyField.php | 16 +++++++++++++++- forms/TextareaField.php ...
null
CVE-2023-22726
Unrestricted file upload leading to privilege escalation in act
act is a project which allows for local running of github actions. The artifact server that stores artifacts from Github Action runs does not sanitize path inputs. This allows an attacker to download and overwrite arbitrary files on the host from a Github Action. This issue may lead to privilege escalation. The /upload endpoint is vulnerable to path traversal as filepath is user controlled, and ultimately flows into os.Mkdir and os.Open. The /artifact endpoint is vulnerable to path traversal as the path is variable is user controlled, and the specified file is ultimately returned by the server. This has been addressed in version 0.2.40. Users are advised to upgrade. Users unable to upgrade may, during implementation of Open and OpenAtEnd for FS, ensure to use ValidPath() to check against path traversal or clean the user-provided paths manually.
[ { "commit_message": "[PATCH] fix: update artifact server to address GHSL-2023-004 (#1565) .vscode/settings.json | 1 + pkg/artifacts/server.go | 82 +++++----- pkg/artifacts/server_test.go | 149 +++++++++++++----- .../testdata/GHSL-2023-004/artifac...
CWE-434: Unrestricted Upload of File with Dangerous Type
GHSA-g43p-7j43-jpj7
null
[ { "commit_message": "[PATCH] Apply CVE fixes for X509 parsing Apply patches developed by Sze Yiu which correct a vulnerability in X509 parsing. See CVE-2018-16150 and CVE-2018-16149 for more info. ssl/os_port.h | 12 ++++++ ssl/x509.c | 102 +++++++++++++++++++++++++++++++------------------- 2 files changed,...
null
GHSA-4wjx-42q4-77fh
null
[ { "commit_message": "[PATCH] scsi: libsas: fix memory leak in sas_smp_get_phy_events() We've got a memory leak with the following producer: while true; do cat /sys/class/sas_phy/phy-1:0:12/invalid_dword_count >/dev/null; done The buffer req is allocated and not freed after we return. Fix it. Fixes: 2908d778ab3e...
null
GHSA-9g7r-h55w-795g
null
[ { "commit_message": "[PATCH] =?UTF-8?q?=F0=9F=AA=90=20refactor:=20Migrate=20Share=20Fu?= =?UTF-8?q?nctionality=20to=20Type-Safe=20Methods=20(#7903)?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit * chore: Update import for isEnabled utility in convoAccess middleware *...
null
CVE-2016-7142
The m_sasl module in InspIRCd before 2.0.23, when used with a service that supports SASL_EXTERNAL authentication, allows remote attackers to spoof certificate fingerprints and consequently log in as another user via a crafted SASL message.
[ { "commit_message": "[PATCH] m_sasl: don't allow AUTHENTICATE with mechanisms with a space src/modules/m_sasl.cpp | 4 ++++ 1 file changed, 4 insertions(+)", "patch_text_b64": "RnJvbSA3NGZhZmI3ZjExYjA2NzQ3ZjY5ZjE4MmFkNWUzNzY5YjY2NWVlYTdhIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBBZGFtIDxBZGFtQGFub3BlLm9yZz4K...
n/a
GHSA-8xc6-g8xw-h2c4
YARP Denial of Service Vulnerability
null
[ { "commit_message": "[PATCH] Attribute request failure blame before determining a destination's health (#1648) .../TransportFailureRateHealthPolicy.cs | 27 ++- .../PassiveHealthCheckTests.cs | 172 ++++++++++++++++++ 2 files changed, 197 insertions(+), 2 deletions(-) create mode 100644 test...
null
CVE-2024-0765
Default user role exporting save state of instance
As a default user on a multi-user instance of AnythingLLM, you could execute a call to the `/export-data` endpoint of the system and then unzip and read that export that would enable you do exfiltrate data of the system at that save state. This would require the attacked to be granted explicit access to the system, but they can do this at any role. Additionally, post-download, the data is deleted so no evidence would exist that the exfiltration occured.
[ { "commit_message": "[PATCH] Merge pull request from GHSA-xmj6-g32r-fc5q * remove support for import export anythingllm data * remove unused imports remove unused dep update lockfile Co-authored-by: timothycarambat <rambat1010@gmail.com> frontend/src/App.jsx | 7 - .../src/components/S...
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
GHSA-246w-56m2-5899
Cross-site scripting (XSS) vulnerability in the password reset endpoint
null
[ { "commit_message": "[PATCH] Clean-up the template loading code. (#9200) * Enables autoescape by default for HTML files. * Adds a new read_template method for reading a single template. * Some logic clean-up. UPGRADE.rst | 37 ++++++++++++++++ changelog.d/9200.misc ...
null
GHSA-h533-q6jc-qx28
Cloud Foundry Runtime Insufficient Session Expiration vulnerability
null
[ { "commit_message": "[PATCH] Upon a password change we will expire all HTTP sessions for that user https://www.pivotaltracker.com/story/show/100043648 [#100043648] .../AuthzAuthenticationFilter.java | 2 +- .../authentication/SessionResetFilter.java | 98 ++++++++++ .../uaa/authentication/UaaAuth...
null
CVE-2017-17852
kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging mishandling of 32-bit ALU ops.
[ { "commit_message": "[PATCH] bpf: fix 32-bit ALU op verification 32-bit ALU ops operate on 32-bit values and have 32-bit outputs. Adjust the verifier accordingly. Fixes: f1174f77b50c (\"bpf/verifier: rework value tracking\") Signed-off-by: Jann Horn <jannh@google.com> Signed-off-by: Alexei Starovoitov <ast@kern...
n/a
CVE-2023-46249
authentik potential installation takeover when default admin user is deleted
authentik is an open-source Identity Provider. Prior to versions 2023.8.4 and 2023.10.2, when the default admin user has been deleted, it is potentially possible for an attacker to set the password of the default admin user without any authentication. authentik uses a blueprint to create the default admin user, which can also optionally set the default admin users' password from an environment variable. When the user is deleted, the `initial-setup` flow used to configure authentik after the first installation becomes available again. authentik 2023.8.4 and 2023.10.2 fix this issue. As a workaround, ensure the default admin user (Username `akadmin`) exists and has a password set. It is recommended to use a very strong password for this user, and store it in a secure location like a password manager. It is also possible to deactivate the user to prevent any logins as akadmin.
[ { "commit_message": "[PATCH] security: fix oobe-flow reuse when akadmin is deleted (#7361) Signed-off-by: Jens Langhammer <jens@goauthentik.io> .../migrations/0027_auto_20231028_1424.py | 34 +++++++++++++++++++ blueprints/default/flow-oobe.yaml | 19 +++++++++++ blueprints/system/bootstrap.yaml ...
CWE-287: Improper Authentication
CVE-2021-3770
Heap-based Buffer Overflow in vim/vim
vim is vulnerable to Heap-based Buffer Overflow
[ { "commit_message": "[PATCH] patch 8.2.3402: invalid memory access when using :retab with large value Problem: Invalid memory access when using :retab with large value. Solution: Check the number is positive. src/indent.c | 34 +++++++++++++++++++++------------- src/option.c | 12...
CWE-122 Heap-based Buffer Overflow
CVE-2021-21375
Crash in receiving updated SDP answer after initial SDP negotiation failed
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In PJSIP version 2.10 and earlier, after an initial INVITE has been sent, when two 183 responses are received, with the first one causing negotiation failure, a crash will occur. This results in a denial of service.
[ { "commit_message": "[PATCH] Merge pull request from GHSA-hvq6-f89p-frvp pjmedia/src/pjmedia/sdp_neg.c | 14 ++++++++++++-- 1 file changed, 12 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSA5N2IzZDdhZGRiYWE3MjBiN2RkYjBhZjliZjZmM2U0NDNlNjY0MzY1IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBOYW5hbmcgSXp...
CWE-400 Uncontrolled Resource Consumption
CVE-2022-29776
Onlyoffice Document Server v6.0.0 and below and Core 6.1.0.26 and below were discovered to contain a stack overflow via the component DesktopEditor/common/File.cpp.
[ { "commit_message": "[PATCH] Fix 25 errors DesktopEditor/common/File.cpp | 151 ++++++++++++------ DesktopEditor/cximage/CxImage/xfile.h | 29 +++- DesktopEditor/cximage/CxImage/ximabmp.cpp | 14 +- DesktopEditor/cximage/CxImage/ximage.cpp | 14 +- DesktopEditor/cximage/CxImage/x...
n/a
CVE-2026-22588
Spree API has Authenticated Insecure Direct Object Reference (IDOR) via Order Modification
Spree is an open source e-commerce solution built with Ruby on Rails. Prior to versions 4.10.2, 5.0.7, 5.1.9, and 5.2.5, an Authenticated Insecure Direct Object Reference (IDOR) vulnerability was identified that allows an authenticated user to retrieve other users’ address information by modifying an existing order. By editing an order they legitimately own and manipulating address identifiers in the request, the backend server accepts and processes references to addresses belonging to other users, subsequently associating those addresses with the attacker’s order and returning them in the response. This issue has been patched in versions 4.10.2, 5.0.7, 5.1.9, and 5.2.5.
[ { "commit_message": "[PATCH] =?UTF-8?q?Fixed=20GHSA-g268-72p7-9j6j=20Authenticated=20I?= =?UTF-8?q?nsecure=20Direct=20Object=20Refere=E2=80=A6=20(#13423)?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Fixed GHSA-g268-72p7-9j6j Authenticated Insecure Direct Object Ref...
CWE-639: Authorization Bypass Through User-Controlled Key
CVE-2023-23941
SwagPayPal payment not sent to PayPal correctly
SwagPayPal is a PayPal integration for shopware/platform. If JavaScript-based PayPal checkout methods are used (PayPal Plus, Smart Payment Buttons, SEPA, Pay Later, Venmo, Credit card), the amount and item list sent to PayPal may not be identical to the one in the created order. The problem has been fixed with version 5.4.4. As a workaround, disable the aforementioned payment methods or use the Security Plugin in version >= 1.0.21.
[ { "commit_message": "[PATCH] Update changelog CHANGELOG.md | 1 + CHANGELOG_de-DE.md | 1 + 2 files changed, 2 insertions(+)", "patch_text_b64": "RnJvbSA1N2RiNWY0YTU3ZWYwYTE2NDZiNTA5YjQxNWRlOWYwM2JmNDQxYjA4IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBNYXggU3RlZ21leWVyIDxtLnN0ZWdtZXllckBzaG9wd2FyZS5jb20+Ck...
CWE-345: Insufficient Verification of Data Authenticity
CVE-2025-52477
Octo-STS Vulnerable to Unauthenticated SSRF with HTTP Response Reflection in OIDC Flow
Octo-STS is a GitHub App that acts like a Security Token Service (STS) for the GitHub API. Octo-STS versions before v0.5.3 are vulnerable to unauthenticated SSRF by abusing fields in OpenID Connect tokens. Malicious tokens were shown to trigger internal network requests which could reflect error logs with sensitive information. Upgrade to v0.5.3 to resolve this issue. This version includes patch sets to sanitize input and redact logging.
[ { "commit_message": "[PATCH] Merge commit from fork pkg/octosts/octosts.go | 22 +++++++++++++++------- 1 file changed, 15 insertions(+), 7 deletions(-)", "patch_text_b64": "RnJvbSAwZjE3N2ZkZTU0ZjkzMThlMzNmMGJiYTZhYmFlYTk0NjNhN2MzYWZkIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBDYXJsb3MgVGFkZXUgUGFuYXRvIEp1bml...
CWE-918: Server-Side Request Forgery (SSRF)
GHSA-3q24-rrgq-j66h
null
[ { "commit_message": "[PATCH] xss: Organization Search q This mitigates a vulnerability reported by @indevi0us where XSS is possible via the `q` parameter in organization lookups. This sanitizes the parameter value before use as well as htmlchars it before adding to JSON output. include/ajax.orgs.php | 4 ++-- 1 ...
null
GHSA-73rg-f94j-xvhx
Plate allows arbitrary DOM attributes in element.attributes and leaf.attributes
null
[ { "commit_message": "[PATCH 1/5] Mitigate XSS in `element.attributes` .changeset/lovely-taxis-bake.md | 5 + .changeset/olive-shrimps-joke.md | 31 ++++ packages/core/src/lib/plugin/BasePlugin.ts | 31 ++++ .../core/src/react/components/Plate.spec.tsx | 83 ++++++++- .../src/reac...
null
CVE-2022-37109
patrickfuller camp up to and including commit bbd53a256ed70e79bd8758080936afbf6d738767 is vulnerable to Incorrect Access Control. Access to the password.txt file is not properly restricted as it is in the root directory served by StaticFileHandler and the Tornado rule to throw a 403 error when password.txt is accessed can be bypassed. Furthermore, it is not necessary to crack the password hash to authenticate with the application because the password hash is also used as the cookie secret, so an attacker can generate his own authentication cookie.
[ { "commit_message": "[PATCH] Fix vulnerability and add warning README.md | 15 ++++++++------- server.py | 15 +++++---------- client.js => static/client.js | 0 favicon.ico => static/favicon.ico | Bin {img => static/img}/example.png | Bin {img => static/im...
n/a
GHSA-fr6p-j5w9-5pc8
null
[ { "commit_message": "[PATCH] issue #67: make sure sample rate is specified and non-zero in DFF files cli/dsdiff.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSBiYzZjYmEzZjU1MmM0NDU2NWY3ZjFlNjZkYzE1ODAxODlhZGRiMmI0IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBEYXZpZCBCcnlh...
null
GHSA-9q37-6mpp-rv7v
null
[ { "commit_message": "[PATCH] (cp 917cab5a4) fixes GHSA-7379-w44f-mfw4 and fixes GHSA-8g2g-6f2c-6h7j protect tag name from XSS admin/include/functions.php | 3 +++ 1 file changed, 3 insertions(+)", "patch_text_b64": "RnJvbSA1MDY5NjEwYWFlYjFkYTZkOTZkMzg5NjUxYTViYTliMzg2OTBjNTgwIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwM...
null
CVE-2017-6309
An issue was discovered in tnef before 1.4.13. Two type confusions have been identified in the parse_file() function. These might lead to invalid read and write operations, controlled by an attacker.
[ { "commit_message": "[PATCH] Check types to avoid invalid reads/writes. src/file.c | 4 ++++ src/tnef.c | 16 +++++++++------- 2 files changed, 13 insertions(+), 7 deletions(-)", "patch_text_b64": "RnJvbSA4ZGNjZjc5ODU3Y2VlYjdhNmQzZTQyYzFlNzYyZTdiODY1ZDUzNDRkIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBFcmljIFN...
n/a
GHSA-vm74-j4wq-82xj
Sisimai Inefficient Regular Expression Complexity vulnerability
null
[ { "commit_message": "[PATCH] Prevent Regex Denial of Service in Sisimai::String.to_plain lib/sisimai/string.rb | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSA1MWZlMmU2NTIxYzljMDJiNDIxYjM4Mzk0M2RjOWU0YmJiZTY1ZDRlIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiA9P1VURi04P3E/R29...
null
CVE-2025-23212
Tandoor Recipes - Local file disclosure - Users can read the content of any file on the server
Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. The external storage feature allows any user to enumerate the name and content of files on the server. This vulnerability is fixed in 1.5.28.
[ { "commit_message": "[PATCH] restrict local external recipes to superusers and restrict file path/type cookbook/provider/local.py | 26 +++++++++++++++----------- cookbook/views/edit.py | 2 +- cookbook/views/new.py | 8 +++++++- 3 files changed, 23 insertions(+), 13 deletions(-)", "patch_text_b64":...
CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
GHSA-839r-7hhg-xhqr
null
[ { "commit_message": "[PATCH] Release 4.3.1 CHANGELOG | 4 + docs/conf.py | 2 +- include/lsquic.h | 2 +- qir/run_endpoint.sh | 4 + src/liblsquic/lsquic_alarmset.c | 15 +++ src/liblsquic/lsquic_alarmset.h ...
null
GHSA-238g-gw8w-m679
null
[ { "commit_message": "[PATCH] https://github.com/ImageMagick/ImageMagick/issues/120 coders/wpg.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBiZWYxZTRmNjM3ZDhmNjY1YmMxMzNhOWM2ZDMwZGYwOGQ5ODNiYzNhIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBDcmlzdHkgPHVyYmFuLXdhcnJpb3JAaW1hZ2...
null
GHSA-g2fr-rq52-c2h3
null
[ { "commit_message": "[PATCH] shared/gatt-server: Fix heap overflow when appending prepare writes The code shall check if the prepare writes would append more the allowed maximum attribute length. Fixes https://github.com/bluez/bluez/security/advisories/GHSA-479m-xcq5-9g2q src/shared/gatt-server.c | 22 +++++++++...
null
CVE-2016-2044
libraries/sql-parser/autoload.php in the SQL parser in phpMyAdmin 4.5.x before 4.5.4 allows remote attackers to obtain sensitive information via a crafted request, which reveals the full path in an error message.
[ { "commit_message": "[PATCH] Avoid invalid invocation of SQL parser MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Signed-off-by: Michal Čihař <michal@cihar.com> libraries/sql-parser/autoload.php | 3 +++ 1 file changed, 3 insertions(+)", "patch_text_b64": "RnJvbSBj...
n/a
GHSA-9rxm-rvcp-xvp2
null
[ { "commit_message": "[PATCH] fixes #188 admin/panels/uploader/admin.uploader.php | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBmNjM5NGVhYzdhMGUwMDFkMmIxYWM2MzhkMzMxM2U1MzFkMTllYTkzIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBhemV0dCA8Z2l0aHVicmVnaXN0cmllcnVuZ0BhemV0dC5jb20...
null
GHSA-pj36-9rxw-2h2x
null
[ { "commit_message": "[PATCH] Skip MNG CLIP chunk with out-of-range object IDs coders/png.c | 3 +++ 1 file changed, 3 insertions(+)", "patch_text_b64": "RnJvbSBkMDcyZWQ2YWZmODM1YzE3NGU4NTZjZTNhNDI4MTYzYzBkYTllOGY0IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBHbGVubiBSYW5kZXJzLVBlaHJzb24gPGdsZW5ucnBAZ21haWwuY29t...
null
PYSEC-2022-43010
null
[ { "commit_message": "[PATCH] Make sure that all ssh keys are unique, regardless of the user README.md | 1 + rdiffweb/core/model/__init__.py | 23 ++++++++++++++-- rdiffweb/core/model/_sshkey.py | 6 ++++- rdiffweb/core/model/_user.py | 5 ++-- rdiffweb/core/...
null
GHSA-c4q5-6c82-3qpw
Spring Security vulnerable to Authorization Bypass of Static Resources in WebFlux Applications
null
[ { "commit_message": "[PATCH] Add Firewall for WebFlux Closes gh-15967 docs/modules/ROOT/nav.adoc | 1 + .../pages/reactive/exploits/firewall.adoc | 202 +++++ .../web/server/WebFilterChainProxy.java | 47 +- .../HttpStatusExchangeRejectedHandler.java | 66 ++ .../ServerExchangeRe...
null
GHSA-wh6m-h6f4-rjf4
Libredesk has Improper Neutralization of HTML Tags in a Web Page
null
[ { "commit_message": "[PATCH] fix: use vue-letter to render html in contact notes, command box. This prevents forms from being injected in contact notes, macros etc. Use common message bubble component to render msg bubbles. Delete duplicate contact and agent msg bubbles. Remove vue dompuritfy html dep frontend...
null
GHSA-pfj7-w373-gqch
Cross-Site Request Forgery in firefly-iii
null
[ { "commit_message": "[PATCH] Catch CSRF issues .../Controllers/Rule/CreateController.php | 15 +++-- .../Controllers/RuleGroup/EditController.php | 56 +++++++++---------- .../RuleGroup/RuleGroupRepository.php | 3 - public/v1/js/ff/rules/index.js | 29 ++++++++++ resources/views/v1/rul...
null
CVE-2021-21352
Predictable tokens used for password resets
Anuko Time Tracker is an open source, web-based time tracking application written in PHP. In TimeTracker before version 1.19.24.5415 tokens used in password reset feature in Time Tracker are based on system time and, therefore, are predictable. This opens a window for brute force attacks to guess user tokens and, once successful, change user passwords, including that of a system administrator. This vulnerability is pathced in version 1.19.24.5415 (started to use more secure tokens) with an additional improvement in 1.19.24.5416 (limited an available window for brute force token guessing).
[ { "commit_message": "[PATCH] Fixed a critical security vulnerability with password resets. WEB-INF/templates/report.tpl | 4 ++++ initialize.php | 2 +- password_reset.php | 5 ++++- 3 files changed, 9 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSA0MGYzZDkzNDVhZGMyMGU2ZjI4ZW...
CWE-330: Use of Insufficiently Random Values
GHSA-vfm6-r2gc-pwww
Symfony2 security issue when the trust proxy mode is enabled
null
[ { "commit_message": "[PATCH] [HttpFoundation] reverted variable rename Request.php | 16 ++++++++-------- 1 file changed, 8 insertions(+), 8 deletions(-)", "patch_text_b64": "RnJvbSA1Y2RlNTIyOWZjNzFhMTljZWYyYTBhOTMzYTE4ZTA4ZTQzMjUyZjM0IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBGYWJpZW4gUG90ZW5jaWVyIDxmYWJpZW...
null
GHSA-c2w9-48qc-qpj4
Code injection in ansible
null
[ { "commit_message": "[PATCH] Fix security issue refs #4 * Update version to 1.0.5 * Update to use yaml.safe_load() * Update to tomoh1r .travis.yml | 20 +++++++++++++------- CHANGES.txt | 10 ++++++++++ README.rst | 4 ++-- README_test.rst ...
null
GHSA-grv7-4qw2-wr4j
null
[ { "commit_message": "[PATCH] fix: crash when accidental without a note at start of line after K: Issue #84. abcparse.c | 17 ++++++++++------- 1 file changed, 10 insertions(+), 7 deletions(-)", "patch_text_b64": "RnJvbSAzMTY5YWNlNmQ2M2Y2ZjUxN2E2NGU4ZGYwMjk4ZjQ0YTQ5MGM0YTE1IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpG...
null
PYSEC-2012-38
null
[ { "commit_message": "[PATCH] Prevent file injection writing to host filesystem. MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Fix bug 1015531, CVE-2012-3360, CVE-2012-3361 This patch prevents the file injection code from writing into the host filesystem if a user spec...
null
CVE-2014-1737
The raw_cmd_copyin function in drivers/block/floppy.c in the Linux kernel through 3.14.3 does not properly handle error conditions during processing of an FDRAWCMD ioctl call, which allows local users to trigger kfree operations and gain privileges by leveraging write access to a /dev/fd device.
[ { "commit_message": "[PATCH] floppy: ignore kernel-only members in FDRAWCMD ioctl input Always clear out these floppy_raw_cmd struct members after copying the entire structure from userspace so that the in-kernel version is always valid and never left in an interdeterminate state. Signed-off-by: Matthew Daley <...
n/a
GHSA-qjr6-p4j5-v4qx
null
[ { "commit_message": "[PATCH] Strengthen field validations on user Updates (#1201) * Strengthen field validations on user Updates * update writables server/models/user.js | 54 ++++++++++++++++++-- server/utils/AiProviders/openRouter/index.js | 2 +- server/utils/PasswordRecovery/index.js ...
null
GHSA-5jp2-vwrj-99rf
Team scope authorization bypass when Post/Put request with :team_name in body, allows HTTP parameter pollution
null
[ { "commit_message": "[PATCH] fix team_name overwritten bug Signed-off-by: Rui Yang <ruiya@vmware.com> atc/api/auth/check_pipeline_access_handler.go | 4 ++-- .../reject_archived_handler_factory.go | 4 ++-- .../pipelineserver/scoped_handler_factory.go | 4 ++-- .../scoped_handler_factory_test.go ...
null
PYSEC-2021-205
null
[ { "commit_message": "[PATCH] Fix breakage in parameterized_truncated_normal_op.cc PiperOrigin-RevId: 372041718 Change-Id: Iff79e77a2bb27032423eefcb84211627b27dfe81 tensorflow/core/kernels/parameterized_truncated_normal_op.cc | 3 +++ 1 file changed, 3 insertions(+)", "patch_text_b64": "RnJvbSA1ZTUyZWY1YTQ2MT...
null
GHSA-gmhr-6f43-7qpj
Moodle does not properly implement group-based access restrictions
null
[ { "commit_message": "[PATCH] MDL-51861 enrol: Don't get all parts in get_enrolled_users with groups enrol/externallib.php | 34 ++++++++++++++++++++++++++++------ enrol/upgrade.txt | 4 ++++ 2 files changed, 32 insertions(+), 6 deletions(-)", "patch_text_b64": "RnJvbSAxMmJjNzEzMDgxZGMyNGI2ZWVkZWE1NDI4MTg...
null
GHSA-jphj-5g3m-w7x6
Ignite Realtime Openfire vulnerable to cross-site scripting
null
[ { "commit_message": "[PATCH] xss filter src/web/audit-policy.jsp | 11 ++--- src/web/available-plugins.jsp | 55 ++++++++++++------------ src/web/clearspace-status.jsp | 11 ++--- src/web/component-session-details.jsp | 13 +++--- src/web/component-session-summary.jsp | ...
null
CVE-2023-37261
OpenComputers's SSRF to cloud service metadata services and local IPv6 addresses not blocked by default
OpenComputers is a Minecraft mod that adds programmable computers and robots to the game. This issue affects every version of OpenComputers with the Internet Card feature enabled; that is, OpenComputers 1.2.0 until 1.8.3 in their most common, default configurations. If the OpenComputers mod is installed as part of a Minecraft server hosted on a popular cloud hosting provider, such as AWS, GCP and Azure, those metadata services' API endpoints are not forbidden (aka "blacklisted") by default. As such, any player can gain access to sensitive information exposed via those metadata servers, potentially allowing them to pivot or privilege escalate into the hosting provider. In addition, IPv6 addresses are not correctly filtered at all, allowing broader access into the local IPv6 network. This can allow a player on a server using an OpenComputers computer to access parts of the private IPv4 address space, as well as the whole IPv6 address space, in order to retrieve sensitive information. OpenComputers v1.8.3 for Minecraft 1.7.10 and 1.12.2 contains a patch for this issue. Some workarounds are also available. One may disable the Internet Card feature completely. If using OpenComputers 1.3.0 or above, using the allow list (`opencomputers.internet.whitelist` option) will prohibit connections to any IP addresses and/or domains not listed; or one may add entries to the block list (`opencomputers.internet.blacklist` option). More information about mitigations is available in the GitHub Security Advisory.
[ { "commit_message": "[PATCH] Rework Internet Card filtering system. changelog.md | 4 + ...omputersConfigCommentManipulationHook.java | 27 ++++ .../java/li/cil/oc/util/InetAddressRange.java | 64 +++++++++ src/main/resources/application.conf | 57 ++++---- src/main/s...
CWE-918: Server-Side Request Forgery (SSRF)
GHSA-ww6f-76ff-phhj
ChakraCore RCE Vulnerability
null
[ { "commit_message": "[PATCH] Chakra Assert : sym->HasScopeSlot() CVE-2016-3202 A let/const bug exposes a bad array indexing operation during bytecode emit. A symbol can fail to get a location due to this bug but then the location is used to offset into an array assuming it is always valid. Fix the array offset...
null
GHSA-892q-vvcr-v6j5
null
[ { "commit_message": "[PATCH] Limit accepted chunk-size to 2^63-1 and be strict about chunk-ext authorized characters. Submitted by: Yann Ylavic git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1684513 13f79535-47bb-0310-9956-ffa450edef68 CHANGES | 3 + docs/log-message-t...
null
CVE-2019-18841
Chartkick.js 3.1.0 through 3.1.3, as used in the Chartkick gem before 3.3.0 for Ruby, allows prototype pollution.
[ { "commit_message": "[PATCH] Updated Chartkick.js to 3.2.0 CHANGELOG.md | 1 + vendor/assets/javascripts/chartkick.js | 117 +++++++++++++++++++++++-- 2 files changed, 109 insertions(+), 9 deletions(-)", "patch_text_b64": "RnJvbSBiODEwOTM2YmJmNjg3YmM3NGM1YjZkYmE3MmQyMzk3YTM5OTg4NWZ...
n/a
GHSA-hm36-ffrh-c77c
Litestar X-Forwarded-For Header Spoofing Vulnerability Enables Rate Limit Evasion
null
[ { "commit_message": "[PATCH] Merge commit from fork docs/usage/middleware/builtin-middleware.rst | 19 ++++++++ litestar/middleware/rate_limit.py | 45 +++++++++++++++--- .../test_rate_limit_middleware.py | 46 +++++++++++++++++++ 3 files changed, 103 insertions(+), 7 deletions(-)", "p...
null
GHSA-8m6j-p5jv-v69w
TYPO3 Cross-Site Scripting in Online Media Asset Rendering
null
[ { "commit_message": "[PATCH] [SECURITY] Properly escape videoId for YouTube/Vimeo Resolves: #83184 Releases: master, 8.7, 7.6 Security-Commit: 8da8a3c1609fbd83b025c8a815d9c3b667c7722c Security-Bulletin: TYPO3-CORE-SA-2018-006 Change-Id: Iaab42d0c00d465582cb48fe473cc345c68144031 Reviewed-on: https://review.typo3...
null
CVE-2023-46928
GPAC 2.3-DEV-rev605-gfc9e29089-master contains a SEGV in gpac/MP4Box in gf_media_change_pl /afltest/gpac/src/media_tools/isom_tools.c:3293:42.
[ { "commit_message": "[PATCH] null guard on gf_media_change_pl (fixes #2661) src/media_tools/isom_tools.c | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAwNzUzYmY2ZDg2NzM0M2E4MGEwNDRiZjQ3YTI3ZDBiN2FjY2M4YmYxIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBBdXJlbGllbiBEYXZpZCA8...
n/a
CVE-2018-1002200
plexus-archiver before 3.6.0 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in an archive entry that is mishandled during extraction. This vulnerability is also known as 'Zip-Slip'.
[ { "commit_message": "[PATCH] fix: fail when trying to extract outside of dest dir A well crafted zip file may cause the code to extract outside of the destination dir. This PR fails when that happens so that no unexpected behaviour happens. .../plexus/archiver/AbstractUnArchiver.java | 9 +++++++ .../archive...
CWE-22
CVE-2018-9110
Studio 42 elFinder before 2.1.37 has a directory traversal vulnerability in elFinder.class.php with the zipdl() function that can allow a remote attacker to download files accessible by the web server process and delete files owned by the account running the web server process. NOTE: this issue exists because of an incomplete fix for CVE-2018-9109.
[ { "commit_message": "[PATCH] [php:security] re-fix directory traversal vulnerability for windows server rel. commit 157f471d7e48f190f74e66eb5bc73360b5352fd3 php/elFinder.class.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBlNjM1MTU1N2I4NmNjMTBhNzY1MTI1M2QyZDJhZmY3ZjZiOT...
n/a
GHSA-c9hm-r59j-h433
null
[ { "commit_message": "[PATCH] Limit write requests to at most INT_MAX. This prevents a certain common programming error (passing -1 to write) from leading to other problems deeper in the library. libarchive/archive_write.c | 5 +++++ 1 file changed, 5 insertions(+)", "patch_text_b64": "RnJvbSAyMjUzMTU0NTUxNDA...
null
GHSA-348r-6928-rfcr
null
[ { "commit_message": "[PATCH] bug fixes (#1790) interface/forms/eye_mag/php/taskman_functions.php | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-)", "patch_text_b64": "RnJvbSAzZTIyZDExYzcxNzVjMWViYmYzZDg2MjU0NWNlNmZlZTE4ZjcwNjE3IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBCcmFkeSBNaWxsZXIgPG...
null
GHSA-grcg-hjg8-mrhw
null
[ { "commit_message": "[PATCH] ASoC: SOF: ipc: Fix memory leak in sof_set_get_large_ctrl_data In the implementation of sof_set_get_large_ctrl_data() there is a memory leak in case an error. Release partdata if sof_get_ctrl_copy_params() fails. Fixes: 54d198d5019d (\"ASoC: SOF: Propagate sof_get_ctrl_copy_params()...
null
CVE-2020-15862
Net-SNMP through 5.8 has Improper Privilege Management because SNMP WRITE access to the EXTEND MIB provides the ability to run arbitrary commands as root.
[ { "commit_message": "[PATCH] make the extend mib read-only by default agent/mibgroup/agent/extend.c | 18 ++++++++++++------ 1 file changed, 12 insertions(+), 6 deletions(-)", "patch_text_b64": "RnJvbSA3N2Y2YzYwZjU3ZGJhMGFhZWE1ZDhlZjFkZDk0YmNkMGM4ZTZkMjA1IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBXZXMgSGFyZG...
n/a
CVE-2020-15258
Insecure use of shell.openExternal in Wire
In Wire before 3.20.x, `shell.openExternal` was used without checking the URL. This vulnerability allows an attacker to execute code on the victims machine by sending messages containing links with arbitrary protocols. The victim has to interact with the link and sees the URL that is opened. The issue was patched by implementing a helper function which checks if the URL's protocol is common. If it is common, the URL will be opened externally. If not, the URL will not be opened and a warning appears for the user informing them that a probably insecure URL was blocked from being executed. The issue is patched in Wire 3.20.x. More technical details about exploitation are available in the linked advisory.
[ { "commit_message": "[PATCH] Merge pull request from GHSA-5gpx-9976-ggpm electron/html/about.html | 8 ++- electron/src/lib/showDialog.ts | 11 ++++ electron/src/main.ts | 5 +- electron/src/menu/system.ts | 13 ++--- electron/src/window/AboutWindow.ts | 20 +...
{"CWE-20":"Improper Input Validation"}
GHSA-hpf7-mmqw-g6vq
Cross-site Scripting in Jenkins Plot Plugin
null
[ { "commit_message": "[PATCH] [SECURITY-2220] Escape plot description (#72) src/main/resources/hudson/plugins/plot/PlotReport/index.jelly | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA0YjY4MWFmMjg4OGRhNDljNDE4NjNjY2M5ZjZlYWEzZWEyNjM2N2Q4IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGc...
null
GHSA-fqrg-vmvj-jv3x
Moodle allows attackers obtain full-name information
null
[ { "commit_message": "[PATCH] MDL-50099 auth: less verbose account confirmed message auth/email/auth.php | 8 ++++---- auth/ldap/auth.php | 8 ++++---- login/confirm.php | 1 - 3 files changed, 8 insertions(+), 9 deletions(-)", "patch_text_b64": "RnJvbSA0ZjhiNmQ1Njc0OTQzNzUwMTdjNGJjMjIyOGUxNjY4ZDEzYjIxNjQ1IE...
null
CVE-2023-0549
YAFNET Private Message PostPrivateMessage cross site scripting
A vulnerability, which was classified as problematic, has been found in YAFNET up to 3.1.10. This issue affects some unknown processing of the file /forum/PostPrivateMessage of the component Private Message Handler. The manipulation of the argument subject/message leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.1.11 is able to address this issue. The identifier of the patch is 2237a9d552e258a43570bb478a92a5505e7c8797. It is recommended to upgrade the affected component. The identifier VDB-219665 was assigned to this vulnerability.
[ { "commit_message": "[PATCH] [FIXED GHSA-4hwx-678w-9cp5] XSS in pms .../Pages/PostPrivateMessage.ascx.cs | 10 +++++----- yafsrc/YetAnotherForum.NET/Pages/PrivateMessage.ascx | 3 ++- .../YetAnotherForum.NET/Pages/PrivateMessage.ascx.cs | 6 ++++-- 3 files changed, 11 insertions(+), 8 delet...
CWE-79 Cross Site Scripting
GHSA-gxcr-ff3v-w6r6
null
[ { "commit_message": "[PATCH] 2.11.1 updates README.md | 19 +++++++++++++++---- 1 file changed, 15 insertions(+), 4 deletions(-)", "patch_text_b64": "RnJvbSA5MjIzZGM2YmZjNTAyNTFhOWEzY2JhMDIxMGU3MWJlODBmYzM4ZWNkIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBKb2huIER5ZXIgPGpvaG5keWVyQGdtYWlsLmNvbT4KRGF0ZTogVGh1LCA...
null
GHSA-32fh-gwcr-7pmx
null
[ { "commit_message": "[PATCH] Resolving Issues #2213, #2214, #2215 and Additional Multiple XSS vectors associated with un-escaped strings. Introduce new function, audit all calls, remove inline styles for classes, some i18n missed. CHANGELOG | 3 +++ aggregate_graphs.php | 6 +++--- aggrega...
null
GHSA-9hh7-6558-qfp2
Mattermost allows other users to determine when users had read channels via channel member objects
null
[ { "commit_message": "[PATCH] Sanatize LastViewedAt and LastUpdateAt for other users on channel member object (#33835) (#33905) Automatic Merge server/channels/api4/channel.go | 27 +++++++ server/channels/api4/channel_test.go | 84 ++++++++++++++++++++++ server/channels/api4/user.go ...
null
GHSA-mm6v-68qp-f9fw
Crayfish allows Remote Code Execution via Homarus Authorization header
null
[ { "commit_message": "[PATCH] Merge commit from fork * Rework Homarus CLI invocation to use better escaping. * Bump PHP version in docs. * Point at the newly released/merged code. Homarus/composer.json | 2 +- Homarus/src/Controller/HomarusController.php | 55 +++++++++++++++----- README.md...
null
GHSA-g64q-v8cm-wr64
null
[ { "commit_message": "[PATCH] fix pecl security bug onto the test script test.php | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA1NDVlMDU4NjMyMGFlNmYxNjIwNGJhNTQ4Y2Y1MzNlZjc1ZGMyZmJkIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBEYW5pZWwgTWFyemluaSA8ZGFuaWVsLm1hcnppbmlAaXViZW...
null
GHSA-3xc7-xg67-pw99
Sensitive Data Exposure in sequelize-cli
null
[ { "commit_message": "[PATCH] Bug Fix: Special characters in password are not escaped https://github.com/sequelize/cli/issues/172 is stil open when special characters find their way in a password src/helpers/config-helper.js | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBkYT...
null
CVE-2024-27938
SMTP Smuggling in Postal
Postal is an open source SMTP server. Postal versions less than 3.0.0 are vulnerable to SMTP Smuggling attacks which may allow incoming e-mails to be spoofed. This, in conjunction with a cooperative outgoing SMTP service, would allow for an incoming e-mail to be received by Postal addressed from a server that a user has 'authorised' to send mail on their behalf but were not the genuine author of the e-mail. Postal is not affected for sending outgoing e-mails as email is re-encoded with `<CR><LF>` line endings when transmitted over SMTP. This issue has been addressed and users should upgrade to Postal v3.0.0 or higher. Once upgraded, Postal will only accept End of DATA sequences which are explicitly `<CR><LF>.<CR><LF>`. If a non-compliant sequence is detected it will be logged to the SMTP server log. There are no workarounds for this issue.
[ { "commit_message": "[PATCH] feat: only accept RFC-compliant End-of-DATA sequence Previously Postal was fairly forgiving about line endings. This requires that the end of data sequence is `<CR><LF>.<CR><LF>`. app/lib/smtp_server/client.rb | 19 ++++++++-- app/lib/smtp_server/server.rb ...
CWE-116: Improper Encoding or Escaping of Output
GHSA-p76j-h4m8-hx5c
Pimcore Demo Allows GraphQL Introspection
null
[ { "commit_message": "[PATCH] Disable introspection (#437) dump/data-1-settings_store.sql | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-)", "patch_text_b64": "RnJvbSBhMmE3ZmYzYjU2NTg4MmFlZmI3NTk4MDRhYWM0YTUxYWZiNDU4ZjFmIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBtY29wMSA8ODkwMTE1MjcrbWNvcDFAdXNlc...
null
CVE-2012-1208
Multiple cross-site scripting (XSS) vulnerabilities in backend/core/engine/base.php in Fork CMS 3.2.4 and possibly other versions before 3.2.5 allow remote attackers to inject arbitrary web script or HTML via the (1) report parameter to blog/settings or (2) error parameter to users/index.
[ { "commit_message": "[PATCH] Make sure the error doesn't contain any html tags. backend/core/engine/base.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBkNjVjMDgzYWRjOTFjODhkMjFiZDlhMGRmNGMyNjg4ZGY2MzRjNmZmIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBCYXVmZm1hbiA8ZGF2eUBzc...
n/a
GHSA-6jwp-4wvj-6597
Apache Pinot Vulnerable to Authentication Bypass
null
[ { "commit_message": "[PATCH] Strip Matrix parameter from BasePath check (#14383) .../broker/broker/AuthenticationFilter.java | 5 ++++- .../pinot/common/auth/AuthProviderUtils.java | 13 +++++++++++ .../api/access/AuthenticationFilter.java | 4 +++- .../api/access/AuthenticationFilterTest.java | 22 ++++...
null
GHSA-hfx2-wgxq-fp88
null
[ { "commit_message": "[PATCH] Release 4.0.4 src/liblsquic/lsquic_full_conn_ietf.c | 7 +++++-- 1 file changed, 5 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSA1MTVmNDUzNTU2Yzk5ZDI3YzRkZGRiNTQyNDg5OGRjMWE1NTM3NzA4IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBHZW9yZ2UgV2FuZyA8Z3dhbmdAbGl0ZXNwZWVkdGVjaC...
null
GHSA-4225-xq9f-4ww3
null
[ { "commit_message": "[PATCH] security: fix SELinux label generation logic MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit A process can access a file if the set of MCS categories for the file is equal-to *or* a subset-of, the set of MCS categories for the process. If th...
null
GHSA-w3wh-g4m9-783p
XWiki Rendering is vulnerable to XSS attacks through insecure XHTML syntax
null
[ { "commit_message": "[PATCH] XRENDERING-660: Get rid of the dependency on the xdom+xml syntax (#230) * Pass the label via an XDOM instance instead of rendering/parsing to xdom+xml syntax. * Remove the dependency on the xdom+xml syntax as it isn't needed anymore. * Move the reference type detection into the XWik...
null
PYSEC-2021-548
null
[ { "commit_message": "[PATCH] Prevent heap OOB in sparse reduction ops. PiperOrigin-RevId: 387934524 Change-Id: I894aa30f1e454f09b471d565b4a325da49322c1a tensorflow/core/kernels/sparse_reduce_op.cc | 13 +++++++++++++ 1 file changed, 13 insertions(+)", "patch_text_b64": "RnJvbSA4NzE1OGY0M2YwNWYyNzIwYTM3NGYzZT...
null
CVE-2014-3183
Heap-based buffer overflow in the logi_dj_ll_raw_request function in drivers/hid/hid-logitech-dj.c in the Linux kernel before 3.16.2 allows physically proximate attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a crafted device that specifies a large report size for an LED report.
[ { "commit_message": "[PATCH] HID: logitech: fix bounds checking on LED report size The check on report size for REPORT_TYPE_LEDS in logi_dj_ll_raw_request() is wrong; the current check doesn't make any sense -- the report allocated by HID core in hid_hw_raw_request() can be much larger than DJREPORT_SHORT_LENGT...
n/a
GHSA-xm64-phgg-mwc9
null
[ { "commit_message": "[PATCH] minissdpd: Fix broken overflow test (p+l > buf+n) thanks to Salva Piero minissdpd/Changelog.txt | 5 ++++- minissdpd/minissdpd.c | 10 +++++----- minissdpd/testminissdpd.c | 12 +++++++++++- 3 files changed, 20 insertions(+), 7 deletions(-)", "patch_text_b64": "RnJvbSBiMjM4Y...
null
GHSA-rmh2-65xw-9m6q
Infinite Loop in jsonparser
null
[ { "commit_message": "[PATCH] fix issue 188 (#192) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit **Description**: This pr fix issue #188. If `findKeyStart` meets a `[` or `{`, it should not add i with `blockEnd`’s return value directly because it may return -1 if it di...
null
CVE-2023-23935
Presence of restricted personal Discourse messages may be leaked if tagged with a tag
Discourse is an open-source messaging platform. In versions 3.0.1 and prior on the `stable` branch and versions 3.1.0.beta2 and prior on the `beta` and `tests-passed` branches, the count of personal messages displayed for a tag is a count of all personal messages regardless of whether the personal message is visible to a given user. As a result, any users can technically poll a sensitive tag to determine if a new personal message is created even if the user does not have access to the personal message. In the patched versions, the count of personal messages tagged with a given tag is hidden by default. To revert to the old behaviour of displaying the count of personal messages for a given tag, an admin may enable the `display_personal_messages_tag_counts` site setting.
[ { "commit_message": "[PATCH] SECURITY: Hide PM count for tags by default (#20061) Currently `Topic#pm_topic_count` is a count of all personal messages tagged for a given tag. As a result, any user with access to PM tags can poll a sensitive tag to determine if a new personal message has been created using that ...
CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CVE-2025-24030
Envoy Admin Interface Exposed through prometheus metrics endpoint
Envoy Gateway is an open source project for managing Envoy Proxy as a standalone or Kubernetes-based application gateway. A user with access to the Kubernetes cluster can use a path traversal attack to execute Envoy Admin interface commands on proxies managed by any version of Envoy Gateway prior to 1.2.6. The admin interface can be used to terminate the Envoy process and extract the Envoy configuration (possibly containing confidential data). Version 1.2.6 fixes the issue. As a workaround, the `EnvoyProxy` API can be used to apply a bootstrap config patch that restricts access strictly to the prometheus stats endpoint. Find below an example of such a bootstrap patch.
[ { "commit_message": "[PATCH] Merge commit from fork Signed-off-by: Guy Daich <guy.daich@sap.com> .../translate/out/default-resources.all.yaml | 12 ++++++++++-- .../translate/out/from-gateway-api-to-xds.all.json | 9 ++++++++- .../translate/out/from-gateway-api-to-xds.all.yaml | 6 +++++- .../out/fro...
CWE-419: Unprotected Primary Channel
CVE-2023-29209
org.xwiki.platform:xwiki-platform-legacy-notification-activitymacro Eval Injection vulnerability
XWiki Commons are technical libraries common to several other top level XWiki projects. Any user with view rights on commonly accessible documents including the legacy notification activity macro can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping of the macro parameters of the legacy notification activity macro. This macro is installed by default in XWiki. The vulnerability can be exploited via every wiki page that is editable including the user's profile, but also with just view rights using the HTMLConverter that is part of the CKEditor integration which is bundled with XWiki. The vulnerability has been patched in XWiki 13.10.11, 14.4.7 and 14.10.
[ { "commit_message": "[PATCH] XWIKI-20258: Improve escaping in the Legacy ActivityMacro .../Notifications/Code/Legacy/ActivityMacro.xml | 13 +++++++++++-- 1 file changed, 11 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSA5NDM5MjQ5MDg4NDYzNWMwMjgxOTkyNzVkYjA1OWE0ZjQ3MWU1N2JjIE1vbiBTZXAgMTcgMDA6...
CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')
CVE-2020-26263
RSA vulnerability in tslite-ng
tlslite-ng is an open source python library that implements SSL and TLS cryptographic protocols. In tlslite-ng before versions 0.7.6 and 0.8.0-alpha39, the code that performs decryption and padding check in RSA PKCS#1 v1.5 decryption is data dependant. In particular, the code has multiple ways in which it leaks information about the decrypted ciphertext. It aborts as soon as the plaintext doesn't start with 0x00, 0x02. All TLS servers that enable RSA key exchange as well as applications that use the RSA decryption API directly are vulnerable. This is patched in versions 0.7.6 and 0.8.0-alpha39. Note: the patches depend on Python processing the individual bytes in side-channel free manner, this is known to not the case (see reference). As such, users that require side-channel resistance are recommended to use different TLS implementations, as stated in the security policy of tlslite-ng.
[ { "commit_message": "[PATCH 1/5] stop conversion from bytes to int to bytes with m2crypto with M2Crypto we can process byte strings, and for padding/depadding we need bytes, so don't convert back and forth between the formats also put all the integer to bytes conversion in a single place for the implementations...
CWE-326 Inadequate Encryption Strength
CVE-2025-32951
io.jmix.rest:jmix-rest allows XSS in the /files Endpoint of the Generic REST API
Jmix is a set of libraries and tools to speed up Spring Boot data-centric application development. In versions 1.0.0 to 1.6.1 and 2.0.0 to 2.3.4, the input parameter, which consists of a file path and name, can be manipulated to return the Content-Type header with text/html if the name part ends with .html. This could allow malicious JavaScript code to be executed in the browser. For a successful attack, a malicious file needs to be uploaded beforehand. This issue has been patched in versions 1.6.2 and 2.4.0. A workaround is provided on the Jmix documentation website.
[ { "commit_message": "[PATCH] Backport REST files fixes to 1.6 #3836 .../io/jmix/localfs/LocalFileStorage.java | 38 +++++++++++++++---- .../localfs/LocalFileStorageProperties.java | 18 ++++++++- .../java/io/jmix/rest/RestProperties.java | 14 +++++++ .../controller/FileDownloadController.java | 26 ++...
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
GHSA-q3qx-cp62-f6m7
Grav Admin Plugin vulnerable to User Enumeration & Email Disclosure
null
[ { "commit_message": "[PATCH] Fix security vulnerabilities: user enumeration and XSS issues Security fixes: 1. GHSA-q3qx-cp62-f6m7: User Enumeration & Email Disclosure - Changed rate-limiter error message in taskForgot() to not include email - Added generic translation key FORGOT_CANNOT_RESET_RATE_LIMITED - Prev...
null
CVE-2018-8948
In MISP before 2.4.89, app/View/Events/resolved_attributes.ctp has multiple XSS issues via a malicious MISP module.
[ { "commit_message": "[PATCH] fix: Fixed various potential XSS issues in the resolved attributes view - potentially exposed XSS if a malicious MISP module was loaded on the instance - as reported by Christophe Vandeplas (@cvandeplas) app/View/Events/resolved_attributes.ctp | 12 ++++++------ 1 file changed, 6 ins...
n/a
CVE-2021-41265
Improper Authentication in Flask-AppBuilder
Flask-AppBuilder is a development framework built on top of Flask. Verions prior to 3.3.4 contain an improper authentication vulnerability in the REST API. The issue allows for a malicious actor with a carefully crafted request to successfully authenticate and gain access to existing protected REST API endpoints. This only affects non database authentication types and new REST API endpoints. Users should upgrade to Flask-AppBuilder 3.3.4 to receive a patch.
[ { "commit_message": "[PATCH] chore: improve schema validation (#1712) docs/config.rst | 3 ++ flask_appbuilder/security/api.py | 62 +++++++++++++--------------- flask_appbuilder/security/manager.py | 30 +++++++++----- flask_appbuilder/security/schemas.py | 45 ++++++++++++++++++++ 4 file...
CWE-287: Improper Authentication
PYSEC-2021-168
null
[ { "commit_message": "[PATCH] Fix null CHECK issue with `tf.raw_ops.EncodePng`. PiperOrigin-RevId: 369717714 Change-Id: I24136cd99c20b8466671f4f93b670ef6f6dd1250 tensorflow/core/kernels/image/encode_png_op.cc | 2 ++ 1 file changed, 2 insertions(+)", "patch_text_b64": "RnJvbSAyNmViMzIzNTU0ZmZjY2QxNzNlOGE3OWE4...
null
GHSA-g42g-737j-qx6j
Access Restriction Bypass in kube-apiserver
null
[ { "commit_message": "[PATCH 1/7] tweak validation to avoid mutation pkg/apis/core/validation/validation.go | 46 +++++++++----------------- 1 file changed, 15 insertions(+), 31 deletions(-)", "patch_text_b64": "RnJvbSBkMDAwZjJjOGM1MWIyNDkzMzg0MjRjZDgyNjJkNDU2MTNkZjk2ZGExIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm...
null
PYSEC-2021-462
null
[ { "commit_message": "[PATCH] Fix overflow CHECK issue with `tf.raw_ops.AddManySparseToTensorsMap`. PiperOrigin-RevId: 369492969 Change-Id: I1d70d6c0c92e3d7a25bc3b3aa2a0c0ac9688bf81 .../core/kernels/sparse_tensors_map_ops.cc | 26 ++++++++++++++----- 1 file changed, 19 insertions(+), 7 deletions(-)", "patc...
null
CVE-2017-8890
The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel through 4.10.15 allows attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call.
[ { "commit_message": "[PATCH] dccp/tcp: do not inherit mc_list from parent syzkaller found a way to trigger double frees from ip_mc_drop_socket() It turns out that leave a copy of parent mc_list at accept() time, which is very bad. Very similar to commit 8b485ce69876 (\"tcp: do not inherit fastopen_req from pare...
n/a
GHSA-vg7j-7cwx-8wgw
Mongoose search injection vulnerability
null
[ { "commit_message": "[PATCH] fix: disallow nested $where in populate match .../populate/getModelsMapForPopulate.js | 41 +++++++++++-------- test/model.populate.test.js | 21 ++++++++-- 2 files changed, 40 insertions(+), 22 deletions(-)", "patch_text_b64": "RnJvbSA2NGE5Zjk3MDZmMjQyOGM0...
null
CVE-2012-4506
Directory traversal vulnerability in gitolite 3.x before 3.1, when wild card repositories and a pattern matching "../" are enabled, allows remote authenticated users to create arbitrary repositories and possibly perform other actions via a .. (dot dot) in a repository name.
[ { "commit_message": "[PATCH] (security) fix bug in pattern to detect path traversal while we're about it, add the same check to some of the internal routines, so that commands can also be protected. finally, just to make sure we don't lose it again in some other fashion, add a few tests for path traversal... sr...
n/a