id
stringlengths
12
19
title
stringlengths
0
237
description
stringlengths
35
3.87k
patches
listlengths
1
22
cwe
stringlengths
2
440
CVE-2023-48224
Cryptographically Weak Generation of One-Time Codes for Identity Verification in ethyca-fides
Fides is an open-source privacy engineering platform for managing the fulfillment of data privacy requests in a runtime environment, and the enforcement of privacy regulations in code. The Fides Privacy Center allows data subject users to submit privacy and consent requests to data controller users of the Fides web application. Privacy requests allow data subjects to submit a request to access all person data held by the data controller, or delete/erase it. Consent request allows data subject users to modify their privacy preferences for how the data controller uses their personal data e.g. data sales and sharing consent opt-in/opt-out. If `subject_identity_verification_required` in the `[execution]` section of `fides.toml` or the env var `FIDES__EXECUTION__SUBJECT_IDENTITY_VERIFICATION_REQUIRED` is set to `True` on the fides webserver backend, data subjects are sent a one-time code to their email address or phone number, depending on messaging configuration, and the one-time code must be entered in the Privacy Center UI by the data subject before the privacy or consent request is submitted. It was identified that the one-time code values for these requests were generated by the python `random` module, a cryptographically weak pseduo-random number generator (PNRG). If an attacker generates several hundred consecutive one-time codes, this vulnerability allows the attacker to predict all future one-time code values during the lifetime of the backend python process. There is no security impact on data access requests as the personal data download package is not shared in the Privacy Center itself. However, this vulnerability allows an attacker to (i) submit a verified data erasure request, resulting in deletion of data for the targeted user and (ii) submit a verified consent request, modifying a user's privacy preferences. The vulnerability has been patched in Fides version `2.24.0`. Users are advised to upgrade to this version or later to secure their systems against this threat. There are no known workarounds for this vulnerability.
[ { "commit_message": "[PATCH] Merge pull request from GHSA-82vr-5769-6358 * replace random.choice with secrets.choice for generating id verification code * update changelog CHANGELOG.md | 3 +++ .../api/service/privacy_request/request_runner_service.py | 4 ++--...
CWE-338: Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
CVE-2025-49136
listmonk's Sprig template Injection vulnerability leads to reading of Environment Variable for low privilege user
listmonk is a standalone, self-hosted, newsletter and mailing list manager. Starting in version 4.0.0 and prior to version 5.0.2, the `env` and `expandenv` template functions which is enabled by default in Sprig enables capturing of env variables on host. While this may not be a problem on single-user (super admin) installations, on multi-user installations, this allows non-super-admin users with campaign or template permissions to use the `{{ env }}` template expression to capture sensitive environment variables. Users should upgrade to v5.0.2 to mitigate the issue.
[ { "commit_message": "[PATCH] Remove dangerous tpl funcs in Sprig that's enabled by default. `env` and `expandenv` template functions in the Sprig library allow accessing system environment variables within campaign templates. cmd/init.go | 6 +++++- internal/manager/manager.go | 6 +++++- 2 files ...
CWE-1336: Improper Neutralization of Special Elements Used in a Template Engine
CVE-2024-0550
Privileged User using traversal to read system files
A user who is privileged already `manager` or `admin` can set their profile picture via the frontend API using a relative filepath to then user the PFP GET API to download any valid files. The attacker would have to have been granted privileged permissions to the system before executing this attack.
[ { "commit_message": "[PATCH] Normalize pfp path to prevent traversal server/endpoints/system.js | 5 +++-- server/utils/files/pfp.js | 4 ++-- 2 files changed, 5 insertions(+), 4 deletions(-)", "patch_text_b64": "RnJvbSBlMWRjZDVkZWQwMTBiMDNhYmQ2YWEzMmQxYmYwNjY4YTQ4ZTM4ZTE3IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpG...
CWE-23 Relative Path Traversal
GHSA-xv5p-fjw5-vrj6
Fugue is Vulnerable to Remote Code Execution by Pickle Deserialization via FlaskRPCServer
null
[ { "commit_message": "[PATCH] Adding security warnings to Flask RPCServer (#564) * Adding security warnings to Flask RPCServer * lint * changing documentation url * f-string * codacy analysis fugue/rpc/flask.py | 9 +++++++++ 1 file changed, 9 insertions(+)", "patch_text_b64": "RnJvbSA2ZjI1MzI2Nzc5ZmQxZjUyODE...
null
CVE-2018-16658
An issue was discovered in the Linux kernel before 4.18.6. An information leak in cdrom_ioctl_drive_status in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940.
[ { "commit_message": "[PATCH] cdrom: Fix info leak/OOB read in cdrom_ioctl_drive_status Like d88b6d04: \"cdrom: information leak in cdrom_ioctl_media_changed()\" There is another cast from unsigned long to int which causes a bounds check to fail with specially crafted input. The value is then used as an index in...
n/a
PYSEC-2021-236
null
[ { "commit_message": "[PATCH] Prevent division by 0 PiperOrigin-RevId: 370998952 Change-Id: I6b1d49079624ee1447d2d9b53a8976fb356cc8f5 tensorflow/lite/kernels/split.cc | 1 + 1 file changed, 1 insertion(+)", "patch_text_b64": "RnJvbSBiMjI3ODZlN2U5YjdiZGI2YTU2OTM2ZmYyOWNjN2U5OTY4ZDdiYzFkIE1vbiBTZXAgMTcgMDA6MDA6...
null
CVE-2024-36619
FFmpeg n6.1.1 has a vulnerability in the WAVARC decoder of the libavcodec library which allows for an integer overflow when handling certain block types, leading to a denial-of-service (DoS) condition.
[ { "commit_message": "[PATCH] avcodec/wavarc: fix signed integer overflow in block type 6/19 Fixes: signed integer overflow: -2088796289 + -91276551 cannot be represented in type 'int' Fixes: 67772/clusterfuzz-testcase-minimized-ffmpeg_AV_CODEC_ID_WAVARC_fuzzer-6533568953122816 Found-by: continuous fuzzing proce...
n/a
GHSA-j68w-pg49-f6vx
Symfony XML decoding attack vector through external entities
null
[ { "commit_message": "[PATCH] [Serializer] Fix XML decoding attack vector through external entities Encoder/XmlEncoder.php | 11 +++++++++++ 1 file changed, 11 insertions(+)", "patch_text_b64": "RnJvbSAwOTQzYTA2YTY2M2I1NzNkNzMxOWZjMWFjZDU2ZDM0ODRlYWFhNDMwIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBKb3JkaSBCb2d...
null
CVE-2020-11456
LimeSurvey before 4.1.12+200324 has stored XSS in application/views/admin/surveysgroups/surveySettings.php and application/models/SurveysGroups.php (aka survey groups).
[ { "commit_message": "[PATCH] Fixed issue [security] #16019: Stored XSS in survey groups. (Thanks to Matthew Aberegg and Michael Burkey) Dev: admin view to be fixed Dev: not shown in public : no need XSS filtering application/models/SurveysGroups.php | 1 - application/views/admin/surveysgroup...
n/a
GHSA-mqqc-3gqh-h2x8
AIOHTTP has unicode match groups in regexes for ASCII protocol elements
null
[ { "commit_message": "[PATCH] [PR #11887/7a067d19 backport][3.13] Reject non-ascii digits in Range header (#11903) **This is a backport of PR #11887 as merged into master (7a067d1905e1eeb921a50010dd0004990dbb3bf0).** Co-authored-by: Sam Bull <git@sambull.org> aiohttp/web_request.py | 2 +- tests/test_web_reque...
null
CVE-2024-28854
Slow loris vulnerability with default configuration in tls-listener
tls-listener is a rust lang wrapper around a connection listener to support TLS. With the default configuration of tls-listener, a malicious user can open 6.4 `TcpStream`s a second, sending 0 bytes, and can trigger a DoS. The default configuration options make any public service using `TlsListener::new()` vulnerable to a slow-loris DoS attack. This impacts any publicly accessible service using the default configuration of tls-listener in versions prior to 0.10.0. Users are advised to upgrade. Users unable to upgrade may mitigate this by passing a large value, such as `usize::MAX` as the parameter to `Builder::max_handshakes`.
[ { "commit_message": "[PATCH 1/2] Accept all available incoming connections. If we don't have any available TLS connections, instead of returning Pending, we will try to get new (TCP) incoming connections again, unless there aren't any more to get. This mitigates a potential DoS attach by creating TCP connectio...
CWE-400: Uncontrolled Resource Consumption
CVE-2023-38499
typo3/cms-core Information Disclosure due to Out-of-scope Site Resolution
TYPO3 is an open source PHP based web content management system. Starting in version 9.4.0 and prior to versions 9.5.42 ELTS, 10.4.39 ELTS, 11.5.30, and 12.4.4, in multi-site scenarios, enumerating the HTTP query parameters `id` and `L` allowed out-of-scope access to rendered content in the website frontend. For instance, this allowed visitors to access content of an internal site by adding handcrafted query parameters to the URL of a site that was publicly available. TYPO3 versions 9.5.42 ELTS, 10.4.39 ELTS, 11.5.30, 12.4.4 fix the problem.
[ { "commit_message": "[PATCH] [SECURITY] Avoid out-of-scope page access for non-matching site This change disallows calling an URI with page-id query parameters that are not part of a particular site - for instance the following URL `https://example.org/?id=3000&L=0` has two aspects: * the site `example.org` has...
CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CVE-2020-27223
In Eclipse Jetty 9.4.6.v20170531 to 9.4.36.v20210114 (inclusive), 10.0.0, and 11.0.0 when Jetty handles a request containing multiple Accept headers with a large number of “quality” (i.e. q) parameters, the server may enter a denial of service (DoS) state due to high CPU usage processing those quality values, resulting in minutes of CPU time exhausted processing those quality values.
[ { "commit_message": "[PATCH] Merge pull request from GHSA-m394-8rww-3jr7 Use comparator based sort Signed-off-by: Joakim Erdfelt <joakim.erdfelt@gmail.com> Signed-off-by: gregw <gregw@webtide.com> Co-authored-by: gregw <gregw@webtide.com> .../eclipse/jetty/http/QuotedQualityCSV.java | 118 +++++++++++++----- 1 ...
CWE-407: Inefficient Algorithmic Complexity
GHSA-gmc6-fwg3-75m5
Mimekit has vulnerable dependency that can lead to denial of service
null
[ { "commit_message": "[PATCH] Explicitly depend on System.Formats.Asn1 8.0.1 Fixes a denial of service security vulnerability (CVE-2024-38095) in the System.Security.Formats.Asn1 (<= 8.0.0) nuget package. MimeKit/MimeKit.csproj | 1 + nuget/MimeKit.nuspec | 4 ++++ 2 files changed, 5 insertions(+)", "patch_t...
null
GHSA-mr7h-w2qc-ffc2
pytorch-lightning vulnerable to Arbitrary File Write via /v1/runs API endpoint
null
[ { "commit_message": "[PATCH] Remove the lightning app code (#20039) * remove source, tests, docs, workflows * update checkgroup * update codeowners * update workflows * package setup * config files * update * [pre-commit.ci] auto fixes from pre-commit.com hooks for more information, see https://pre-commit.ci * ...
null
GHSA-ch4c-278q-5654
rdiffweb Missing Custom Error Page
null
[ { "commit_message": "[PATCH] Enforce minimum and maximum password length #211 README.md | 1 + doc/configuration.md | 14 +++++++++ rdiffweb/controller/page_admin.py | 16 +++++++++- rdiffweb/controller/pref_general.py | 16 +++++++++- ...
null
GHSA-x89m-rvq3-8g32
null
[ { "commit_message": "[PATCH] Fixed DoS vulnerability in sFlow v5 plugin which caused crash of FastNetMon with specially crafted packet. Reported by Evgeny Shtanov aka @Klavishnik src/libsflow/libsflow.hpp | 3 +++ src/sflow_plugin/sflow_collector.cpp | 10 ++++++++++ 2 files changed, 13 insertions(+)"...
null
GHSA-wf6c-hrhf-86cw
NocoDB Vulnerable to Reflected Cross-Site Scripting on Reset Password Page
null
[ { "commit_message": "[PATCH] fix: password reset page packages/nocodb/src/modules/auth/auth.controller.ts | 2 +- packages/nocodb/src/modules/auth/ui/auth/emailVerify.ts | 2 +- packages/nocodb/src/modules/auth/ui/auth/resetPassword.ts | 2 +- 3 files changed, 3 insertions(+), 3 deletions(-)", "patch_t...
null
GHSA-c467-5c2g-jp86
Cross-site Scripting in modoboa
null
[ { "commit_message": "[PATCH 1/2] Fixed XSS issue in domain creation form. modoboa/admin/static/admin/js/admin.js | 2 +- modoboa/admin/templates/admin/domains.html | 10 +++++----- modoboa/static/js/global.js | 9 +++++++++ 3 files changed, 15 insertions(+), 6 deletions(-)", "patch_text_b6...
null
CVE-2024-43380
fugit parse and parse_nat stall on lengthy input
fugit contains time tools for flor and the floraison group. The fugit "natural" parser, that turns "every wednesday at 5pm" into "0 17 * * 3", accepted any length of input and went on attempting to parse it, not returning promptly, as expected. The parse call could hold the thread with no end in sight. Fugit dependents that do not check (user) input length for plausibility are impacted. A fix was released in fugit 1.11.1.
[ { "commit_message": "[PATCH] Lower time expectations for labby rubies, gh-104 CREDITS.md | 1 + spec/parse_spec.rb | 8 ++++---- 2 files changed, 5 insertions(+), 4 deletions(-)", "patch_text_b64": "RnJvbSBhZDJjMWM5YzczNzIxM2Q1ODVmZmYwYjUxYzkyN2QxNzhiMmMwNWE1IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiB...
CWE-400: Uncontrolled Resource Consumption
CVE-2016-15022
mosbth cimage check_system.php cross site scripting
A vulnerability was found in mosbth cimage up to 0.7.18. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file check_system.php. The manipulation of the argument $_SERVER['SERVER_SOFTWARE'] leads to cross site scripting. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. Upgrading to version 0.7.19 is able to address this issue. The patch is named 401478c8393989836beeddfeac5ce44570af162b. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-219715.
[ { "commit_message": "[PATCH] Correct XSS injection in check_system.php. REVISION.md | 3 ++- webroot/check_system.php | 2 +- 2 files changed, 3 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSA0MDE0NzhjODM5Mzk4OTgzNmJlZWRkZmVhYzVjZTQ0NTcwYWYxNjJiIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tO...
CWE-79 Cross Site Scripting
GHSA-9rg3-9pvr-6p27
MONAI has Path Traversal (Zip Slip) in NGC Private Bundle Download
null
[ { "commit_message": "[PATCH] Fix Zip Slip vulnerability in NGC private bundle download (#8682) Replaced the unsafe `zipfile.extractall()` in `_download_from_ngc_private` with MONAI's safe extraction utility. Prevents path traversal via crafted zip member paths (CWE-22). ### Description This changes _download_fr...
null
GHSA-3fj5-q6p4-25m2
null
[ { "commit_message": "[PATCH] netfilter: xt_TCPMSS: add more sanity tests on tcph->doff Denys provided an awesome KASAN report pointing to an use after free in xt_TCPMSS I have provided three patches to fix this issue, either in xt_TCPMSS or in xt_tcpudp.c. It seems xt_TCPMSS patch has the smallest possible impa...
null
GHSA-5g2h-9x5v-5h3x
phoenix_html allows Cross-site Scripting in HEEx class attributes
null
[ { "commit_message": "[PATCH] Make sure class={@value} in HEEx is escaped lib/phoenix_html/tag.ex | 21 +++++++++++---------- test/phoenix_html/tag_test.exs | 11 +++++++++-- 2 files changed, 20 insertions(+), 12 deletions(-)", "patch_text_b64": "RnJvbSA2MmEwMTM5ZmI3MTZiY2RjZTY5N2Y2MjIxMjQ0YmQ4MWQzMjFkN...
null
CVE-2015-8958
coders/sun.c in ImageMagick before 6.9.0-4 Beta allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted SUN file.
[ { "commit_message": "[PATCH] coders/sun.c | 43 +++++++++++++++++-------------------------- 1 file changed, 17 insertions(+), 26 deletions(-)", "patch_text_b64": "RnJvbSAxYWEwYzZkYWI2ZGNlZjRkOWJjMzU3MTg2NmFlMWMxZGRiZWM3ZDhmIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBjcmlzdHkgPHVyYmFuLXdhcnJpb3JAZ2l0LmltYWdlbW...
n/a
GHSA-4r8q-gv9j-3xx6
Open Redirect
null
[ { "commit_message": "[PATCH] Trim slashes from request uri before redirecting (#1001) src/Middleware/HostnameActions.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA5YzgzN2EyMWJjY2NlOWJjYWViOTAwMzNlZjIwMGQ4NGYwZDllMTY0IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBKYXNwZXIgW...
null
GHSA-m8r4-c7jm-w782
Jenkins Plugin Installation Manager Tool did not verify plugin downloads
null
[ { "commit_message": "[PATCH] Check that downloads are correct .../tools/pluginmanager/impl/Plugin.java | 15 +-- .../impl/PluginChecksumMismatchException.java | 30 ++++++ .../pluginmanager/impl/PluginManager.java | 88 ++++++++++++++++++ .../pluginmanager/impl/ChecksumTest.java | 53 +++++++++++ ...
null
GHSA-92rv-mvmj-47qh
Jenkins GitHub Pull Request Builder Plugin credential capture vulnerability
null
[ { "commit_message": "[PATCH] [SECURITY-805] .../plugins/ghprb/GhprbGitHubAuth.java | 24 +++++++++++++------ 1 file changed, 17 insertions(+), 7 deletions(-)", "patch_text_b64": "RnJvbSBlNzhlZTI0ZjcwNTZiODUwNzk5MmVmMTdhOWJiNzRhMWEzMWQ4YzExIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiA9P1VURi04P3E/Qmo9QzM...
null
GHSA-7rrm-v45f-jp64
Nokogiri updates packaged dependency on libxml2 from 2.9.10 to 2.9.12
null
[ { "commit_message": "[PATCH] dep: upgrade libxml2 from 2.9.10 to 2.9.12 dependencies.yml | 24 ++++++++++++------------ 1 file changed, 12 insertions(+), 12 deletions(-)", "patch_text_b64": "RnJvbSA5YjkwYTg4NTRmNzRiNWY2NzJhNDM3YmEwMDQzYTUwM2JjMjU5ZDFiIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBNaWtlIERhbGVzc2...
null
CVE-2025-27408
Manifest Uses a One-Way Hash without a Salt
Manifest offers users a one-file micro back end. Prior to version 4.9.2, Manifest employs a weak password hashing implementation that uses SHA3 without a salt. This exposes user passwords to a higher risk of being cracked if an attacker gains access to the database. Without the use of a salt, identical passwords across multiple users will result in the same hash, making it easier for attackers to identify and exploit patterns, thereby accelerating the cracking process. Version 4.9.2 fixes the issue.
[ { "commit_message": "[PATCH 1/4] fix(login): error flash message not showing Somehow the flash message is not appearing in the login page. I replaced it with an alert() for the moment. Let's see that later .../auth/views/login/login.component.html | 16 ++++++++-------- .../modules/auth/views/login/login....
CWE-759: Use of a One-Way Hash without a Salt
GHSA-4g77-cm25-7q33
null
[ { "commit_message": "[PATCH] cuse: fix memory leak The problem is that fuse_dev_alloc() acquires an extra reference to cc.fc, and the original ref count is never dropped. Reported-by: Colin Ian King <colin.king@canonical.com> Signed-off-by: Miklos Szeredi <miklos@szeredi.hu> Fixes: cc080e9e9be1 (\"fuse: introdu...
null
GHSA-xfm4-w623-4vcg
null
[ { "commit_message": "[PATCH] CSP: Remove unsafe-eval when vue isn't used (#4747) * CSP: Remove unsafe-eval when vue isn't used * Prevent XSS injection via VueJS .../Security/ContentSecurityPolicies.cs | 5 ++++ .../Filters/ContentSecurityPolicyAttribute.cs | 2 +- .../Crowdfund/Public/ViewCrowdfund.cshtml...
null
GHSA-jgwv-fx37-24vq
null
[ { "commit_message": "[PATCH] Re-sync with internal repository (#960) Co-authored-by: Facebook Community Bot <6422482+facebook-github-bot@users.noreply.github.com> include/hermes/VM/HermesValue.h | 20 ++++ lib/Optimizer/Scalar/TypeInference.cpp | 27 +++-- lib/VM/JSLib/TypedArray.cpp ...
null
CVE-2023-24813
URI validation failure on SVG parsing. Bypass of CVE-2023-23924
Dompdf is an HTML to PDF converter written in php. Due to the difference in the attribute parser of Dompdf and php-svg-lib, an attacker can still call arbitrary URLs with arbitrary protocols. Dompdf parses the href attribute of `image` tags and respects `xlink:href` even if `href` is specified. However, php-svg-lib, which is later used to parse the svg file, parses the href attribute. Since `href` is respected if both `xlink:href` and `href` is specified, it's possible to bypass the protection on the Dompdf side by providing an empty `xlink:href` attribute. An attacker can exploit the vulnerability to call arbitrary URLs with arbitrary protocols if they provide an SVG file to the Dompdf. In PHP versions before 8.0.0, it leads to arbitrary unserialize, which will lead, at the very least, to arbitrary file deletion and might lead to remote code execution, depending on available classes. This vulnerability has been addressed in commit `95009ea98` which has been included in release version 2.0.3. Users are advised to upgrade. There are no known workarounds for this vulnerability.
[ { "commit_message": "[PATCH] Validate both bare and namespaced SVG image HREF attributes src/Image/Cache.php | 23 ++++++++++++++--------- 1 file changed, 14 insertions(+), 9 deletions(-)", "patch_text_b64": "RnJvbSA5NTAwOWVhOTgyMzBmOWIwODRiMDQwYzM0ZTM4NjllZjNkY2NjOWFhIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9t...
CWE-436: Interpretation Conflict
CVE-2018-20724
A cross-site scripting (XSS) vulnerability exists in pollers.php in Cacti before 1.2.0 due to lack of escaping of unintended characters in the Website Hostname for Data Collectors.
[ { "commit_message": "[PATCH] Resolving Issue #2212 Stored XSS in \"Website Hostname\" field CHANGELOG | 1 + pollers.php | 2 +- 2 files changed, 2 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAxZjQyNDc4NTA2ZDgzZDE4OGY2OGNlNWZmNDE3MjhhN2JkMTU5ZjUzIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBjaWdhbW...
n/a
GHSA-wxqc-pxw9-g2p8
Spring Framework vulnerable to denial of service
null
[ { "commit_message": "[PATCH] Limit SpEL expression length This commit enforces a limit of the maximum size of a single SpEL expression. Closes gh-30330 .../expression/spel/SpelMessage.java | 10 ++++-- .../InternalSpelExpressionParser.java | 15 +++++++++ .../expression/spel/EvaluationTests.java ...
null
GHSA-6vc5-v7hw-h5h2
Cross-site Scripting in RosarioSIS
null
[ { "commit_message": "<francoisjacquet@users.noreply.github.com> [PATCH] Fix #291 XSS Use URLEscape() for links href modules/Custom/NotifyParents.php | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSBjNGE2OTQ4NjBiNTBjNGFhNWM2N2Q2NTY4ZjdkMDYxM2ZlZjFhMzBkIE1vbiBTZXAgMTcgMDA6M...
null
GHSA-5whg-j5fv-xcm2
ChakraCore RCE Vulnerability
null
[ { "commit_message": "[PATCH] Change to address CVE-2016-7200,CVE-2016-7201,CVE-2016-7202,CVE-2016-7203,CVE-2016-7208,CVE-2016-7240,CVE-2016-7241,CVE-2016-7242,CVE-2016-7243 Type confusion in Array.prototype.filter Type confusion due to reentrancy can cause a Var to be written into a native int array. Fix by mak...
null
GHSA-9hp4-rpgx-8fxp
null
[ { "commit_message": "[PATCH] avformat/mvdec: Fix DoS due to lack of eof check Fixes: loop.mv Found-by: Xiaohei and Wangchu from Alibaba Security Team Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> libavformat/mvdec.c | 2 ++ 1 file changed, 2 insertions(+)", "patch_text_b64": "RnJvbSA0ZjA1ZTJlMm...
null
GHSA-6gph-p9m6-46vx
null
[ { "commit_message": "[PATCH] 19.0.2 release ChangeLog | 6 + VERSION | 2 +- etc/dependencies/package.json | 2 +- src/main/webapp/js/app.min.js | 204 +++++++++--------- src/main/webapp/js/diagramly/App....
null
GHSA-g4r8-mp7g-85fq
ZITADEL Allows IdP Intent Token Reuse
null
[ { "commit_message": "[PATCH] Merge commit from fork * fix: prevent intent token reuse and add expiry * fix duplicate * fix expiration cmd/defaults.yaml | 3 + .../v2/integration_test/session_test.go | 80 +++++++++++- .../v2beta/integration_test/session_test.go | 80 +++++++...
null
GHSA-r58r-w68f-vcxj
null
[ { "commit_message": "[PATCH] DnsServer: fixed bug in reloading doh ssl cert. Implemented resolver task pool to allow handling large number of requests such that ongoing resolutions do not timeout due to large number of pending tasks. Fixed issue of unhandled exception in AcceptQuicConnectionAsync() causing DoS ...
null
CVE-2022-25845
Deserialization of Untrusted Data
The package com.alibaba:fastjson before 1.2.83 are vulnerable to Deserialization of Untrusted Data by bypassing the default autoType shutdown restrictions, which is possible under certain conditions. Exploiting this vulnerability allows attacking remote servers. Workaround: If upgrading is not possible, you can enable [safeMode](https://github.com/alibaba/fastjson/wiki/fastjson_safemode).
[ { "commit_message": "[PATCH] bug fix for autotype .../alibaba/fastjson/parser/ParserConfig.java | 83 +++++-------------- .../java/com/alibaba/json/bvt/PointTest2.java | 4 +- 2 files changed, 23 insertions(+), 64 deletions(-)", "patch_text_b64": "RnJvbSA4ZjM0MTBmODFjYmQ0MzdmN2M0NTlmODg2ODQ0NWQ1MGFkMzAxZjE1I...
Deserialization of Untrusted Data
CVE-2025-59822
Http4s vulnerable to HTTP Request Smuggling due to improper handling of HTTP trailer section
Http4s is a Scala interface for HTTP services. In versions from 1.0.0-M1 to before 1.0.0-M45 and before 0.23.31, http4s is vulnerable to HTTP Request Smuggling due to improper handling of HTTP trailer section. This vulnerability could enable attackers to bypass front-end servers security controls, launch targeted attacks against active users, and poison web caches. A pre-requisite for exploitation involves the web application being deployed behind a reverse-proxy that forwards trailer headers. This issue has been patched in versions 1.0.0-M45 and 0.23.31.
[ { "commit_message": "[PATCH] fail parsing invalid whitespace around field name test trailer headers specifically better tests, clean up comments, rm space clause test when crlf split across chunk recover parse errors by returning BadRequest clean up fix the weird chunking test handle header parse error in runCo...
CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
GHSA-78fx-h6xr-vch4
Laravel has a File Validation Bypass
null
[ { "commit_message": "[PATCH 1/4] [11.x] Add valid values to ensure method (#54840) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit * Add valid values to ensure method * Update src/Illuminate/Collections/Traits/EnumeratesValues.php Co-authored-by: Sebastian Hädrich <1122...
null
GHSA-2jh5-g5ch-43q5
YoutubeDLSharp allows command injection on windows system due to non sanitized arguments
null
[ { "commit_message": "[PATCH] Remove `UseWindowsEncodingWorkaround` YoutubeDLSharp/YoutubeDL.cs | 2 +- YoutubeDLSharp/YoutubeDLProcess.cs | 17 +---------------- 2 files changed, 2 insertions(+), 17 deletions(-)", "patch_text_b64": "RnJvbSBiNjA1MTM3MmJkNWFmMzBmOTVmNzNkZTQ3ZDliYzcxYzNhMDdkZTBmIE1vbiBTZ...
null
CVE-2024-31988
XWiki Platform CSRF remote code execution through the realtime HTML Converter API
XWiki Platform is a generic wiki platform. Starting in version 13.9-rc-1 and prior to versions 4.10.19, 15.5.4, and 15.10-rc-1, when the realtime editor is installed in XWiki, it allows arbitrary remote code execution with the interaction of an admin user with programming right. More precisely, by getting an admin user to either visit a crafted URL or to view an image with this URL that could be in a comment, the attacker can get the admin to execute arbitrary XWiki syntax including scripting macros with Groovy or Python code. This compromises the confidentiality, integrity and availability of the whole XWiki installation. This vulnerability has been patched in XWiki 14.10.19, 15.5.4 and 15.9. As a workaround, one may update `RTFrontend.ConvertHTML` manually with the patch. This will, however, break some synchronization processes in the realtime editor, so upgrading should be the preferred way on installations where this editor is used.
[ { "commit_message": "[PATCH] XWIKI-21424: Use CSRF token in the realtime HTML Converter API * Add a mandatory CSRF token to use RTFrontend.ConvertHTML * Add a page test for RTFrontend.ConvertHTML that checks for the proper use of the CSRF token * Improve URL creation and add Translations.xml .../xwiki-platform-...
CWE-352: Cross-Site Request Forgery (CSRF)
CVE-2024-23637
OctoPrint Unverified Password Change via Access Control Settings
OctoPrint is a web interface for 3D printer.s OctoPrint versions up until and including 1.9.3 contain a vulnerability that allows malicious admins to change the password of other admin accounts, including their own, without having to repeat their password. An attacker who managed to hijack an admin account might use this to lock out actual admins from their OctoPrint instance. The vulnerability will be patched in version 1.10.0.
[ { "commit_message": "[PATCH 01/13] =?UTF-8?q?=F0=9F=94=92=EF=B8=8F=20Further=20protect?= =?UTF-8?q?=20user=20management=20with=20reauthentication?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit For any changes of users or groups, if the user hasn't entered their passw...
CWE-287: Improper Authentication
GHSA-4jwc-4cp5-ff42
null
[ { "commit_message": "[PATCH] Fix #9902 - Fix oobread in RBin.string_scan_range libr/bin/file.c | 9 +++++---- 1 file changed, 5 insertions(+), 4 deletions(-)", "patch_text_b64": "RnJvbSAzZmNmNDFlZDk2ZmZhMjViMzgwMjk0NDk1MjBjOGQwYTE5ODc0NWYzIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBwYW5jYWtlIDxwYW5jYWtlQG5vcG...
null
GHSA-j7j6-7hfx-5522
Inconsistent Interpretation of HTTP Requests in Waitress
null
[ { "commit_message": "[PATCH] Upon receiving invalid Content-Length bail Instead of attempting to continue processing the request, we instead raise a ParsingError and return a HTTP Bad Request to the client. This also catches the case where two Content-Length's are sent, and are folded together using HTTP header...
null
GHSA-4qq9-rrq6-48ff
Cross site scripting in org.apache.nifi:nifi
null
[ { "commit_message": "[PATCH] NIFI-5442 Get X-ProxyContextPath value from request attributes rather than directly from headers. NIFI-5442 Populate request contextPath attribute during AccessResource before displaying on message-page.jsp. Refactored shared code from CatchAllFilter to WebUtils. NIFI-5442 Refactore...
null
CVE-2021-22871
Revive Adserver before 5.1.0 permits any user with a manager account to store possibly malicious content in the URL website property, which is then displayed unsanitized in the affiliate-preview.php tag generation screen, leading to a persistent cross-site scripting (XSS) vulnerability.
[ { "commit_message": "[PATCH] Fixed h1 report 819362 RELEASE_NOTES.txt | 4 ++++ .../openXInvocationTags/plugins/etc/openXInvocationTags.xml | 4 ++-- .../plugins/etc/oxInvocationTags/oxInvocationTags.xml | 4 ++-- .../plugins/invocationTags/oxInvocationTags/spc.class...
Cross-site Scripting (XSS) - Stored (CWE-79)
CVE-2025-49011
SpiceDB checks involving relations with caveats can result in no permission when permission is expected
SpiceDB is an open source database for storing and querying fine-grained authorization data. Prior to version 1.44.2, on schemas involving arrows with caveats on the arrow’ed relation, when the path to resolve a CheckPermission request involves the evaluation of multiple caveated branches, requests may return a negative response when a positive response is expected. Version 1.44.2 fixes the issue. As a workaround, do not use caveats in the schema over an arrow’ed relation.
[ { "commit_message": "[PATCH] fix: Checks involving relations with caveats can result in no permission when permission is expected internal/developmentmembership/membership.go | 3 +- internal/dispatch/graph/check_test.go | 92 ++++++++++++++++++- internal/graph/check.go | 3 + .../...
CWE-358: Improperly Implemented Security Check for Standard
CVE-2019-18857
darylldoyle svg-sanitizer before 0.12.0 mishandles script and data values in attributes, as demonstrated by unexpected whitespace such as in the javascript&#9;:alert substring.
[ { "commit_message": "[PATCH 1/2] Add test to show XSS bypass using encoded tab character tests/data/hrefCleanOne.svg | 2 ++ tests/data/hrefTestOne.svg | 2 ++ 2 files changed, 4 insertions(+)", "patch_text_b64": "RnJvbSA2YTg0ZDhkODU2YWIzOTdjODY1MTc0NzVkNzg3OWU3ZWM2N2RhYjE4IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQp...
n/a
GHSA-723h-x37g-f8qm
Chaosblade vulnerable to OS command execution
null
[ { "commit_message": "[PATCH] fix: Temporarily disable server mode. Signed-off-by: xcaspar <changjun.xcj@alibaba-inc.com> cli/cmd/cmd.go | 7 +------ cli/cmd/server_start.go | 17 ++--------------- 2 files changed, 3 insertions(+), 21 deletions(-)", "patch_text_b64": "RnJvbSA2YmM3M2MzMWUxNGVhMmIxYmZj...
null
PYSEC-2022-121
null
[ { "commit_message": "[PATCH] [lite] Add check for bias_size is zero to avoid division by zero. This shouldn't happen for properly converted models. Just safety check PiperOrigin-RevId: 416383645 Change-Id: If8e508bf696ae8ecfb927e69c139a8ccf7fe60cb tensorflow/lite/kernels/internal/common.h | 1 + 1 file changed, ...
null
CVE-2014-4678
The safe_eval function in Ansible before 1.6.4 does not properly restrict the code subset, which allows remote attackers to execute arbitrary code via crafted instructions. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-4657.
[ { "commit_message": "[PATCH] Change safe_eval to a strict white list lib/ansible/constants.py | 17 ++++++++++------- lib/ansible/utils/__init__.py | 26 ++++++++++++++++++-------- 2 files changed, 28 insertions(+), 15 deletions(-)", "patch_text_b64": "RnJvbSA1NDI5Yjg1YjlmNmMyZTY0MDA3NDE3NmYzNmZmMDVmZDVl...
Other
GHSA-4c32-w6c7-77x4
SQL injection when using MySQL/PostgreSQL data checking
null
[ { "commit_message": "[PATCH] fix the SQL Injection (#330) global/global.go | 19 +++++++ global/global_test.go | 9 +++ probe/client/mysql/mysql.go | 95 ++++++++++++++++++------------- probe/client/postgres/postgres.go | 12 ++-- 4 files changed, 89 insertions(+), 46 deletions(-...
null
CVE-2024-5851
playSMS SMS Schedule cross site scripting
A vulnerability classified as problematic has been found in playSMS up to 1.4.7. Affected is an unknown function of the file /index.php?app=main&inc=feature_schedule&op=list of the component SMS Schedule Handler. The manipulation of the argument name/message leads to basic cross site scripting. It is possible to launch the attack remotely. Upgrading to version 1.4.8 is able to address this issue. The name of the patch is 7a88920f6b536c6a91512e739bcb4e8adefeed2b. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-267912. NOTE: The code maintainer was contacted early about this disclosure and was eager to prepare a fix as quickly as possible.
[ { "commit_message": "[PATCH] sms schedule update v1.1: - format codes - remove error suppression from dba_*() - strip tags inputs with core_sanitize_string() - strip tags data with core_display_text() before displaying on web and export web/plugin/feature/schedule/config.php | 4 +- web/plugin/feature/sche...
CWE-80 Basic Cross Site Scripting
GHSA-r9gv-qffm-xw6f
Yeswiki Vulnerable to Unauthenticated Reflected Cross-site Scripting
null
[ { "commit_message": "[PATCH] fix(bazar): no html in template parameter tools/bazar/actions/BazarListeAction.php | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAxMDdkNDMwNTZhZGViYWEwYzczMTIzMGY5ZmQwMTA4OThlODhmM2Y1IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBGbG9yaWFuIFNjaG1...
null
CVE-2021-29502
Remote code execution in the WarnSystem module of Laggrons-Dumb-Cogs
WarnSystem is a cog (plugin) for the Red discord bot. A vulnerability has been found in the code that allows any user to access sensible informations by setting up a specific template which is not properly sanitized. The problem has been patched in version 1.3.18. Users should update and type `!warnsysteminfo` to check that their version is 1.3.18 or above. As a workaround users may unload the WarnSystem cog or disable the `!warnset description` command globally.
[ { "commit_message": "[PATCH] [WarnSystem] Safely format embed descriptions warnsystem/api.py | 39 ++++++++++++++++++++++++++++++++++++--- warnsystem/warnsystem.py | 2 +- 2 files changed, 37 insertions(+), 4 deletions(-)", "patch_text_b64": "RnJvbSBjNzlkZDJjYzg3OTk4OWNmMjAxOGU3NmJhMmFhZDBiYWVmM2I0ZWM...
{"CWE-74":"Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')"}
CVE-2025-10725
Openshift-ai: overly permissive clusterrole allows authenticated users to escalate privileges to cluster admin
A flaw was found in Red Hat Openshift AI Service. A low-privileged attacker with access to an authenticated account, for example as a data scientist using a standard Jupyter notebook, can escalate their privileges to a full cluster administrator. This allows for the complete compromise of the cluster's confidentiality, integrity, and availability. The attacker can steal sensitive data, disrupt all services, and take control of the underlying infrastructure, leading to a total breach of the platform and all applications hosted on it.
[ { "commit_message": "[PATCH] remove useless kueue-batch-user-rolebinding (#2571) Removed the config/kueue-configs/ directory and all associated references as the kueue-batch-user-rolebinding functionality is no longer needed. Dockerfiles/Dockerfile | 4 --- .../kueue-configs/batch-user-ro...
Incorrect Privilege Assignment
CVE-2017-2630
A stack buffer overflow flaw was found in the Quick Emulator (QEMU) before 2.9 built with the Network Block Device (NBD) client support. The flaw could occur while processing server's response to a 'NBD_OPT_LIST' request. A malicious NBD server could use this issue to crash a remote NBD client resulting in DoS or potentially execute arbitrary code on client host with privileges of the QEMU process.
[ { "commit_message": "[PATCH] nbd/client: fix drop_sync [CVE-2017-2630] MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Comparison symbol is misused. It may lead to memory corruption. Introduced in commit 7d3123e. Signed-off-by: Vladimir Sementsov-Ogievskiy <vsementsov@v...
CWE-121
GHSA-jq3w-9mgf-43m4
Fides Server-Side Request Forgery Vulnerability in Custom Integration Upload
null
[ { "commit_message": "[PATCH] Merge pull request from GHSA-jq3w-9mgf-43m4 * init * feat: add non-dev-mode verification for IP addresses * fix: static_checks * feat: add tests * cleanup * feat: add better error messaging if the hostname can't resolve * fix: docstring * fix: handle special cases for templated valu...
null
CVE-2025-46327
Go Snowflake Driver has race condition when checking access to Easy Logging configuration file
gosnowflake is the Snowflake Golang driver. Versions starting from 1.7.0 to before 1.13.3, are vulnerable to a Time-of-Check to Time-of-Use (TOCTOU) race condition. When using the Easy Logging feature on Linux and macOS, the Driver reads logging configuration from a user-provided file. On Linux and macOS the Driver verifies that the configuration file can be written to only by its owner. That check was vulnerable to a TOCTOU race condition and failed to verify that the file owner matches the user running the Driver. This could allow a local attacker with write access to the configuration file or the directory containing it to overwrite the configuration and gain control over logging level and output location. This issue has been patched in version 1.13.3.
[ { "commit_message": "[PATCH] SNOW-1155452 Fix race condition on perm checking for easy logging (#1382) client_configuration.go | 25 +++--------------------- client_configuration_test.go | 15 ++++++++++++++ os_specific_posix.go | 38 ++++++++++++++++++++++++++++++++++++ os_specific_windows.go |...
CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition
PYSEC-2019-106
null
[ { "commit_message": "[PATCH] CVE-2019-14751: Fixed security bug in downloader (https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14751) nltk/downloader.py | 36 +----------------------------------- 1 file changed, 1 insertion(+), 35 deletions(-)", "patch_text_b64": "RnJvbSBmNTlkN2VkOGRmMmUwZTk1N2Y3ZjI0...
null
CVE-2023-3700
Authorization Bypass Through User-Controlled Key in alextselegidis/easyappointments
Authorization Bypass Through User-Controlled Key in GitHub repository alextselegidis/easyappointments prior to 1.5.0.
[ { "commit_message": "[PATCH] Only allow authorized users to manage appointments from the calendar page (#1387) application/controllers/Calendar.php | 34 ++++++++++++++++++++++++---- 1 file changed, 30 insertions(+), 4 deletions(-)", "patch_text_b64": "RnJvbSBiMzdiNDYwMTk1NTMwODlkYjRmMjJlYjJmZTk5OGJjYTg0YjJj...
CWE-639 Authorization Bypass Through User-Controlled Key
GHSA-qhh5-9738-g9mx
Incorrect Default Permissions in Apache DolphinScheduler
null
[ { "commit_message": "[PATCH] modify general user can't create,delete,update token (#3538) Co-authored-by: qiaozhanwei <qiaozhanwei@analysys.com.cn> .../api/service/AccessTokenService.java | 15 +++++++-------- 1 file changed, 7 insertions(+), 8 deletions(-)", "patch_text_b64": "RnJvbSBiOGE5ZTJlMDBm...
null
GHSA-2rwj-7xq8-4gx4
Qwik has a potential mXSS vulnerability due to improper HTML escaping
null
[ { "commit_message": "[PATCH] Merge pull request from GHSA-2rwj-7xq8-4gx4 * chore: added more escapes * refactor: consolidated escape fn .../qwik/src/core/render/ssr/render-ssr.ts | 100 ++++++++---------- .../src/core/render/ssr/render-ssr.unit.tsx | 20 ++-- 2 files changed, 55 insertions(+), 65 deletions(...
null
CVE-2014-9870
The Linux kernel before 3.11 on ARM platforms, as used in Android before 2016-08-05 on Nexus 5 and 7 (2013) devices, does not properly consider user-space access to the TPIDRURW register, which allows local users to gain privileges via a crafted application, aka Android internal bug 28749743 and Qualcomm internal bug CR561044.
[ { "commit_message": "[PATCH] ARM: 7735/2: Preserve the user r/w register TPIDRURW on context switch and fork MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Since commit 6a1c53124aa1 the user writeable TLS register was zeroed to prevent it from being used as a covert ch...
n/a
CVE-2025-64499
Tuleap is missing CSRF protections for its planning management API
Tuleap is a free and open source suite for management of software development and collaboration. Tuleap Community Editon versions prior to 17.0.99.1762456922 and Tuleap Enterprise Edition versions prior to 17.0-2, 16.13-7 and 16.12-10 are vulnerable to CSRF attacks through planning management API. Attackers have access to create, edit or remove plans. This issue is fixed in Tuleap Community Edition version 17.0.99.1762456922 and Tuleap Enterprise Edtion versions 17.0-2, 16.13-7 and 16.12-10.
[ { "commit_message": "[PATCH] fix: request #45592 Missing CSRF protections on planning management actions Change-Id: Ic72da0ade84cec3fc7519ba89c9ba24b4f4f254f .../AgileDashboard/AdminController.php | 11 +++--- .../AgileDashboard/AdminScrumPresenter.php | 9 ++--- .../Admin/PlanningEditionPresenter.php ...
CWE-352: Cross-Site Request Forgery (CSRF)
GHSA-h3r8-h5qw-4r35
sidekiq vulnerable to cross-site scripting
null
[ { "commit_message": "[PATCH] Trim :period parameter to two characters and escape the value Changes.md | 7 +++++-- lib/sidekiq/version.rb | 2 +- lib/sidekiq/web/application.rb | 4 ++-- 3 files changed, 8 insertions(+), 5 deletions(-)", "patch_text_b64": "RnJvbSA0NThmZGY3NDE3NmE5OD...
null
CVE-2022-1942
Heap-based Buffer Overflow in vim/vim
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.
[ { "commit_message": "[PATCH] patch 8.2.5043: can open a cmdline window from a substitute expression Problem: Can open a cmdline window from a substitute expression. Solution: Disallow opening a command line window when text or buffer is locked. src/buffer.c | 7 +------ src/ex_getln.c ...
CWE-122 Heap-based Buffer Overflow
GHSA-27j2-c838-c3qg
Moodle Arbitrary File Read via XML External Entity vulnerability
null
[ { "commit_message": "[PATCH] MDL-45417 mod_imscp: Prevent entity injections from package content mod/imscp/locallib.php | 6 ++++++ 1 file changed, 6 insertions(+)", "patch_text_b64": "RnJvbSA1OTVlZjQ3NzJkMzMwYTIwYzc1NzYzNWFiMDkwYWNkY2M5YjJhMmZhIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBGcmVkZXJpYyBNYXNzYXJ0...
null
GHSA-vf5m-xrhm-v999
Nautobot missing object-level permissions enforcement when running Job Buttons
null
[ { "commit_message": "[PATCH] Fix object permissions enforcement on Job Buttons (#4993) * Fix object permissions enforcement on Job Buttons * s/SAFE_EMPTY/SAFE_EMPTY_STR/ * Improve return_url handling Co-authored-by: Gary Snider <75227981+gsnider2195@users.noreply.github.com> changes/4988.housekeeping ...
null
GHSA-6mpx-pmgp-ww49
Duplicate Advisory: Keycloak vulnerable to Cleartext Transmission of Sensitive Information
null
[ { "commit_message": "[PATCH] Fixing the condition for embedded cache MTLS encryption Closes #28750 Signed-off-by: Alexander Schwartz <aschwart@redhat.com> .../runtime/storage/legacy/infinispan/CacheManagerFactory.java | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAwNzEwMzJ...
null
GHSA-ghfh-p92w-j4mg
Elasticsearch Potential Node Crash due to Large Recursion in `innerForbidCircularReferences` Function
null
[ { "commit_message": "[PATCH] Improve performance of grok pattern cycle detection (#111947) (#112219) docs/changelog/111947.yaml | 5 + .../org/elasticsearch/grok/PatternBank.java | 144 +++++++++----- .../elasticsearch/grok/PatternBankTests.java | 179 ++++++++++++++++-- 3 files changed, 26...
null
GHSA-r3j2-7g54-8mxw
null
[ { "commit_message": "[PATCH] Progresses on grades change view and events. Discovered security vulnerability that allows a course admin to change whatever grade they want if they know the ID, even in other classes app/assets/javascripts/collections/grades.js | 18 +++++++-- app/assets/javascripts/models/grade.js...
null
CVE-2019-13304
ImageMagick 7.0.8-50 Q16 has a stack-based buffer overflow at coders/pnm.c in WritePNMImage because of a misplaced assignment.
[ { "commit_message": "[PATCH] https://github.com/ImageMagick/ImageMagick/issues/1614 coders/pnm.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBiZmEzYjk2MTBjODMyMjc4OTRjOTJiMGQzMTJhZDMyN2ZjZWI2MjQxIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBDcmlzdHkgPHVyYmFuLXdhcnJpb3JAaW1hZ...
n/a
CVE-2022-24754
Buffer overflow in pjsip
PJSIP is a free and open source multimedia communication library written in C language. In versions prior to and including 2.12 PJSIP there is a stack-buffer overflow vulnerability which only impacts PJSIP users who accept hashed digest credentials (credentials with data_type `PJSIP_CRED_DATA_DIGEST`). This issue has been patched in the master branch of the PJSIP repository and will be included with the next release. Users unable to upgrade need to check that the hashed digest data length must be equal to `PJSIP_MD5STRLEN` before passing to PJSIP.
[ { "commit_message": "[PATCH] Use PJ_ASSERT_RETURN() on pjsip_auth_create_digest() and pjsua_init_tpselector() (#3009) * Use PJ_ASSERT_RETURN on pjsip_auth_create_digest * Use PJ_ASSERT_RETURN on pjsua_init_tpselector() * Fix incorrect check. * Add return value to pjsip_auth_create_digest() and pjsip_auth_create...
CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
GHSA-mg5h-rhjq-6v84
phpMyFAQ vulnerable to reflected Cross-site Scripting
null
[ { "commit_message": "[PATCH] fix: added missing quoting for search terms phpmyfaq/index.php | 2 +- phpmyfaq/search.php | 2 +- phpmyfaq/src/phpMyFAQ/Strings.php | 6 +++--- 3 files changed, 5 insertions(+), 5 deletions(-)", "patch_text_b64": "RnJvbSBjNzkwNGYyMjM2YzZjMGRkNjRjMjIyNm...
null
CVE-2021-41173
DoS via maliciously crafted p2p message
Go Ethereum is the official Golang implementation of the Ethereum protocol. Prior to version 1.10.9, a vulnerable node is susceptible to crash when processing a maliciously crafted message from a peer. Version v1.10.9 contains patches to the vulnerability. There are no known workarounds aside from upgrading.
[ { "commit_message": "[PATCH] docs: update vulnerabilities with GHSA-59hh-656j-3p7v (#23801) docs/_vulnerabilities/vulnerabilities.json | 16 ++++++++++++++++ .../vulnerabilities.json.minisig | 6 +++--- 2 files changed, 19 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSBlNDBiM...
CWE-20: Improper Input Validation
GHSA-vh6j-wmcp-r6j7
null
[ { "commit_message": "[PATCH] csrf: tighten csrf code paths a little o restructure session open/close for better visibility o remove potentially insecure \"try again\" button o remove override for switching csrf off (defer) src/www/csrf/csrf-magic.php | 62 ++----------------------------------- src/www/guiconfig....
null
GHSA-q7gx-m2g7-jwx9
null
[ { "commit_message": "[PATCH] Adds isLinkLocalAddress() to address checks src/main/java/com/mxgraph/online/ProxyServlet.java | 1 + 1 file changed, 1 insertion(+)", "patch_text_b64": "RnJvbSBjZjVjNzhhYTBmMzEyN2ZiMTAwNTNkYjU1YjM5ZjMwMTdhMDY1NGFlIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBEYXZpZCBCZW5zb24gPGRhdm...
null
GHSA-7rpc-9m88-cf9w
OS Command Injection Vulnerability and Potential Zip Slip Vulnerability in baserCMS
null
[ { "commit_message": "[PATCH] Merge pull request from GHSA-7rpc-9m88-cf9w MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit * 固定ページプレビュー実行時に入力内容検証を追加 * SimpleZipの利用を停止しZipArchiveの利用に切り替え * 不要コード除去 * BcZip利用時、ZipArchiveをopenしていない場合エラーログが出力される問題を改善 .../admin-third/Installati...
null
CVE-2022-23623
Validation bypass in frourio
Frourio is a full stack framework, for TypeScript. Frourio users who uses frourio version prior to v0.26.0 and integration with class-validator through `validators/` folder are subject to a input validation vulnerability. Validators do not work properly for request bodies and queries in specific situations and some input is not validated at all. Users are advised to update frourio to v0.26.0 or later and to install `class-transformer` and `reflect-metadata`.
[ { "commit_message": "[PATCH] feat(validation): use class-transformer to support validation of nested objects __test__/index.spec.ts | 83 +++++++++++++++++++ package.json | 2 + servers/all/$server.ts | 18 ++-- .../api/users/_userId@n...
CWE-20: Improper Input Validation
CVE-2021-45927
MDB Tools (aka mdbtools) 0.9.2 has a stack-based buffer overflow (at 0x7ffd6e029ee0) in mdb_numeric_to_string (called from mdb_xfer_bound_data and _mdb_attempt_bind).
[ { "commit_message": "[PATCH] Version 0.9.3, final NEWS | 37 ++++++++++--------------------------- configure.ac | 2 +- 2 files changed, 11 insertions(+), 28 deletions(-)", "patch_text_b64": "RnJvbSAzNzNiN2ZmNGM0ZGFmODg3MjY5YzA3ODQwN2NiMTMzODk0MmM0ZWE2IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBFdmFuI...
n/a
CVE-2025-24803
Stored Cross-Site Scripting (XSS) in MobSF
Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework. According to Apple's documentation for bundle ID's, it must contain only alphanumeric characters (A–Z, a–z, and 0–9), hyphens (-), and periods (.). However, an attacker can manually modify this value in the `Info.plist` file and add special characters to the `<key>CFBundleIdentifier</key>` value. The `dynamic_analysis.html` file does not sanitize the received bundle value from Corellium and as a result, it is possible to break the HTML context and achieve Stored XSS. This issue has been addressed in version 4.3.1 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
[ { "commit_message": "[PATCH] [SECURITY] Security update to fix vulnerabilities reported by Positive Technologies researchers (#2488) * Fix Stored XSS in iOS Dynamic Analysis, GHSA-cxqq-w3x5-7ph3 * Fix DOS by loose re_path check and strict check inside function, GHSA-jrm8-xgf3-fwqr * Fix API Key leakage, replace...
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-26545
In the Linux kernel before 6.1.13, there is a double free in net/mpls/af_mpls.c upon an allocation failure (for registering the sysctl table under a new location) during the renaming of a device.
[ { "commit_message": "[PATCH] net: mpls: fix stale pointer if allocation fails during device rename lianhui reports that when MPLS fails to register the sysctl table under new location (during device rename) the old pointers won't get overwritten and may be freed again (double free). Handle this gracefully. The ...
n/a
GHSA-2vjq-hg5w-5gm7
OctoPrint has an Authentication Bypass via X-Forwarded-For Header when autologinLocal is enabled
null
[ { "commit_message": "[PATCH 01/11] =?UTF-8?q?=F0=9F=94=92=EF=B8=8F=20Fix=20an=20authen?= =?UTF-8?q?tication=20bypass=20through=20autologin=20&=20manipulated=20hea?= =?UTF-8?q?ders?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit See GHSA-2vjq-hg5w-5gm7 src/octoprint/sc...
null
CVE-2024-47533
Cobbler allows anyone to connect to cobbler XML-RPC server with a known password and make changes
Cobbler, a Linux installation server that allows for rapid setup of network installation environments, has an improper authentication vulnerability starting in version 3.0.0 and prior to versions 3.2.3 and 3.3.7. `utils.get_shared_secret()` always returns `-1`, which allows anyone to connect to cobbler XML-RPC as user `''` password `-1` and make any changes. This gives anyone with network access to a cobbler server full control of the server. Versions 3.2.3 and 3.3.7 fix the issue.
[ { "commit_message": "[PATCH] Use utf-8 encoding for md5 handling and web.ss data. cobbler/modules/authn_configfile.py | 2 +- cobbler/utils.py | 4 ++-- 2 files changed, 3 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSAzMmM1Y2FkYTAxM2RjOGRhYTczMjBhOGVkYTk5MzJjMjgxNDc0MmIwIE1vbiBT...
CWE-287: Improper Authentication
CVE-2025-47929
DumbDrop vulnerable to DOM XSS via file upload
DumbDrop, a file upload application that provides an interface for dragging and dropping files, has a DOM cross-site scripting vulnerability in the upload functionality prior to commit db27b25372eb9071e63583d8faed2111a2b79f1b. A user could be tricked into uploading a file with a malicious payload. Commit db27b25372eb9071e63583d8faed2111a2b79f1b fixes the vulnerability.
[ { "commit_message": "[PATCH] Add html escaping to frontend uploader for xss security replace innerhtml to textcontent package-lock.json | 12 ++++++------ public/index.html | 20 ++++++++++++++++---- 2 files changed, 22 insertions(+), 10 deletions(-)", "patch_text_b64": "RnJvbSAxODM1ZjYxMWRhYWIzMTBhNGI0MzkwZj...
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-7575
Zavy86 WikiDocs submit.php image_delete_ajax path traversal
A vulnerability has been found in Zavy86 WikiDocs up to 1.0.77 and classified as critical. Affected by this vulnerability is the function image_drop_upload_ajax/image_delete_ajax of the file submit.php. The manipulation leads to path traversal. The attack can be launched remotely. Upgrading to version 1.0.78 is able to address this issue. The identifier of the patch is 98ea9ee4a2052c4327f89d2f7688cc1b5749450d. It is recommended to upgrade the affected component.
[ { "commit_message": "[PATCH] Update submit.php submit.php | 17 +++++++++++++++-- 1 file changed, 15 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSA5OGVhOWVlNGEyMDUyYzQzMjdmODlkMmY3Njg4Y2MxYjU3NDk0NTBkIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBNYXRhbiBTYW5kb3JpIDw4Mzg2NzQ3NytNYXRhblNhbmRvcmlAdXNlc...
Path Traversal
GHSA-wc9w-8x8g-533g
null
[ { "commit_message": "[PATCH] KEYS: close race between key lookup and freeing When a key is being garbage collected, it's key->user would get put before the ->destroy() callback is called, where the key is removed from it's respective tracking structures. This leaves a key hanging in a semi-invalid state which l...
null
GHSA-88jx-383q-w4qc
Cosign malicious attachments can cause system-wide denial of service
null
[ { "commit_message": "[PATCH] Fixes for GHSA-88jx-383q-w4qc and GHSA-95pr-fxf5-86gv (#3661) * Merge pull request from GHSA-95pr-fxf5-86gv An Image may come from an untrusted source and contain an unknown number of signatures in the .sig manifest. A common pattern in cosign is to use the number of signatures as t...
null
GHSA-q43x-79jr-cq98
tarteaucitron.js vulnerable to DOM Clobbering via document.currentScript
null
[ { "commit_message": "[PATCH] Security: avoid a DOM clobbering on document.currentScript tarteaucitron.js | 7 +++++-- tarteaucitron.min.js | 2 +- 2 files changed, 6 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSAyMzBhM2I2OWQzNjM4MzdhY2ZhODk1ODIzZDg0MWUwNjA4ODI2YmEzIE1vbiBTZXAgMTcgMDA6MDA6MDAgM...
null
GHSA-pxrw-j2fv-hx3h
TensorFlow vulnerable to OOB read in `Gather_nd` in TF Lite
null
[ { "commit_message": "[PATCH] Return a TFLite error if gather_nd will result in reading invalid memory PiperOrigin-RevId: 463054033 tensorflow/lite/kernels/gather_nd.cc | 24 +++++++++++-------- tensorflow/lite/kernels/gather_nd_test.cc | 16 +++++++++++++ .../internal/reference/reference_ops.h ...
null
CVE-2015-10033
jvvlee MerlinsBoard Grade improper authorization
A vulnerability, which was classified as problematic, was found in jvvlee MerlinsBoard. This affects an unknown part of the component Grade Handler. The manipulation leads to improper authorization. The identifier of the patch is 134f5481e2914b7f096cd92a22b1e6bcb8e6dfe5. It is recommended to apply a patch to fix this issue. The identifier VDB-217713 was assigned to this vulnerability.
[ { "commit_message": "[PATCH] Progresses on grades change view and events. Discovered security vulnerability that allows a course admin to change whatever grade they want if they know the ID, even in other classes app/assets/javascripts/collections/grades.js | 18 +++++++-- app/assets/javascripts/models/grade.js...
CWE-285 Improper Authorization
CVE-2025-62366
Mailgen vulnerable to HTML injection and cross-site scripting via plaintext email generation
mailgen is a Node.js package that generates responsive HTML e-mails for sending transactional mail. Mailgen versions through 2.0.30 contain an HTML injection vulnerability in plaintext emails produced by the generatePlaintext method when user‑generated content is supplied. The function attempts to remove HTML tags, but if tags are provided as encoded HTML entities they are not removed and are later decoded, resulting in active HTML (for example an img tag with an event handler) in the supposed plaintext output. In contexts where the generated plaintext string is subsequently rendered as HTML, this can allow execution of attacker‑controlled JavaScript. Versions 2.0.31 and later contain a fix. No known workarounds exist.
[ { "commit_message": "[PATCH] index.js: Fix additional HTML injection security issue in plaintext e-mails (thanks @edoardottt) index.js | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSA3Mjc5YTk4MzQ4MWQwNWM1MWFhNDUxZTg2MTQ2Zjk4YWFhNDJmZWU5IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwM...
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
GHSA-g3h8-cg9x-47qw
Kirby Panel users could upload PHP Phar archives as content files before v2.5.14 and v3.4.5
null
[ { "commit_message": "[PATCH] Prevent phar upload in file upload validation app/src/panel/models/page/uploader.php | 18 +++++++++--------- 1 file changed, 9 insertions(+), 9 deletions(-)", "patch_text_b64": "RnJvbSA1YTU2OWQ0ZTNkZGFlYTJiNjYyOGQ3ZWMxNDcyYTNlOGJjNDEwODgxIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tO...
null