id
stringlengths
12
19
title
stringlengths
0
237
description
stringlengths
35
3.87k
patches
listlengths
1
22
cwe
stringlengths
2
440
GHSA-pcjh-6r5h-r92r
django-sendfile2 before 0.7.0 contains reflected file download vulnerability
null
[ { "commit_message": "[PATCH] Merge pull request from GHSA-pcjh-6r5h-r92r Similar to CVE-2022-36359 for Django. Thanks to Sergei Maertens for reporting this issue. django_sendfile/tests.py | 27 +++++++++++++++++++++++++++ django_sendfile/utils.py | 2 +- 2 files changed, 28 insertions(+), 1 deletion(-)", "pa...
null
GHSA-8p72-rcq4-h6pw
Directus Blind SSRF On File Import
null
[ { "commit_message": "[PATCH] Add validation for IP Access in Role settings (#21444) .changeset/dull-comics-camp.md | 5 +++ api/src/services/roles.test.ts | 40 +++++++++++++++++- api/src/services/roles.ts | 75 +++++++++++++++++++++++++++++----- 3 files changed, 108 insertions(+), 12 deletions(-) create mod...
null
CVE-2023-0760
Heap-based Buffer Overflow in gpac/gpac
Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to V2.1.0-DEV.
[ { "commit_message": "[PATCH] sgpd box entry: disallow null grouping_type (#2389) src/isomedia/box_code_base.c | 7 +++++-- src/isomedia/box_funcs.c | 8 ++++---- src/isomedia/isom_read.c | 6 +++--- 3 files changed, 12 insertions(+), 9 deletions(-)", "patch_text_b64": "RnJvbSBlYTczOTVmMzlmNjAxYTc3NTBkN...
CWE-122 Heap-based Buffer Overflow
CVE-2021-43795
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in com.linecorp.armeria:armeria
Armeria is an open source microservice framework. In affected versions an attacker can access an Armeria server's local file system beyond its restricted directory by sending an HTTP request whose path contains `%2F` (encoded `/`), such as `/files/..%2Fsecrets.txt`, bypassing Armeria's path validation logic. Armeria 1.13.4 or above contains the hardened path validation logic that handles `%2F` properly. This vulnerability can be worked around by inserting a decorator that performs an additional validation on the request path.
[ { "commit_message": "[PATCH] Merge pull request from GHSA-8fp4-rp6c-5gcv Motivation: - We changed how `PathAndQuery` handles `%2F` (/) in 1.12.0 via #3855. This change introduces an unexpected hole in its double-dot detection logic. - Since we decided not to decode `%2F`, we should not decode it whereever possi...
CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
GHSA-7v5r-r995-q2x2
SSRF in repository migration
null
[ { "commit_message": "[PATCH] security: fix SSRF in repository migration (#6812) Co-authored-by: Joe Chen <jc@unknwon.io> # Conflicts: #\tCHANGELOG.md #\tinternal/route/repo/webhook.go internal/form/repo.go | 6 +++ internal/netutil/netutil.go | 64 +++++++++++++++++++++++++++++ internal/net...
null
CVE-2016-9122
go-jose before 1.0.4 suffers from multiple signatures exploitation. The go-jose library supports messages with multiple signatures. However, when validating a signed message the API did not indicate which signature was valid, which could potentially lead to confusion. For example, users of the library might mistakenly read protected header values from an attached signature that was different from the one originally validated.
[ { "commit_message": "[PATCH] Improve multi-recipient/multi-sig handling crypter.go | 77 +++++++++++++++++++++++++++++++++++++++++++++---- crypter_test.go | 35 +++++++++++----------- jws.go | 5 +++- signing.go | 40 +++++++++++++++++++++++-- signing_test.go | 32 ++++++++++---------- 5 files ch...
Cryptographic Issue
CVE-2021-29584
CHECK-fail due to integer overflow
TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a denial of service via a `CHECK`-fail in caused by an integer overflow in constructing a new tensor shape. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/0908c2f2397c099338b901b067f6495a5b96760b/tensorflow/core/kernels/sparse_split_op.cc#L66-L70) builds a dense shape without checking that the dimensions would not result in overflow. The `TensorShape` constructor(https://github.com/tensorflow/tensorflow/blob/6f9896890c4c703ae0a0845394086e2e1e523299/tensorflow/core/framework/tensor_shape.cc#L183-L188) uses a `CHECK` operation which triggers when `InitDims`(https://github.com/tensorflow/tensorflow/blob/6f9896890c4c703ae0a0845394086e2e1e523299/tensorflow/core/framework/tensor_shape.cc#L212-L296) returns a non-OK status. This is a legacy implementation of the constructor and operations should use `BuildTensorShapeBase` or `AddDimWithStatus` to prevent `CHECK`-failures in the presence of overflows. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
[ { "commit_message": "[PATCH] Prevent overflow in sparse op PiperOrigin-RevId: 372442006 Change-Id: I60fe31cd7e56fb3501e97c63500caf902ddeee96 tensorflow/core/kernels/sparse_split_op.cc | 13 ++++++++++--- 1 file changed, 10 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSA0YzBlZTkzN2MwZjYxYzRmYzVmNWQ...
CWE-190: Integer Overflow or Wraparound
GHSA-gwr8-5j83-483c
OS Command Injection and Improper Input Validation in ansible
null
[ { "commit_message": "[PATCH] [2.8] solaris_zone: Allow only valid characters in zone name CVE-2019-14904 - solaris_zone module accepts zone name and performs actions related to that. However, there is no user input validation done while performing actions. A malicious user could provide a crafted zone name whic...
null
GHSA-g5r6-vrmx-9gwj
LibreNMS SQL Injection vulnerability
null
[ { "commit_message": "[PATCH] Fix sql injection (#11923) in custom oid code Thanks to loginsoft p.v.t l.t.d india for the report! Website: https://www.loginsoft.com/ includes/html/forms/customoid.inc.php | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSA4ZjNhMjljZGU1YmJkODY...
null
PYSEC-2021-235
null
[ { "commit_message": "[PATCH] Prevent division by 0 PiperOrigin-RevId: 370995582 Change-Id: I670ffaf52d1ff8823ec31ea5f438f9125b402223 tensorflow/lite/kernels/svdf.cc | 1 + 1 file changed, 1 insertion(+)", "patch_text_b64": "RnJvbSA2ODQxZTUyMmEzZTdkNDg3MDZhMDJlODgxOTgzNmU4MDlmNzM4NjgyIE1vbiBTZXAgMTcgMDA6MDA6M...
null
GHSA-6656-6qwx-4c2m
Moodle XSS In Tag Autocomplete functionality
null
[ { "commit_message": "[PATCH] MDL-25754 improved tag sanitisation and fixed tag autocomplete lib/moodlelib.php | 8 +++----- tag/edit.php | 2 ++ tag/lib.php | 5 ++++- tag/tag_autocomplete.php | 4 +++- 4 files changed, 12 insertions(+), 7 deletions(-)", "patch_text_b64": "RnJvbS...
null
CVE-2018-20164
An issue was discovered in regex.yaml (aka regexes.yaml) in UA-Parser UAP-Core before 0.6.0. A Regular Expression Denial of Service (ReDoS) issue allows remote attackers to overload a server by setting the User-Agent header in an HTTP(S) request to a value containing a long digit string. (The UAP-Core project contains the vulnerability, propagating to all implementations.)
[ { "commit_message": "[PATCH] 0.6.0 package.json | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAwMTBjY2RjNzMwMzU0NmNkMjJiOWRhNjg3YzI5ZjRhOTk2OTkwMDE0IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBjb21tZW50aG9sIDxjb21tZW50aG9sQGdtYWlsLmNvbT4KRGF0ZTogRnJpLCAxNCBEZWMgMjAxOCAwODoxOT...
n/a
GHSA-qqff-4vw4-f6hx
Cap'n Proto and its Rust implementation vulnerable to out-of-bounds read due to logic error handling list-of-list
null
[ { "commit_message": "[PATCH] Apply data offset for list-of-pointers at access time rather than ListReader creation time. Baking this offset into `ptr` reduced ops needed at access time but made the interpretation of `ptr` inconsistent depending on what type of list was expected. c++/src/capnp/layout.c++ | 4 ---...
null
CVE-2014-7826
kernel/trace/trace_syscalls.c in the Linux kernel through 3.17.2 does not properly handle private syscall numbers during use of the ftrace subsystem, which allows local users to gain privileges or cause a denial of service (invalid pointer dereference) via a crafted application.
[ { "commit_message": "[PATCH] tracing/syscalls: Ignore numbers outside NR_syscalls' range ARM has some private syscalls (for example, set_tls(2)) which lie outside the range of NR_syscalls. If any of these are called while syscall tracing is being performed, out-of-bounds array access will occur in the ftrace a...
n/a
CVE-2019-16186
In Limesurvey before 3.17.14, admin users can access the plugin manager without proper permissions.
[ { "commit_message": "[PATCH] Release 3.17.14+190902 application/config/version.php | 4 ++-- docs/release_notes.txt | 40 ++++++++++++++++++++++++++++++++++ 2 files changed, 42 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSA1ODcwZmQxMDM3MDU4YmM0ZTQzY2NjZjg5M2I1NzZjNzIyOTMzNzFlIE1vbiBTZXAgM...
n/a
CVE-2017-12871
The aesEncrypt method in lib/SimpleSAML/Utils/Crypto.php in SimpleSAMLphp 1.14.x through 1.14.11 makes it easier for context-dependent attackers to bypass the encryption protection mechanism by leveraging use of the first 16 bytes of the secret key as the initialization vector (IV).
[ { "commit_message": "[PATCH] Fix an issue with IV generation in SimpleSAML\\Utils\\Crypto::aesEncrypt(). IVs must be random and one-time (never reused). Additionally, by deriving it from the key, the key length was effectively reduced to 128 bits. lib/SimpleSAML/Utils/Crypto.php | 2 +- 1 file changed, 1 inserti...
n/a
PYSEC-2022-43014
null
[ { "commit_message": "[PATCH] Fix side channel leaks Calling BN_mod_exp with a small base, and no constant time flag fallback on an insecure implementation with OpenSSL. A simple fix is to set the appropriate flag before the modular exponentiation. srp/_ctsrp.py | 6 ++++++ 1 file changed, 6 insertions(+)", "...
null
CVE-2021-39182
Use of Password Hash With Insufficient Computational Effort and Use of a Broken or Risky Cryptographic Algorithm and Reversible One-Way Hash in hashing.py
EnroCrypt is a Python module for encryption and hashing. Prior to version 1.1.4, EnroCrypt used the MD5 hashing algorithm in the hashing file. Beginners who are unfamiliar with hashes can face problems as MD5 is considered an insecure hashing algorithm. The vulnerability is patched in v1.1.4 of the product. As a workaround, users can remove the `MD5` hashing function from the file `hashing.py`.
[ { "commit_message": "[PATCH] Fixed GHSA-35m5-8cvj-8783 enrocrypt/hashing.py | 5 ----- 1 file changed, 5 deletions(-)", "patch_text_b64": "RnJvbSBlNjUyZDU2YWM2MGVhZGZjMjY0ODlhYjgzOTI3YWYxM2E5YjlkOGNlIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBNb3JnYW4tUGhvZW5peCA8NzM3MTE2MDIrTW9yZ2FuLVBob2VuaXhAdXNlcnMubm9yZX...
CWE-327: Use of a Broken or Risky Cryptographic Algorithm
CVE-2016-6198
The filesystem layer in the Linux kernel before 4.5.5 proceeds with post-rename operations after an OverlayFS file is renamed to a self-hardlink, which allows local users to cause a denial of service (system crash) via a rename system call, related to fs/namei.c and fs/open.c.
[ { "commit_message": "[PATCH] vfs: rename: check backing inode being equal If a file is renamed to a hardlink of itself POSIX specifies that rename(2) should do nothing and return success. This condition is checked in vfs_rename(). However it won't detect hard links on overlayfs where these are given separate i...
n/a
GHSA-cqf7-ff9h-7967
Django ReDoS in validators.URLValidator
null
[ { "commit_message": "[PATCH] [1.8.x] Fixed catastrophic backtracking in URLValidator. MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Thanks João Silva for reporting the problem and Tim Graham for finding the problematic RE and for review. This is a security fix; disclo...
null
GHSA-p9p6-m8vm-vcxx
null
[ { "commit_message": "[PATCH] evdns: fix searching empty hostnames From #332: Here follows a bug report by **Guido Vranken** via the _Tor bug bounty program_. Please credit Guido accordingly. ## Bug report The DNS code of Libevent contains this rather obvious OOB read: ```c static char * search_make_new(const st...
null
CVE-2014-8760
ejabberd before 2.1.13 does not enforce the starttls_required setting when compression is used, which causes clients to establish connections without encryption.
[ { "commit_message": "[PATCH] Make sure \"starttls_required\" can't be bypassed Don't allow clients to circumvent the \"starttls_required\" option by enabling XMPP stream compression. src/ejabberd_c2s.erl | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSA3YmRjMTE1MWIxMWQyNm...
n/a
CVE-2023-7166
Novel-Plus HTTP POST Request updateUserInfo cross site scripting
A vulnerability classified as problematic has been found in Novel-Plus up to 4.2.0. This affects an unknown part of the file /user/updateUserInfo of the component HTTP POST Request Handler. The manipulation of the argument nickName leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of the patch is c62da9bb3a9b3603014d0edb436146512631100d. It is recommended to apply a patch to fix this issue. The identifier VDB-249201 was assigned to this vulnerability.
[ { "commit_message": "[PATCH] =?UTF-8?q?fix:=20nickName=E3=80=81userPhoto=20=E6=9B=B4?= =?UTF-8?q?=E6=96=B0=E6=A0=A1=E9=AA=8C?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit .../java/com/java2nb/novel/entity/User.java | 23 +++++++++++-------- 1 file changed, 14 inser...
CWE-79 Cross Site Scripting
CVE-2025-21621
GeoServer Reflected Cross-Site Scripting (XSS) vulnerability in WMS GetFeatureInfo HTML format
GeoServer is an open source server that allows users to share and edit geospatial data. Prior to version 2.25.0, a reflected cross-site scripting (XSS) vulnerability exists in the WMS GetFeatureInfo HTML output format that enables a remote attacker to execute arbitrary JavaScript code in a victim's browser through specially crafted SLD_BODY parameters. This issue has been patched in version 2.25.0.
[ { "commit_message": "[PATCH] [GEOS-11297] Escape WMS GetFeatureInfo HTML output by default doc/en/user/source/installation/upgrade.rst | 12 +++++ doc/en/user/source/production/config.rst | 22 ++++++++ doc/en/user/source/services/wms/webadmin.rst | 2 + .../source/tutorials/GetFeatureInfo/html.rst | 2 ...
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2018-11245
app/webroot/js/misp.js in MISP 2.4.91 has a DOM based XSS with cortex type attributes.
[ { "commit_message": "[PATCH] fix: Fixed a DOM based XSS with cortex type attributes - as reported by Dawid Czarnecki (dawid@pz.pl) app/webroot/js/misp.js | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA1ZWZjMDdiMTJmODIzMDFhNjA4NmZkMzQzM2ZlZGQ2OWZlNzExOWQzIE1vbiBTZXAgMTcgMDA6...
n/a
GHSA-hh2q-qv66-jcqg
Whoogle Search Path Traversal vulnerability
null
[ { "commit_message": "[PATCH] Validate urls in `element` and `window` endpoints Domains were previously not validated before being handled, leading to a potential scenario where someone could pass something like \"element_url=127.0.0.1:<port>/<resource>\" to access other resources on a machine running Whoogle. T...
null
GHSA-763g-fqq7-48wg
XML external entity (XXE) processing ('external-parameter-entities' feature was not fully disabled))
null
[ { "commit_message": "[PATCH] Issue #7468: disable 'external-parameter-entities' feature by default src/main/java/com/puppycrawl/tools/checkstyle/XmlLoader.java | 4 ++++ 1 file changed, 4 insertions(+)", "patch_text_b64": "RnJvbSBjNDZhMTZkMTc3ZTY3OTc4OTViMTk1YzI4OGFlOWE5YTA5NjI1NGI4IE1vbiBTZXAgMTcgMDA6MDA6MD...
null
GHSA-x93j-3hh3-6x23
Insufficient Session Expiration in librenms/librenms
null
[ { "commit_message": "[PATCH] Block disabled user session auth Do not allow users that are disabled to be logged in via cookie. Allow all auth methods to disable users app/Http/Kernel.php | 1 + app/Http/Middleware/VerifyUserEnabled.php | 30 +++++++++++++++++++++++ resources/lang/en/auth.ph...
null
CVE-2025-55742
UnoPim Stored XSS via SVG MIME/Sanitizer Bypass
UnoPim is an open-source Product Information Management (PIM) system built on the Laravel framework. Before 0.2.1, UnoPim contains a stored cross-site scripting vulnerability via SVG MIME/sanitizer bypass in the /admin/settings/users/create endpoint. This vulnerability is fixed in 0.2.1.
[ { "commit_message": "[PATCH] fix: add validation for file extension and mime - add missing 'file' key from request in ImportController - update user controller for test case .../Settings/DataTransfer/ImportController.php | 1 + .../src/Http/Controllers/Settings/UserController.php | 2 ++ .../JobInstances/...
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
GHSA-m332-53r6-2w93
etcd's WAL `ReadAll` method vulnerable to an entry with large index causing panic
null
[ { "commit_message": "[PATCH] wal: fix panic when decoder not set Handle the related panic and clarify doc. wal/wal.go | 8 +++++++- wal/wal_test.go | 21 +++++++++++++++++++++ 2 files changed, 28 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA3ZDFjZjY0MDQ5N2NiY2RmYjkzMmU2MTliMTM2MjQxMTJjN2UzOD...
null
GHSA-w24v-rj49-6hh3
null
[ { "commit_message": "[PATCH] fix: Fix to certauth pains .../Component/Auth/CertificateAuthenticate.php | 12 +++++++----- 1 file changed, 7 insertions(+), 5 deletions(-)", "patch_text_b64": "RnJvbSBiZTExMWE0NzAyMDRhOTc0YzUwNjgyMDU0YzljN2Q0Yjk0Mzk2ZWQ5IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBpZ2xvY3Nr...
null
CVE-2021-32792
XSS vulnerability when using OIDCPreservePost On in mod_auth_openidc
mod_auth_openidc is an authentication/authorization module for the Apache 2.x HTTP server that functions as an OpenID Connect Relying Party, authenticating users against an OpenID Connect Provider. In mod_auth_openidc before version 2.4.9, there is an XSS vulnerability in when using `OIDCPreservePost On`.
[ { "commit_message": "[PATCH] avoid XSS vulnerability when using OIDCPreservePost On and supplying URLs that contain single quotes; thanks @oss-aimoto Signed-off-by: Hans Zandbelt <hans.zandbelt@zmartzone.eu> ChangeLog | 4 ++++ src/mod_auth_openidc.c | 2 +- 2 files changed, 5 insertions(+), 1 deleti...
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2017-5668
bitlbee-libpurple before 3.5.1 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) and possibly execute arbitrary code via a file transfer request for a contact that is not in the contact list. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-10189.
[ { "commit_message": "[PATCH] purple: Fix crash on ft requests from unknown contacts Followup to 701ab81 (included in 3.5) which was a partial fix which only improved things for non-libpurple file transfers (that is, just jabber) protocols/purple/ft.c | 4 ++++ 1 file changed, 4 insertions(+)", "patch_text_b6...
n/a
GHSA-p799-q2pr-6mxj
go.rgst.io/stencil/v2 vulnerable to Path Traversal
null
[ { "commit_message": "[PATCH] fix(deps): github.com/jaredallard/archives v1.0.1 (#255) Fixes https://github.com/jaredallard/archives/security/advisories/GHSA-j95m-rcjp-q69h go.mod | 4 ++-- go.sum | 8 ++++---- go.work.sum | 4 ++++ 3 files changed, 10 insertions(+), 6 deletions(-)", "patch_text_b64":...
null
CVE-2023-34455
snappy-java's unchecked chunk length leads to DoS
snappy-java is a fast compressor/decompressor for Java. Due to use of an unchecked chunk length, an unrecoverable fatal error can occur in versions prior to 1.1.10.1. The code in the function hasNextChunk in the fileSnappyInputStream.java checks if a given stream has more chunks to read. It does that by attempting to read 4 bytes. If it wasn’t possible to read the 4 bytes, the function returns false. Otherwise, if 4 bytes were available, the code treats them as the length of the next chunk. In the case that the `compressed` variable is null, a byte array is allocated with the size given by the input data. Since the code doesn’t test the legality of the `chunkSize` variable, it is possible to pass a negative number (such as 0xFFFFFFFF which is -1), which will cause the code to raise a `java.lang.NegativeArraySizeException` exception. A worse case would happen when passing a huge positive value (such as 0x7FFFFFFF), which would raise the fatal `java.lang.OutOfMemoryError` error. Version 1.1.10.1 contains a patch for this issue.
[ { "commit_message": "[PATCH] Merge pull request from GHSA-qcwq-55hx-v3vh * asserted chunksize should be in the bounds of 0-java.outofmmeoryexception * asserted chunksize should be in the bounds of 0-java.outofmmeoryexception * https://github.com/xerial/snappy-java-ghsa-qcwq-55hx-v3vh/pull/2 * advisory-fix-3 * a...
CWE-770: Allocation of Resources Without Limits or Throttling
CVE-2021-3660
Cockpit (and its plugins) do not seem to protect itself against clickjacking. It is possible to render a page from a cockpit server via another website, inside an <iFrame> HTML entry. This may be used by a malicious website in clickjacking or similar attacks.
[ { "commit_message": "[PATCH] common: Restrict frame embedding to same origin Declare `X-Frame-Options: sameorigin` [1] so that cockpit frames can only be embedded into pages coming from the same origin. This is similar to setting CORP in commit 2b38b8de92f9a (which applies to `<script>`, `<img>`, etc.). The mai...
CWE-1021 - Improper Restriction of Rendered UI Layers or Frames
GHSA-wp8j-c736-c5r3
TYPO3 Cross-Site Scripting Vulnerability Exploitable by Editors
null
[ { "commit_message": "[PATCH] [SECURITY] XSS in Filelist Properly escape user input when showing error messages during file renaming. Resolves: #59211 Releases: master, 6.2 Security-Bulletin: TYPO3-CORE-SA-2015-004 Change-Id: I59c847e3ee1a5d5c2633cad9e3ce51b290dd1c22 Reviewed-on: http://review.typo3.org/40820 Re...
null
CVE-2021-43814
Heap-based OOB write when parsing dwarf DIE info in Rizin
Rizin is a UNIX-like reverse engineering framework and command-line toolset. In versions up to and including 0.3.1 there is a heap-based out of bounds write in parse_die() when reversing an AMD64 ELF binary with DWARF debug info. When a malicious AMD64 ELF binary is opened by a victim user, Rizin may crash or execute unintended actions. No workaround are known and users are advised to upgrade.
[ { "commit_message": "[PATCH] Fix oob write for dwarf with abbrev with count 0 (Fix #2083) (#2086) librz/bin/dwarf.c | 40 ++++++++++++++++++++++----------------- test/db/formats/elf/crash | 8 ++++++++ 2 files changed, 31 insertions(+), 17 deletions(-)", "patch_text_b64": "RnJvbSBhYTY5MTc3NzJkMmYzMmU...
CWE-787: Out-of-bounds Write
CVE-2023-22462
Stored XSS in Grafana Text plugin
Grafana is an open-source platform for monitoring and observability. On 2023-01-01 during an internal audit of Grafana, a member of the security team found a stored XSS vulnerability affecting the core plugin "Text". The stored XSS vulnerability requires several user interactions in order to be fully exploited. The vulnerability was possible due to React's render cycle that will pass though the unsanitized HTML code, but in the next cycle the HTML is cleaned up and saved in Grafana's database. An attacker needs to have the Editor role in order to change a Text panel to include JavaScript. Another user needs to edit the same Text panel, and click on "Markdown" or "HTML" for the code to be executed. This means that vertical privilege escalation is possible, where a user with Editor role can change to a known password for a user having Admin role if the user with Admin role executes malicious JavaScript viewing a dashboard. This issue has been patched in versions 9.2.10 and 9.3.4.
[ { "commit_message": "[PATCH] [v9.3.x] Plugins: Fix plugin query help markdown (#60907) Plugins: Fix plugin query help markdown (#60485) * refactor(pluginhelp): rewrite as functional component with useAsync * mimic old behaviour * feat(pluginhelp): display message if backend returned an empty string Co-authore...
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
GHSA-x22v-qgm2-7qc7
usememos/memos vulnerable to stored Cross-site Scripting
null
[ { "commit_message": "[PATCH] chore: add skipper for secure (#913) server/common.go | 6 ++++ server/resource.go | 7 +++- server/server.go | 8 ++++- server/version/version.go | 5 ++- server/version/version...
null
CVE-2018-25068
devent globalpom-utils FileResourceManagerProvider.java createTmpDir temp file
A vulnerability has been found in devent globalpom-utils up to 4.5.0 and classified as critical. This vulnerability affects the function createTmpDir of the file globalpomutils-fileresources/src/main/java/com/anrisoftware/globalpom/fileresourcemanager/FileResourceManagerProvider.java. The manipulation leads to insecure temporary file. The attack can be initiated remotely. Upgrading to version 4.5.1 is able to address this issue. The patch is identified as 77a820bac2f68e662ce261ecb050c643bd7ee560. It is recommended to upgrade the affected component. VDB-217570 is the identifier assigned to this vulnerability.
[ { "commit_message": "[PATCH] Feature #4100 Fix critical Vulnerability \"File.createTempFile\" should not be used to create a directory .../FileResourceManagerProvider.java | 135 ++++++++---------- 1 file changed, 57 insertions(+), 78 deletions(-)", "patch_text_b64": "RnJvbSA3N2E4MjBiYWMyZjY4ZTY2MmN...
CWE-377 Insecure Temporary File
GHSA-hjwh-ffhj-2hxf
null
[ { "commit_message": "[PATCH] More checks for correct header sizes Reported-by: \"P. Amsuo, Purdue University\" modules/pico_ipv4.c | 5 +++++ modules/pico_tcp.c | 7 +++++++ 2 files changed, 12 insertions(+)", "patch_text_b64": "RnJvbSA0YjlhMTY3NjRmMmIxMmI2MTFkZTljMzRhNTBiNDcxM2QxMGNhNDAxIE1vbiBTZXAgMTcgMDA6...
null
GHSA-53hp-jpwq-2jgq
Uncontrolled Resource Consumption in Apache Tomcat
null
[ { "commit_message": "[PATCH] Fix BZ 64467. Improve performance of closing idle streams .../coyote/http2/Http2UpgradeHandler.java | 10 +++--- .../coyote/http2/TestHttp2Section_5_1.java | 31 ++++++++++++++++--- webapps/docs/changelog.xml | 4 +++ 3 files changed, 36 insertions(+), 9 dele...
null
GHSA-qfh8-x72v-whwp
null
[ { "commit_message": "[PATCH] patch 8.2.4281: using freed memory with :lopen and :bwipe Problem: Using freed memory with :lopen and :bwipe. Solution: Do not use a wiped out buffer. src/buffer.c | 14 ++++++++++---- src/testdir/test_quickfix.vim | 17 +++++++++++++++++ src/version.c ...
null
GHSA-58v7-58c2-qwm9
phpMyFAQ Cross-site Scripting vulnerability
null
[ { "commit_message": "[PATCH] fix: added missing conversion to HTML entities phpmyfaq/admin/ajax.config_list.php | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSAzMzJkMmU0YTgzMjUxZDQwNmNhNThkZDExYzI3YzU5ODY3M2FhNWZhIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBUaG9yc3RlbiBSa...
null
GHSA-m2vv-5vj5-2hm7
Pillow vulnerable to Data Amplification attack.
null
[ { "commit_message": "[PATCH] Added release notes for #6402 docs/releasenotes/9.2.0.rst | 19 +------------------ 1 file changed, 1 insertion(+), 18 deletions(-)", "patch_text_b64": "RnJvbSAzYjhlMTk1ZGIyZjdiYmVlOTg0NDE4NDk4NDliODQ1NzA0ZDdkMzkzIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBBbmRyZXcgTXVycmF5IDxyYWR...
null
GHSA-4v8x-qr64-whf2
null
[ { "commit_message": "[PATCH] NetLabel: correct CIPSO tag handling when adding new DOI definitions The current netlbl_cipsov4_add_common() function has two problems which are fixed with this patch. The first is an off-by-one bug where it is possibile to overflow the doi_def->tags[] array. The second is a bug w...
null
CVE-2023-47117
Object Relational Mapper Leak Vulnerability in Filtering Task in Label Studio
Label Studio is an open source data labeling tool. In all current versions of Label Studio prior to 1.9.2post0, the application allows users to insecurely set filters for filtering tasks. An attacker can construct a filter chain to filter tasks based on sensitive fields for all user accounts on the platform by exploiting Django's Object Relational Mapper (ORM). Since the results of query can be manipulated by the ORM filter, an attacker can leak these sensitive fields character by character. In addition, Label Studio had a hard coded secret key that an attacker can use to forge a session token of any user by exploiting this ORM Leak vulnerability to leak account password hashes. This vulnerability has been addressed in commit `f931d9d129` which is included in the 1.9.2post0 release. Users are advised to upgrade. There are no known workarounds for this vulnerability.
[ { "commit_message": "[PATCH] fix: LEAP-237: Patch ORM Leak vulnerability in open source (#5012) * fix: LEAP-237: Patch ORM Leak vulnerability in open source * add further detail to docstring about security concern * fix bug where string starts with desc marker label_studio/core/settings/base.py | 8...
CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CVE-2024-34360
Previous ATX is not checked to be the newest valid ATX by Smesher when validating incoming ATX
go-spacemesh is a Go implementation of the Spacemesh protocol full node. Nodes can publish activations transactions (ATXs) which reference the incorrect previous ATX of the Smesher that created the ATX. ATXs are expected to form a single chain from the newest to the first ATX ever published by an identity. Allowing Smeshers to reference an earlier (but not the latest) ATX as previous breaks this protocol rule and can serve as an attack vector where Nodes are rewarded for holding their PoST data for less than one epoch but still being eligible for rewards. This vulnerability is fixed in go-spacemesh 1.5.2-hotfix1 and Spacemesh API 1.37.1.
[ { "commit_message": "[PATCH] Add malfeasance type for incorrect previous ATX (#2) release/go/spacemesh/v1/types.pb.go | 54 ++++++++++++++++------------- spacemesh/v1/types.proto | 1 + 2 files changed, 31 insertions(+), 24 deletions(-)", "patch_text_b64": "RnJvbSAxZDViZDk3MmJiZTIyNWQwMjRjM2UwYWU1...
CWE-754: Improper Check for Unusual or Exceptional Conditions
GHSA-hfgr-h3vc-p6c2
DockerSpawner allows any image by default
null
[ { "commit_message": "[PATCH 1/2] allow only configured image by default avoids allowing all images when no allowed_images are configured The default of an empty collection prohibits specifying the image (even if it is the allowed image). A new value `allowed_images = \"*\"` can be used to explicitly allow any i...
null
GHSA-wh5g-hmcj-7mmx
null
[ { "commit_message": "[PATCH] Validate order by to prevent SQL injection src/Complex.Domino.Lib/Lib/EntityFactory.cs | 9 +++++++++ src/Complex.Domino.Web/PageBase.cs | 2 +- 2 files changed, 10 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAxNmYwMzkwNzM3MDlhMjFhNzY1MjYxMTBkNzczYTZjY2UwY2U3N...
null
CVE-2022-23588
`CHECK`-fails due to attempting to build a reference tensor in Tensorflow
Tensorflow is an Open Source Machine Learning Framework. A malicious user can cause a denial of service by altering a `SavedModel` such that Grappler optimizer would attempt to build a tensor using a reference `dtype`. This would result in a crash due to a `CHECK`-fail in the `Tensor` constructor as reference types are not allowed. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
[ { "commit_message": "[PATCH] Prevent `CHECK`-fail when building reference tensor. The tensor constructor does not allow reference dtypes, as these should not show up explicitly. However, when passed these invalid types instead of building an invalid object the constructor crashes via a `CHECK`-fail. We have a s...
CWE-617: Reachable Assertion
GHSA-694p-xrhg-x3wm
Micronaut's HTTP client is vulnerable to HTTP Request Header Injection
null
[ { "commit_message": "[PATCH] Validate client headers .../src/main/java/io/micronaut/http/netty/NettyHttpHeaders.java | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA2ZGViNjBiNzU1MTdmODBjNTdiNDJkOTM1ZjA3OTU1Yzc3M2I3NjZkIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBqYW1lc2tsZWVoI...
null
GHSA-p24j-h477-76q3
Uncontrolled Search Path Element in sharkdp/bat
null
[ { "commit_message": "[PATCH] Fix for Windows: do not run binaries from CWD This fixes a bug on Windows where `Command::new` would also run executables from the current working directory, possibly resulting in accidental runs of programs called `less`. Cargo.lock | 29 +++++++++++++++++++++++++++++ Cargo.toml ...
null
CVE-2020-26149
NATS nats.js before 2.0.0-209, nats.ws before 1.0.0-111, and nats.deno before 1.0.0-9 allow credential disclosure from a client to a server.
[ { "commit_message": "[PATCH] [update] [security] updated nats-base-client to v1.0.0-9 (#47) * [update] [security] updated nats-base-client to v1.0.0-9 * bumped package version .github/workflows/natsws.yml | 2 +- package.json | 2 +- src/nats-base-client.ts | 2 +- src/ws_transport.ts ...
n/a
CVE-2021-20298
A flaw was found in OpenEXR's B44Compressor. This flaw allows an attacker who can submit a crafted file to be processed by OpenEXR, to exhaust all memory accessible to the application. The highest threat from this vulnerability is to system availability.
[ { "commit_message": "[PATCH] reduce B44 _tmpBufferSize (was allocating two bytes per byte) (#843) Signed-off-by: Peter Hillman <peterh@wetafx.co.nz> OpenEXR/IlmImf/ImfB44Compressor.cpp | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA4NWZkNjM4YWUwZDVmYTEzMjQzNGY0Y2JmMzI1OTAyN...
CWE-400 - Uncontrolled Resource Consumption
GHSA-pxxv-rv32-2qgv
OpenStack Nova uses insecure keystone middleware tmpdir by default
null
[ { "commit_message": "[PATCH] Remove insecure default for signing_dir option. The sample api-paste.ini file included an insecure value for the signing_dir option for the keystone authtoken middleware. Comment out the option so that we just rely on the default behavior by default. Fix bug 1174608. Change-Id: I61...
null
GHSA-h42x-xx2q-6v6g
Flowise Pre-auth Arbitrary File Upload
null
[ { "commit_message": "[PATCH] Bugfix/arbitrary create attachemnt file upload (#4171) fix arbitrary create attachemnt file upload .../PostgresRecordManager.ts | 1 - packages/components/src/index.ts | 1 + packages/components/src/storageUtils.ts | 12 +++---- packages/components...
null
CVE-2024-28123
Wasmi Out-of-bounds Write for host to Wasm calls with more than 128 Parameters
Wasmi is an efficient and lightweight WebAssembly interpreter with a focus on constrained and embedded systems. In the WASMI Interpreter, an Out-of-bounds Buffer Write will arise if the host calls or resumes a Wasm function with more parameters than the default limit (128), as it will surpass the stack value. This doesn’t affect calls from Wasm to Wasm, only from host to Wasm. This vulnerability was patched in version 0.31.1.
[ { "commit_message": "[PATCH] fix bug in wasmi executor crates/wasmi/src/engine/mod.rs | 8 ++++++-- 1 file changed, 6 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSBmN2IzMjAwZTlmM2RjOWUyY2JjYTk2NmNiMjU1YzIyODQ1M2M3OTJmIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBSb2JpbiBGcmV5bGVyIDxyb2Jpbi5mcmV5bGVy...
CWE-787: Out-of-bounds Write
GHSA-qg66-xv7v-m834
Stored XSS vulnerability in computer-queue-plugin Plugin
null
[ { "commit_message": "[PATCH] [SECURITY-1912] .../jenkinsci/plugins/computerqueue/ComputerQueue/queue.jelly | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAzODc3NmMwNzE2NDcwMDM4ZDkyMjgyOWY2NzVhYjI3OGEwNzlhY2ZiIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiA9P1VURi04P3E/T2xpdmVyP...
null
GHSA-xh4g-c9p6-5jxg
LibreNMS has a Stored XSS ('Cross-site Scripting') in librenms/app/Http/Controllers/Table/EditPortsController.php
null
[ { "commit_message": "[PATCH] Fix XSS in port edit secion (#16566) * Fix XSS in port edit secion * Also fixes GHSA-xh4g-c9p6-5jxg * Added htmlentities() to more output * Update EditPortsController.php app/Http/Controllers/Table/EditPortsController.php | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deleti...
null
GHSA-qxg7-q87p-pgh2
null
[ { "commit_message": "[PATCH] Deny access to user edit action for low-priv users Previously you could open the user edit page but not successfully make changes if you didn't have permission to edit that user. Now you won't be able to view that page at all. The edit page shows that user's settings and the \"ident...
null
GHSA-4m5p-5w5w-3jcf
com.enonic.xp:lib-auth vulnerable to Session Fixation
null
[ { "commit_message": "[PATCH] Invalidate old session after login #9253 .../com/enonic/xp/lib/auth/LoginHandler.java | 50 ++++++++++++------- .../enonic/xp/lib/auth/LoginHandlerTest.java | 21 ++++++++ 2 files changed, 52 insertions(+), 19 deletions(-)", "patch_text_b64": "RnJvbSAwMTg5OTc1NjkxZTllNjQwN2E5ZmV...
null
GHSA-m496-5jfw-8fgm
null
[ { "commit_message": "[PATCH] rds: fix an infoleak in rds_inc_info_copy The last field \"flags\" of object \"minfo\" is not initialized. Copying this object out may leak kernel stack data. Assign 0 to it to avoid leak. Signed-off-by: Kangjie Lu <kjlu@gatech.edu> Acked-by: Santosh Shilimkar <santosh.shilimkar@ora...
null
GHSA-hvf8-h2qh-37m9
IPC messages delivered to the wrong frame in Electron
null
[ { "commit_message": "[PATCH] fix: restrict sendToFrame to same-process frames by default (#26875) docs/api/structures/ipc-main-event.md | 1 + docs/api/structures/ipc-main-invoke-event.md | 1 + docs/api/web-contents.md | 2 +- lib/browser/api/web-contents.ts | 19 +++...
null
CVE-2015-5741
The net/http library in net/http/transfer.go in Go before 1.4.3 does not properly parse HTTP headers, which allows remote attackers to conduct HTTP request smuggling attacks via a request that contains Content-Length and Transfer-Encoding header fields.
[ { "commit_message": "[PATCH] net/http: harden Server against request smuggling MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit See RFC 7230. Thanks to Régis Leroy for the report. Change-Id: Ic1779bc2180900430d4d7a4938cac04ed73c304c Reviewed-on: https://go-review.googles...
n/a
GHSA-w8vq-3hf9-xppx
Apollo Router Unnamed "Subscription" operation results in Denial-of-Service
null
[ { "commit_message": "[PATCH] Subscriptions: Correct v1.28.x regression allowing panic via un-named subscription operation (#3738) ### Subscriptions: Correct v1.28.x regression allowing panic via un-named subscription operation Correct a regression that was introduced in Router v1.28.0 which made a Router **pani...
null
GHSA-q445-7m23-qrmw
openssl's `MemBio::get_buf` has undefined behavior with empty buffers
null
[ { "commit_message": "[PATCH] Fixed invariant violation in `MemBio::get_buf` with empty results Pointer arguments to `slice::from_raw_parts` are required to be non-null. (See https://davidben.net/2024/01/15/empty-slices.html for details.) openssl/src/bio.rs | 17 ++++++++++++++++- 1 file changed, 16 insertions(+)...
null
GHSA-x3px-p2f4-4p27
null
[ { "commit_message": "[PATCH] [SECURITY] Prevent directory traversal Resolves #6 Classes/Service/UploadFileService.php | 12 +++++++----- 1 file changed, 7 insertions(+), 5 deletions(-)", "patch_text_b64": "RnJvbSBiMjVkNDJhNDk4MTA3MjMyMWMxYTM2MzMxMWQ4ZWEyYTRhYzg3NjNhIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiB...
null
CVE-2022-31173
Juniper is vulnerable to @DOS GraphQL Nested Fragments overflow
Juniper is a GraphQL server library for Rust. Affected versions of Juniper are vulnerable to uncontrolled recursion resulting in a program crash. This issue has been addressed in version 0.15.10. Users are advised to upgrade. Users unable to upgrade should limit the recursion depth manually.
[ { "commit_message": "[PATCH] Merge pull request from GHSA-4rx6-g5vg-5f3j * Replace recursions with heap allocations * Some corrections [skip ci] * Add recursive nested fragments test case * Docs and small corrections * Corrections Co-authored-by: Kai Ren <tyranron@gmail.com> .../validation/rules/no_fragment_cyc...
CWE-400: Uncontrolled Resource Consumption
GHSA-gcpj-pp7m-cw8v
null
[ { "commit_message": "[PATCH] avcodec/exr: More strictly check dc_count MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Fixes: out of array access Fixes: exr/deneme Found-by: Burak Çarıkçı <burakcarikci@crypttech.com> Signed-off-by: Michael Niedermayer <michael@niedermay...
null
CVE-2025-58446
xgrammar vulnerable to denial of service by huge enum grammar
xgrammar is an open-source library for efficient, flexible, and portable structured generation. A grammar optimizer introduced in 0.1.23 processes large grammars (>100k characters) at very low rates, and can be used for DOS of model providers. This issue is fixed in version 0.1.24.
[ { "commit_message": "[PATCH] [Feature] Add a new expression to represent repetition to speed up. (#368) Currently, if we try to compile a grammar with a expression like `[a-z]{2, 20000}`, it will cost a lot of time to compile the grammar. In this PR, we add a new type of expression `kRepeat` in the parser, whic...
CWE-770: Allocation of Resources Without Limits or Throttling
GHSA-h5qv-p378-3hhr
Centreon Sensitive Data Exposure vulnerability
null
[ { "commit_message": "[PATCH] fix(security) remove session id parameter (#8291) .../common/javascript/ajaxMonitoring.js | 26 +++---------------- .../common/javascript/centreon/notifier.js | 1 - .../configKnowledge/templates/display.ihtml | 8 +++--- www/include/core/footer/footer.php | 1 ...
null
CVE-2024-43379
TruffleHog has a Blind SSRF in some Detectors
TruffleHog is a secrets scanning tool. Prior to v3.81.9, this vulnerability allows a malicious actor to craft data in a way that, when scanned by specific detectors, could trigger the detector to make an unauthorized request to an endpoint chosen by the attacker. For an exploit to be effective, the target endpoint must be an unauthenticated GET endpoint that produces side effects. The victim must scan the maliciously crafted data and have such an endpoint targeted for the exploit to succeed. The vulnerability has been resolved in TruffleHog v3.81.9 and later versions.
[ { "commit_message": "[PATCH] Improve domain / url handling in detectors (#3221) * Strip path and params and use new client * update clients * additional client updates * revert client pkg/detectors/aha/aha.go | 3 +- pkg/detectors/apiflash/apiflash.go | 6 +- pkg/detectors/arti...
CWE-918: Server-Side Request Forgery (SSRF)
GHSA-3hc7-2xcc-7p8f
Squalor SQL Injection vulnerability
null
[ { "commit_message": "[PATCH] Prevent a SQL injection ast.go | 12 ++++++++---- table.go | 9 +++++++-- table_test.go | 31 +++++++++++++++++++++++++++++++ 3 files changed, 46 insertions(+), 6 deletions(-)", "patch_text_b64": "RnJvbSAwMzMzNTBiODU5NmIzOTdjNmNlZmEwNjZiMWYyYzgzZDM1ZmM4YzRhIE1vbiBTZXAg...
null
CVE-2013-4881
Cross-site request forgery (CSRF) vulnerability in core/admin/modules/users/create.php in BigTree CMS 4.0 RC2 and earlier allows remote attackers to hijack the authentication of administrators for requests that create an administrative user via an add user action to index.php.
[ { "commit_message": "[PATCH] Fixed a Cross-Site Request Forgery exploit that would allow logged-in BigTree admins hitting a malicious page to automatically create / update users. core/admin/modules/users/create.php | 28 ++++++++++++++-------- core/admin/modules/users/update.php | 36 ++++++++++++++++++----------...
n/a
GHSA-j2w4-45qm-r674
direct_mail for Typo3 sensitive data exposure
null
[ { "commit_message": "[PATCH] Security fix release Classes/DirectMailUtility.php | 16 +++++++++++++--- Resources/Private/Language/locallang_mod2-6.xlf | 3 +++ ext_emconf.php | 2 +- 3 files changed, 17 insertions(+), 4 deletions(-)", "patch_text_b64": "RnJv...
null
GHSA-fh74-hm69-rqjw
opencontainers runc contains procfs race condition with a shared volume mount
null
[ { "commit_message": "[PATCH] rootfs: do not permit /proc mounts to non-directories mount(2) will blindly follow symlinks, which is a problem because it allows a malicious container to trick runc into mounting /proc to an entirely different location (and thus within the attacker's control for a rename-exchange a...
null
CVE-2025-58362
Hono contains a flaw in URL path parsing, potentially leading to path confusion
Hono is a Web application framework that provides support for any JavaScript runtime. Versions 4.8.0 through 4.9.5 contain a flaw in the getPath utility function which could allow path confusion and potential bypass of proxy-level ACLs (e.g. Nginx location blocks). The original implementation relied on fixed character offsets when parsing request URLs. Under certain malformed absolute-form Request-URIs, this could lead to incorrect path extraction depending on the application and environment. If proxy ACLs are used to protect sensitive endpoints such as /admin, this flaw could have allowed unauthorized access. The confidentiality impact depends on what data is exposed: if sensitive administrative data is exposed, the impact may be high, otherwise it may be moderate. This issue is fixed in version 4.9.6.
[ { "commit_message": "[PATCH] Merge commit from fork src/utils/url.test.ts | 9 +++++++++ src/utils/url.ts | 7 +------ 2 files changed, 10 insertions(+), 6 deletions(-)", "patch_text_b64": "RnJvbSAxZDc5YWVkYzNmODJkOGM5OTY5YjExNWZlNjFiYzRiZDcwNWVjOGRlIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBZdXN1a2UgV2F...
CWE-706: Use of Incorrectly-Resolved Name or Reference
CVE-2014-3682
XML external entity (XXE) vulnerability in the JBPMBpmn2ResourceImpl function in designer/bpmn2/resource/JBPMBpmn2ResourceImpl.java in jbpm-designer 6.0.x and 6.2.x allows remote attackers to read arbitrary files and possibly have other unspecified impact by importing a crafted BPMN2 file.
[ { "commit_message": "[PATCH] BZ1158017: fix XXE vulnerability when importing a BP from a bpmn2 (XML) file. .../jbpm/designer/bpmn2/resource/JBPMBpmn2ResourceImpl.java | 5 +++++ 1 file changed, 5 insertions(+)", "patch_text_b64": "RnJvbSA1NjQxNTg4YzczMGNjNzVkYzNiNzZjMzRiNzYyNzFmYmQ0MDdmYjg0IE1vbiBTZXAgMTcgM...
n/a
GHSA-3mc7-4q67-w48m
Uncontrolled Resource Consumption in snakeyaml
null
[ { "commit_message": "[PATCH] Restrict nested depth for collections to avoid DoS attacks src/changes/changes.xml | 3 ++ .../org/yaml/snakeyaml/LoaderOptions.java | 20 +++++++++++-- .../org/yaml/snakeyaml/composer/Composer.java | 28 ++++++++++++++++++- .../issues/issue377/ReferencesTest...
null
CVE-2023-52262
outdoorbits little-backup-box (aka Little Backup Box) before f39f91c allows remote attackers to execute arbitrary code because the PHP extract function is used for untrusted input.
[ { "commit_message": "[PATCH] security improvement scripts/config.php | 3 ++- scripts/view.php | 50 +++++++++++++++++++++++----------------------- 2 files changed, 27 insertions(+), 26 deletions(-)", "patch_text_b64": "RnJvbSBmMzlmOTFjZDA1NTQ0YjNlYjE4YjU5ODk3Yzc2NWQ2YmE5MzEzZmFhIE1vbiBTZXAgMTcgMDA6MDA6MDA...
n/a
GHSA-m5m2-h6h9-p2c8
Velocity execution without script right through VelocityCode and VelocityWiki property
null
[ { "commit_message": "[PATCH] XWIKI-20847/XWIKI-20848: Improve Velocity execution in TextAreaClass * Add a unit test * Use AuthorExecutor to set the correct context author * Check for script right and restricted properties * Fix a comment .../xwiki/objects/classes/TextAreaClass.java | 129 ++++++++-- .../objects...
null
PYSEC-2024-91
null
[ { "commit_message": "[PATCH] extmod/vfs: Fix buffer overflow of string comparison in umount. The comparison between the given unmount string and existing mount strings were made by the given string, which leads to buffer overflow. Fixes issue #13006. Signed-off-by: Junwha <qbit@unist.ac.kr> extmod/vfs.c | 2 +- ...
null
CVE-2018-12633
An issue was discovered in the Linux kernel through 4.17.2. vbg_misc_device_ioctl() in drivers/virt/vboxguest/vboxguest_linux.c reads the same user data twice with copy_from_user. The header part of the user data is double-fetched, and a malicious user thread can tamper with the critical variables (hdr.size_in and hdr.size_out) in the header between the two fetches because of a race condition, leading to severe kernel errors, such as buffer over-accesses. This bug can cause a local denial of service and information leakage.
[ { "commit_message": "[PATCH] virt: vbox: Only copy_from_user the request-header once In vbg_misc_device_ioctl(), the header of the ioctl argument is copied from the userspace pointer 'arg' and saved to the kernel object 'hdr'. Then the 'version', 'size_in', and 'size_out' fields of 'hdr' are verified. Before th...
n/a
CVE-2021-29522
Division by 0 in `Conv3DBackprop*`
TensorFlow is an end-to-end open source platform for machine learning. The `tf.raw_ops.Conv3DBackprop*` operations fail to validate that the input tensors are not empty. In turn, this would result in a division by 0. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/a91bb59769f19146d5a0c20060244378e878f140/tensorflow/core/kernels/conv_grad_ops_3d.cc#L430-L450) does not check that the divisor used in computing the shard size is not zero. Thus, if attacker controls the input sizes, they can trigger a denial of service via a division by zero error. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
[ { "commit_message": "[PATCH] Eliminate a division by 0 in 3D convolutions. Also prevent a CHECK failed introduced in the most recent change. PiperOrigin-RevId: 369322073 Change-Id: I4f609c028f89565fb2b49c3fdd20b63496582bae tensorflow/core/kernels/conv_grad_ops_3d.cc | 42 +++++++++++++++++++++ 1 file changed, 42...
CWE-369: Divide By Zero
CVE-2022-31003
Heap-based Buffer Overflow and Out-of-bounds Write in Sofia-SIP
Sofia-SIP is an open-source Session Initiation Protocol (SIP) User-Agent library. Prior to version 1.13.8, when parsing each line of a sdp message, `rest = record + 2` will access the memory behind `\0` and cause an out-of-bounds write. An attacker can send a message with evil sdp to FreeSWITCH, causing a crash or more serious consequence, such as remote code execution. Version 1.13.8 contains a patch for this issue.
[ { "commit_message": "[PATCH] Fix Heap-buffer-overflow in parse_descs and parse_message libsofia-sip-ua/sdp/sdp_parse.c | 8 ++++++++ 1 file changed, 8 insertions(+)", "patch_text_b64": "RnJvbSBjMDdmMDVhNGQxNjU1ZmEzNDgxYmEwYzVhZWQ1MDI2YjM4Y2VmNTBjIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBBbmRyZXkgVm9sayA8YW5...
CWE-122: Heap-based Buffer Overflow
GHSA-g76m-mhgj-xf94
null
[ { "commit_message": "[PATCH] XSS vulnerability fix , thanks Max Boll objects/functions.php | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-)", "patch_text_b64": "RnJvbSAzNzIyMzM1ZjgwODQ4NGU2YmZiNWU3MTAyOGZlZGRkZDk0MmFkZDRhIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBEYW5pZWwgPGRhbmllbG5ldG8uY29tQGd...
null
GHSA-x577-gcc9-9xjj
Concrete CMS Stored XSS in Layout Preset Name
null
[ { "commit_message": "[PATCH 1/5] Downgrading vue loader because dependabot installed a version incompatible with vue 2; Upgrading bedrock to 1.4.10 which properly sanitizes user input in the ajax select list build/package-lock.json | 306 ++++++++++++++++++++++-------- build/package.json ...
null
CVE-2020-4041
The filename of uploaded files vulnerable to stored XSS in Bolt CMS
In Bolt CMS before version 3.7.1, the filename of uploaded files was vulnerable to stored XSS. It is not possible to inject javascript code in the file name when creating/uploading the file. But, once created/uploaded, it can be renamed to inject the payload in it. Additionally, the measures to prevent renaming the file to disallowed filename extensions could be circumvented. This is fixed in Bolt 3.7.1.
[ { "commit_message": "[PATCH 1/3] Check CSRF on Preview page src/Config.php | 2 +- src/Controller/Async/FilesystemManager.php | 4 +++- src/Controller/Frontend.php | 7 +++++++ 3 files changed, 11 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSAyNWQwZTg1M2Iw...
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-4385
Kernel: jfs: null pointer dereference in dbfree()
A NULL pointer dereference flaw was found in dbFree in fs/jfs/jfs_dmap.c in the journaling file system (JFS) in the Linux Kernel. This issue may allow a local attacker to crash the system due to a missing sanity check.
[ { "commit_message": "[PATCH] fs: jfs: fix possible NULL pointer dereference in dbFree() In our fault-injection testing, the variable \"nblocks\" in dbFree() can be zero when kmalloc_array() fails in dtSearch(). In this case, the variable \"mp\" in dbFree() would be NULL and then it is dereferenced in \"write_me...
NULL Pointer Dereference
GHSA-7c65-3hqv-hvmm
null
[ { "commit_message": "[PATCH] interp: do not set PYTHONPATH environment variable to prevent a LPE perl/lib/NeedRestart/Interp/Python.pm | 15 +++++++-------- 1 file changed, 7 insertions(+), 8 deletions(-)", "patch_text_b64": "RnJvbSBmY2M5YTQ0MDEzOTIyMzFiZWY0ZWY1ZWQwMjZhMGQ3YTI3NTE0OWFiIE1vbiBTZXAgMTcgMDA6MDA...
null
CVE-2013-4162
The udp_v6_push_pending_frames function in net/ipv6/udp.c in the IPv6 implementation in the Linux kernel through 3.10.3 makes an incorrect function call for pending data, which allows local users to cause a denial of service (BUG and system crash) via a crafted application that uses the UDP_CORK option in a setsockopt system call.
[ { "commit_message": "[PATCH] ipv6: call udp_push_pending_frames when uncorking a socket with AF_INET pending data We accidentally call down to ip6_push_pending_frames when uncorking pending AF_INET data on a ipv6 socket. This results in the following splat (from Dave Jones): skbuff: skb_under_panic: text:ffffff...
n/a
GHSA-883m-49fj-jg3j
null
[ { "commit_message": "[PATCH] packet: Don't write vnet header beyond end of buffer ... which may happen with certain values of tp_reserve and maclen. Fixes: 58d19b19cd99 (\"packet: vnet_hdr support for tpacket_rcv\") Signed-off-by: Benjamin Poirier <bpoirier@suse.com> Cc: Willem de Bruijn <willemb@google.com> Ac...
null
GHSA-7528-7jg5-6g62
Cross-site Scripting Vulnerability in CodeIgniter4
null
[ { "commit_message": "[PATCH 1/8] Merge pull request #5531 from kenjis/fix-framework-composer.json admin/framework/composer.json | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA5ZTlkZmJiNjA5OWFlNjhlNjljZmI5OTM1MjdiMGI5YjliMDkyNzNjIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBNR2...
null
CVE-2022-4773
cloudsync LocalFilesystemConnector.java getItem path traversal
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as problematic was found in cloudsync. Affected by this vulnerability is the function getItem of the file src/main/java/cloudsync/connector/LocalFilesystemConnector.java. The manipulation leads to path traversal. It is possible to launch the attack on the local host. The name of the patch is 3ad796833398af257c28e0ebeade68518e0e612a. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216919. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
[ { "commit_message": "[PATCH] vuln-fix: Partial Path Traversal Vulnerability This fixes a partial path traversal vulnerability. Replaces `dir.getCanonicalPath().startsWith(parent.getCanonicalPath())`, which is vulnerable to partial path traversal attacks, with the more secure `dir.getCanonicalFile().toPath().sta...
CWE-22 Path Traversal
GHSA-55m3-vx37-fcvx
null
[ { "commit_message": "[PATCH] fix: [vulnerability] Fixes a vulnerability where a user can view sightings that they should not be eligible for - requires access to the event that has received the sighting - affects instances with restrictive sighting settings (event only / sighting reported only) - as reported by...
null
GHSA-7cfh-r37c-4mqr
null
[ { "commit_message": "[PATCH] crypto: hmac - require that the underlying hash algorithm is unkeyed Because the HMAC template didn't check that its underlying hash algorithm is unkeyed, trying to use \"hmac(hmac(sha3-512-generic))\" through AF_ALG or through KEYCTL_DH_COMPUTE resulted in the inner HMAC being used...
null
CVE-2012-0787
The clone_file function in transfer.c in Augeas before 1.0.0, when copy_if_rename_fails is set and EXDEV or EBUSY is returned by the rename function, allows local users to overwrite arbitrary files and obtain sensitive information via a bind mount on the (1) .augsave or (2) destination file when using the backup save option, or (3) .augnew file when using the newfile save option.
[ { "commit_message": "[PATCH] Prevent cross-mountpoint attacks via .augsave during saving Previously Augeas would open PATH.augsave for writing if a rename from PATH to PATH.augsave failed, then write the file contents in. Now if the rename fails, it tries to unlink PATH.augsave and open it with O_EXCL first. M...
n/a
CVE-2024-43410
Russh has an OOM Denial of Service due to allocation of untrusted amount
Russh is a Rust SSH client & server library. Allocating an untrusted amount of memory allows any unauthenticated user to OOM a russh server. An SSH packet consists of a 4-byte big-endian length, followed by a byte stream of this length. After parsing and potentially decrypting the 4-byte length, russh allocates enough memory for this bytestream, as a performance optimization to avoid reallocations later. But this length is entirely untrusted and can be set to any value by the client, causing this much memory to be allocated, which will cause the process to OOM within a few such requests. This vulnerability is fixed in 0.44.1.
[ { "commit_message": "[PATCH] fixed GHSA-vgvv-x7xg-6cqg - OOM Denial of Service due to allocation of untrusted packet size russh/src/cipher/mod.rs | 9 ++++++++- russh/src/lib.rs | 4 ++++ 2 files changed, 12 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBmNjYwZWEzZjY0Yjg2ZDExZDE5ZTMzMDc2MDEyM...
CWE-770: Allocation of Resources Without Limits or Throttling