id
stringlengths
12
19
title
stringlengths
0
237
description
stringlengths
35
3.87k
patches
listlengths
1
22
cwe
stringlengths
2
440
PYSEC-2021-690
null
[ { "commit_message": "[PATCH] Fix multiple issues in EditDistance PiperOrigin-RevId: 372033948 Change-Id: Ieb957c29894af05bdfeb1a0402fced808dfcfd7b tensorflow/core/kernels/edit_distance_op.cc | 47 +++++++++++++++++++++ 1 file changed, 47 insertions(+)", "patch_text_b64": "RnJvbSBmNGMzNjRhNWQ2ODgwNTU3ZjZmNWI2...
null
GHSA-rcfr-q8x3-q62p
null
[ { "commit_message": "[PATCH] Secunia 81800#1: samsumg_load_raw Secunia 81800#2: find_green Secunia 81800#3: rollei_load_raw remove_trailing_spaces: isspace() does not works right with signed non-latin chars Secunia 81800#5/6: nikon_coolscan_load_raw Secunia 81800#4: rollei_load_raw dcraw/dcraw.c | 1...
null
CVE-2016-8645
The TCP stack in the Linux kernel before 4.8.10 mishandles skb truncation, which allows local users to cause a denial of service (system crash) via a crafted application that makes sendto system calls, related to net/ipv4/tcp_ipv4.c and net/ipv6/tcp_ipv6.c.
[ { "commit_message": "[PATCH] tcp: take care of truncations done by sk_filter() With syzkaller help, Marco Grassi found a bug in TCP stack, crashing in tcp_collapse() Root cause is that sk_filter() can truncate the incoming skb, but TCP stack was not really expecting this to happen. It probably was expecting a s...
n/a
GHSA-5jwv-m8h3-69cg
phpMyFaq Cross-site Scripting vulnerability
null
[ { "commit_message": "[PATCH] fix: allow only valid URLs for instances phpmyfaq/admin/ajax.config.php | 7 +++++++ phpmyfaq/admin/instances.php | 27 ++++++++++++++++++--------- 2 files changed, 25 insertions(+), 9 deletions(-)", "patch_text_b64": "RnJvbSBlYzU1MWJkZjE1NjZlZGUxZTU1ZjI4OTg4OGM0NDZmODc3YWQ5YTg...
null
GHSA-9wf6-6h7r-6q4w
null
[ { "commit_message": "[PATCH] tipc: fix info leaks via msg_name in recv_msg/recv_stream The code in set_orig_addr() does not initialize all of the members of struct sockaddr_tipc when filling the sockaddr info -- namely the union is only partly filled. This will make recv_msg() and recv_stream() -- the only user...
null
CVE-2014-9756
The psf_fwrite function in file_io.c in libsndfile allows attackers to cause a denial of service (divide-by-zero error and application crash) via unspecified vectors related to the headindex variable.
[ { "commit_message": "[PATCH] src/file_io.c : Prevent potential divide-by-zero. Closes: https://github.com/erikd/libsndfile/issues/92 src/file_io.c | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA3MjVjN2RiYjk1YmZhZjhiNGJiN2IwNDgyMGUzYTAwY2NlZWE5Y2U2IE1vbiBTZXAgMTcgMDA6MDA...
n/a
CVE-2025-32015
FreshRSS vulnerable to Cross-site Scripting by embedding <script> tag inside <iframe srcdoc>
FreshRSS is a self-hosted RSS feed aggregator. Prior to version 1.26.2, HTML is sanitized improperly inside the `<iframe srcdoc>` attribute, which leads to cross-site scripting (XSS) by loading an attacker's UserJS inside `<script src>`. In order to execute the attack, the attacker needs to control one of the victim's feeds and have an account on the FreshRSS instance that the victim is using. An attacker can gain access to the victim's account by exploiting this vulnerability. If the victim is an admin it would be possible to delete all users (cause damage) or execute arbitrary code on the server by modifying the update URL using fetch() via the XSS. Version 1.26.2 contains a patch for the issue.
[ { "commit_message": "[PATCH] Disallow iframe srcdoc for now (#7494) We do not sanitize this attribute well enough, so striped for now. It is rarely used: I have not seen any use of it in any of my many test feeds. Can be added back when we can handle its inherent security issues better. lib/lib_rss.php | 2 +- 1...
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
GHSA-qj56-r3xc-5qwh
null
[ { "commit_message": "[PATCH] xss: AJAX Paths This mitigates a vulnerability reported by indevi0us where XSS is possible via some AJAX paths. include/class.osticket.php | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSAzNDNhMmI0N2UxNjRkZDkwOTBhM2M5NDc3ZWYyNzNmMGVmYTE2YTdkIE...
null
CVE-2025-53909
mailcow: dockerized vulnerable to SSTI in Quota and Quarantine Notification Template
mailcow: dockerized is an open source groupware/email suite based on docker. A Server-Side Template Injection (SSTI) vulnerability exists in versions prior to 2025-07 in the notification template system used by mailcow for sending quota and quarantine alerts. The template rendering engine allows template expressions that may be abused to execute code in certain contexts. The issue requires admin-level access to mailcow UI to configure templates, which are automatically rendered during normal system operation. Version 2025-07 contains a patch for the issue.
[ { "commit_message": "[PATCH] [Dovecot] Use Jinja2 sandbox for rendering quota and quarantine notifications data/Dockerfiles/dovecot/quarantine_notify.py | 28 +++++++++++-------- data/Dockerfiles/dovecot/quota_notify.py | 24 ++++++++++------ docker-compose.yml | 2 +- 3 files chan...
CWE-1336: Improper Neutralization of Special Elements Used in a Template Engine
CVE-2025-64495
Open WebUI vulnerable to Stored DOM XSS via prompts when 'Insert Prompt as Rich Text' is enabled resulting in ATO/RCE
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. In versions 0.6.34 and below, the functionality that inserts custom prompts into the chat window is vulnerable to DOM XSS when 'Insert Prompt as Rich Text' is enabled, since the prompt body is assigned to the DOM sink .innerHtml without sanitisation. Any user with permissions to create prompts can abuse this to plant a payload that could be triggered by other users if they run the corresponding / command to insert the prompt. This issue is fixed in version 0.6.35.
[ { "commit_message": "[PATCH] refac/fix: insert prompt as rich text src/lib/components/common/RichTextInput.svelte | 16 ++++++++++------ 1 file changed, 10 insertions(+), 6 deletions(-)", "patch_text_b64": "RnJvbSBlYjljNGMwZTM1OGMyNzRhZWEzNWYyMWMyODU2YzBhMjAwNTFlNWYxIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOi...
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
GHSA-59hf-mpf8-pqjh
Mattermost fails to strip `embeds` from `metadata` when broadcasting `posted` events
null
[ { "commit_message": "[PATCH] Cleanup post embed for WebSocket payload (#27763) * Cleanup post embed for WebSocket payload * Removing post embeds in create post API * Fixed a nil check: * Removed a now-irrelavent test Co-authored-by: Mattermost Build <build@mattermost.com> server/channels/app/post_metadata.go | ...
null
CVE-2024-1724
snapd allows $HOME/bin symlink
In snapd versions prior to 2.62, when using AppArmor for enforcement of sandbox permissions, snapd failed to restrict writes to the $HOME/bin path. In Ubuntu, when this path exists, it is automatically added to the users PATH. An attacker who could convince a user to install a malicious snap which used the 'home' plug could use this vulnerability to install arbitrary scripts into the users PATH which may then be run by the user outside of the expected snap sandbox and hence allow them to escape confinement.
[ { "commit_message": "[PATCH] interfaces/builtin/home: add apparmor rule Signed-off-by: Zeyad Gouda <zeyad.gouda@canonical.com> interfaces/builtin/home.go | 1 + interfaces/builtin/home_test.go | 2 ++ 2 files changed, 3 insertions(+)", "patch_text_b64": "RnJvbSBhYTE5MWY5NzcxM2RlOGRjM2NlM2FjODE4NTM5ZjBiOT...
CWE-732 Incorrect Permission Assignment for Critical Resource
GHSA-4wv2-475w-c2fw
null
[ { "commit_message": "[PATCH] ofp-group: Don't assert-fail decoding bad OF1.5 group mod type or command. When decoding a group mod, the current code validates the group type and command after the whole group mod has been decoded. The OF1.5 decoder, however, tries to use the type and command earlier, when it mig...
null
CVE-2017-16877
ZEIT Next.js before 2.4.1 has directory traversal under the /_next and /static request namespace, allowing attackers to obtain sensitive information.
[ { "commit_message": "[PATCH] Implement the fix. server/index.js | 19 ++++++++++++++++++- 1 file changed, 18 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA0M2M0NDdlZGQwYzIzZGI1YTlhY2M0NzdiZWZhNzdhNDI4MjZkMWEzIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBBcnVub2RhIFN1c2lyaXBhbGEgPGFydW5vZGEuc3VzaXJpcG...
n/a
CVE-2023-38408
The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.
[ { "commit_message": "[PATCH] Ensure FIDO/PKCS11 libraries contain expected symbols This checks via nlist(3) that candidate provider libraries contain one of the symbols that we will require prior to dlopen(), which can cause a number of side effects, including execution of constructors. Feedback deraadt; ok mar...
n/a
CVE-2022-23067
ToolJet - Token Leakage via Referer Header
ToolJet versions v0.5.0 to v1.2.2 are vulnerable to token leakage via Referer header that leads to account takeover . If the user opens the invite link/signup link and then clicks on any external links within the page, it leaks the password set token/signup token in the referer header. Using these tokens the attacker can access the user’s account.
[ { "commit_message": "[PATCH] Fix token present in referrer header (#2413) frontend/src/App/App.jsx | 17 ++++++++++++++--- .../ConfirmationPage.jsx} | 8 ++++---- frontend/src/ConfirmationPage/index.js | 1 + frontend/src/InvitationPage/index.js | ...
CWE-200 Information Exposure
GHSA-3rhm-67j6-42jq
Exposure of Sensitive information in authentikat-jwt
null
[ { "commit_message": "[PATCH] Use constant-time string comparison for sigs Fixed #12 src/main/scala/authentikat/jwt/JsonWebToken.scala | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAyZDJmYTBkNDBhYzhmMmY3YWE3ZTliMDcwZmExYTI1ZWVlMDgyY2IwIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9t...
null
GHSA-r5ph-4jxm-6j9p
LF Edge eKuiper has a SQL Injection in sqlKvStore
null
[ { "commit_message": "[PATCH] fix: use prepared stmt in sql (#3100) Signed-off-by: Song Gao <disxiaofei@163.com> internal/pkg/store/sql/sqlKv.go | 31 ++++++++++++++++++++++--------- internal/pkg/store/sql/sqlTs.go | 24 ++++++++++++++++++------ 2 files changed, 40 insertions(+), 15 deletions(-)", "patch_text_...
null
CVE-2022-1339
SQL injection in ElementController.php in pimcore/pimcore
SQL injection in ElementController.php in GitHub repository pimcore/pimcore prior to 10.3.5. This vulnerability is capable of steal the data
[ { "commit_message": "[PATCH] Added Quote In Condition Filters .../Controller/Admin/ElementController.php | 11 +++++------ .../Controller/Admin/RecyclebinController.php | 2 +- 2 files changed, 6 insertions(+), 7 deletions(-)", "patch_text_b64": "RnJvbSBhZGFlM2JlNjQ0Mjc0NjZiZjBkZjE1Y2VhZWE...
CWE-89 Improper Neutralization of Special Elements used in an SQL Command
GHSA-x3cf-w64x-4cp2
Symfony Path Disclosure
null
[ { "commit_message": "[PATCH] [Form] Filter file uploads out of regular form types .../Form/Extension/Core/Type/FileType.php | 1 + .../Form/Extension/Core/Type/FormType.php | 1 + src/Symfony/Component/Form/Form.php | 9 +++++++++ .../Component/Form/Tests/CompoundFormTest.php | 17 ++++...
null
GHSA-vchg-jq4g-j9q7
null
[ { "commit_message": "[PATCH] Fix seqset iterator when it ends in a comma If the seqset ended with a comma, the substr_end marker would be just before the trailing nul. In the next call, the loop to skip the marker would iterate right past the end of string too. The fix is simple: place the substr_end marker an...
null
CVE-2023-46927
GPAC 2.3-DEV-rev605-gfc9e29089-master contains a heap-buffer-overflow in gf_isom_use_compact_size gpac/src/isomedia/isom_write.c:3403:3 in gpac/MP4Box.
[ { "commit_message": "[PATCH] gf_isom_use_compact_size() check sampleCount!=0 (fixes #2657) src/isomedia/isom_write.c | 13 ++++++------- 1 file changed, 6 insertions(+), 7 deletions(-)", "patch_text_b64": "RnJvbSBhN2I0NjdiMTUxZDliNTRiYWRiYzRkZDcxZTdhMzY2YjdjMzkxODE3IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiB...
n/a
GHSA-f734-p3hx-8cw4
null
[ { "commit_message": "[PATCH] Fix unsinking of IR_FSTORE for NULL metatable. Reported by pwnhacker0x18. #1147 src/lj_snap.c | 11 ++++++++--- 1 file changed, 8 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSA4NWI0ZmVkMGIwMzUzZGQ3OGM4Yzg3NWMyZjU2MmQ1MjJhMmIzMTBmIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9...
null
CVE-2018-17179
An issue was discovered in OpenEMR before 5.0.1 Patch 7. There is SQL Injection in the make_task function in /interface/forms/eye_mag/php/taskman_functions.php via /interface/forms/eye_mag/taskman.php.
[ { "commit_message": "[PATCH] bug fixes (#1790) interface/forms/eye_mag/php/taskman_functions.php | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-)", "patch_text_b64": "RnJvbSAzZTIyZDExYzcxNzVjMWViYmYzZDg2MjU0NWNlNmZlZTE4ZjcwNjE3IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBCcmFkeSBNaWxsZXIgPG...
n/a
GHSA-q4q5-c5cv-2p68
Vuetify Cross-site Scripting vulnerability
null
[ { "commit_message": "[PATCH] fix(VCalendar): prevent XSS from eventName function fixes #15757 BREAKING CHANGE: eventName can no longer render arbitrary HTML, convert to VNodes instead .../VCalendar/mixins/calendar-with-events.ts | 27 ++++++++++--------- packages/vuetify/types/index.d.ts | 4 +-- 2 ...
null
GHSA-jhmf-6w7j-g482
null
[ { "commit_message": "[PATCH] Patch serial # exploit. The serial # range needs to be checked or else the serial number is able to be incremented to a value that will create a valid proof, thus allowing multiple spends of a single mint. CoinSpend.cpp | 10 ++++++++++ CoinSpend.h | 1 + 2 files changed, 11 insert...
null
CVE-2020-7707
Prototype Pollution
The package property-expr before 2.0.3 are vulnerable to Prototype Pollution via the setter function.
[ { "commit_message": "[PATCH] fix: prototype polution vector compiler.js | 16 ++++++++++++---- index.js | 37 ++++++++++++++++++++++++------------- test.js | 25 ++++++++++++++++++++++--- 3 files changed, 58 insertions(+), 20 deletions(-)", "patch_text_b64": "RnJvbSBkZjg0NjkxMDkxNWQ1OWY3MTFjZTYzYzFmODE3...
Prototype Pollution
CVE-2020-5255
Prevent cache poisoning via a Response Content-Type header
In Symfony before versions 4.4.7 and 5.0.7, when a `Response` does not contain a `Content-Type` header, affected versions of Symfony can fallback to the format defined in the `Accept` header of the request, leading to a possible mismatch between the response&#39;s content and `Content-Type` header. When the response is cached, this can prevent the use of the website by other users. This has been patched in versions 4.4.7 and 5.0.7.
[ { "commit_message": "[PATCH] [HttpFoundation] Do not set the default Content-Type based on the Accept header .../ErrorRenderer/SerializerErrorRenderer.php | 9 ++++++++- src/Symfony/Component/HttpFoundation/Request.php | 4 +++- src/Symfony/Component/HttpFoundation/Response.php | 2 +- .../HttpFoundation/T...
CWE-435 Improper Interaction Between Multiple Correctly-Behaving Entities
CVE-2018-14361
An issue was discovered in NeoMutt before 2018-07-16. nntp.c proceeds even if memory allocation fails for messages data.
[ { "commit_message": "[PATCH] Add alloc fail check in nntp_fetch_headers nntp.c | 2 ++ 1 file changed, 2 insertions(+)", "patch_text_b64": "RnJvbSA5ZTkyN2FmZmUzYTAyMTE3NWYzNTRhZjVmYTAxZDIyNjU3YzIwNTg1IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBKZXJpa29PbmUgPGplcmlrby5vbmVAZ214LnVzPgpEYXRlOiBUdWUsIDMgSnVsIDIwM...
n/a
CVE-2025-24013
CodeIgniter validation of header name and value
CodeIgniter is a PHP full-stack web framework. Prior to 4.5.8, CodeIgniter lacked proper header validation for its name and value. The potential attacker can construct deliberately malformed headers with Header class. This could disrupt application functionality, potentially causing errors or generating invalid HTTP requests. In some cases, these malformed requests might lead to a DoS scenario if a remote service’s web application firewall interprets them as malicious and blocks further communication with the application. This vulnerability is fixed in 4.5.8.
[ { "commit_message": "[PATCH] Merge commit from fork Co-authored-by: neznaika0 <ozornick.ks@gmail.com> Co-authored-by: John Paul E. Balandan, CPA <paulbalandan@gmail.com> system/HTTP/Header.php | 72 +++++++++++++++++- tests/system/HTTP/HeaderTest.php | 81 +++++++++++++++++++++ use...
CWE-436: Interpretation Conflict
CVE-2023-34464
XWiki vulnerable to stored cross-site scripting via any wiki document and the displaycontent/rendercontent template
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Starting in version 2.2.1 until versions 14.4.8, 14.10.5, and 15.1RC1 of org.xwiki.platform:xwiki-platform-web and any version prior to 14.4.8, 14.10.5, and 15.1.RC1 of org.xwiki.platform:xwiki-platform-web-templates, any user who can edit a document in a wiki like the user profile can create a stored cross-site scripting attack. The attack occurs by putting plain HTML code into that document and then tricking another user to visit that document with the `displaycontent` or `rendercontent` template and plain output syntax. If a user with programming rights is tricked into visiting such a URL, arbitrary actions be performed with this user's rights, impacting the confidentiality, integrity, and availability of the whole XWiki installation. This has been patched in XWiki 14.4.8, 14.10.5 and 15.1RC1 by setting the content type of the response to plain text when the output syntax is not an HTML syntax.
[ { "commit_message": "[PATCH] XWIKI-20290: Set correct content type in rendercontent.vm * Set the content type to text/plain when the output syntax is not HTML * Add a page test .../main/resources/templates/rendercontent.vm | 15 +- .../org/xwiki/web/DisplaycontentPageTest.java | 131 ++++++++++++++++++ 2 files c...
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-33973
RIOT-OS vulnerable to NULL pointer dereference during NHC encoding
RIOT-OS, an operating system for Internet of Things (IoT) devices, contains a network stack with the ability to process 6LoWPAN frames. In versions 2023.01 and prior, an attacker can send a crafted frame which is forwarded by the device. During encoding of the packet a NULL pointer dereference occurs. This crashes the device leading to denial of service. A patch is available at pull request 19678. There are no known workarounds.
[ { "commit_message": "[PATCH] gnrc_sixlowpan_iphc: fix NULL pointer dereference .../sixlowpan/iphc/gnrc_sixlowpan_iphc.c | 16 +++++++++++++++- 1 file changed, 15 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBjOWQ3ODYzZTU2NjRhMTY5MDM1MDM4NjI4MDI5YmIwN2UwOTBjNWZmIE1vbiBTZXAgMTcgMDA6MDA6MDAgM...
CWE-476: NULL Pointer Dereference
CVE-2017-5608
Cross-site scripting (XSS) vulnerability in the image upload function in Piwigo before 2.8.6 allows remote attackers to inject arbitrary web script or HTML via a crafted image filename.
[ { "commit_message": "[PATCH] fixes #600, avoid html in web uploaded filenames action.php | 2 +- admin/include/functions_upload.inc.php | 5 +++++ 2 files changed, 6 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA2ZWMzZjJkMGZhZTA0MzdmMGMyY2M4YzQ3NWEyNmZiNmFlYjBkNGNiIE1vbi...
n/a
GHSA-r38m-cgpg-qj69
XWiki leaks password hashes and other accessible password properties
null
[ { "commit_message": "[PATCH] XWIKI-22811: Validate field names in DBList queries * Ensure that the specified fields are actually valid field names * Don't allow password and email fields * Add tests ...icitlyAllowedValuesDBListQueryBuilder.java | 81 ++++++++-- ...lyAllowedValuesDBListQueryBuilderTest.java | 13...
null
GHSA-vmg6-94hc-5vqp
null
[ { "commit_message": "[PATCH] Fix for CVE-2018-16790 -- Verify bounds before binary length read. As reported here: https://jira.mongodb.org/browse/CDRIVER-2819, a heap overread occurs due a failure to correctly verify data bounds. In the original check, len - o returns the data left including the sizeof(l) we ju...
null
GHSA-wq88-fq4x-h2pm
WiX Burn-based bundles are vulnerable to binary hijack when run as SYSTEM
null
[ { "commit_message": "[PATCH] Do not follow junctions when recursively deleting directories This will prevent elevated processes from accidentally following a junction from a user-writable directory to a per-machine directory and erroneously deleting the per-machine contents. Revert the mergemod.cub to pre-ARM6...
null
PYSEC-2023-275
null
[ { "commit_message": "[PATCH] fix: LEAP-237: Patch ORM Leak vulnerability in open source (#5012) * fix: LEAP-237: Patch ORM Leak vulnerability in open source * add further detail to docstring about security concern * fix bug where string starts with desc marker label_studio/core/settings/base.py | 8...
null
CVE-2017-1002150
python-fedora 0.8.0 and lower is vulnerable to an open redirect resulting in loss of CSRF protection
[ { "commit_message": "[PATCH] Disable covert redirects and CSRF token leaking This disallows the url() function from returning any remote URLs. This prevents covert redirects, and also prevents us from leaking CSRF tokens to outside parties. Signed-off-by: Patrick Uiterwijk <puiterwijk@redhat.com> fedora/tg/util...
CWE-601
GHSA-vg2r-rmgp-cgqj
Deno's --deny-write check does not prevent permission bypass
null
[ { "commit_message": "[PATCH] fix(fs): improve file utime checks (#30872) Improves the checks on FsFile.prototype.utime cli/rt/file_system.rs | 6 ++++++ ext/fs/lib.rs | 4 ++-- ext/fs/ops.rs | 18 ++++++++++++++-- ext/fs/std_fs.rs | 10 +++++++-- ext/io/fs.rs | 5 ++++...
null
PYSEC-2022-43016
null
[ { "commit_message": "[PATCH] Fix path traversal vulnerability. ubireader_extract_files could lead to path traversal when run against specifically crafted UBIFS files, allowing the attacker to overwrite files outside of the extraction directory (provided the process has write access to that file or directory). u...
null
GHSA-qpfw-4m9x-rxx8
Improper Privilege Management in Azure ms-rest-nodeauth
null
[ { "commit_message": "[PATCH] [CVE-2021-28458] Security Fix for Command Injection - huntr.dev (#117) Changelog.md | 3 +++ lib/login.ts | 4 ++-- package.json | 2 +- 3 files changed, 6 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSAxYjhkY2ZiNmQ3ZTFjOGEwYTAwMDQ0Mjg2MDIxYTg0MTk2MWNmNjM2IE1vbiBTZXAgMTc...
null
GHSA-pgpw-mqm2-h4m6
null
[ { "commit_message": "[PATCH] libvncserver: encodings: prevent OOB accesses libvncserver/corre.c | 2 +- libvncserver/hextile.c | 2 +- libvncserver/rre.c | 2 +- 3 files changed, 3 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSA3NGU4YTcwZjJjOWE1MjQ4ZDY3MThjZTQ0M2UwN2M3ZWQzMTRkZmZmIE1vbiBTZXAgM...
null
GHSA-hp46-5f8h-j7p8
null
[ { "commit_message": "[PATCH] Update contact_import.php app/contacts/contact_import.php | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSBjY2RiMjc1MzZkMzU0OWI1YzBjMzE3ZTM2NjVmZmYyMzE2MzFlYzc3IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBGdXNpb25QQlggPG1hcmtqY3JhbmVAZ21haWwuY29...
null
GHSA-mjf9-q9gc-82xc
null
[ { "commit_message": "[PATCH] RDS: Heap OOB write in rds_message_alloc_sgs() When args->nr_local is 0, nr_pages gets also 0 due some size calculation via rds_rm_size(), which is later used to allocate pages for DMA, this bug produces a heap Out-Of-Bound write access to a specific memory region. Signed-off-by: Mo...
null
GHSA-w7v9-fc49-4qg4
org.xwiki.platform:xwiki-platform-wiki-ui-mainwiki Eval Injection vulnerability
null
[ { "commit_message": "[PATCH] XWIKI-20297: Improved DeleteWiki error message escaping - Cleanup the unknown wiki error message in DeleteWiki - Make it easier to use the TestNoScriptMacro by moving it to xwiki-platform-test-page - Make it easier to use the translation macro in page tests .../AttachmentSelectorPa...
null
GHSA-85g2-29m8-qf2p
Prototype Pollution Vulnerability in object-collider
null
[ { "commit_message": "[PATCH] fix: __proto__ property merge src/utils/CollideUtil.ts | 17 ++++++----- test/unit/CollideUtilTestSuite.ts | 49 ++++++++++++++++++++++--------- 2 files changed, 44 insertions(+), 22 deletions(-)", "patch_text_b64": "RnJvbSAzMjFmNzVhN2Y4ZTdiMzM5M2U1YjdkZDZkZDlhYjI2ZWRlNTk...
null
GHSA-f69v-xrj8-rhxf
org.xwiki.platform:xwiki-platform-rest-server allows SQL injection in query endpoint of REST API
null
[ { "commit_message": "[PATCH] XWIKI-22718, XWIKI-22691: Improve query validation .../hibernate/query/HqlQueryExecutor.java | 36 +++++++++++++------ .../hibernate/query/HqlQueryUtilsTest.java | 2 ++ .../hibernate/query/HqlQueryExecutorTest.java | 11 +++--- .../search/AbstractDatabaseSearchSource.java | ...
null
CVE-2023-26119
Versions of the package net.sourceforge.htmlunit:htmlunit from 0 and before 3.0.0 are vulnerable to Remote Code Execution (RCE) via XSTL, when browsing the attacker’s webpage.
[ { "commit_message": "[PATCH] enable FEATURE_SECURE_PROCESSING for the XSLT processor src/changes/changes.xml | 3 + .../javascript/host/xml/XSLTProcessor.java | 6 + .../htmlunit/ErrorOutputChecker.java | 7 +- .../host/xml/XSLTProcessorTest.java | 110 ++++++++++++...
Remote Code Execution (RCE)
PYSEC-2021-595
null
[ { "commit_message": "[PATCH] Fix a null pointer exception caused by branching on uninitialized data. This is due to not checking that the params for the quantization exists. If there is no quantization, we should not access the `.params` field. PiperOrigin-RevId: 385163909 Change-Id: I2beb8d50649b6542db224c1630...
null
GHSA-42r6-p4px-qvv6
tgstation-server cached user logins in legacy server
null
[ { "commit_message": "[PATCH] Critical security fix [TGSDeploy] AssemblyInfo.global.cs | 6 +++--- TGS.ControlPanel/Login.cs | 6 ++++++ TGS.Interface/RemoteLoginInfo.cs | 4 ++-- TGS.Server/Security/AuthenticationHeaderDecoder.cs | 2 +- 4 files...
null
CVE-2026-21900
CryptoLib Has Out-of-Bounds Read in KMC Encrypt Metadata Parsing via Flawed strtok Pattern
CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. Prior to version 1.4.3, an out-of-bounds heap read vulnerability in cryptography_encrypt() occurs when parsing JSON metadata from KMC server responses. The flawed strtok iteration pattern uses ptr + strlen(ptr) + 1 which reads one byte past allocated buffer boundaries when processing short or malformed metadata strings. This issue has been patched in version 1.4.3.
[ { "commit_message": "[PATCH] Fix reference to SDSL standard The chapter describing the AAD construction in CCSDS 355.0-B-2 is 4.2.3 not 7.2.3 (this last one does not exist) src/core/crypto_aos.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSBjZThhNjhkMmYyNzU4OTI3MWZiZjQ...
CWE-125: Out-of-bounds Read
CVE-2025-49584
XWiki makes title of inaccessible pages available through the class property values REST API
XWiki is a generic wiki platform. In XWiki Platform versions 10.9 through 16.4.6, 16.5.0-rc-1 through 16.10.2, and 17.0.0-rc-1, the title of every single page whose reference is known can be accessed through the REST API as long as an XClass with a page property is accessible, this is the default for an XWiki installation. This allows an attacker to get titles of pages whose reference is known, one title per request. This doesn't affect fully private wikis as the REST endpoint checks access rights on the XClass definition. The impact on confidentiality depends on the strategy for page names. By default, page names match the title, so the impact should be low but if page names are intentionally obfuscated because the titles are sensitive, the impact could be high. This has been fixed in XWiki 16.4.7, 16.10.3 and 17.0.0 by adding access control checks before getting the title of any page.
[ { "commit_message": "[PATCH] XWIKI-22736: Improve right checks in property values provider MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit * Check VIEW right before rendering titles * Use generic icons when the specific icon can’t be accessed * Don't provide any metadat...
CWE-201: Insertion of Sensitive Information Into Sent Data
CVE-2021-37679
Heap OOB in nested `tf.map_fn` with `RaggedTensor`s in TensorFlow
TensorFlow is an end-to-end open source platform for machine learning. In affected versions it is possible to nest a `tf.map_fn` within another `tf.map_fn` call. However, if the input tensor is a `RaggedTensor` and there is no function signature provided, code assumes the output is a fully specified tensor and fills output buffer with uninitialized contents from the heap. The `t` and `z` outputs should be identical, however this is not the case. The last row of `t` contains data from the heap which can be used to leak other memory information. The bug lies in the conversion from a `Variant` tensor to a `RaggedTensor`. The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/kernels/ragged_tensor_from_variant_op.cc#L177-L190) does not check that all inner shapes match and this results in the additional dimensions. The same implementation can result in data loss, if input tensor is tweaked. We have patched the issue in GitHub commit 4e2565483d0ffcadc719bd44893fb7f609bb5f12. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
[ { "commit_message": "[PATCH] Fix bug that could cause map_fn to produce incorrect results (rather than an error) when mapping over a ragged tensor with an inappropriate fn_output_signature. (Note: there are cases where the default value for fn_output_signature is not appropriate, so the user needs to explicitl...
CWE-125: Out-of-bounds Read
GHSA-w546-43x5-c5vq
null
[ { "commit_message": "[PATCH] a-a-i-d-to-abrt-cache: make own random temporary directory The set-user-ID wrapper must use own new temporary directory in order to avoid security issues with unpacking specially crafted debuginfo packages that might be used to create files or symlinks anywhere on the file system as...
null
CVE-2012-2375
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-4131.
[ { "commit_message": "[PATCH] Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl l...
n/a
GHSA-r7v4-jwx9-wx43
Authorization Bypass Through User-Controlled Key when using CILogonOAuthenticator oauthenticator
null
[ { "commit_message": "[PATCH 01/40] Deprecate allowed_idps and add allowed_auth_providers and allowed_domains oauthenticator/cilogon.py | 98 +++++++++++++++++++++++++++++++++------ 1 file changed, 85 insertions(+), 13 deletions(-)", "patch_text_b64": "RnJvbSBkYzRmN2RhN2JjMmM5Y2VhYTFmYWM1ZWM1MzNmNWJlOTZlMDc4O...
null
CVE-2018-10757
CSP MySQL User Manager 2.3.1 allows SQL injection, and resultant Authentication Bypass, via a crafted username during a login attempt.
[ { "commit_message": "[PATCH] Check for invalid characters in username and password CHANGELOG | 1 + js/ajaxcalls.js | 16 ++++++++++++++++ js/cmum.js | 9 +++++++++ 3 files changed, 26 insertions(+)", "patch_text_b64": "RnJvbSBjODkxNThlYzY0NmM0ZThlOTU1ODdiNjUwZjZmZDg2YjUwMmZmOGI1IE1vbiBTZXAgMTcgMD...
n/a
PYSEC-2025-49
null
[ { "commit_message": "[PATCH] Add a check to ensure the name resolves relative to the tmpdir. Closes #4946 setuptools/package_index.py | 18 ++++++++++++++++-- 1 file changed, 16 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSAyNTBhNmQxNzk3OGY5ZjZhYzNhYzg4NzA5MWYyZDMyODg2ZmJiYjBiIE1vbiBTZXAgMTcgMDA6...
null
GHSA-3q9w-xvhm-rg6c
null
[ { "commit_message": "[PATCH] usb: gadget: rndis: check size of RNDIS_MSG_SET command Check the size of the RNDIS_MSG_SET command given to us before attempting to respond to an invalid message size. Reported-by: Szymon Heidrich <szymon.heidrich@gmail.com> Cc: stable@kernel.org Tested-by: Szymon Heidrich <szymon....
null
GHSA-95pr-fxf5-86gv
Cosign malicious artifacts can cause machine-wide DoS
null
[ { "commit_message": "[PATCH] Fixes for GHSA-88jx-383q-w4qc and GHSA-95pr-fxf5-86gv (#3661) * Merge pull request from GHSA-95pr-fxf5-86gv An Image may come from an untrusted source and contain an unknown number of signatures in the .sig manifest. A common pattern in cosign is to use the number of signatures as t...
null
CVE-2021-44078
An issue was discovered in split_region in uc.c in Unicorn Engine before 2.0.0-rc5. It allows local attackers to escape the sandbox. An attacker must first obtain the ability to execute crafted code in the target sandbox in order to exploit this vulnerability. The specific flaw exists within the virtual memory manager. The issue results from the faulty comparison of GVA and GPA while calling uc_mem_map_ptr to free part of a claimed memory block. An attacker can leverage this vulnerability to escape the sandbox and execute arbitrary code on the host machine.
[ { "commit_message": "[PATCH] Fix wrong offset used in split_region qemu/accel/tcg/translate-all.c | 4 +++- uc.c | 3 ++- 2 files changed, 5 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSBjNzMzYmJhZGEzNTZiMDM3M2ZhOGFhNzJjMDQ0NTc0YmI4NTVmZDI0IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAw...
n/a
GHSA-8qrm-2wm8-6v53
null
[ { "commit_message": "[PATCH] Fixing XSS on file names that fail to upload core/admin/ajax/file-browser/upload.php | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSBmZmQ2NjhhM2FhN2QyZjU0MGRiY2RmNTc1MWYyMDczMDI1MTlkZjcyIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBUaW0gQnVja...
null
GHSA-rf7h-9m85-535v
Jenkins Publisher Over CIFS Plugin confused deputy vulnerability
null
[ { "commit_message": "[PATCH] [SECURITY-975] .../descriptor/CifsPublisherPluginDescriptor.java | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA5NDAyZDhjMTA0NDUwOGMyZmMzMGE1ZGQxZTM0YWZlNjgxOTYxNmEwIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBBbGV4IEVhcmwgPHNsaWRlL...
null
CVE-2015-7566
The clie_5_attach function in drivers/usb/serial/visor.c in the Linux kernel through 4.4.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB device that lacks a bulk-out endpoint.
[ { "commit_message": "[PATCH] USB: serial: visor: fix crash on detecting device without write_urbs The visor driver crashes in clie_5_attach() when a specially crafted USB device without bulk-out endpoint is detected. This fix adds a check that the device has proper configuration expected by the driver. Reported...
n/a
CVE-2024-43802
heap-buffer-overflow in ins_typebuf() in Vim < 9.1.0697
Vim is an improved version of the unix vi text editor. When flushing the typeahead buffer, Vim moves the current position in the typeahead buffer but does not check whether there is enough space left in the buffer to handle the next characters. So this may lead to the tb_off position within the typebuf variable to point outside of the valid buffer size, which can then later lead to a heap-buffer overflow in e.g. ins_typebuf(). Therefore, when flushing the typeahead buffer, check if there is enough space left before advancing the off position. If not, fall back to flush current typebuf contents. It's not quite clear yet, what can lead to this situation. It seems to happen when error messages occur (which will cause Vim to flush the typeahead buffer) in comnination with several long mappgins and so it may eventually move the off position out of a valid buffer size. Impact is low since it is not easily reproducible and requires to have several mappings active and run into some error condition. But when this happens, this will cause a crash. The issue has been fixed as of Vim patch v9.1.0697. Users are advised to upgrade. There are no known workarounds for this issue.
[ { "commit_message": "[PATCH] patch 9.1.0697: [security]: heap-buffer-overflow in ins_typebuf Problem: heap-buffer-overflow in ins_typebuf (SuyueGuo) Solution: When flushing the typeahead buffer, validate that there is enough space left Github Advisory: https://github.com/vim/vim/security/advisories/GHSA-4ghr-c...
CWE-122: Heap-based Buffer Overflow
CVE-2017-12991
The BGP parser in tcpdump before 4.9.2 has a buffer over-read in print-bgp.c:bgp_attr_print().
[ { "commit_message": "[PATCH] CVE-2017-12991/BGP: Add missing bounds check. MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit This fixes a buffer over-read discovered by Forcepoint's security researchers Otto Airamo & Antti Levomäki. Add a test using the capture file suppl...
n/a
CVE-2014-1932
The (1) load_djpeg function in JpegImagePlugin.py, (2) Ghostscript function in EpsImagePlugin.py, (3) load function in IptcImagePlugin.py, and (4) _copy function in Image.py in Python Image Library (PIL) 1.1.7 and earlier and Pillow before 2.3.1 do not properly create temporary files, which allow local users to overwrite arbitrary files and obtain sensitive information via a symlink attack on the temporary file.
[ { "commit_message": "[PATCH] Removed tempfile.mktemp, fixes CVE-2014-1932 CVE-2014-1933, debian bug #737059 PIL/EpsImagePlugin.py | 3 ++- PIL/Image.py | 9 ++++++--- PIL/IptcImagePlugin.py | 4 ++-- PIL/JpegImagePlugin.py | 12 ++++++++---- 4 files changed, 18 insertions(+), 10 deletions(-)", "pa...
n/a
CVE-2025-21612
Cross-site Scripting in TabberTransclude in Extension:TabberNeue
TabberNeue is a MediaWiki extension that allows the wiki to create tabs. Prior to 2.7.2, TabberTransclude.php doesn't escape the user-supplied page name when outputting, so an XSS payload as the page name can be used here. This vulnerability is fixed in 2.7.2.
[ { "commit_message": "[PATCH] feat: allow tab content to be transclusions of other pages * Initial merge of the TabberTransclude extension from Ciencia * Tab content can now be fetched from other pages on the wiki. The content is lazy-loaded when the tab is selected through a XHR request. * Add a config option t...
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-26103
Versions of the package deno before 1.31.0 are vulnerable to Regular Expression Denial of Service (ReDoS) due to the upgradeWebSocket function, which contains regexes in the form of /s*,s*/, used for splitting the Connection/Upgrade header. A specially crafted Connection/Upgrade header can be used to significantly slow down a web socket server.
[ { "commit_message": "[PATCH] refactor(ext/http): use `String.prototype.trim()` instead of regex (#17722) ext/http/01_http.js | 11 +++++++---- 1 file changed, 7 insertions(+), 4 deletions(-)", "patch_text_b64": "RnJvbSBjZjA2YTdjN2U2NzI4ODBlMWIzODU5OGZlNDQ1ZTJjNTBiNGE5ZDA2IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGc...
Regular Expression Denial of Service (ReDoS)
GHSA-626r-cj47-p49g
Centreon insertGraphTemplate SQL Injection Remote Code Execution Vulnerability
null
[ { "commit_message": "[PATCH] fix(legacy): escape fields (#2464) Co-authored-by: Arnaud Buathier <abuathier@centreon.com> .../include/configuration/configObject/host/listHost.ihtml | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSBjNmVlMGY2NzU0NGE3MDUyNDUzOWIyNmU4ZWE5MjI...
null
GHSA-cmm2-4q45-jpgh
null
[ { "commit_message": "[PATCH] Fix flaws in LDAP DN checking KDB_TL_USER_INFO tl-data is intended to be internal to the LDAP KDB module, and not used in disk or wire principal entries. Prevent kadmin clients from sending KDB_TL_USER_INFO tl-data by giving it a type number less than 256 and filtering out type num...
null
CVE-2020-14405
An issue was discovered in LibVNCServer before 0.9.13. libvncclient/rfbproto.c does not limit TextChat size.
[ { "commit_message": "[PATCH] libvncclient/rfbproto: limit max textchat size Addresses GitHub Security Lab (GHSL) Vulnerability Report `GHSL-2020-063`. Re #275 libvncclient/rfbproto.c | 3 +++ 1 file changed, 3 insertions(+)", "patch_text_b64": "RnJvbSA4OTM3MjAzNDQxZWUyNDFjNGFjZTg1ZGE2ODdiN2Q2NjMzYTEyMzY1IE1v...
n/a
GHSA-8phr-637g-pxrg
LibreNMS Cross-site Scripting at Device groups Deletion feature
null
[ { "commit_message": "[PATCH] Fix a few XSS vulnerabilities in device group popups (#15581) I can't tell if the flasher ones are vulnerable, as flasher is still broken. app/Http/Controllers/DeviceGroupController.php | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSBmYWY2N...
null
GHSA-mgh8-hcwj-h57v
Improper Restriction of XML External Entity Reference in Apache Olingo
null
[ { "commit_message": "[PATCH] [OLINGO-1409] XML serializer defaults .../olingo/server/core/MetadataParser.java | 21 ++++++++++++------- .../xml/ODataXmlDeserializer.java | 2 ++ 2 files changed, 16 insertions(+), 7 deletions(-)", "patch_text_b64": "RnJvbSA1OTQ4OTc0YWQyODI3MTgxOGUyYWZlNzQ3YzcxY...
null
CVE-2017-15906
The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files.
[ { "commit_message": "[PATCH] disallow creation (of empty files) in read-only mode; reported by Michal Zalewski, feedback & ok deraadt@ usr.bin/ssh/sftp-server.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSBhNjk4MTU2N2U4ZTIxNWFjYzFlZjY5MGM4ZGJiMzBmMmQ5YjAwYTE5IE1vbiB...
n/a
GHSA-5v95-v8c8-3rh6
Privilege escalation in rbac
null
[ { "commit_message": "[PATCH] Merge pull request from GHSA-5v95-v8c8-3rh6 This fixes a security vulnerability where, with a carefully crafted request or malicious proxy, a user with UserWrite permissions could create another user with higher privileges than their own due to insufficient checks on the allowed set...
null
CVE-2023-34961
Chamilo v1.11.x up to v1.11.18 was discovered to contain a cross-site scripting (XSS) vulnerability via the /feedback/comment field.
[ { "commit_message": "[PATCH] Work: Remove xss for comment list main/template/default/work/comments.tpl | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA4MGQxYThjOTA2M2EyMGYyODZiMDE5NWVmNTM3Yzg0YTFhMTE4NzVhIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBBbmdlbCBGZXJuYW5kbyBRdWlyb3o...
n/a
CVE-2022-39379
Fluentd vulnerable to remote code execution due to insecure deserialization (in non-default configuration)
Fluentd collects events from various data sources and writes them to files, RDBMS, NoSQL, IaaS, SaaS, Hadoop and so on. A remote code execution (RCE) vulnerability in non-default configurations of Fluentd allows unauthenticated attackers to execute arbitrary code via specially crafted JSON payloads. Fluentd setups are only affected if the environment variable `FLUENT_OJ_OPTION_MODE` is explicitly set to `object`. Please note: The option FLUENT_OJ_OPTION_MODE was introduced in Fluentd version 1.13.2. Earlier versions of Fluentd are not affected by this vulnerability. This issue was patched in version 1.15.3. As a workaround do not use `FLUENT_OJ_OPTION_MODE=object`.
[ { "commit_message": "[PATCH] Remove `object` from the available list of `FLUENT_OJ_OPTION_MODE` There is less benefit by this option in actual, and it will instroduce serious security risk since it can execute arbitrary Ruby code. We remove it since keeping it secure is difficult. ref: GHSL-2022-067 Signed-off-...
CWE-502: Deserialization of Untrusted Data
GHSA-277f-37gw-9gmq
raspap-webgui has a Directory Traversal vulnerability
null
[ { "commit_message": "[PATCH] fix: mitigate UUF vulnerability by escaping entity with escapeshellarg ajax/networking/get_wgkey.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBlYjUzYzQ2YzMzNjM4NGQ3ODMzNmIwMjFhZGVhOTRkOTI1N2UxZDY3IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBT...
null
GHSA-x3pf-j9xx-29g6
null
[ { "commit_message": "[PATCH] rpk: do not modify redpanda.rpc_server_tls field rpk now will treat this field like an unmanaged field, which means that we can have either a list, or an element, and rpk will respect that. src/go/rpk/pkg/cli/cmd/debug/bundle_linux.go | 1 - src/go/rpk/pkg/config/schema.go ...
null
GHSA-494h-9924-xww9
Pterodactyl Wings vulnerable to improper isolation of server file access
null
[ { "commit_message": "[PATCH] server(filesystem): rebuild everything imaginable This wonderfully large commit replaces basically everything under the `server/filesystem` package, re-implementing essentially everything. This is related to https://github.com/pterodactyl/wings/security/advisories/GHSA-494h-9924-xww...
null
GHSA-438r-9269-8f2c
null
[ { "commit_message": "[PATCH] fix a possible vulnerability and add some comments framework/core/subsystems/expRouter.php | 147 +++++++++--------- .../blog/controllers/blogController.php | 2 +- .../search/controllers/searchController.php | 9 +- 3 files changed, 81 insertions(+), 77 deletions(-)"...
null
GHSA-qx9h-c5v6-ghqh
org.xwiki.platform:xwiki-platform-panels-ui Eval Injection vulnerability
null
[ { "commit_message": "[PATCH] XWIKI-20293: Improved IncludedDocuments panel escaping .../src/main/resources/Panels/IncludedDocuments.xml | 7 +++++-- 1 file changed, 5 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSA1MGI0ZDkxNDE4YjQxNTA5MzNmMDMxN2ViNGE5NGNlYWY1YjY5ZjY3IE1vbiBTZXAgMTcgMDA6MDA6...
null
GHSA-q5w4-h927-6jj8
null
[ { "commit_message": "[PATCH] =?UTF-8?q?SQL=E3=82=A4=E3=83=B3=E3=82=B8=E3=82=A7?= =?UTF-8?q?=E3=82=AF=E3=82=B7=E3=83=A7=E3=83=B3=E3=81=AB=E3=82=88=E3=82=8A?= =?UTF-8?q?=E3=80=81=E6=83=85=E5=A0=B1=E3=82=92=E4=B8=8D=E6=AD=A3=E5=8F=96?= =?UTF-8?q?=E5=BE=97=E3=81=A7=E3=81=8D=E3=81=A6=E3=81=97=E3=81=BE=E3=81=86?= =?U...
null
GHSA-hh8p-374f-qgr5
Grafana plugin data sources vulnerable to access control bypass
null
[ { "commit_message": "[PATCH] RBAC: Allow plugins to use scoped actions (#90945) Co-authored-by: gamab <gabriel.mabille@grafana.com> pkg/api/pluginproxy/ds_proxy.go | 10 +- pkg/api/pluginproxy/ds_proxy_test.go | 56 ++++- pkg/api/pluginproxy/pluginproxy.go | 4 +- pkg/api/plug...
null
CVE-2024-52787
An issue in the upload_documents method of libre-chat v0.0.6 allows attackers to execute a path traversal via supplying a crafted filename in an uploaded file.
[ { "commit_message": "[PATCH] Fix Path Traversal issue src/libre_chat/router.py | 9 ++++++++- 1 file changed, 8 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBkNDUwNjI5MWNmZDRlMTY1YmYyODYzZTBlYmMwYjNmM2RmMzE3YTg1IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBqeGZ6enp0IDwxMTYwNDkwNjI1QHFxLmNvbT4KRGF0ZTo...
n/a
CVE-2012-1190
Cross-site scripting (XSS) vulnerability in the replication-setup functionality in js/replication.js in phpMyAdmin 3.4.x before 3.4.10.1 allows user-assisted remote attackers to inject arbitrary web script or HTML via a crafted database name.
[ { "commit_message": "[PATCH] Do not put database names as html js/replication.js | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-)", "patch_text_b64": "RnJvbSA4NjA3M2Q1MzJhZWQ2NTY1NTBjYjczMWFhNWI0Mjg4YjEyNmFlN2E2IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiA9P1VURi04P3E/TWljaGFsPTIwPUM0PThDaWhhPU...
n/a
GHSA-jrwr-5x3p-hvc3
markdown-it-py Denial of Service vulnerability in the command line interface
null
[ { "commit_message": "[PATCH] =?UTF-8?q?=F0=9F=90=9B=20FIX:=20CLI=20crash=20on=20non-ut?= =?UTF-8?q?f8=20character=20(#247)?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Addresses CVE-2023-26302 markdown_it/cli/parse.py | 2 +- tests/test_cli.py | 7 +++++++ 2 f...
null
CVE-2018-11688
Ignite Realtime Openfire before 3.9.2 is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote attacker could exploit this vulnerability via a crafted URL to execute script in a victim's Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.
[ { "commit_message": "[PATCH] xss filter src/web/audit-policy.jsp | 11 ++--- src/web/available-plugins.jsp | 55 ++++++++++++------------ src/web/clearspace-status.jsp | 11 ++--- src/web/component-session-details.jsp | 13 +++--- src/web/component-session-summary.jsp | ...
n/a
GHSA-w7f2-6896-6mm2
Liferay Portal and Liferay DXP allows arbitrary injection via web content template names
null
[ { "commit_message": "[PATCH] LPS-117985 Escape template name to avoid XSS .../src/main/resources/META-INF/resources/journal_template.jsp | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBjNjE5NzZmYzg2N2YzYWRkOGViNDI5Yjk5MzgwZTkxZjAyMWY5MzEzIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpG...
null
GHSA-3263-mvg8-28x9
null
[ { "commit_message": "[PATCH] [Bug 1593] ntpd abort in free() with logconfig syntax error. ChangeLog | 1 + ntpd/ntp_parser.c | 114 +++++++++++++++++++++++++--------------------- ntpd/ntp_parser.y | 24 +++++++--- 3 files changed, 80 insertions(+), 59 deletions(-)", "patch_text_b64": "RnJvbSA1NTNmMm...
null
GHSA-33c6-jw29-2569
null
[ { "commit_message": "[PATCH] Fix issue with corrupt files with tagvalues_count = 0 that caused null pointer dereference ChangeLog | 1 + src/index.c | 2 +- 2 files changed, 2 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBjZTBhYjY1ODYwNjk3OTFiMWU4ZTJhNDJmNDQzMThlNTgxYzM5OTM5IE1vbiBTZXAgMTcgMDA6MD...
null
CVE-2019-10793
dot-object before 2.1.3 is vulnerable to Prototype Pollution. The set function could be tricked into adding or modifying properties of Object.prototype using a __proto__ payload.
[ { "commit_message": "[PATCH] guard for possible prototype polution index.js | 137 ++++++++++++++++++++++++----------------- src/dot-object.js | 137 ++++++++++++++++++++++++----------------- test/array_notation.js | 6 ++ test/dot-json.js | 7 +++ test/str.js | 20 ++++-- 5 ...
Prototype Pollution
GHSA-624c-2h52-gf7f
Duplicate Advisory: Remotely exploitable denial of service in Rosenpass
null
[ { "commit_message": "[PATCH] fix crash on undersized buffers going through the lenses Co-authored-by: wucke13 <wucke13@gmail.com> rosenpass/src/lib.rs | 2 +- rosenpass/src/msgs.rs | 40 ++++++++++++-- rosenpass/src/protocol.rs | 107 ++++++++++++++++++++++++++++++-------- 3 files changed, 121 insertio...
null
GHSA-6mv3-wm7j-h4w5
Tauri Filesystem Scope Glob Pattern is too Permissive
null
[ { "commit_message": "[PATCH] chore: update tauri changelog core/tauri/CHANGELOG.md | 15 +++++++++++++++ core/tauri/Cargo.toml | 2 +- tooling/cli/metadata.json | 2 +- 3 files changed, 17 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSAxNGQ1NjdmN2VjYjI1YTZkMTAyNGNmM2Q3OTZmODZhZWU4OWQwZGQ0IE1...
null
GHSA-f2gg-g599-6m5f
null
[ { "commit_message": "[PATCH] Fixed possibility of Unsolicited Dialback Attacks s2s/out.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSBhYWJjZmZhZTU2MGQ1ZmQwMGNkMWQyZmZjZTVkNzYwMzUzY2YwYTRkIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBUb21hc3ogU3Rlcm5hIDx0b21la0B4aWFva2EuY...
null
GHSA-524r-w8fx-hqg3
TeamPass Cross-site Scripting vulnerability
null
[ { "commit_message": "[PATCH] 3.0.10 Fix possible xss includes/core/load.js.php | 2 +- pages/options.php | 22 +++++++++++----------- 2 files changed, 12 insertions(+), 12 deletions(-)", "patch_text_b64": "RnJvbSA4MjBiYjQ5YTM2MmE1NjZjOTAzOGU0YTMwNDhiMjZkNjU0YmFiYjBlIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQp...
null
CVE-2023-5323
Cross-site Scripting (XSS) - Generic in dolibarr/dolibarr
Cross-site Scripting (XSS) - Generic in GitHub repository dolibarr/dolibarr prior to 18.0.
[ { "commit_message": "[PATCH] Fix #hunter7a048bb7-bfdd-4299-931e-9bc283e92bc8 htdocs/main.inc.php | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA2OTVjYTA4Njg0N2IzYjZhMTg1YWZhOTNlODk3OTcyYzkzYzQzZDE1IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBMYXVyZW50IERlc3RhaWxsZXVyIDxl...
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
GHSA-ch3r-j5x3-6q2m
vm2 Sandbox Escape vulnerability
null
[ { "commit_message": "[PATCH] Ensure every catch block is protected lib/transformer.js | 26 +++++++++++++------------- 1 file changed, 13 insertions(+), 13 deletions(-)", "patch_text_b64": "RnJvbSA0YjIyZTg3YjEwMmQ5N2Q0NWQxMTJhMDkzMWRiYTFhZWY3ZWVhMDQ5IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBYbWlsaWFIIDx4bWl...
null
CVE-2013-4492
Cross-site scripting (XSS) vulnerability in exceptions.rb in the i18n gem before 0.6.6 for Ruby allows remote attackers to inject arbitrary web script or HTML via a crafted I18n::MissingTranslationData.new call.
[ { "commit_message": "[PATCH] The I18n::MissingTranslation exception escapes key names for its html_message Also added deprecation message for the :rescue_format option lib/i18n/exceptions.rb | 28 +++++++++++++++++++++++++--- test/i18n/exceptions_test.rb | 10 +++++++--- 2 files changed, 32 insertions(+), 6...
n/a