id
stringlengths
12
19
title
stringlengths
0
237
description
stringlengths
35
3.87k
patches
listlengths
1
22
cwe
stringlengths
2
440
CVE-2016-10211
libyara/grammar.y in YARA 3.5.0 allows remote attackers to cause a denial of service (use-after-free and application crash) via a crafted rule that is mishandled in the yr_parser_lookup_loop_variable function.
[ { "commit_message": "[PATCH] Fix issue #575 libyara/grammar.c | 645 +++++++++++++++++++++++----------------------- libyara/grammar.y | 5 + 2 files changed, 332 insertions(+), 318 deletions(-)", "patch_text_b64": "RnJvbSA4OTBjM2Y4NTAyOTMxNzZjMGU5OTZhNjAyZmZhODhiMzE1ZjRlOThmIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwM...
n/a
CVE-2016-2384
Double free vulnerability in the snd_usbmidi_create function in sound/usb/midi.c in the Linux kernel before 4.5 allows physically proximate attackers to cause a denial of service (panic) or possibly have unspecified other impact via vectors involving an invalid USB descriptor.
[ { "commit_message": "[PATCH] ALSA: usb-audio: avoid freeing umidi object twice The 'umidi' object will be free'd on the error path by snd_usbmidi_free() when tearing down the rawmidi interface. So we shouldn't try to free it in snd_usbmidi_create() after having registered the rawmidi interface. Found by KASAN. ...
n/a
CVE-2025-64482
Tuleap missing CSRF protections in the File Release System
Tuleap is an Open Source Suite to improve management of software developments and collaboration. Tuleap Community Edition prior to version 16.13.99.1762267347 and Tuleap Enterprise Edition prior to versions 17.01-, 16.13-6, and 16.12-9 don't have cross-site request forgery protections in the file release system. An attacker could use this vulnerability to trick victims into changing the commit rules or immutable tags of a SVN repo. Tuleap Community Edition 16.13.99.1762267347, Tuleap Enterprise Edition 17.0-1, Tuleap Enterprise Edition 16.13-6, and Tuleap Enterprise Edition 16.12-9 fix the issue.
[ { "commit_message": "[PATCH] fix: request #45259 Add missing CSRF protections in the FRS Change-Id: Ie0e30917d2efe23cb8345e6e0cea19c053275be7 src/common/FRS/FRSPackageRouter.php | 41 +++++++++++++--- src/common/FRS/FRSReleaseController.php | 8 +++- src/common/FRS/FRSReleaseRouter.php ...
CWE-352: Cross-Site Request Forgery (CSRF)
GHSA-7322-jrq4-x5hf
File reference keys leads to incorrect hashes on HMAC algorithms
null
[ { "commit_message": "[PATCH] Ensure key contents is used for all hashing algorithms On v3.4.0 we introduced the `Lcobucci\\JWT\\Signer\\Key\\LocalFileReference`, which was designed to be used with OpenSSL-based algorithms and avoid having to load the file contents into user-land to sign/verify tokens. However, ...
null
GHSA-p976-pjhw-2wph
null
[ { "commit_message": "[PATCH] - files: removed unused code related to \"picnik\" upload lib/packages/files/files.php | 44 ------------------------------------ navigate_upload.php | 25 +------------------- 2 files changed, 1 insertion(+), 68 deletions(-)", "patch_text_b64": "RnJvbSAyYmRjYjhiM2M1YmIyM...
null
GHSA-xqfj-35wv-m3cr
Null pointer dereference in `StringNGrams`
null
[ { "commit_message": "[PATCH] Enhance validation of ngram op and handle case of 0 tokens. PiperOrigin-RevId: 369940178 Change-Id: Ia82f42c09d14efe76e7dc013505b832a42282f0b tensorflow/core/kernels/string_ngrams_op.cc | 52 +++++++++++++++---- .../core/kernels/string_ngrams_op_test.cc | 34 ++++++++++++ 2 file...
null
CVE-2015-5263
pulp-consumer-client 2.4.0 through 2.6.3 does not check the server's TLS certificate signatures when retrieving the server's public key upon registration.
[ { "commit_message": "[PATCH] convert consumer register to bindings bindings/pulp/bindings/bindings.py | 2 + bindings/pulp/bindings/consumer.py | 8 +- bindings/pulp/bindings/server.py | 35 +++--- bindings/pulp/bindings/static.py | 16 +++ bindings/test/unit/test_stati...
n/a
GHSA-xvf7-4v9q-58w6
Infinite loop in jpeg-js
null
[ { "commit_message": "[PATCH] fix: validate sampling factors (#106) lib/decoder.js | 9 ++++++++- test/index.js | 16 ++++++++++++---- 2 files changed, 20 insertions(+), 5 deletions(-)", "patch_text_b64": "RnJvbSA5Y2NkMzVmYjVmNTVhNmM0ZjE5MDJhYzViMGYyNzBmNjc1NzUwYzI3IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiB...
null
GHSA-hp5w-w29m-vg63
Apache Accumulo Improper Authentication vulnerability
null
[ { "commit_message": "[PATCH] Modify Shell to authenticate user on call to config (#3440) Closes #3433 Co-authored-by: Christopher Tubbs <ctubbsii@apache.org> .../java/org/apache/accumulo/shell/Shell.java | 66 +++++----- .../apache/accumulo/shell/ShellOptionsJC.java | 6 +- .../shell/commands/FateCommandTest.j...
null
GHSA-w765-jm6w-4hhj
Webrecorder packages are vulnerable to XSS through 404 error handling logic
null
[ { "commit_message": "[PATCH] Security: Reduce XSS attack surface for templated HTML (#275) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Previously, a maliciously-crafted URL could cause code to be run on the client viewing an archive as part of the not found error pa...
null
CVE-2015-2695
lib/gssapi/spnego/spnego_mech.c in MIT Kerberos 5 (aka krb5) before 1.14 relies on an inappropriate context handle, which allows remote attackers to cause a denial of service (incorrect pointer read and process crash) via a crafted SPNEGO packet that is mishandled during a gss_inquire_context call.
[ { "commit_message": "[PATCH] Fix SPNEGO context aliasing bugs [CVE-2015-2695] The SPNEGO mechanism currently replaces its context handle with the mechanism context handle upon establishment, under the assumption that most GSS functions are only called after context establishment. This assumption is incorrect, ...
n/a
GHSA-cf4h-3jhx-xvhq
Arbitrary Code Execution in underscore
null
[ { "commit_message": "[PATCH] Fix #2911 modules/template.js | 23 +++++++++++++++++++---- underscore-esm.js | 23 +++++++++++++++++++---- underscore-esm.js.map | 2 +- underscore.js | 23 +++++++++++++++++++---- underscore.js.map | 2 +- 5 files changed, 59 insertions(+), 14 deletions(-)", "pa...
null
CVE-2024-21665
Pimcore Ecommerce Framework Bundle Improper Access Control allows unprivileged user to access back-office orders list
ecommerce-framework-bundle is the Pimcore Ecommerce Framework Bundle. An authenticated and unauthorized user can access the back-office orders list and be able to query over the information returned. Access control and permissions are not being enforced. This vulnerability has been patched in version 1.0.10.
[ { "commit_message": "[PATCH] [Task]: Improve permission check (#149) * add permission check * add permission check * add permission check * replace with UserAwareController * remov eextra break line src/Controller/AdminOrderController.php | 2 ++ src/Controller/ConfigController.php | 9 ++++++++- src/Contro...
CWE-284: Improper Access Control
CVE-2025-25291
ruby-saml vulnerable to SAML authentication bypass due to DOCTYPE handling (parser differential)
ruby-saml provides security assertion markup language (SAML) single sign-on (SSO) for Ruby. An authentication bypass vulnerability was found in ruby-saml prior to versions 1.12.4 and 1.18.0 due to a parser differential. ReXML and Nokogiri parse XML differently; the parsers can generate entirely different document structures from the same XML input. That allows an attacker to be able to execute a Signature Wrapping attack. This issue may lead to authentication bypass. Versions 1.12.4 and 1.18.0 fix the issue.
[ { "commit_message": "[PATCH] Fix vulnerabilities: CVE-2025-25291, CVE-2025-25292: SAML authentication bypass via Signature Wrapping attack allowed due parser differential lib/onelogin/ruby-saml/logoutresponse.rb | 3 +- lib/onelogin/ruby-saml/response.rb | 13 +++-- lib/onelogin/ruby-saml/saml_messag...
CWE-347: Improper Verification of Cryptographic Signature
CVE-2022-4495
collective.dms.basecontent column.py renderCell cross site scripting
A vulnerability, which was classified as problematic, has been found in collective.dms.basecontent up to 1.6. This issue affects the function renderCell of the file src/collective/dms/basecontent/browser/column.py. The manipulation leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 1.7 is able to address this issue. The name of the patch is 6c4d616fcc771822a14ebae5e23f3f6d96d134bd. It is recommended to upgrade the affected component. The identifier VDB-215813 was assigned to this vulnerability.
[ { "commit_message": "[PATCH] Updated columns to work with z3c.table 2.2. Escaped rendering special caracters to avoid xss CHANGES.rst | 4 +- setup.py | 3 +- .../dms/basecontent/browser/column.py | 42 ++++++++++++------- 3 files cha...
CWE-79 Cross Site Scripting
GHSA-fr22-5377-f3p7
Mattermost Playbooks fails to properly validate permissions
null
[ { "commit_message": "[PATCH] Fix channel actions modal (#1961) * Fix channel actions modal * Remove bad test .../channels/general_actions_spec.js | 17 ----------------- server/api/actions.go | 6 ++++++ .../src/components/channel_actions_modal.tsx | 19 +++++++++++++++---- 3 fil...
null
GHSA-663w-2xp3-5739
org.xwiki.rendering:xwiki-rendering-xml Improper Neutralization of Invalid Characters in Identifiers in Web Pages vulnerability
null
[ { "commit_message": "[PATCH] XRENDERING-697: XHTMLWikiPrinter doesn't validate generated data attributes * Strip invalid characters and make sure the data attribute is allowed. * Add tests. .../renderer/printer/XHTMLWikiPrinter.java | 55 ++++++++++++- .../printer/XHTMLWikiPrinterTest.java | 81 ++++++...
null
GHSA-wr6w-jxg7-qpfh
Jenkins Missing Permission Check
null
[ { "commit_message": "[PATCH] [SECURITY-3513] Co-authored-by: Kevin-CB <kguerroudj@cloudbees.com> .../main/java/hudson/model/ComputerSet.java | 15 +++++ .../hudson/model/Messages.properties | 1 + .../hudson/model/Messages_bg.properties | 5 ++ .../hudson/model/Messages_de.properties | 1 ...
null
CVE-2020-26254
omniauth-apple allows attacker to fake their email address during authentication
omniauth-apple is the OmniAuth strategy for "Sign In with Apple" (RubyGem omniauth-apple). In omniauth-apple before version 1.0.1 attackers can fake their email address during authentication. This vulnerability impacts applications using the omniauth-apple strategy of OmniAuth and using the info.email field of OmniAuth's Auth Hash Schema for any kind of identification. The value of this field may be set to any value of the attacker's choice including email addresses of other users. Applications not using info.email for identification but are instead using the uid field are not impacted in the same manner. Note, these applications may still be negatively affected if the value of info.email is being used for other purposes. Applications using affected versions of omniauth-apple are advised to upgrade to omniauth-apple version 1.0.1 or later.
[ { "commit_message": "[PATCH] Use only verified email address to prevent fake email address Co-authored-by: David Taylor <david@taylorhq.com> lib/omniauth/strategies/apple.rb | 2 +- spec/omniauth/strategies/apple_spec.rb | 15 +++++++++++++++ 2 files changed, 16 insertions(+), 1 deletion(-)", "patch_te...
CWE-290 Authentication Bypass by Spoofing
CVE-2020-11012
Authentication bypass MinIO Admin API
MinIO versions before RELEASE.2020-04-23T00-58-49Z have an authentication bypass issue in the MinIO admin API. Given an admin access key, it is possible to perform admin API operations i.e. creating new service accounts for existing access keys - without knowing the admin secret key. This has been fixed and released in version RELEASE.2020-04-23T00-58-49Z.
[ { "commit_message": "[PATCH] fix: Add missing return in admin requests auth (#9422) cmd/auth-handler.go | 1 + cmd/auth-handler_test.go | 46 ++++++++++++++++++++++++++++++++++++++++ 2 files changed, 47 insertions(+)", "patch_text_b64": "RnJvbSA0Y2Q2Y2EwMmM3OTU3YWViMmRlM2VlZGUwOGIwNzU0MzMyYTc3OTIzIE1vbi...
CWE-305: Authentication Bypass by Primary Weakness
GHSA-phwr-pmh3-m8g2
Jenkins aws-device-farm Plugin stores credentials in plain text
null
[ { "commit_message": "[PATCH] [SECURITY-835][CVE-2019-1003064] Fix for reported issue on Jenkins Jira. .../awsdevicefarm/AWSDeviceFarmRecorder.java | 33 ++++++++++--------- 1 file changed, 17 insertions(+), 16 deletions(-)", "patch_text_b64": "RnJvbSAyZDhjZmUzY2RkMjk5YzE1MmNhNWQxM2FhZGE1MWNiNjlkMGZlYzg4IE1v...
null
GHSA-xwmx-qhv2-jx64
null
[ { "commit_message": "[PATCH] fix #2571 src/utils/os_file.c | 10 ++++++---- 1 file changed, 6 insertions(+), 4 deletions(-)", "patch_text_b64": "RnJvbSBkMjhkOWJhNDVjZjRmNjI4YTdiMmMzNTE4NDlhODk1ZTZmY2YyMjM0IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBBdXJlbGllbiBEYXZpZCA8YXVyZWxpZW4uZGF2aWRAdGVsZWNvbS1wYXJpc3Rl...
null
GHSA-q2wp-rjmx-x6x9
Transformers's ReDoS vulnerability in get_configuration_file can lead to catastrophic backtracking
null
[ { "commit_message": "[PATCH] Release: v4.51.0 examples/flax/question-answering/run_qa.py | 2 +- .../run_flax_speech_recognition_seq2seq.py | 2 +- .../flax/text-classification/run_flax_glue.py | 2 +- .../flax/token-classification/run_flax_ner.py | 2 +- .../run_audio_classification.py ...
null
GHSA-ghmc-655x-wwhc
null
[ { "commit_message": "[PATCH] mm/demotion: fix NULL vs IS_ERR checking in memory_tier_init alloc_memory_type() returns error pointers on error instead of NULL. Use IS_ERR() to check the return value to fix this. Link: https://lkml.kernel.org/r/20221110030751.1627266-1-linmq006@gmail.com Fixes: 7b88bda3761b (\"m...
null
CVE-2025-58178
Command Injection via sonarqube-scan-action GitHub Action
SonarQube Server and Cloud is a static analysis solution for continuous code quality and security inspection. In versions 4 to 5.3.0, a command injection vulnerability was discovered in the SonarQube Scan GitHub Action that allows untrusted input arguments to be processed without proper sanitization. Arguments sent to the action are treated as shell expressions, allowing potential execution of arbitrary commands. A fix has been released in SonarQube Scan GitHub Action 5.3.1.
[ { "commit_message": "[PATCH] SQSCANGHA-101 Add more command injection tests .github/workflows/qa-main.yml | 93 ++++++++++++++++++++++++++++++-- action.yml | 6 +-- scripts/run-sonar-scanner-cli.sh | 12 ++++- scripts/run-sonar-scanner.sh | 6 +++ 4 files changed, 109 insertions(+), 8...
CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')
CVE-2017-13020
The VTP parser in tcpdump before 4.9.2 has a buffer over-read in print-vtp.c:vtp_print().
[ { "commit_message": "[PATCH] CVE-2017-13020/VTP: Add another test. A capture file supplied by Bhargava Shastry, modified so the capture file won't be rejected as an invalid capture. tests/TESTLIST | 1 + tests/vtp_asan-2.out | 3 +++ tests/vtp_asan-2.pcap | Bin 0 -> 108 bytes 3 files changed, 4 insert...
n/a
GHSA-ph68-qqgf-rq69
null
[ { "commit_message": "[PATCH] soc: qcom: aoss: Fix missing put_device call in qmp_get The reference taken by 'of_find_device_by_node()' must be released when not needed anymore. Add the corresponding 'put_device()' in the error handling paths. Fixes: 8c75d585b931 (\"soc: qcom: aoss: Expose send for generic useca...
null
CVE-2014-1438
The restore_fpu_checking function in arch/x86/include/asm/fpu-internal.h in the Linux kernel before 3.12.8 on the AMD K7 and K8 platforms does not clear pending exceptions before proceeding to an EMMS instruction, which allows local users to cause a denial of service (task kill) or possibly gain privileges via a crafted application.
[ { "commit_message": "[PATCH] x86, fpu, amd: Clear exceptions in AMD FXSAVE workaround Before we do an EMMS in the AMD FXSAVE information leak workaround we need to clear any pending exceptions, otherwise we trap with a floating-point exception inside this code. Reported-by: halfdog <me@halfdog.net> Tested-by: B...
n/a
GHSA-r53w-g4xm-3gc6
Haml vulnerable to cross-site scripting
null
[ { "commit_message": "[PATCH] Always escape `'` in Haml::Helpers.#html_escape. In some tests, `attr_wrapper` is changed to be ignored. I'll split its fix to other commis because not Haml::Helpers but Haml::AttributeBuilder is responsible for that. lib/haml/helpers.rb | 2 +- test/engine_test.rb ...
null
GHSA-6fqw-r97c-866j
null
[ { "commit_message": "[PATCH] fixed #1767 (fuzz) applications/mp4box/filedump.c | 32 ++++++++++++++++++-------------- 1 file changed, 18 insertions(+), 14 deletions(-)", "patch_text_b64": "RnJvbSAyODlmZmNlM2UwZDIyNGQzMTRmNWY5MmE3NDRkNWZlMzU5OTlmMjBiIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBqZWFubGYgPGplYW5s...
null
CVE-2017-20178
Codiad process.php saveJSON information disclosure
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in Codiad 2.8.0. It has been rated as problematic. Affected by this issue is the function saveJSON of the file components/install/process.php. The manipulation of the argument data leads to information disclosure. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. Upgrading to version 2.8.1 is able to address this issue. The patch is identified as 517119de673e62547ee472a730be0604f44342b5. It is recommended to upgrade the affected component. VDB-221498 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
[ { "commit_message": "[PATCH] fixed vuln added \\r\\n to saveJSON function to prevent sensitive information disclosure components/install/process.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA1MTcxMTlkZTY3M2U2MjU0N2VlNDcyYTczMGJlMDYwNGY0NDM0MmI1IE1vbiBTZXAgMTcgMDA6MDA6M...
CWE-200 Information Disclosure
CVE-2018-12684
Out-of-bounds Read in the send_ssi_file function in civetweb.c in CivetWeb through 1.10 allows attackers to cause a Denial of Service or Information Disclosure via a crafted SSI file.
[ { "commit_message": "[PATCH] Check length of memcmp src/civetweb.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSA4ZmQwNjlmNmRlZGIwNjQzMzlmMTA5MTA2OWFjOTZmM2Y4YmRiNTUyIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBiZWwyMTI1IDxiZWwyMTI1QGdtYWlsLmNvbT4KRGF0ZTogU2F0LCAxNiBKdW4...
n/a
GHSA-2vc4-3hx7-v7v7
Hax CMS Stored Cross-Site Scripting vulnerability
null
[ { "commit_message": "[PATCH] https://github.com/haxtheweb/issues/security/advisories/GHSA-2vc4-3hx7-v7v7 .../glossy-portfolio-theme.js | 181 +- .../lib/components/data (1).json | 15307 ++++++++++++++++ .../lib/glossy-portfolio-breadcrumb.js | 77 + .../lib/glossy-portfoli...
null
GHSA-xp3r-9wx8-q2mm
Agent-to-controller security bypass vulnerabilities in Jenkins Compuware Topaz for Total Test Plugin
null
[ { "commit_message": "[PATCH] SECURITY-2624:Arbitrary file read vulnerability due to empty role check (#52) * SECURITY-2624:Arbitrary file read vulnerability due to empty role check * SECURITY-2624:Missing permission check - Changed copyright .../totaltest/RemoteSystemProperties.java | 18 ++++------------ .....
null
GHSA-xhw6-hjc9-679m
Pac4j token validation bypass if OpenID Connect provider supports none algorithm
null
[ { "commit_message": "[PATCH] Fix CVE-2021-44878 documentation/docs/release-notes.md | 4 ++++ .../org/pac4j/oidc/config/OidcConfiguration.java | 12 +++++++++++- .../oidc/profile/creator/TokenValidator.java | 16 +++++++++++----- 3 files changed, 26 insertions(+), 6 deletions(-)", "patch_text...
null
CVE-2025-24795
The Snowflake Connector for Python uses insecure cache files permissions
The Snowflake Connector for Python provides an interface for developing Python applications that can connect to Snowflake and perform all standard operations. Snowflake discovered and remediated a vulnerability in the Snowflake Connector for Python. On Linux systems, when temporary credential caching is enabled, the Snowflake Connector for Python will cache temporary credentials locally in a world-readable file. This vulnerability affects versions 2.3.7 through 3.13.0. Snowflake fixed the issue in version 3.13.1.
[ { "commit_message": "<jakub.szczerbinski@snowflake.com> [PATCH] SNOW-1902019: Python CVEs january batch (#2154) Co-authored-by: Jamison <jamison.rose@snowflake.com> Co-authored-by: Adam Ling <adam.ling@snowflake.com> src/snowflake/connector/auth/_auth.py | 7 +- src/snowflake/connector/cache.py ...
CWE-276: Incorrect Default Permissions
GHSA-cjcc-46j8-xmr8
destiny.gg chat vulnerable to cross-site request forgery
null
[ { "commit_message": "[PATCH] Use default `CheckOrigin` implementation If `CheckOrigin` is undefined, a \"safe default\" is used. main.go | 1 - 1 file changed, 1 deletion(-)", "patch_text_b64": "RnJvbSBkNjIxNDA4Mjc0NGNlNzNjOTAwMjIwNDZiM2U2MGQ1ZTBiYmNmYWY3IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBGYXJoYWQgSm...
null
GHSA-j7mw-7crr-658v
Richfaces vulnerable to arbitrary code execution
null
[ { "commit_message": "[PATCH] RF-13608: Renamed \"framework\" to \"core\" NOTICE.txt | 16 ++++++++-------- TESTS.md | 2 +- {framework => core}/pom.xml | 0 .../src/main/java/org/ajax4jsf/Messages.java | 0 ......
null
GHSA-5rvj-4rxp-67hv
null
[ { "commit_message": "[PATCH] sec(VTLIB) purify clean javascript in href include/utils/VtlibUtils.php | 10 ++++++++++ 1 file changed, 10 insertions(+)", "patch_text_b64": "RnJvbSBhYWFjYTY5MTg1YmNlMmJlNmE4Mjk1NmM2OTU0MTkzOGRjODcxMjY4IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBqb2Vib3JkZXMgPGpvZUB0c29sdWNpby5jb...
null
GHSA-rrqr-7w59-637v
Pomerium exposed OAuth2 access and ID tokens in user info endpoint response
null
[ { "commit_message": "<87506591+backport-actions-token[bot]@users.noreply.github.com> [PATCH] core/userinfo: remove excess userinfo data (#5148) core/userinfo: remove excess userinfo data (#5137) Co-authored-by: Caleb Doxsey <cdoxsey@pomerium.com> internal/handlers/userinfo.go | 71 +++++++++++++++++++++++++++++-...
null
CVE-2018-11627
Sinatra before 2.0.2 has XSS via the 400 Bad Request page that occurs upon a params parser exception.
[ { "commit_message": "[PATCH] escape invalid query params, fixes #1428 lib/sinatra/base.rb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAxMjc4Njg2N2Q2ZmFhY2VhZWM2MmM3YzJjYjViMGUyZGMwNzRkNzFhIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBLdW5wZWkgU2FrYWkgPG5hbXVzeWFrYUBnbWFpbC5j...
n/a
GHSA-p55p-5prc-ppxq
null
[ { "commit_message": "[PATCH] usbnet: cleanup after bind() in probe() In case bind() works, but a later error forces bailing in probe() in error cases work and a timer may be scheduled. They must be killed. This fixes an error case related to the double free reported in http://www.spinics.net/lists/netdev/msg367...
null
GHSA-rjch-j5x9-fgph
Stored XSS vulnerability in Jenkins Active Choices Plugin
null
[ { "commit_message": "[PATCH] [SECURITY-2008] .../biouno/unochoice/model/GroovyScript.java | 72 +++++++- .../unochoice/model/ScriptlerScript.java | 2 +- .../TestGroovyScriptXssVulnerabilities.java | 167 ++++++++++++++++++ 3 files changed, 232 insertions(+), 9 deletions(-) create mode 100644 src/test/j...
null
GHSA-876p-8259-xjgg
libp2p nodes vulnerable to attack using large RSA keys
null
[ { "commit_message": "[PATCH] crypto/tls: restrict RSA keys in certificates to <= 8192 bits Extremely large RSA keys in certificate chains can cause a client/server to expend significant CPU time verifying signatures. Limit this by restricting the size of RSA keys transmitted during handshakes to <= 8192 bits. B...
null
GHSA-r9vw-9gvx-7g72
null
[ { "commit_message": "[PATCH] Fix NULL pointer crashes from #175 avahi-daemon is crashing when running \"ping .local\". The crash is due to failing assertion from NULL pointer. Add missing NULL pointer checks to fix it. Introduced in #175 - merge commit 8f75a045709a780c8cf92a6a21e9d35b593bdecd avahi-core/browse-...
null
GHSA-f2w8-jw48-fr7j
`FractionalMaxPoolGrad` Heap out of bounds read
null
[ { "commit_message": "[PATCH] Fix security vulnerability with FractionalMaxPoolGrad PiperOrigin-RevId: 477500477 .../core/kernels/fractional_max_pool_op.cc | 12 +++++++++++ .../nn_ops/fractional_max_pool_op_test.py | 20 ++++++++++++++++++- 2 files changed, 31 insertions(+), 1 deletion(-)", "patch_text...
null
CVE-2025-66623
Strimzi allows unrestricted access to all Secrets in the same Kubernetes namespace from Kafka Connect and MirrorMaker 2 operands
Strimzi provides a way to run an Apache Kafka cluster on Kubernetes or OpenShift in various deployment configurations. From 0.47.0 and prior to 0.49.1, in some situations, Strimzi creates an incorrect Kubernetes Role which grants the Apache Kafka Connect and Apache Kafka MirrorMaker 2 operands the GET access to all Kubernetes Secrets that exist in the given Kubernetes namespace. The issue is fixed in Strimzi 0.49.1.
[ { "commit_message": "[PATCH] Merge commit from fork Signed-off-by: Jakub Scholz <www@scholzj.com> .../operator/cluster/model/KafkaCluster.java | 21 +++--- .../cluster/model/KafkaConnectCluster.java | 69 ++++++++++++------- .../model/KafkaConnectClusterTest.java | 40 +++++++++++ .../model/KafkaMirrorM...
CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
GHSA-f6vv-86p4-jjqr
null
[ { "commit_message": "[PATCH] Changes for issues #863 and #862 src/bin/jp2/convert.c | 59 ++++++++++++++++++++++++++++++++---- src/bin/jp2/convertbmp.c | 29 +++++++++++++++++- src/bin/jp2/opj_decompress.c | 2 +- src/lib/openjp2/j2k.c | 11 +++++-- 4 files changed, 90 insertions(+), 11 deletions...
null
PYSEC-2022-33
null
[ { "commit_message": "[PATCH] Merge pull request from GHSA-p867-fxfr-ph2w * Fix setting permissions for local sqlite database Thanks to Jan Schejbal for responsible disclosure! There used to be a brief moment between creation of the sqlite database and applying chmod, now there is no such delay. * Rename self.ho...
null
CVE-2014-1235
Stack-based buffer overflow in the "yyerror" function in Graphviz 2.34.0 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted file. NOTE: This vulnerability exists due to an incomplete fix for CVE-2014-0978.
[ { "commit_message": "[PATCH] Prevent possible buffer overflow in yyerror() lib/cgraph/scan.l | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBkMjY2YmIyYjQxNTRkMTFjMjcyNTJiNTZkODY5NjNhZWY0NDM0NzUwIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiAiRW1kZW4gUi4gR2Fuc25lciIgPGVyZ0BhbHV...
n/a
PYSEC-2020-70
null
[ { "commit_message": "[PATCH] Merge pull request from GHSA-7wgr-7666-7pwj * All strings used as file/directory names are now sanitized to address the path traversal vulnerabilities * Switched calls to utils.spinal_case to utils.kebab_case Co-authored-by: Ethan Mann <emann@triaxtec.com> end_to_end_tests/regen_gol...
null
GHSA-264x-4r27-x5m2
null
[ { "commit_message": "[PATCH] Fixed CVE-2018-8787 Thanks to Eyal Itkin from Check Point Software Technologies. libfreerdp/gdi/graphics.c | 10 +++++++++- 1 file changed, 9 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAwOWI5ZDRmMTk5NGE2NzRjNGVjODViNDk0N2FhNjU2ZWRhMWFlZDhhIE1vbiBTZXAgMTcgMDA6MDA6MDAg...
null
GHSA-4jv9-3563-23j3
Knex.js has a limited SQL injection vulnerability
null
[ { "commit_message": "[PATCH] 1227: add assertion for basic where clause values (#5417) CHANGELOG.md | 3 + .../mysql/query/mysql-querycompiler.js | 28 +++++- lib/query/querybuilder.js | 1 + test/db-less-test-suite.js | 4 + test/uni...
null
GHSA-h45v-vgvp-3h5v
Out-of-bounds write in stack
null
[ { "commit_message": "[PATCH] Add bounds check to Vector::insert Fixes #4 src/vector.rs | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAzNjllNTU3MzZmOWJkMjljMzdiMTcxMmFmYzI5MjNmNDAyODE0OGM2IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBhcmNubXggPGFyY25teEB1c2Vycy5ub3JlcGx5Lmdpd...
null
CVE-2022-24839
Uncontrolled Resource Consumption in org.cyberneko.html (nokogiri fork)
org.cyberneko.html is an html parser written in Java. The fork of `org.cyberneko.html` used by Nokogiri (Rubygem) raises a `java.lang.OutOfMemoryError` exception when parsing ill-formed HTML markup. Users are advised to upgrade to `>= 1.9.22.noko2`. Note: The upstream library `org.cyberneko.html` is no longer maintained. Nokogiri uses its own fork of this library located at https://github.com/sparklemotion/nekohtml and this CVE applies only to that fork. Other forks of nekohtml may have a similar vulnerability.
[ { "commit_message": "[PATCH] fix: ensure ill-formed PIs are parsed correctly src/org/cyberneko/html/HTMLScanner.java | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBhODAwZmNlM2IwNzlkZWYxMzBlZDQyYTQwOGZmMWQwOWY4OWU3NzNkIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBNaWtlIERhbGVzc...
CWE-400: Uncontrolled Resource Consumption
CVE-2022-1244
heap-buffer-overflow in radareorg/radare2
heap-buffer-overflow in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is capable of inducing denial of service.
[ { "commit_message": "[PATCH] Fix oobread in dyldcache ##crash * Reported by @hdthky via huntr.dev * Reproducers: poc1 * BountyID: 8ae2c61a-2220-47a5-bfe8-fe6d41ab1f82 libr/bin/format/mach0/dyldcache.h | 2 +- libr/bin/p/bin_dyldcache.c | 3 ++- 2 files changed, 3 insertions(+), 2 deletions(-)", "patch_...
CWE-122 Heap-based Buffer Overflow
GHSA-jg82-xh3w-rhxx
Synchrony deobfuscator prototype pollution vulnerability leading to arbitrary code execution
null
[ { "commit_message": "[PATCH 1/4] fix(literalmap): fix prototype pollution vuln src/transformers/literalmap.ts | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-)", "patch_text_b64": "RnJvbSA3Y2U2YzM5YjdiNDdlNjJjMTczYjY5NDgwMDY1N2U3MDU0OWFmZDFhIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiByZWxhdGl...
null
GHSA-hvr8-466p-75rh
Pillow Integer overflow in ImagingResampleHorizontal
null
[ { "commit_message": "[PATCH] fix integer overflow in Resample.c libImaging/Resample.c | 12 ++++++++++++ 1 file changed, 12 insertions(+)", "patch_text_b64": "RnJvbSA0ZTBkOWIwYjk3NDBkMjU4YWRlNDBjY2UyNDhjOTM3NzczNjJhYzFlIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBOZWQgV2lsbGlhbXNvbiA8bmVkd2lsbGlhbXNvbkBnbWFpbC...
null
CVE-2022-23595
Null pointer dereference in TensorFlow
Tensorflow is an Open Source Machine Learning Framework. When building an XLA compilation cache, if default settings are used, TensorFlow triggers a null pointer dereference. In the default scenario, all devices are allowed, so `flr->config_proto` is `nullptr`. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
[ { "commit_message": "[PATCH] Fix Null-pointer dereference in BuildXlaCompilationCache If ConfigProto is not used, then use the default settings which is to allow all devices. PiperOrigin-RevId: 420391800 Change-Id: I88161ad7042990aef678e77b597a2fb2c8f815be tensorflow/compiler/jit/xla_platform_info.cc | 12 +++++...
CWE-476: NULL Pointer Dereference
GHSA-qw32-4rhp-3985
null
[ { "commit_message": "[PATCH] fixed #2872 src/filters/load_text.c | 1 + 1 file changed, 1 insertion(+)", "patch_text_b64": "RnJvbSAzMWU0OTlkMzEwYTQ4YmQxN2M4YjA1NWEwYmZlMGZlMzU4ODdhN2NkIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBqZWFubGYgPGplYW5sZkBncGFjLmlvPgpEYXRlOiBXZWQsIDEyIEp1biAyMDI0IDE1OjMxOjMwICswMjAwC...
null
CVE-2024-52338
Apache Arrow R package: Arbitrary code execution when loading a malicious data file
Deserialization of untrusted data in IPC and Parquet readers in the Apache Arrow R package versions 4.0.0 through 16.1.0 allows arbitrary code execution. An application is vulnerable if it reads Arrow IPC, Feather or Parquet data from untrusted sources (for example, user-supplied input files). This vulnerability only affects the arrow R package, not other Apache Arrow implementations or bindings unless those bindings are specifically used via the R package (for example, an R application that embeds a Python interpreter and uses PyArrow to read files from untrusted sources is still vulnerable if the arrow R package is an affected version). It is recommended that users of the arrow R package upgrade to 17.0.0 or later. Similarly, it is recommended that downstream libraries upgrade their dependency requirements to arrow 17.0.0 or later. If using an affected version of the package, untrusted data can read into a Table and its internal to_data_frame() method can be used as a workaround (e.g., read_parquet(..., as_data_frame = FALSE)$to_data_frame()). This issue affects the Apache Arrow R package: from 4.0.0 through 16.1.0. Users are recommended to upgrade to version 17.0.0, which fixes the issue.
[ { "commit_message": "[PATCH] GH-42143: [R] Sanitize R metadata (#41969) ### Rationale for this change `arrow` uses R `serialize()`/`unserialize()` to store additional metadata in the Arrow schema. This PR adds some extra checking and sanitizing in order to make the reading of this metadata robust to data of unk...
CWE-502 Deserialization of Untrusted Data
GHSA-j8xg-fqg3-53r7
word-wrap vulnerable to Regular Expression Denial of Service
null
[ { "commit_message": "[PATCH 1/7] :lock: fix: CVE-2023-26115 index.js | 10 ++++++++-- 1 file changed, 8 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSAyMzVjZmQ0ZmUzZGJkNTQ2ZDFmMmI1MmI3MGFhNzE3NjE0YjdlNGQ2IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBBYXNodXRvc2ggUmF0aGkgPGFhc2h1dG9zaHJhdGhpQGdtYWlsLm...
null
CVE-2024-37160
Formwork has a Cross-site scripting (XSS) vulnerability in Description metadata
Formwork is a flat file-based Content Management System (CMS). An attackers (requires administrator privilege) to execute arbitrary web scripts by modifying site options via /panel/options/site. This type of attack is suitable for persistence, affecting visitors across all pages (except the dashboard). This vulnerability is fixed in 1.13.1.
[ { "commit_message": "[PATCH] Escape meta attributes to avoid XSS injection templates/partials/meta.php | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-)", "patch_text_b64": "RnJvbSA5ZDQ3MTIwNGY3ZWJiNTFjM2MyNzEzMTU4MWMyYjgzNDMxNWI1ZTBiIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBHaXVzZXBwZSBDcmlzY2l...
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2022-4810
Improper Access Control in usememos/memos
Improper Access Control in GitHub repository usememos/memos prior to 0.9.1.
[ { "commit_message": "[PATCH] fix: access control (#870) api/memo.go | 8 +- api/memo_organizer.go | 10 +- api/memo_resource.go | 2 +- api/resource.go | 2 +- api/shortcut.go | 2 +- api/tag.go | 2 +- api/user_setting.go | 2 +- server/auth.go | 6 +- server/m...
CWE-284 Improper Access Control
GHSA-9qmh-276g-x5pj
Prototype Pollution in immer
null
[ { "commit_message": "[PATCH] fix: Fixed security issue #738: prototype pollution possible when applying patches CVE-2020-28477 See: CVE-2020-28477 / SNYK-JS-IMMER-1019369 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28477 https://snyk.io/vuln/SNYK-JS-IMMER-1019369 __tests__/patch.js | 109 +++++++...
null
GHSA-j6px-673q-87gh
null
[ { "commit_message": "[PATCH] parse_qt: possible integer overflow dcraw/dcraw.c | 2 ++ internal/dcraw_common.cpp | 2 ++ 2 files changed, 4 insertions(+)", "patch_text_b64": "RnJvbSAxMzM0NjQ3ODYyYjBjOTBiMmU4Y2IyZjY2OGU2NjYyN2Q5NTE3YjE3IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBBbGV4IFR1dHViYWxpbiA...
null
CVE-2025-53889
Directus missing permission checks for manual trigger Flows
Directus is a real-time API and App dashboard for managing SQL database content. Starting in version 9.12.0 and prior to version 11.9.0, Directus Flows with a manual trigger are not validating whether the user triggering the Flow has permissions to the items provided as payload to the Flow. Depending on what the Flow is set up to do this can lead to the Flow executing potential tasks on the attacker's behalf without authenticating. Bad actors could execute the manual trigger Flows without authentication, or access rights to the said collection(s) or item(s). Users with manual trigger Flows configured are impacted as these endpoints do not currently validate if the user has read access to `directus_flows` or to the relevant collection/items. The manual trigger Flows should have tighter security requirements as compared to webhook Flows where users are expected to perform do their own checks. Version 11.9.0 fixes the issue. As a workaround, implement permission checks for read access to Flows and read access to relevant collection/items.
[ { "commit_message": "[PATCH] Fix manual flows to only trigger with appropriate permissions (#25354) * fix manual flows only being triggered with appropiate permissions * update changeset * check for access to the ids * also check required keys * small tweaks * ran prettier * Update .changeset/seven-flies-exist....
CWE-287: Improper Authentication
CVE-2022-24977
ImpressCMS before 1.4.2 allows unauthenticated remote code execution via ...../// directory traversal in origName or imageName, leading to unsafe interaction with the CKEditor processImage.php script. The payload may be placed in PHP_SESSION_UPLOAD_PROGRESS when the PHP installation supports upload_progress.
[ { "commit_message": "[PATCH] Prevents using submitted filenames with ../ for controller (#812) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit * Prevents using submitted filenames with ../ for controller * Using preg replace for better parent paths replaces Co-authored-...
n/a
CVE-2025-66416
DNS Rebinding Protection Disabled by Default in Model Context Protocol Python SDK for Servers Running on Localhost
The MCP Python SDK, called `mcp` on PyPI, is a Python implementation of the Model Context Protocol (MCP). Prior to version 1.23.0, tThe Model Context Protocol (MCP) Python SDK does not enable DNS rebinding protection by default for HTTP-based servers. When an HTTP-based MCP server is run on localhost without authentication using FastMCP with streamable HTTP or SSE transport, and has not configured TransportSecuritySettings, a malicious website could exploit DNS rebinding to bypass same-origin policy restrictions and send requests to the local MCP server. This could allow an attacker to invoke tools or access resources exposed by the MCP server on behalf of the user in those limited circumstances. Note that running HTTP-based MCP servers locally without authentication is not recommended per MCP security best practices. This issue does not affect servers using stdio transport. This vulnerability is fixed in 1.23.0.
[ { "commit_message": "[PATCH] Merge commit from fork * Auto-enable DNS rebinding protection for localhost servers When a FastMCP server is created with host=\"127.0.0.1\" or \"localhost\" and no explicit transport_security is provided, automatically enable DNS rebinding protection. Both 127.0.0.1 and localhost a...
CWE-1188: Insecure Default Initialization of Resource
GHSA-88gc-h5ch-vcch
null
[ { "commit_message": "<francoisjacquet@users.noreply.github.com> [PATCH] Fix #291 XSS Use URLEscape() for forms action CHANGES.md | 1 + modules/Accounting/DailyTotals.php | 2 +- modules/Accounting/DailyTransactions.php | 2 +- modules/Accounting...
null
GHSA-x4rq-x9vx-hmx3
null
[ { "commit_message": "[PATCH] Fix XSS in cachelists (OBB-217897) htdocs/templates2/ocstyle/cachelists.tpl | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSBhOWY3OWM3ZGE3OGNkMjRhN2VmMWQyOThlNmJjODYwMDY5NzJlYTczIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBTYW11ZWwgRGVubmxlciA8O...
null
GHSA-mx5g-3vxh-rgm8
Moodle vulnerable to XSS via bundled spikephpcoverage library
null
[ { "commit_message": "[PATCH] MDL-26237 code coverage - prevent execution of not used stuff lib/spikephpcoverage/readme_moodle.txt | 2 ++ lib/spikephpcoverage/src/phpcoverage.remote.bottom.inc.php | 1 + lib/spikephpcoverage/src/phpcoverage.remote.top.inc.php | 1 + 3 files changed, 4 insert...
null
GHSA-ww45-x87c-wgff
Moodle all messaging conversations could be viewed
null
[ { "commit_message": "[PATCH] MDL-65365 core_message: prevent users from viewing all conversations message/externallib.php | 9 +++++++-- message/tests/externallib_test.php | 25 +++++++++++++++++++++++++ 2 files changed, 32 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSAyOTA0YTdmODUxZGE...
null
GHSA-v67j-hmh5-9qhg
null
[ { "commit_message": "[PATCH] bpf: fix missing error return in check_stack_boundary() Prevent indirect stack accesses at non-constant addresses, which would permit reading and corrupting spilled pointers. Fixes: f1174f77b50c (\"bpf/verifier: rework value tracking\") Signed-off-by: Jann Horn <jannh@google.com> Si...
null
CVE-2024-31821
SQL Injection vulnerability in Ecommerce-CodeIgniter-Bootstrap commit v. d22b54e8915f167a135046ceb857caaf8479c4da allows a remote attacker to execute arbitrary code via the manageQuantitiesAndProcurement method of the Orders_model.php component.
[ { "commit_message": "[PATCH] Vulnerability fixes from Lion Tree .../advanced_settings/Languages.php | 27 ++++++++++++++++--- .../admin/controllers/ecommerce/Publish.php | 15 ++++++----- .../modules/admin/models/Orders_model.php | 8 ++++-- 3 files changed, 39 insertions(+), 11 deletions(-)", ...
n/a
CVE-2024-49767
Werkzeug possible resource exhaustion when parsing file data in forms
Werkzeug is a Web Server Gateway Interface web application library. Applications using `werkzeug.formparser.MultiPartParser` corresponding to a version of Werkzeug prior to 3.0.6 to parse `multipart/form-data` requests (e.g. all flask applications) are vulnerable to a relatively simple but effective resource exhaustion (denial of service) attack. A specifically crafted form submission request can cause the parser to allocate and block 3 to 8 times the upload size in main memory. There is no upper limit; a single upload at 1 Gbit/s can exhaust 32 GB of RAM in less than 60 seconds. Werkzeug version 3.0.6 fixes this issue.
[ { "commit_message": "[PATCH] apply max_form_memory_size another level up in the parser CHANGES.rst | 6 ++++++ pyproject.toml | 2 +- src/quart/formparser.py | 10 ++++++++++ tests/test_formparser.py | 21 +++++++++++++++++++++ 4 files changed, 38 insertions(+), 1 deletion(-) create mode 1...
CWE-400: Uncontrolled Resource Consumption
GHSA-wxvf-839f-jqmh
Craft CMS Cross site Scripting vulnerability
null
[ { "commit_message": "[PATCH] More XSS vulnerabilities CHANGELOG.md | 2 +- src/helpers/Cp.php | 4 ++-- src/templates/settings/fields/index.twig | 2 +- 3 files changed, 4 insertions(+), 4 deletions(-)", "patch_text_b64": "RnJvbSBjZWRlYmEwNjA5ZTRiMTczY2Q1ODRkYW...
null
GHSA-ggcf-hwxp-rc77
Answer Insufficient Session Expiration vulnerability
null
[ { "commit_message": "[PATCH] feat(password): logout other user when update password internal/controller/user_controller.go | 9 ++-- internal/repo/auth/auth.go | 5 +- internal/schema/user_schema.go | 18 ++++--- internal/service/auth/auth.go | 13 +++-- intern...
null
GHSA-fprw-935f-f6f7
null
[ { "commit_message": "[PATCH] sgwc: validate mandatory IEs and handle missing bearer context safely Add explicit error handling for missing EPS Bearer ID and S5/S8 U F-TEID in Create Session Response processing. Instead of breaking out of the loop, immediately send an appropriate GTPv2 error response and abort p...
null
GHSA-wmxw-5jh4-p3j8
null
[ { "commit_message": "[PATCH] Use a random key to \"encrypt\" the remember-me cookie's value Since Spring's default remember-me technique is terrible security-wise (`user:timstamp:md5(use:timestamp:password:key)`), we should at least use a random key, instead of a fixed one, otherwise, and attacker able to captu...
null
GHSA-4phc-fq33-39gx
null
[ { "commit_message": "[PATCH] [IEDriver] Fix potential null pointer access in CookieManager cpp/iedriver/CookieManager.cpp | 12 +++++++++++- 1 file changed, 11 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAwMjNhMGQ1MmYxMDYzMjE4MzhhYjFjMDk5N2U3NjY5M2Y0ZGNiZGY2IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9...
null
CVE-2024-48645
In Minecraft mod "Command Block IDE" up to and including version 0.4.9, a missing authorization (CWE-862) allows any user to modify "function" files used by the game when installed on a dedicated server.
[ { "commit_message": "[PATCH] Check permissions for APPLY_FUNCTION packet Thanks to @apple502j for the report. .../java/arm32x/minecraft/commandblockide/CommandBlockIDE.java | 3 +++ 1 file changed, 3 insertions(+)", "patch_text_b64": "RnJvbSA0MmUwOTg0MDE2OGQ5YzJmZTJlZTA3ZjQ0NzJkMjk2MDAwYjJhNDE2IE1vbiBTZXAgMT...
n/a
CVE-2025-1752
Denial of Service in run-llama/llama_index
A Denial of Service (DoS) vulnerability has been identified in the KnowledgeBaseWebReader class of the run-llama/llama_index project, affecting version ~ latest(v0.12.15). The vulnerability arises due to inappropriate secure coding measures, specifically the lack of proper implementation of the max_depth parameter in the get_article_urls function. This allows an attacker to exhaust Python's recursion limit through repeated function calls, leading to resource consumption and ultimately crashing the Python process.
[ { "commit_message": "[PATCH] fix: respect max_depth in KnowledgeBaseWebReader (#17949) .../readers/web/knowledge_base/base.py | 15 +++++++++++++-- .../llama-index-readers-web/pyproject.toml | 2 +- 2 files changed, 14 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSAzYzY1ZGIyOTQ3M...
CWE-674 Uncontrolled Recursion
CVE-2021-29514
Heap out of bounds write in `RaggedBinCount`
TensorFlow is an end-to-end open source platform for machine learning. If the `splits` argument of `RaggedBincount` does not specify a valid `SparseTensor`(https://www.tensorflow.org/api_docs/python/tf/sparse/SparseTensor), then an attacker can trigger a heap buffer overflow. This will cause a read from outside the bounds of the `splits` tensor buffer in the implementation of the `RaggedBincount` op(https://github.com/tensorflow/tensorflow/blob/8b677d79167799f71c42fd3fa074476e0295413a/tensorflow/core/kernels/bincount_op.cc#L430-L446). Before the `for` loop, `batch_idx` is set to 0. The attacker sets `splits(0)` to be 7, hence the `while` loop does not execute and `batch_idx` remains 0. This then results in writing to `out(-1, bin)`, which is before the heap allocated buffer for the output tensor. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2 and TensorFlow 2.3.3, as these are also affected.
[ { "commit_message": "[PATCH] Fix an invalid address vulnerability in `tf.raw_ops.RaggedBincount`. PiperOrigin-RevId: 368293153 Change-Id: I4b4e493d3fd05e7dc55a55de3a041a80a4f275c3 tensorflow/core/kernels/bincount_op.cc | 9 +++++++++ 1 file changed, 9 insertions(+)", "patch_text_b64": "RnJvbSBlZWJiOTZjMjgzMG...
CWE-787: Out-of-bounds Write
CVE-2023-37270
Piwigo SQL Injection vulnerability in "User-Agent"
Piwigo is open source photo gallery software. Prior to version 13.8.0, there is a SQL Injection vulnerability in the login of the administrator screen. The SQL statement that acquires the HTTP Header `User-Agent` is vulnerable at the endpoint that records user information when logging in to the administrator screen. It is possible to execute arbitrary SQL statements. Someone who wants to exploit the vulnerability must be log in to the administrator screen, even with low privileges. Any SQL statement can be executed. Doing so may leak information from the database. Version 13.8.0 contains a fix for this issue. As another mitigation, those who want to execute a SQL statement verbatim with user-enterable parameters should be sure to escape the parameter contents appropriately.
[ { "commit_message": "[PATCH] Merge pull request from GHSA-934w-qj9p-3qcx include/functions.inc.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA5Nzg0MjU1MjdkNmMxMTM4ODdmODQ1ZDc1Y2Y5ODJiYmI2MmQ3NjFhIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBQaWVycmljayBMZSBHYWxsIDxwbGdAcGl...
CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
GHSA-q347-jrx8-5pw9
Admidio vulnerable to Unrestricted Upload of File with Dangerous Type
null
[ { "commit_message": "[PATCH] Possible to upload non image files within ckeditor #1455 .../system/ckeditor_upload_handler.php | 38 +++++++++++++------ .../system/classes/FileSystemUtils.php | 6 ++- adm_program/system/classes/TableFile.php | 4 +- .../system/classes/UploadHandlerPhoto.php ...
null
CVE-2025-46687
quickjs-ng through 0.9.0 has a missing length check in JS_ReadString for a string, leading to a heap-based buffer overflow. QuickJS before 2025-04-26 is also affected.
[ { "commit_message": "[PATCH] fixed buffer overflow in BJSON String and BigInt reader (#399) quickjs.c | 7 +++++-- 1 file changed, 5 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSAxZWIwNWU0NGZhZDg5ZGFhZmE4ZWUzZWI3NGI4NTIwYjRhMzdlYzlhIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBGYWJyaWNlIEJlbGxhcmQgP...
CWE-770 Allocation of Resources Without Limits or Throttling
CVE-2025-54949
A heap buffer overflow vulnerability in the loading of ExecuTorch models can potentially result in code execution or other undesirable effects. This issue affects ExecuTorch prior to commit ede82493dae6d2d43f8c424e7be4721abe5242be
[ { "commit_message": "[PATCH] Check for buffer overflow in prim_ops::et_copy_index() Differential Revision: D78701418 Pull Request resolved: https://github.com/pytorch/executorch/pull/12697 kernels/prim_ops/et_copy_index.cpp | 19 +++++++++++++------ kernels/prim_ops/test/prim_ops_test.cpp | 2 +- 2 files ch...
Heap-based Buffer Overflow (CWE-122)
CVE-2019-15900
An issue was discovered in slicer69 doas before 6.2 on certain platforms other than OpenBSD. On platforms without strtonum(3), sscanf was used without checking for error cases. Instead, the uninitialized variable errstr was checked and in some cases returned success even if sscanf failed. The result was that, instead of reporting that the supplied username or group name did not exist, it would execute the command as root.
[ { "commit_message": "[PATCH] Added optimization to Makefile (can be set/overruled using OPT). Added flag to display all warnings during compiling. Added status checks when parsing user/group IDs for Linux. Make sure Linux drops original user's groups when running as another user. Makefile | 3 ++- doas.c | 28...
n/a
GHSA-v6gq-6h27-8r9r
null
[ { "commit_message": "[PATCH] Introduce SIXEL_ALLOCATE_BYTES_MAX macro and limit allocation size to 128MB(#74) include/sixel.h.in | 1 + src/allocator.c | 29 +++++++++++++++++++++++++++++ 2 files changed, 30 insertions(+)", "patch_text_b64": "RnJvbSAwYjFlMGIzZjdiNDQyMzNmODRlNWM5ZjUxMmY4YzkwZDZiYmJlMzNkIE1...
null
CVE-2022-2730
Authorization Bypass Through User-Controlled Key in openemr/openemr
Authorization Bypass Through User-Controlled Key in GitHub repository openemr/openemr prior to 7.0.0.1.
[ { "commit_message": "[PATCH] bug fix e4 .../summary/add_edit_amendments.php | 23 +++++++++++++++---- .../patient_file/summary/demographics.php | 8 +++---- .../patient_file/summary/list_amendments.php | 7 ++++++ .../patient_file/summary/print_amendments.php | 8 +++++++ 4 files changed, 38 inser...
CWE-639 Authorization Bypass Through User-Controlled Key
CVE-2018-17569
network/nw_buf.c in ViaBTC Exchange Server before 2018-08-21 has an integer overflow leading to memory corruption.
[ { "commit_message": "[PATCH] fix memory corruption and other 32bit overflows network/nw_buf.c | 10 ++++++++-- utils/ut_rpc.c | 10 ++++++++-- utils/ut_rpc.h | 1 + utils/ut_ws_svr.c | 2 +- utils/ut_ws_svr.h | 2 ++ 5 files changed, 20 insertions(+), 5 deletions(-)", "patch_text_b64": "RnJvbSA1YzJkYzJ...
n/a
CVE-2020-5271
Reflected XSS with dashboard calendar of PrestaShop
In PrestaShop between versions 1.6.0.0 and 1.7.6.5, there is a reflected XSS with `date_from` and `date_to` parameters in the dashboard page This problem is fixed in 1.7.6.5
[ { "commit_message": "[PATCH] Make sure the input value is a correct date classes/helper/HelperCalendar.php | 20 ++++++++++---------- 1 file changed, 10 insertions(+), 10 deletions(-)", "patch_text_b64": "RnJvbSBiNjI5MGE2NGY4NDExNzZjOWE2NjRhODMzNTBiZThmM2NiMzhmNzY3IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBQ...
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
GHSA-rj5f-vm79-5j84
OctoPrint vulnerable to Special Element Injection
null
[ { "commit_message": "[PATCH] =?UTF-8?q?=F0=9F=94=92=EF=B8=8F=20Close=20a=20sanity=20ch?= =?UTF-8?q?eck=20hole=20in=20language=20packs?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit A language pack containing a directory traversing symlink could be uploaded. Upon back...
null
GHSA-3fq7-5q53-mpg7
null
[ { "commit_message": "[PATCH] KVM: x86: Convert MSR_KVM_SYSTEM_TIME to use gfn_to_hva_cache functions (CVE-2013-1797) There is a potential use after free issue with the handling of MSR_KVM_SYSTEM_TIME. If the guest specifies a GPA in a movable or removable memory such as frame buffers then KVM might continue to...
null
CVE-2020-36280
Leptonica before 1.80.0 allows a heap-based buffer over-read in pixReadFromTiffStream, related to tiffio.c.
[ { "commit_message": "[PATCH] Issue 23654 in oss-fuzz: Heap-buffer-overflow in pixReadFromTiffStream * Increase scanline buffer for reading gray+alpha and converting to RGBA prog/dewarptest1.c | 4 ++-- src/tiffio.c | 2 +- 2 files changed, 3 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSA1Y...
n/a
CVE-2022-29264
An issue was discovered in coreboot 4.13 through 4.16. On APs, arbitrary code execution in SMM may occur.
[ { "commit_message": "[PATCH] cpu/x86/smm: Introduce SMM module loader version 2 Xeon-SP Skylake Scalable Processor can have 36 CPU threads (18 cores). Current coreboot SMM is unable to handle more than ~32 CPU threads. This patch introduces a version 2 of the SMM module loader which addresses this problem. Havi...
n/a
GHSA-g4r8-3qmh-pmch
pgAdmin has vulnerability in LDAP authentication mechanism that allows bypassing TLS certificate verification
null
[ { "commit_message": "[PATCH] 1) Fixed LDAP authentication flow vulnerable to TLS certificate verification bypass (CVE-2025-12765). #9324 2) Fixed LDAP injection vulnerability in LDAP authentication flow (CVE-2025-12764). #9325 docs/en_US/ldap.rst | 2 ++ docs/en_US/release_notes_9_10.rst | 4 +++-...
null
GHSA-wxcx-gg9c-fwp2
TorchServe vulnerable to bypass of allowed_urls configuration
null
[ { "commit_message": "[PATCH] Security fix to prevent allowed_urls Filter Bypass (#3082) * allowed url test fix * allowed url test fix * changing test name * fix format Co-authored-by: Mark Saroufim <marksaroufim@fb.com> .../serve/archive/model/ModelArchive.java | 9 ++--- .../serve/archive/model/ModelArchi...
null
GHSA-mfcp-mxhv-3www
null
[ { "commit_message": "[PATCH] patch 9.0.1145: invalid memory access with recursive substitute expression Problem: Invalid memory access with recursive substitute expression. Solution: Check the return value of vim_regsub(). src/eval.c | 5 +++++ src/testdir/test_substitute.vim | 16 ++++...
null