id
stringlengths
12
19
title
stringlengths
0
237
description
stringlengths
35
3.87k
patches
listlengths
1
22
cwe
stringlengths
2
440
GHSA-m6x4-97wx-4q27
Unsafe Deserialization in jackson-databind
null
[ { "commit_message": "[PATCH] Fixed #2998 release-notes/VERSION-2.x | 2 ++ .../jackson/databind/jsontype/impl/SubTypeValidator.java | 5 +++++ 2 files changed, 7 insertions(+)", "patch_text_b64": "RnJvbSA1NjcxOTRjNTNhZTkxZjBhMTRkYzI3MjM5YWZiNzM5YjFjMTA0NDhhIE1vbiBTZXAgMT...
null
CVE-2024-7659
projectsend Password Reset Token functions.php generate_random_string random values
A vulnerability, which was classified as problematic, was found in projectsend up to r1605. Affected is the function generate_random_string of the file includes/functions.php of the component Password Reset Token Handler. The manipulation leads to insufficiently random values. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. Upgrading to version r1720 is able to address this issue. The name of the patch is aa27eb97edc2ff2b203f97e6675d7b5ba0a22a17. It is recommended to upgrade the affected component.
[ { "commit_message": "[PATCH] Generate secure random strings. Found by hassan al-khafaji includes/functions.php | 7 +------ 1 file changed, 1 insertion(+), 6 deletions(-)", "patch_text_b64": "RnJvbSBhYTI3ZWI5N2VkYzJmZjJiMjAzZjk3ZTY2NzVkN2I1YmEwYTIyYTE3IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBpZ25hY2lvbmVsc...
CWE-330 Insufficiently Random Values
GHSA-6f6v-26gj-6crp
null
[ { "commit_message": "[PATCH] Fix invalid free() after failed realloc() (GHSA-gcx3-7m76-287p) pb_decode.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSA0NTU4MmYxZjk3ZjQ5ZTJhYmZkYmExNDYzZDFlMTAyNzY4MmQ5ODU2IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBQZXR0ZXJpIEFpbW9uZW4...
null
GHSA-m757-p8rv-4q93
Apache Linkis DataSource: DataSource module Oracle SQL Database Password Logged
null
[ { "commit_message": "[PATCH] remove unnecessary log print .github/workflows/publish-snapshot.yml | 2 +- .../manager/am/restful/ECResourceInfoRestfulApi.java | 3 +-- .../linkis/manager/am/restful/EngineRestfulApi.java | 3 +-- linkis-dist/deploy-config/linkis-env.sh | 2...
null
CVE-2022-3506
Cross-site Scripting (XSS) - Stored in barrykooij/related-posts-for-wp
Cross-site Scripting (XSS) - Stored in GitHub repository barrykooij/related-posts-for-wp prior to 2.1.3.
[ { "commit_message": "[PATCH] Escape output in setting fields, fixes XSS CWE-79. Props @und3sc0n0c1d0 classes/settings/class-settings.php | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-)", "patch_text_b64": "RnJvbSAzNzczMzM5OGRkODg4NjNmYzBiZGIzZDZkMzc4NTk4NDI5ZmQwYjgxIE1vbiBTZXAgMTcgMDA6MDA6MDAgM...
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-59020
TYPO3 CMS Allows Broken Access Control in Edit Document Controller
By exploiting the defVals parameter, attackers could bypass field‑level access checks during record creation in the TYPO3 backend. This gave them the ability to insert arbitrary data into prohibited exclude fields of a database table for which the user already has write permission for a reduced set of fields. This issue affects TYPO3 CMS versions 10.0.0-10.4.54, 11.0.0-11.5.48, 12.0.0-12.4.40, 13.0.0-13.4.22 and 14.0.0-14.0.1.
[ { "commit_message": "[PATCH] [SECURITY] Ensure defVals adhere to permissions checks For historical and practical reasons `defVals` are allowed to overrule `TCEFORM.[tableName].[fieldName].disabled` and `TCEFORM.[tableName].[fieldName].config.readOnly` settings to make it possible to pass default values that are...
CWE-863 Incorrect Authorization
GHSA-wc48-x993-f73q
null
[ { "commit_message": "[PATCH] aacraid: prevent invalid pointer dereference It appears that driver runs into a problem here if fibsize is too small because we allocate user_srbcmd with fibsize size only but later we access it until user_srbcmd->sg.count to copy it over to srbcmd. It is not correct to test (fibsiz...
null
GHSA-6crj-vqv7-qq9r
null
[ { "commit_message": "[PATCH] Fix illegal client float (CVE-2020-11810) There is a time frame between allocating peer-id and initializing data channel key (which is performed on receiving push request or on async push-reply) in which the existing peer-id float checks do not work right. If a \"rogue\" data channe...
null
CVE-2023-35938
User access not updated with privilege change in Tuleap
Tuleap is a Free & Open Source Suite to improve management of software developments and collaboration. When switching from a project visibility that allows restricted users to `Private without restricted`, restricted users that are project administrators keep this access right. Restricted users that were project administrators before the visibility switch keep the possibility to access the project and do some administration actions. This issue has been resolved in Tuleap version 14.9.99.63. Users are advised to upgrade. There are no known workarounds for this issue.
[ { "commit_message": "[PATCH] Close request #32278 Removed restricted users are not remove at project visibility switch When switching from a project visibility that allows restricted users to Private without restricted, then restricted users that are project administrators keep this access right, meaning that t...
CWE-281: Improper Preservation of Permissions
GHSA-jhmr-57cj-q6g9
Komari vulnerable to 2FA Authentication Bypass
null
[ { "commit_message": "[PATCH] =?UTF-8?q?fix:=20=E4=BF=AE=E5=A4=8D2FA=E9=AA=8C=E8=AF=81?= =?UTF-8?q?=E9=80=BB=E8=BE=91=E4=B8=AD=E7=9A=84=E9=94=99=E8=AF=AF=E5=A4=84?= =?UTF-8?q?=E7=90=86?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit api/login.go | 2 +- 1 file changed, ...
null
CVE-2024-31985
XWiki Platform CSRF in the job scheduler
XWiki Platform is a generic wiki platform. Starting in version 3.1 and prior to versions 4.10.20, 15.5.4, and 15.10-rc-1, it is possible to schedule/trigger/unschedule existing jobs by having an admin visit the Job Scheduler page through a predictable URL, for example by embedding such an URL in any content as an image. The vulnerability has been fixed in XWiki 14.10.19, 15.5.5, and 15.9. As a workaround, manually apply the patch by modifying the `Scheduler.WebHome` page.
[ { "commit_message": "[PATCH] XWIKI-20851: Validate CSRF token before running job scheduling actions * Add a mandatory CSRF token for job management * Add a page test for Scheduler.WebHome that checks for the proper use of the CSRF token * Refactor scheduling actions URL generation * Refactor Scheduler.WebHome t...
CWE-352: Cross-Site Request Forgery (CSRF)
CVE-2021-4272
studygolang topics.js cross site scripting
A vulnerability classified as problematic has been found in studygolang. This affects an unknown part of the file static/js/topics.js. The manipulation of the argument contentHtml leads to cross site scripting. It is possible to initiate the attack remotely. The name of the patch is 0fb30f9640bd5fa0cae58922eac6c00bb1a94391. It is recommended to apply a patch to fix this issue. The identifier VDB-216477 was assigned to this vulnerability.
[ { "commit_message": "[PATCH] =?UTF-8?q?=E4=B8=B4=E6=97=B6=E5=A4=84=E7=90=86=20xss?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit static/js/topics.js | 18 ++++++++++++++++++ 1 file changed, 18 insertions(+)", "patch_text_b64": "RnJvbSAwZmIzMGY5NjQwYmQ1ZmEwY2FlNTg5...
CWE-707 Improper Neutralization -> CWE-74 Injection -> CWE-79 Cross Site Scripting
CVE-2021-4302
slackero phpwcms SVG File cross site scripting
A vulnerability was found in slackero phpwcms up to 1.9.26. It has been classified as problematic. This affects an unknown part of the component SVG File Handler. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 1.9.27 is able to address this issue. The patch is named b39db9c7ad3800f319195ff0e26a0981395b1c54. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217419.
[ { "commit_message": "[PATCH] Sanitize and minify SVG on upload to avoid XSS vulnerability # Conflicts: #\tinclude/inc_lib/revision/revision.php composer.json | 8 + composer.lock | 65 + include/inc_act/act_upload.php | 2...
CWE-79 Cross Site Scripting
GHSA-77m6-x95j-75r5
Data races in ticketed_lock
null
[ { "commit_message": "[PATCH] 'T: Send' to prevent misuse src/lib.rs | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSBhOTg2YTkzMzVkNTkxZmE1YzgyNjE1N2QxNjc0ZDQ3YWE1MjUzNTdmIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBKT0UxOTk0IDxqb3NlcGg5NDIwMTBAZ21haWwuY29tPgpEYXRlOiBTYXQsID...
null
CVE-2021-4261
pacman-canvas db-handler.php addHighscore sql injection
A vulnerability classified as critical has been found in pacman-canvas up to 1.0.5. Affected is the function addHighscore of the file data/db-handler.php. The manipulation leads to sql injection. It is possible to launch the attack remotely. Upgrading to version 1.0.6 is able to address this issue. The name of the patch is 29522c90ca1cebfce6453a5af5a45281d99b0646. It is recommended to upgrade the affected component. VDB-216270 is the identifier assigned to this vulnerability.
[ { "commit_message": "[PATCH] get rid of sql injection vulnerability data/db-handler.php | 15 ++------------- 1 file changed, 2 insertions(+), 13 deletions(-)", "patch_text_b64": "RnJvbSAyOTUyMmM5MGNhMWNlYmZjZTY0NTNhNWFmNWE0NTI4MWQ5OWIwNjQ2IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBDaHJlZ2kgR2xhdHRoYXJkIDxja...
CWE-707 Improper Neutralization -> CWE-74 Injection -> CWE-89 SQL Injection
GHSA-7w9j-h3hj-wc9g
null
[ { "commit_message": "[PATCH] Should not call `initialize_copy` for `TT_ICLASS`; fix #4027 Since `TT_ICLASS` is a internal object that should never be revealed to Ruby world. src/kernel.c | 3 +++ 1 file changed, 3 insertions(+)", "patch_text_b64": "RnJvbSBiNjRjZTE3ODUyYjE4MGRmZWVhODFjZjQ1ODY2MGJlNDFhNzg5NzRk...
null
GHSA-rvjp-8qj4-8p29
Answer has Observable Timing Discrepancy
null
[ { "commit_message": "[PATCH] update VerifyCaptcha internal/repo/captcha/captcha.go | 8 ++++++++ internal/service/action/captcha_service.go | 7 +++++++ 2 files changed, 15 insertions(+)", "patch_text_b64": "RnJvbSA4MTNhZDBiOTg5NDY3M2IxYmRkNDg5YTJlOWFiNjBhNDRmZTk5MGFmIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAw...
null
PYSEC-2024-248
null
[ { "commit_message": "[PATCH] Prevent Local Privilege Escalation via Config & Untrusted Aliases * Mitigated local config exploitability * Re-ordered precedence to sys locations * Added warning if local location is used * Mitigated untrusted alias execution opencanary/__init__.py | 33 ++++++++++++++++++++...
null
CVE-2022-4560
Joget wflow-core UniversalTheme.java getInternalJsCssLib cross site scripting
A vulnerability was found in Joget up to 7.0.31. It has been rated as problematic. This issue affects the function getInternalJsCssLib of the file wflow-core/src/main/java/org/joget/plugin/enterprise/UniversalTheme.java of the component wflow-core. The manipulation of the argument key leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 7.0.32 is able to address this issue. The name of the patch is ecf8be8f6f0cb725c18536ddc726d42a11bdaa1b. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-215963.
[ { "commit_message": "[PATCH] Fixed: wflow-core - Userview - Fixed XSS issue on key parameter. @7.0-SNAPSHOT .../app/controller/UserviewWebController.java | 2 +- .../userview/service/UserviewService.java | 1 + .../plugin/enterprise/UniversalTheme.java | 24 +++++++++---------- 3 files changed, 14 insert...
CWE-79 Cross Site Scripting
CVE-2023-4751
Heap-based Buffer Overflow in vim/vim
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1331.
[ { "commit_message": "[PATCH] patch 9.0.1331: illegal memory access when using :ball in Visual mode Problem: Illegal memory access when using :ball in Visual mode. Solution: Stop Visual mode when using :ball. (Pavel Mayorov, closes #11923) src/buffer.c | 4 ++++ src/testdir/test_visual.vim | ...
CWE-122 Heap-based Buffer Overflow
CVE-2023-37269
Winter CMS vulnerable to stored XSS through privileged upload of SVG file
Winter is a free, open-source content management system (CMS) based on the Laravel PHP framework. Users with the `backend.manage_branding` permission can upload SVGs as the application logo. Prior to version 1.2.3, SVG uploads were not sanitized, which could have allowed a stored cross-site scripting (XSS) attack. To exploit the vulnerability, an attacker would already need to have developer or super user level permissions in Winter CMS. This means they would already have extensive access and control within the system. Additionally, to execute the XSS, the attacker would need to convince the victim to directly visit the URL of the maliciously uploaded SVG, and the application would have to be using local storage where uploaded files are served under the same domain as the application itself instead of a CDN. This is because all SVGs in Winter CMS are rendered through an `img` tag, which prevents any payloads from being executed directly. These two factors significantly limit the potential harm of this vulnerability. This issue has been patched in v1.2.3 through the inclusion of full support for SVG uploads and automatic sanitization of uploaded SVG files. As a workaround, one may apply the patches manually.
[ { "commit_message": "[PATCH] Add support for uploading SVGs src/Database/Attach/File.php | 22 ++++++++++++++++------ src/Filesystem/Definitions.php | 13 ++++++++----- 2 files changed, 24 insertions(+), 11 deletions(-)", "patch_text_b64": "RnJvbSAxODZkODVkOGZlYTJjYWU0M2FmYzgwN2QzOWY2ODU1M2MyNGU1NmJlIE1vbiB...
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
GHSA-q4rc-8r6m-mw3q
null
[ { "commit_message": "[PATCH] =?UTF-8?q?XSS=20=EC=B7=A8=EC=95=BD=EC=A0=90=20=EC=88=98?= =?UTF-8?q?=EC=A0=95?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit bbs/view_comment.php | 2 +- lib/common.lib.php | 6 ++++++ 2 files changed, 7 insertions(+), 1 deletion(-)", ...
null
GHSA-h2wg-83fc-xvm9
Answer vulnerable to Business Logic Errors
null
[ { "commit_message": "[PATCH] fix(admin): add restriction about admin modify their password i18n/en_US.yaml | 2 ++ internal/base/reason/reason.go | 1 + internal/service/user_admin/user_backyard.go | 4 ++++ 3 files changed, 7 insertions(+)", "patch_text_b64": "RnJvbS...
null
GHSA-px4h-xg32-q955
ReDoS in normalize-url
null
[ { "commit_message": "[PATCH] Fix ReDoS for data URLs index.js | 2 +- test.js | 14 ++++++++++++++ 2 files changed, 15 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBiMWZkYjUxMjBiNmQyN2E4ODQwMGQ4ODAwZTY3ZmY1YTIyYmQyMTAzIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBTaW5kcmUgU29yaHVzIDxzaW5kcmVzb3JodXN...
null
GHSA-5mh9-r3rr-9597
Code execution vulnerability in HtmlUnit
null
[ { "commit_message": "[PATCH] Security: prevent Rhinos access to Java resources; e.g. call java methods src/changes/changes.xml | 3 ++ .../javascript/JavaScriptEngine2Test.java | 50 +++++++++++++++++++ 2 files changed, 53 insertions(+)", "patch_text_b64": "RnJvbSBiYzFmNThkNDgzY2M4O...
null
GHSA-7pf6-3qr6-mjfr
null
[ { "commit_message": "[PATCH] Fix #340: System frozen gdImageCreate() doesn't check for oversized images and as such is prone to DoS vulnerabilities. We fix that by applying the same overflow check that is already in place for gdImageCreateTrueColor(). CVE-2016-9317 src/gd.c | 1 + test...
null
CVE-2025-67743
Local Deep Research is Vulnerable to Server-Side Request Forgery (SSRF) in Download Service
Local Deep Research is an AI-powered research assistant for deep, iterative research. In versions from 1.3.0 to before 1.3.9, the download service (download_service.py) makes HTTP requests using raw requests.get() without utilizing the application's SSRF protection (safe_requests.py). This can allow attackers to access internal services and attempt to reach cloud provider metadata endpoints (AWS/GCP/Azure), as well as perform internal network reconnaissance, by submitting malicious URLs through the API, depending on the deployment and surrounding controls. This issue has been patched in version 1.3.9.
[ { "commit_message": "[PATCH] fix: enforce SSRF protection across all HTTP requests Replace direct requests.get/post/Session usage with safe_get/safe_post/SafeSession from the security module to prevent SSRF vulnerabilities (CWE-918). Changes: - Migrate 19 files (~40 instances) to use SSRF-protected wrappers - A...
CWE-918: Server-Side Request Forgery (SSRF)
CVE-2020-19488
An issue was discovered in box_code_apple.c:119 in Gpac MP4Box 0.8.0, allows attackers to cause a Denial of Service due to an invalid read on function ilst_item_Read.
[ { "commit_message": "[PATCH] fixed potential crash - cf #1263 src/isomedia/box_code_apple.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA2MTcwMDI0NTY4ZjRkZGEzMTBlOThlZjc1MDg0NzdiNDI1YzU4ZDA5IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBqZWFubGYgPGplYW5sZkB1c2Vycy5zb3VyY2Vm...
n/a
GHSA-5wmg-j84w-4jj4
Arbitrary File Write via Archive Extraction in mholt/archiver
null
[ { "commit_message": "[PATCH] fix: prevent extraction of archived files outside target path (#65) * fix: prevent extraction of archived files outside target path * CR: consolidate the path sanitaiton logic archiver.go | 12 ++++++++++++ cmd/archiver/main.go | 5 ++++- rar.go | 13 ++++++++++...
null
CVE-2022-24441
Code Injection
The package snyk before 1.1064.0 are vulnerable to Code Injection when analyzing a project. An attacker who can convince a user to scan a malicious project can include commands in a build file such as build.gradle or gradle-wrapper.jar, which will be executed with the privileges of the application. This vulnerability may be triggered when running the the CLI tool directly, or when running a scan with one of the IDE plugins that invoke the Snyk CLI. Successful exploitation of this issue would likely require some level of social engineering - to coerce an untrusted project to be downloaded and analyzed via the Snyk CLI or opened in an IDE where a Snyk IDE plugin is installed and enabled. Additionally, if the IDE has a Trust feature then the target folder must be marked as ‘trusted’ in order to be vulnerable. **NOTE:** This issue is independent of the one reported in [CVE-2022-40764](https://security.snyk.io/vuln/SNYK-JS-SNYK-3037342), and upgrading to a fixed version for this addresses that issue as well. The affected IDE plugins and versions are: - VS Code - Affected: <=1.8.0, Fixed: 1.9.0 - IntelliJ - Affected: <=2.4.47, Fixed: 2.4.48 - Visual Studio - Affected: <=1.1.30, Fixed: 1.1.31 - Eclipse - Affected: <=v20221115.132308, Fixed: All subsequent versions - Language Server - Affected: <=v20221109.114426, Fixed: All subsequent versions
[ { "commit_message": "[PATCH] feat: workspace trust (#306) CHANGELOG.md | 8 +- package.json | 7 +- src/snyk/base/modules/snykLib.ts | 4 +- src/snyk/cli/services/cliService.ts | 31 ++++++-- src/snyk/common/commands/command...
Code Injection
GHSA-99h5-pjcv-gr6v
Better Auth: Unauthenticated API key creation through api-key plugin
null
[ { "commit_message": "[PATCH] fix: [security] api keys should properly check if a request is from client or server .../src/plugins/api-key/api-key.test.ts | 29 +++++++++++++++++-- .../plugins/api-key/routes/create-api-key.ts | 13 +++++++-- 2 files changed, 37 insertions(+), 5 deletions(-)", "patch_tex...
null
GHSA-7g2c-539w-w69c
null
[ { "commit_message": "[PATCH] iniitial effort to greatly enhance system security (xss, sql inject, file exploit, rce, etc...) framework/core/controllers/expController.php | 42 +- framework/core/expFramework.php | 70 +- framework/core/models/expRecord.php | 21 +- framework/core/subs...
null
GHSA-w5w5-8vfh-xcjq
whoami stack buffer overflow on several Unix platforms
null
[ { "commit_message": "[PATCH] Fix Instances of Memory Corruption on Illumos (#93) TESTING.md | 66 ++++++++++++++++++++++++++++++++++++++ src/os/unix.rs | 87 +++++++++++++++++++++++++++++++++++++++++--------- 2 files changed, 138 insertions(+), 15 deletions(-)", "patch_text_b64": "RnJvbSBkNmVlMTNlZDllODE4...
null
GHSA-j6rx-38wj-434p
null
[ { "commit_message": "[PATCH] Fix seven bugs discovered and fixed by ForAllSecure: CVE-2019-13217: heap buffer overflow in start_decoder() CVE-2019-13218: stack buffer overflow in compute_codewords() CVE-2019-13219: uninitialized memory in vorbis_decode_packet_rest() CVE-2019-13220: out-of-range read in draw_lin...
null
GHSA-xpg8-8xpv-948p
Mattermost does not enforce MFA on WebSocket connections
null
[ { "commit_message": "[PATCH] MM-63930: Lack of MFA enforcement in Websocket connections (#33381) server/channels/api4/websocket_test.go | 145 ++++++++++++++++++ server/channels/app/platform/helper_test.go | 4 + .../channels/app/platform/mocks/SuiteIFace.go | 20 +++ server/channels/app/platform/web_c...
null
PYSEC-2023-309
null
[ { "commit_message": "[PATCH] Fix for windows traversal attack (#10647) Signed-off-by: Ben Wilson <benjamin.wilson@databricks.com> Signed-off-by: Ben Wilson <39283302+BenWilson2@users.noreply.github.com> Co-authored-by: Harutaka Kawamura <hkawamura0130@gmail.com> mlflow/data/http_dataset_source.py | 36 +++++...
null
CVE-2021-25972
Camaleon CMS - Server-Side Request Forgery (SSRF) in Media Upload Feature
In Camaleon CMS, versions 2.1.2.0 to 2.6.0, are vulnerable to Server-Side Request Forgery (SSRF) in the media upload feature, which allows admin users to fetch media files from external URLs but fails to validate URLs referencing to localhost or other internal servers. This allows attackers to read files stored in the internal server.
[ { "commit_message": "[PATCH] Disallow uploads from localhost .../camaleon_cms/admin/media_controller.rb | 19 ++++++++++++++++++- config/locales/camaleon_cms/admin/en.yml | 1 + 2 files changed, 19 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA1YTI1MmQ1Mzc0MTFmZGQwMTI3NzE0ZDY2YzFkNzYwNjlkY...
CWE-918 Server-Side Request Forgery (SSRF)
GHSA-chfm-68vv-pvw5
XMLUnit for Java has Insecure Defaults when Processing XSLT Stylesheets
null
[ { "commit_message": "[PATCH] disable XSLT extension functions by default, add more configurers see #264 .../util/TransformerFactoryConfigurer.java | 60 ++++++++++++++++++- 1 file changed, 58 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSBiODFkNDhiNzFkZmQyODY4YmRmYzMwYTNlMTdmZjk3M2YzMmJjMTViIE1...
null
GHSA-v965-wwrq-gxfg
Alkacon OpenCMS XSS via file tree navigation in system/workplace/views/explorer/tree_files.jsp
null
[ { "commit_message": "[PATCH] Bugfix for security issue 27986 reported by Security Focus src/org/opencms/workplace/explorer/CmsTree.java | 15 +++++++++++---- 1 file changed, 11 insertions(+), 4 deletions(-)", "patch_text_b64": "RnJvbSA0OWM1YmVkZWQ2NWJmMDIzMmNhYjYxYjEyOTliODVkZWU5YWUyMDE0IE1vbiBTZXAgMTcgMDA6M...
null
GHSA-f772-66g8-q5h3
Nodejs ‘undici’ vulnerable to CRLF Injection via Content-Type
null
[ { "commit_message": "[PATCH] Merge pull request from GHSA-f772-66g8-q5h3 lib/core/request.js | 3 ++- test/request-crlf.js | 32 ++++++++++++++++++++++++++++++++ 2 files changed, 34 insertions(+), 1 deletion(-) create mode 100644 test/request-crlf.js", "patch_text_b64": "RnJvbSA2NjE2NWQ2MDRmZDBhZWU3MGE5M2Vk...
null
CVE-2021-39302
MISP 2.4.148, in certain configurations, allows SQL injection via the app/Model/Log.php $conditions['org'] value.
[ { "commit_message": "[PATCH] security: fix unescaped parameter leading to sqli app/Model/Log.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAyMGQ5MDIwYjc2ZDFmNjc5MGM0ZDg0ZTAyMGQwY2M5N2M5MjlmNjZiIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBMdWNpYW5vIFJpZ2hldHRpIDxsdWNpYW5vL...
n/a
GHSA-xr7r-88qv-q7hm
Out of bounds write in serde_cbor
null
[ { "commit_message": "[PATCH] Prevent stack overflow from nested tags In the deserializer decrement the remaining depth each time a tagged value is encountered to prevent stack overflows caused by this recursion. Small malicious input can cause this overflow, therefore it is considered to be a security issue. I'...
null
GHSA-fg3x-rwq9-74cw
Gogs and Gitea SSRF Vulnerability
null
[ { "commit_message": "[PATCH] Only allow webhook to send requests to allowed hosts (#17482) cmd/web.go | 4 + custom/conf/app.example.ini | 6 + .../doc/advanced/config-cheat-sheet.en-us.md | 8 ++ modules/hostmatcher/hostmatcher.go | 94 ++++++...
null
CVE-2015-5302
libreport 2.0.7 before 2.6.3 only saves changes to the first file when editing a crash report, which allows remote attackers to obtain sensitive information via unspecified vectors related to the (1) backtrace, (2) cmdline, (3) environ, (4) open_fds, (5) maps, (6) smaps, (7) hostname, (8) remote, (9) ks.cfg, or (10) anaconda-tb file attachment included in a Red Hat Bugzilla bug report.
[ { "commit_message": "[PATCH] wizard: fix save users changes after reviewing dump dir files If the user reviewed the dump dir's files during reporting the crash, the changes was thrown away and original data was passed to the bugzilla bug report. report-gtk saves the first text view buffer and then reloads data ...
n/a
CVE-2022-2433
WordPress Infinite Scroll – Ajax Load More <= 5.5.3 - Cross-Site Request Forgery to PHAR Deserialization
The WordPress Infinite Scroll – Ajax Load More plugin for WordPress is vulnerable to deserialization of untrusted input via the 'alm_repeaters_export' parameter in versions up to, and including 5.5.3. This makes it possible for unauthenticated users to call files using a PHAR wrapper, granted they can trick a site administrator into performing an action such as clicking on a link, that will deserialize and call arbitrary PHP Objects that can be used to perform a variety of malicious actions granted a POP chain is also present. It also requires that the attacker is successful in uploading a file with the serialized payload.
[ { "commit_message": "[PATCH] Adding hooks for posts_per_page and other functionality README.txt | 18 +- admin/admin.php | 116 ++++--- admin/includes/components/layout-list.php | 11 +- .../includes/components/repeater-options.php | 20 +- ad...
CWE-502 Deserialization of Untrusted Data
GHSA-xwrh-qxmc-x8c8
Concrete CMS Cross-site Scripting (XSS) in the Advanced File Search Filter
null
[ { "commit_message": "[PATCH] Output cleanup (#11988) * Cleanup output - presets - file block output - style customizer * Output cleanup in colors concrete/blocks/file/view.php | 2 +- concrete/controllers/dialog/express/preset/delete.php | 2 +- concrete/controllers/dialog/file/preset/...
null
GHSA-3q9r-pq9x-wfp4
null
[ { "commit_message": "[PATCH] patch 9.0.1847: [security] potential oob write in do_addsub() Problem: potential oob write in do_addsub() Solution: don't overflow buf2, check size in for loop() Signed-off-by: Christian Brabandt <cb@256bit.org> src/ops.c | 2 +- src/version.c | 2 ++ 2 files changed, 3 insertion...
null
CVE-2020-7776
Cross-site Scripting (XSS)
This affects the package phpoffice/phpspreadsheet from 0.0.0. The library is vulnerable to XSS when creating an html output from an excel file by adding a comment on any cell. The root cause of this issue is within the HTML writer where user comments are concatenated as part of link and this is returned as HTML. A fix for this issue is available on commit 0ed5b800be2136bcb8fa9c1bdf59abc957a98845/master branch.
[ { "commit_message": "[PATCH] Resolve XSS Vulnerability in the HTML Writer (#1719) Resolve XSS Vulnerability in the HTML Writer CHANGELOG.md | 4 + composer.json | 11 +- composer.lock | 858 ++++++++++++------ src/P...
Cross-site Scripting (XSS)
CVE-2024-55658
SiYuan has an arbitrary file read and path traversal via /api/export/exportResources
SiYuan is a personal knowledge management system. Prior to version 3.1.16, SiYuan's /api/export/exportResources endpoint is vulnerable to arbitary file read via path traversal. It is possible to manipulate the paths parameter to access and download arbitrary files from the host system by traversing the workspace directory structure. Version 3.1.16 contains a patch for the issue.
[ { "commit_message": "[PATCH] :lock: Some security vulnerabilities https://github.com/siyuan-note/siyuan/issues/13426 kernel/api/template.go | 6 ++++++ kernel/model/export.go | 8 +++++++- kernel/model/upload.go | 5 +++++ kernel/treenode/template.go | 6 ++++++ kernel/util/path.go | 4 ++++ 5...
CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
GHSA-99jc-wqmr-ff2q
MantisBT Vulnerable to Exposure of Sensitive Information to an Unauthorized Actor
null
[ { "commit_message": "[PATCH] Fix access level check for note links Fixes #34434 core/string_api.php | 42 +++++++++++++++++++++++++----------------- 1 file changed, 25 insertions(+), 17 deletions(-)", "patch_text_b64": "RnJvbSAwYTUwNTYyMzY5ZDgyMzY4OWM5Yjk0NjA2NmQxZTQ5ZDNjMmRmMjI2IE1vbiBTZXAgMTcgMDA6MDA6MDAgM...
null
GHSA-p87v-9j2v-6w24
null
[ { "commit_message": "[PATCH] Bug 700947: Add missing ENDTRY opcode in try/catch/finally byte code. In one of the code branches in handling exceptions in the catch block we forgot to call the ENDTRY opcode to pop the inner hidden try. This leads to an unbalanced exception stack which can cause a crash due to us ...
null
CVE-2021-41222
Segfault due to negative splits in `SplitV`
TensorFlow is an open source platform for machine learning. In affected versions the implementation of `SplitV` can trigger a segfault is an attacker supplies negative arguments. This occurs whenever `size_splits` contains more than one value and at least one value is negative. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
[ { "commit_message": "[PATCH] A negative size in one of the split sizes allowed the computed size of another to exceed the total dimension, leading to a segfault and security vulnerability. Adding a check for negative sizes prevents this. PiperOrigin-RevId: 401035665 Change-Id: I79bbe329787dac82aa4bf60397a9129b7...
CWE-682: Incorrect Calculation
GHSA-9h52-p55h-vw2f
Model Context Protocol (MCP) Python SDK does not enable DNS rebinding protection by default
null
[ { "commit_message": "[PATCH] Merge commit from fork * Auto-enable DNS rebinding protection for localhost servers When a FastMCP server is created with host=\"127.0.0.1\" or \"localhost\" and no explicit transport_security is provided, automatically enable DNS rebinding protection. Both 127.0.0.1 and localhost a...
null
GHSA-98p5-x8x4-c9m5
Integer overflow in TFLite
null
[ { "commit_message": "[PATCH] [lite] Check for overflow when creating required bytes. PiperOrigin-RevId: 417629001 Change-Id: Ia7feb3ea8e988f4fd4b3c98c1a1fed4557d99fd7 .../lite/kernels/embedding_lookup_sparse.cc | 23 +++++++++++++------ 1 file changed, 16 insertions(+), 7 deletions(-)", "patch_text_b64": "...
null
CVE-2023-23618
gitk can inadvertently call executables in the worktree
Git for Windows is the Windows port of the revision control system Git. Prior to Git for Windows version 2.39.2, when `gitk` is run on Windows, it potentially runs executables from the current directory inadvertently, which can be exploited with some social engineering to trick users into running untrusted code. A patch is available in version 2.39.2. As a workaround, avoid using `gitk` (or Git GUI's "Visualize History" functionality) in clones of untrusted repositories.
[ { "commit_message": "[PATCH] gitk(Windows): avoid inadvertently calling executables in the worktree Just like CVE-2022-41953 for Git GUI, there exists a vulnerability of `gitk` where it looks for `taskkill.exe` in the current directory before searching `PATH`. Note that the many `exec git` calls are unaffected,...
CWE-426: Untrusted Search Path
CVE-2024-25618
External OpenID Connect Account Takeover by E-Mail Change in mastodon
Mastodon is a free, open-source social network server based on ActivityPub. Mastodon allows new identities from configured authentication providers (CAS, SAML, OIDC) to attach to existing local users with the same e-mail address. This results in a possible account takeover if the authentication provider allows changing the e-mail address or multiple authentication providers are configured. When a user logs in through an external authentication provider for the first time, Mastodon checks the e-mail address passed by the provider to find an existing account. However, using the e-mail address alone means that if the authentication provider allows changing the e-mail address of an account, the Mastodon account can immediately be hijacked. All users logging in through external authentication providers are affected. The severity is medium, as it also requires the external authentication provider to misbehave. However, some well-known OIDC providers (like Microsoft Azure) make it very easy to accidentally allow unverified e-mail changes. Moreover, OpenID Connect also allows dynamic client registration. This issue has been addressed in versions 4.2.6, 4.1.14, 4.0.14, and 3.5.18. Users are advised to upgrade. There are no known workarounds for this vulnerability.
[ { "commit_message": "[PATCH] Merge pull request from GHSA-vm39-j3vx-pch3 * Prevent different identities from a same SSO provider from accessing a same account * Lock auth provider changes behind `ALLOW_UNSAFE_AUTH_PROVIDER_REATTACH=true` * Rename methods to avoid confusion between OAuth and OmniAuth .../auth/om...
CWE-287: Improper Authentication
CVE-2025-40909
Perl threads have a working directory race condition where file operations may target unintended paths
Perl threads have a working directory race condition where file operations may target unintended paths. If a directory handle is open at thread creation, the process-wide current working directory is temporarily changed in order to clone that handle for the new thread, which is visible from any third (or more) thread already running. This may lead to unintended operations such as loading code or accessing files from unexpected locations, which a local attacker may be able to exploit. The bug was introduced in commit 11a11ecf4bea72b17d250cfb43c897be1341861e and released in Perl version 5.13.6
[ { "commit_message": "[PATCH] [perl #75174] Clone dir handles MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit On systems that support fchdir, use it to clone dir handles. On other systems, at least for now, don’t give the new thread a copy of the handle. This is not idea...
CWE-689 Permission Race Condition During Resource Copy
PYSEC-2022-203
null
[ { "commit_message": "[PATCH] pin setuptools for reorder_python_imports .pre-commit-config.yaml | 2 ++ 1 file changed, 2 insertions(+)", "patch_text_b64": "RnJvbSBhZWIzOTM1ZmJmOGExMWJjYjEyMGUxODhlNDQzZTM0MzJlMTg3OWZmIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBEYXZpZCBMb3JkIDxkYXZpZGlzbUBnbWFpbC5jb20+CkRhdGU6I...
null
CVE-2012-0036
curl and libcurl 7.2x before 7.24.0 do not properly consider special characters during extraction of a pathname from a URL, which allows remote attackers to conduct data-injection attacks via a crafted URL, as demonstrated by a CRLF injection attack on the (1) IMAP, (2) POP3, or (3) SMTP protocol.
[ { "commit_message": "[PATCH] URL sanitize: reject URLs containing bad data Protocols (IMAP, POP3 and SMTP) that use the path part of a URL in a decoded manner now use the new Curl_urldecode() function to reject URLs with embedded control codes (anything that is or decodes to a byte value less than 32). URLs con...
n/a
GHSA-93gm-xcwj-q3j2
null
[ { "commit_message": "[PATCH] REST API: Send a Vary: Origin header on GET requests. Add this header on all GET requests to prevent cached requests. Props darthhexx, davidbinda, nickdaugherty, whyisjake. Built from https://develop.svn.wordpress.org/trunk@46478 git-svn-id: http://core.svn.wordpress.org/trunk@46276...
null
GHSA-65hj-9ppw-77xc
ff4j is vulnerable to Remote Code Execution (RCE)
null
[ { "commit_message": "[PATCH 1/5] fix: CVE-2022-44262 (#624) .../ff4j/property/util/PropertyFactory.java | 6 +++++- .../test/property/PropertyFactoryTest.java | 20 ++++++++++++++++++- 2 files changed, 24 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSA0ODFjYTcyM2E1N2Y4N2VjYTkzMTE5NmVjOWE3NzI5...
null
GHSA-54pp-c6pp-7fpx
Overflow in `ImageProjectiveTransformV2`
null
[ { "commit_message": "[PATCH] Fix tf.raw_ops.ImageProjectiveTransformV2 vulnerability with large output_shape. Note: This fix will have to be cherry picked in r2.10, r2.9, and r2.8. PiperOrigin-RevId: 479125772 tensorflow/core/kernels/image/image_ops.cc | 9 +++++---- tensorflow/python/ops/image_ops_test.py |...
null
GHSA-rrvc-c7xg-7cf3
TokenController formName not sanitized in hidden input
null
[ { "commit_message": "[PATCH] Merge pull request from GHSA-rrvc-c7xg-7cf3 Controller/FormTokenController.php | 3 + .../Controller/FormTokenControllerTest.php | 55 +++++++++++++++++++ 2 files changed, 58 insertions(+) create mode 100644 Tests/Functional/Controller/FormTokenControllerTest.php", ...
null
GHSA-xhw3-4j3m-hq53
Winter CMS Modules allows a sandbox bypass in Twig templates leading to data modification and deletion
null
[ { "commit_message": "[PATCH] Merge commit from fork * Harden theme objects, prevent certain properties from being passed through to ThemeData object * Improve and properly scope Twig security policy - Deny access to \"include\" and \"extends\" tags/functions, as per Markup docs - Block methods that write, delet...
null
GHSA-hg79-fw4p-25p8
Volcano Scheduler Denial of Service via Unbounded Response from Elastic Service/extender Plugin
null
[ { "commit_message": "[PATCH] Add http response body size limit Signed-off-by: Monokaix <changxuzheng@huawei.com> .../source/metrics_client_elasticsearch.go | 4 ++ .../metrics_client_elasticsearch_test.go | 52 ++++++++++++++++++- pkg/scheduler/plugins/extender/extender.go | 4 ++ .../plugins/extender...
null
GHSA-6c3r-q65g-rjqx
null
[ { "commit_message": "[PATCH] patch 8.2.4214: illegal memory access with large 'tabstop' in Ex mode Problem: Illegal memory access with large 'tabstop' in Ex mode. Solution: Allocate enough memory. src/ex_getln.c | 2 +- src/testdir/test_ex_mode.vim | 10 ++++++++++ src/version.c ...
null
CVE-2022-41934
Improper Neutralization of Directives in Dynamically Evaluated Code in org.xwiki.platform:xwiki-platform-menu-ui
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any user with view rights on commonly accessible documents including the menu macro can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation due to improper escaping of the macro content and parameters of the menu macro. The problem has been patched in XWiki 14.6RC1, 13.10.8 and 14.4.3. The patch (commit `2fc20891`) for the document `Menu.MenuMacro` can be manually applied or a XAR archive of a patched version can be imported. The menu macro was basically unchanged since XWiki 11.6 so on XWiki 11.6 or later the patch for version of 13.10.8 (commit `59ccca24a`) can most likely be applied, on XWiki version 14.0 and later the versions in XWiki 14.6 and 14.4.3 should be appropriate.
[ { "commit_message": "[PATCH] XWIKI-19857: Modernize the menu macro and add escaping .../src/main/resources/Menu/MenuMacro.xml | 53 +++++++++++++------ 1 file changed, 38 insertions(+), 15 deletions(-)", "patch_text_b64": "RnJvbSAyZmMyMDg5MWU2YzZiMGNhMDVlZTA3ZTMxNWU3ZjQzNWU4OTE5ZjhkIE1vbiBTZXAgMTcgMDA6MD...
CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
GHSA-q4q2-93pw-qwgf
Issuer validation regression in Spring Cloud SSO Connector
null
[ { "commit_message": "[PATCH] Revert commit c594317337457a7f19166244f6acc66b476be856 * Above commit creates a regression for when we make the Issuer check without binding to a SSO service [#157069100] Signed-off-by: Alex Jackson <ajackson@pivotal.io> .../java/io/pivotal/spring/cloud/IssuerCheckConfiguration.java...
null
GHSA-hvmf-r92r-27hr
Django allows unintended model editing
null
[ { "commit_message": "[PATCH] Fixed CVE-2019-19118 -- Required edit permissions on parent model for editable inlines in admin. Thank you to Shen Ying for reporting this issue. django/contrib/admin/options.py | 21 +++- .../templates/admin/edit_inline/stacked.html | 2 +- .../templates/admin/edit_...
null
GHSA-j6mr-cm6x-h6jg
OpenStack Glance Server-Side Request Forgery (SSRF)
null
[ { "commit_message": "[PATCH] Add a policy handler to control copy-from functionality This patch adds the ability to set a policy handler to control what users can use the 'copy_from' feature in the v1 API. Fixes bug: 1153614 Change-Id: Ie194979a2aa66c9327bf14d7a85ead6f773a6079 glance/api/v1/images.py |...
null
GHSA-fj69-23m4-ccvv
Elasticsearch Packetbeat has Excessive Allocation of Memory and CPU via Malicious IPv4 Fragments
null
[ { "commit_message": "[PATCH] packetbeat: Rework ip fragmentation and make it bound (#47970) (#47989) This fixes a number of issues with ip fragmentation: * Make the fragment cache keyed by src/dst, otherwise one could end up joining fragments from different tuples. * Make sure fragments always expire, even if t...
null
GHSA-6643-h7h5-x9wh
Langchain vulnerable to arbitrary code execution
null
[ { "commit_message": "[PATCH] remove code (#8425) .../langchain_experimental/pal_chain/base.py | 23 +- .../tests/unit_tests}/test_pal.py | 8 +- libs/langchain/langchain/__init__.py | 4 - libs/langchain/langchain/agents/load_tools.py | 19 -- libs/langchain/langchain/chains/__init__.py ...
null
GHSA-jcrj-x36p-h9f6
Moodle Open Redirect in Calendar Set Page
null
[ { "commit_message": "[PATCH] MDL-28720 fix set.php return url handling calendar/lib.php | 2 +- calendar/renderer.php | 10 +++++----- calendar/set.php | 8 +++++--- 3 files changed, 11 insertions(+), 9 deletions(-)", "patch_text_b64": "RnJvbSAwZDI2NzI3NDhjMDAxODFkOWNkYWUyYWFiYmFiOTE2Y2JkNjRjNDdkIE...
null
GHSA-r28h-x6hv-2fq3
Improper Verification of Cryptographic Signature in starkbank-ecdsa
null
[ { "commit_message": "[PATCH 1/2] Fixed signature range .../java/com/starkbank/ellipticcurve/Ecdsa.java | 14 ++++++++++++++ 1 file changed, 14 insertions(+)", "patch_text_b64": "RnJvbSA4NTg0ODg0OGRjNzM2ODY3YmIxNjJjNTIxZGIxZjIyYTkxODlhZDkwIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBGZWxpcGUgU3VldG8gPGZlbGlw...
null
GHSA-fhf3-77x2-3mpp
null
[ { "commit_message": "[PATCH] http: check certificate validity before clobbering the error variable src/transports/http.c | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-)", "patch_text_b64": "RnJvbSA5YTY0ZTYyZjBmMjBjOWNmOWIyZTE2MDlmMDM3MDYwZWIyZDhlYjIyIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBFdGllbm5...
null
GHSA-p373-jqfm-j6wr
Shinken Solutions Shinken Monitoring vulnerable to Incorrect Access Control
null
[ { "commit_message": "[PATCH] Fix: Dailymotion team (Nicolas Perraud) found a way to bypass pickle.loads protection and execute code from daemon if you can exchange with it's internal port. Now we whitelist allowed class only :) Bonus: update the changelog, Thanks & setup.py so we can release soon :) Changelog ...
null
CVE-2016-10088
The sg implementation in the Linux kernel through 4.9 does not properly restrict write operations in situations where the KERNEL_DS option is set, which allows local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device, related to block/bsg.c and drivers/scsi/sg.c. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9576.
[ { "commit_message": "[PATCH] sg_write()/bsg_write() is not fit to be called under KERNEL_DS Both damn things interpret userland pointers embedded into the payload; worse, they are actually traversing those. Leaving aside the bad API design, this is very much _not_ safe to call with KERNEL_DS. Bail out early if...
n/a
CVE-2025-54883
Vision UI's security-kit Contains Cryptographic Weakness
Vision UI is a collection of enterprise-grade, dependency-free modules for modern web projects. In versions 1.4.0 and below, the getSecureRandomInt function in security-kit versions prior to 3.5.0 (packaged in Vision-ui <= 1.4.0) contains a critical cryptographic weakness. Due to a silent 32-bit integer overflow in its internal masking logic, the function fails to produce a uniform distribution of random numbers when the requested range between min and max is larger than 2³². The root cause is the use of a 32-bit bitwise left-shift operation (<<) to generate a bitmask for the rejection sampling algorithm. This causes the mask to be incorrect for any range requiring 32 or more bits of entropy. This issue is fixed in version 1.5.0.
[ { "commit_message": "[PATCH] Fixed vulnerabilities src/security-kit.js | 118 +++++++++------ tests/security-kit.test.js | 285 ++++++++++++++++++++++++++++++++++++- 2 files changed, 354 insertions(+), 49 deletions(-)", "patch_text_b64": "RnJvbSAzNDczNTU4NTlmMDVlOTgwNDdlZmJkOTZmYzBlNjFiOTE5MTMyNGYxIE1v...
CWE-338: Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
GHSA-h5p2-273c-rxjp
null
[ { "commit_message": "[PATCH] refactor(files.js): Improve file deletion process api/server/routes/files/files.js | 8 +++++++- 1 file changed, 7 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBhMzUwNDQzNjYxZDAwMWFjNTU3ODc3NDE5NjlhNzVkOTRjYTE0MTE2IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBEYW5ueSBBdml...
null
GHSA-2q8v-3gqq-4f8p
concat built-in can corrupt memory in vyper
null
[ { "commit_message": "[PATCH] fix: concat buffer bug (#3738) the `concat()` builtin did not respect the `copy_bytes()` API, it allocated a buffer in some cases which did not have enough padding. patches GHSA-2q8v-3gqq-4f8p Co-authored-by: cyberthirst <cyberthirst.eth@gmail.com> .../builtins/codegen/test_concat.p...
null
GHSA-h3rm-p42x-h7h7
null
[ { "commit_message": "[PATCH] Fixed possible foveon buffer overrun (Secunia SA750000) dcraw_foveon.c | 8 ++++++-- 1 file changed, 6 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSAxOTRmNTkyZTIwNTk5MGVhOGZjZTcyYjZjNTcxYzE0MzUwYWNhNzE2IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBBbGV4IFR1dHViYWxpbiA8bG...
null
GHSA-864j-6qpp-cmrr
SQL Injection in Geocoder
null
[ { "commit_message": "[PATCH] Sanitize lat/lon for SQL query. lib/geocoder/sql.rb | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-)", "patch_text_b64": "RnJvbSBkY2RjM2Q4Njc1NDExZWRjZTM5NjU5NDFhMmNhN2M0NDFjYTQ4NjEzIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBBbGV4IFJlaXNuZXIgPGFsZXhAYWxleHJlaXNuZXIuY...
null
CVE-2016-15029
Ydalb mapicoin stats.php cross site scripting
A vulnerability has been found in Ydalb mapicoin up to 1.9.0 and classified as problematic. This vulnerability affects unknown code of the file webroot/stats.php. The manipulation of the argument link/search leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 1.10.0 is able to address this issue. The patch is identified as 67e87f0f0c1ac238fcd050f4c3db298229bc9679. It is recommended to upgrade the affected component. VDB-223402 is the identifier assigned to this vulnerability.
[ { "commit_message": "[PATCH] fix(stats.php): security issue (XSS) webroot/stats.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA2N2U4N2YwZjBjMWFjMjM4ZmNkMDUwZjRjM2RiMjk4MjI5YmM5Njc5IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBRdWVudGluIExEIDxxdWVudGluLmxlZG9sZWRlY0BnbWFpbC...
CWE-79 Cross Site Scripting
GHSA-m44j-cfrm-g8qc
Bouncy Castle crafted signature and public key can be used to trigger an infinite loop
null
[ { "commit_message": "[PATCH] EdDSA improvements from bc-csharp - reject small order public keys - cofactored verification - perf. opts.: Pornin's basis reduction - hold decoded public point in public keys .../params/Ed25519PrivateKeyParameters.java | 4 +- .../params/Ed25519PublicKeyParameters.java | 4...
null
GHSA-x37x-qf4v-f54f
Roundup Cross-site Scripting Vulnerability
null
[ { "commit_message": "[PATCH] fix(security): fix CVE-2024-39124, CVE-2024-39124, and CVE-2024-39125 Directions for fixing: * `CVE-2024-39124`_ - :ref:`classhelpers (_generic.help.html) are vulnerable to an XSS attack. <CVE-2024-39124>` Requires fixing tracker homes. * `CVE-2024-39125`_ - :ref:`if Referer header ...
null
GHSA-9fj8-8x6q-5x7m
null
[ { "commit_message": "[PATCH] patch 9.0.0025: accessing beyond allocated memory with the cmdline window Problem: Accessing beyond allocated memory when using the cmdline window in Ex mode. Solution: Use \"*\" instead of \"'<,'>\" for Visual mode. src/ex_docmd.c | 6 ++++-- src/testdir/test_cmdl...
null
CVE-2024-32871
Pimcore Vulnerable to Flooding Server with Thumbnail files
Pimcore is an Open Source Data & Experience Management Platform. The Pimcore thumbnail generation can be used to flood the server with large files. By changing the file extension or scaling factor of the requested thumbnail, attackers can create files that are much larger in file size than the original. This vulnerability is fixed in 11.2.4.
[ { "commit_message": "[PATCH] Fix thumbnail generation if asset or config is null models/Asset/Document/ImageThumbnail.php | 9 ++++--- models/Asset/Image/Thumbnail.php | 26 ++++++++++++++----- .../Asset/Thumbnail/ImageThumbnailTrait.php | 2 +- models/Asset/Video/ImageThumbnail.php |...
CWE-770: Allocation of Resources Without Limits or Throttling
GHSA-f72g-52v7-mg3p
Mattermost boards plugin fails to restrict download access to files
null
[ { "commit_message": "[PATCH] Added file ownership validation to file access endpoints (#114) * Added file ownership validation to file access endpoints * Linter fixes * Optmised code to use GetBlockByType rather than GetBlockByBoards * Added comment * Linter fixes server/api/files.go | 7 +++ server/app/f...
null
CVE-2024-50356
Press has a potential 2FA bypass
Press, a Frappe custom app that runs Frappe Cloud, manages infrastructure, subscription, marketplace, and software-as-a-service (SaaS). The password could be reset by anyone who have access to the mail inbox circumventing the 2FA. Even though they wouldn't be able to login by bypassing the 2FA. Only users who have enabled 2FA are affected. Commit ba0007c28ac814260f836849bc07d29beea7deb6 patches this bug.
[ { "commit_message": "[PATCH] fix(LoginPage): verify 2FA on reset password dashboard/src2/pages/LoginSignup.vue | 44 +++++++++++++++++++++++----- 1 file changed, 36 insertions(+), 8 deletions(-)", "patch_text_b64": "RnJvbSBiYTAwMDdjMjhhYzgxNDI2MGY4MzY4NDliYzA3ZDI5YmVlYTdkZWI2IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwM...
CWE-640: Weak Password Recovery Mechanism for Forgotten Password
CVE-2023-46929
An issue discovered in GPAC 2.3-DEV-rev605-gfc9e29089-master in MP4Box in gf_avc_change_vui /afltest/gpac/src/media_tools/av_parsers.c:6872:55 allows attackers to crash the application.
[ { "commit_message": "[PATCH] add nullguard on gf_avc_change_vui (fixes #2662) src/media_tools/av_parsers.c | 3 +++ 1 file changed, 3 insertions(+)", "patch_text_b64": "RnJvbSA0MjQ4ZGVmNWQyNDMyNWFlYjBlMzVjYWNkZTNkNTZjOTQxMTgxNmE2IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBBdXJlbGllbiBEYXZpZCA8YXVyZWxpZW4uZGF2...
n/a
CVE-2022-3327
Missing Authentication for Critical Function in ikus060/rdiffweb
Missing Authentication for Critical Function in GitHub repository ikus060/rdiffweb prior to 2.5.0a6.
[ { "commit_message": "[PATCH] Define idle and absolute session timeout with agressive default to protect usage on public computer README.md | 1 + doc/configuration.md | 10 +++++ rdiffweb/controller/tests/test_page_login.py | 21 ++++++++++ rdiffweb/core/...
CWE-306 Missing Authentication for Critical Function
GHSA-7hpf-g48v-hw3j
Zoraxy has an authenticated command injection in the Web SSH feature
null
[ { "commit_message": "[PATCH] Fixed web ssh security bug src/mod/sshprox/sshprox.go | 26 ++++++------- src/mod/sshprox/sshprox_test.go | 66 +++++++++++++++++++++++++++++++++ src/mod/sshprox/utils.go | 63 ++++++++++++++++++++++++++++--- src/webssh.go | 4 +- 4 files changed, 136 inse...
null
CVE-2024-47781
Cross-site Scripting (XSS) in Special:RequestWikiQueue when displaying sitename in CreateWiki
CreateWiki is an extension used at Miraheze for requesting & creating wikis. The name of requested wikis is not escaped on Special:RequestWikiQueue, so a user can insert arbitrary HTML that is displayed in the request wiki queue when requesting a wiki. If a wiki creator comes across the XSS payload, their user session can be abused to retrieve deleted wiki requests, which typically contains private information. Likewise, this can also be abused on those with the ability to suppress requests to view sensitive information. This issue has been patched with commit `693a220` and all users are advised to apply the patch. Users unable to upgrade should disable Javascript and/or prevent access to the vulnerable page (Special:RequestWikiQueue).
[ { "commit_message": "[PATCH] Merge commit from fork * SECURITY: T12693: Escape all plain text values on Special:RequestWikiQueue * Make changes per review .../RequestWiki/RequestWikiQueuePager.php | 21 ++++++++++++------- 1 file changed, 14 insertions(+), 7 deletions(-)", "patch_text_b64": "RnJvbSA2OTNh...
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2018-1000204
Linux Kernel version 3.18 to 4.16 incorrectly handles an SG_IO ioctl on /dev/sg0 with dxfer_direction=SG_DXFER_FROM_DEV and an empty 6-byte cmdp. This may lead to copying up to 1000 kernel heap pages to the userspace. This has been fixed upstream in https://github.com/torvalds/linux/commit/a45b599ad808c3c982fdcdc12b0b8611c2f92824 already. The problem has limited scope, as users don't usually have permissions to access SCSI devices. On the other hand, e.g. the Nero user manual suggests doing `chmod o+r+w /dev/sg*` to make the devices accessible. NOTE: third parties dispute the relevance of this report, noting that the requirement for an attacker to have both the CAP_SYS_ADMIN and CAP_SYS_RAWIO capabilities makes it "virtually impossible to exploit.
[ { "commit_message": "[PATCH] scsi: sg: allocate with __GFP_ZERO in sg_build_indirect() This shall help avoid copying uninitialized memory to the userspace when calling ioctl(fd, SG_IO) with an empty command. Reported-by: syzbot+7d26fc1eea198488deab@syzkaller.appspotmail.com Cc: stable@vger.kernel.org Signed-off...
n/a
CVE-2021-32701
Possible bypass of token claim validation when OAuth2 Introspection caching is enabled
ORY Oathkeeper is an Identity & Access Proxy (IAP) and Access Control Decision API that authorizes HTTP requests based on sets of Access Rules. When you make a request to an endpoint that requires the scope `foo` using an access token granted with that `foo` scope, introspection will be valid and that token will be cached. The problem comes when a second requests to an endpoint that requires the scope `bar` is made before the cache has expired. Whether the token is granted or not to the `bar` scope, introspection will be valid. A patch will be released with `v0.38.12-beta.1`. Per default, caching is disabled for the `oauth2_introspection` authenticator. When caching is disabled, this vulnerability does not exist. The cache is checked in [`func (a *AuthenticatorOAuth2Introspection) Authenticate(...)`](https://github.com/ory/oathkeeper/blob/6a31df1c3779425e05db1c2a381166b087cb29a4/pipeline/authn/authenticator_oauth2_introspection.go#L152). From [`tokenFromCache()`](https://github.com/ory/oathkeeper/blob/6a31df1c3779425e05db1c2a381166b087cb29a4/pipeline/authn/authenticator_oauth2_introspection.go#L97) it seems that it only validates the token expiration date, but ignores whether the token has or not the proper scopes. The vulnerability was introduced in PR #424. During review, we failed to require appropriate test coverage by the submitter which is the primary reason that the vulnerability passed the review process.
[ { "commit_message": "[PATCH] Merge pull request from GHSA-qvp4-rpmr-xwrr This patch addresses a security vulnerability which would bypass token claim validation once a token is in the cache. For more information please refer to https://github.com/ory/oathkeeper/security/advisories/GHSA-qvp4-rpmr-xwrr .circleci/...
CWE-863: Incorrect Authorization
CVE-2024-41800
Craft CMS Allows TOTP Token To Stay Valid After Use
Craft is a content management system (CMS). Craft CMS 5 allows reuse of TOTP tokens multiple times within the validity period. An attacker is able to re-submit a valid TOTP token to establish an authenticated session. This requires that the attacker has knowledge of the victim's credentials. This has been patched in Craft 5.2.3.
[ { "commit_message": "[PATCH 1/3] use verifyKeyNewer src/auth/methods/TOTP.php | 54 ++++++++++++++++++- src/migrations/Install.php | 1 + .../m240619_091352_add_auth_2fa_timestamp.php | 36 +++++++++++++ src/records/Authenticator.php | 2 + 4 files changed, 9...
CWE-287: Improper Authentication
CVE-2022-0624
Authorization Bypass Through User-Controlled Key in ionicabizau/parse-path
Authorization Bypass Through User-Controlled Key in GitHub repository ionicabizau/parse-path prior to 5.0.0.
[ { "commit_message": "[PATCH] Refactor the codebase to make it more secure lib/index.js | 140 ++++++++++++++------------------------------------ package.json | 2 +- test/index.js | 119 ++++++++++++++++++++++++++---------------- 3 files changed, 114 insertions(+), 147 deletions(-)", "patch_text_b64": "RnJ...
CWE-639 Authorization Bypass Through User-Controlled Key
PYSEC-2021-560
null
[ { "commit_message": "[PATCH] Prevent nullptr deref in SparseTensorSliceDataset The arguments must determine a valid sparse tensor. This means that when indices are empty then the values must be empty too (and the reverse). Also added test, by modifying existing test with empty sparse tensor to now run with an i...
null
CVE-2019-16718
In radare2 before 3.9.0, a command injection vulnerability exists in bin_symbols() in libr/core/cbin.c. By using a crafted executable file, it's possible to execute arbitrary shell commands with the permissions of the victim. This vulnerability is due to an insufficient fix for CVE-2019-14745 and improper handling of symbol names embedded in executables.
[ { "commit_message": "[PATCH] More fixes for the CVE-2019-14745 libr/core/cbin.c | 12 ++++++++---- 1 file changed, 8 insertions(+), 4 deletions(-)", "patch_text_b64": "RnJvbSA1NDExNTQzYTMxMGE0NzBiMTI1N2ZiOTMyNzNjZGQ2ZThkZmNiM2FmIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBwYW5jYWtlIDxwYW5jYWtlQG5vcGNvZGUub3JnP...
n/a
GHSA-vwcr-hcq5-36jr
null
[ { "commit_message": "[PATCH] patch 9.0.0805: filetype autocmd may cause freed memory access Problem: Filetype autocmd may cause freed memory access. Solution: Set the quickfix-busy flag while filling the buffer. src/quickfix.c | 6 ++++++ src/testdir/test_quickfix.vim | 16 ++++++++++++++++ s...
null