id
stringlengths
12
19
title
stringlengths
0
237
description
stringlengths
35
3.87k
patches
listlengths
1
22
cwe
stringlengths
2
440
GHSA-4jh3-6jhv-2mgp
react-native-mmkv Insertion of Sensitive Information into Log File vulnerability
null
[ { "commit_message": "[PATCH] fix: Don't leak encryption key in logs android/src/main/cpp/MmkvHostObject.cpp | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSBhODk5NWNjYjcxODQyODFmN2QxNjhiYWQzZTk5ODdjOWJkMDVmMDBkIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBNYXJjIFJvdXNhdnkgP...
null
CVE-2018-14719
FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to execute arbitrary code by leveraging failure to block the blaze-ds-opt and blaze-ds-core classes from polymorphic deserialization.
[ { "commit_message": "[PATCH] Fix #2097 for 2.6.7.2 release-notes/VERSION | 3 +++ .../jackson/databind/deser/BeanDeserializerFactory.java | 6 ++++++ 2 files changed, 9 insertions(+)", "patch_text_b64": "RnJvbSA4N2QyOWFmMjVlODJhMjQ5ZWExNTg1OGUyZDRlY2JmNjQwOTFkYjQ0IE1v...
n/a
GHSA-9v49-c9x8-3hm2
null
[ { "commit_message": "[PATCH] Bug #970 tcprewrite: --fixlen: do not use realloc No need to realloc if buffer is already proven to be big enough. configure.ac | 2 +- docs/CHANGELOG | 3 ++- src/common/sendpacket.h | 2 +- src/tcpedit/edit_packet.c | 1 - src/tcprewrite.c | 2 ++ 5 f...
null
CVE-2011-1588
Thunar before 1.3.1 could crash when copy and pasting a file name with % format characters due to a format string error.
[ { "commit_message": "[PATCH] Don't interpret file display names as format strings This avoids a segfault when copying/moving files containing \"%\" formatters in their name. Signed-off-by: Jannis Pohlmann <jannis@xfce.org> thunar/thunar-transfer-job.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "...
Metacharacters
CVE-2013-4205
Memory leak in the unshare_userns function in kernel/user_namespace.c in the Linux kernel before 3.10.6 allows local users to cause a denial of service (memory consumption) via an invalid CLONE_NEWUSER unshare call.
[ { "commit_message": "[PATCH] userns: unshare_userns(&cred) should not populate cred on failure unshare_userns(new_cred) does *new_cred = prepare_creds() before create_user_ns() which can fail. However, the caller expects that it doesn't need to take care of new_cred if unshare_userns() fails. We could change th...
n/a
GHSA-q624-9634-77gh
Cherry Music directory traversal vulnerability
null
[ { "commit_message": "[PATCH] fixes for CVE-2015-8309 (download arbitrary files) and CVE-2015-8309 (XSS vulnerability) Many thanks to feedersec for checking the security of CherryMusic! Note to CM users: Both those vulnerabilities only work for logged-in users. cherrymusicserver/httphandler.py | 6 +++++- res/js/...
null
CVE-2024-47227
iRedAdmin before 2.6 allows XSS, e.g., via order_name.
[ { "commit_message": "[PATCH] Fix 2 possible XSS vulnerabilities. Thanks to Simone Quatrini @surecloudcyber.com. ChangeLog | 2 ++ controllers/ldap/user.py | 5 +++++ controllers/sql/user.py | 6 ++++++ libs/sqllib/user.py | 1 - templates/...
n/a
GHSA-g96g-p7vc-32vc
null
[ { "commit_message": "[PATCH] isofs: Fix infinite looping over CE entries Rock Ridge extensions define so called Continuation Entries (CE) which define where is further space with Rock Ridge data. Corrupted isofs image can contain arbitrarily long chain of these, including a one containing loop and thus causing ...
null
GHSA-624g-8qjg-8qxf
Conform contains a Prototype Pollution Vulnerability in `parseWith...` function
null
[ { "commit_message": "[PATCH] Merge pull request from GHSA-624g-8qjg-8qxf packages/conform-dom/formdata.ts | 18 ++++++++++++++++-- 1 file changed, 16 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSA0ODE5ZDUxYjVhNTNmZDU0ODZmYzg1YzE3Y2RjMTQ4ZWIxNjBlM2RlIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBFZG11...
null
CVE-2024-43794
OpenSearch Dashboards Security Plugin improper validation of nextUrl can lead to external redirect
OpenSearch Dashboards Security Plugin adds a configuration management UI for the OpenSearch Security features to OpenSearch Dashboards. Improper validation of the nextUrl parameter can lead to external redirect on login to OpenSearch-Dashboards for specially crafted parameters. A patch is available in 1.3.19 and 2.16.0 for this issue.
[ { "commit_message": "<98922864+opensearch-trigger-bot[bot]@users.noreply.github.com> [PATCH] Update nextUrl validation to incorporate serverBasePath (#2048) (#2050) * Fix the nextUrl validation test and test url path using regex Signed-off-by: Craig Perkins <cwperx@amazon.com> * Update nextUrl validation regex ...
CWE-601: URL Redirection to Untrusted Site ('Open Redirect')
CVE-2022-36011
Null dereference on MLIR on empty function attributes in TensorFlow
TensorFlow is an open source platform for machine learning. When `mlir::tfg::ConvertGenericFunctionToFunctionDef` is given empty function attributes, it gives a null dereference. We have patched the issue in GitHub commit 1cf45b831eeb0cab8655c9c7c5d06ec6f45fc41b. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
[ { "commit_message": "[PATCH] [tfg][functiondef_import] Emit error on empty function attributes Disallow empty function attributes. Emit an error when one is encountered. PiperOrigin-RevId: 448629968 .../ir/importexport/functiondef_import.cc | 2 + .../invalid_generic_function_attr_name.pbtxt | 52 +++++++++...
CWE-476: NULL Pointer Dereference
CVE-2022-24894
Symfony storing cookie headers in HttpCache
Symfony is a PHP framework for web and console applications and a set of reusable PHP components. The Symfony HTTP cache system, acts as a reverse proxy: It caches entire responses (including headers) and returns them to the clients. In a recent change in the `AbstractSessionListener`, the response might contain a `Set-Cookie` header. If the Symfony HTTP cache system is enabled, this response might bill stored and return to the next clients. An attacker can use this vulnerability to retrieve the victim's session. This issue has been patched and is available for branch 4.4.
[ { "commit_message": "[PATCH] [HttpKernel] Remove private headers before storing responses with HttpCache .../Component/HttpKernel/HttpCache/Store.php | 20 ++++++++++++++++--- .../HttpKernel/Tests/HttpCache/StoreTest.php | 13 ++++++++++++ 2 files changed, 30 insertions(+), 3 deletions(-)", "patch_text_b64"...
CWE-285: Improper Authorization
CVE-2023-43793
Misskey allows users to bypass authentication of Bull dashboard
Misskey is an open source, decentralized social media platform. Prior to version 2023.9.0, by editing the URL, a user can bypass the authentication of the Bull dashboard, which is the job queue management UI, and access it. Version 2023.9.0 contains a fix. There are no known workarounds.
[ { "commit_message": "[PATCH] =?UTF-8?q?fix(backend):=20=E3=82=B8=E3=83=A7=E3=83=96?= =?UTF-8?q?=E3=82=AD=E3=83=A5=E3=83=BC=E7=AE=A1=E7=90=86=E7=94=BB=E9=9D=A2?= =?UTF-8?q?=E3=81=AE=E8=AA=8D=E8=A8=BC=E3=82=92=E5=9B=9E=E9=81=BF=E3=81=A7?= =?UTF-8?q?=E3=81=8D=E3=82=8B=E5=95=8F=E9=A1=8C=E3=82=92=E4=BF=AE=E6=AD=A3?=...
CWE-287: Improper Authentication
GHSA-w946-xrfr-63w7
null
[ { "commit_message": "[PATCH] fix 2 vulnerabilities reported by felixk3y framework/core/subsystems/expPaginator.php | 2 +- framework/modules/help/controllers/helpController.php | 1 + 2 files changed, 2 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBkNWMzYzE3NWI2MGJkMjZiMmI3NGVjODViOGYwZD...
null
CVE-2021-46872
An issue was discovered in Nim before 1.6.2. The RST module of the Nim language stdlib, as used in NimForum and other products, permits the javascript: URI scheme and thus can lead to XSS in some applications. (Nim versions 1.6.2 and later are fixed; there may be backports of the fix to some earlier versions. NimForum 2.2.0 is fixed.)
[ { "commit_message": "[PATCH] fixes a possible 'javascript:' protocol exploit [backport:1.0] (#19134) * fixes a possible 'javascript:' protocol exploit [backport:1.0] * add tests * Update tests/stdlib/trstgen.nim * add the same logic for hyperlinks * move the logic into a proc Co-authored-by: narimiran <narimira...
n/a
GHSA-3fc5-9x9m-vqc4
Privilege Escalation in express-cart
null
[ { "commit_message": "[PATCH] Fix issue with ability to create admin user by setting referrer routes/user.js | 93 ++++++++++++++++++++++++++------------------------ 1 file changed, 49 insertions(+), 44 deletions(-)", "patch_text_b64": "RnJvbSBiYWNjYWFlOWIwYjcyZjAwYjEwYzU0NTNjYTAwMjMxMzQwYWQzZTNiIE1vbiBTZXAgM...
null
CVE-2021-25914
Prototype pollution vulnerability in 'object-collider' versions 1.0.0 through 1.0.3 allows attacker to cause a denial of service and may lead to remote code execution.
[ { "commit_message": "[PATCH] fix: __proto__ property merge src/utils/CollideUtil.ts | 17 ++++++----- test/unit/CollideUtilTestSuite.ts | 49 ++++++++++++++++++++++--------- 2 files changed, 44 insertions(+), 22 deletions(-)", "patch_text_b64": "RnJvbSAzMjFmNzVhN2Y4ZTdiMzM5M2U1YjdkZDZkZDlhYjI2ZWRlNTk...
Prototype Pollution
GHSA-cm95-9q8x-72h6
null
[ { "commit_message": "[PATCH] #30 - Security fix: File extension bypass app/Controllers/FileManagerController.php | 4 +- app/Helpers/Security.php | 2 +- composer.json | 2 +- composer.lock | 1279 ++++++--------------- 4 files change...
null
GHSA-7c73-ppwr-83wp
null
[ { "commit_message": "[PATCH] blkcg: fix double free of new_blkg in blkcg_init_queue If blkg_create fails, new_blkg passed as an argument will be freed by blkg_create, so there is no need to free it again. Signed-off-by: Hou Tao <houtao1@huawei.com> Signed-off-by: Jens Axboe <axboe@fb.com> block/blk-cgroup.c | 4...
null
GHSA-92mr-v722-f48m
Improper Input Validation in Jupyter Notebook
null
[ { "commit_message": "[PATCH 1/4] set mime-type on /files/ IPython/html/files/handlers.py | 5 +++++ 1 file changed, 5 insertions(+)", "patch_text_b64": "RnJvbSBkNzI5Y2U3YzIwNjNjMGRlNzQ2YTdjMmVhMzk2OTcwNDBkMGFmNWJmIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBNaW4gUksgPGJlbmphbWlucmtAZ21haWwuY29tPgpEYXRlOiBNb24s...
null
CVE-2021-40507
An issue was discovered in the ALU unit of the OR1200 (aka OpenRISC 1200) processor 2011-09-10 through 2015-11-11. The overflow flag is not being updated correctly for the subtract instruction, which results in an incorrect value in the overflow flag. Any software that relies on this flag may experience corruption in execution.
[ { "commit_message": "[PATCH] or1200: add carry, overflow bits, and range exception rtl/verilog/or1200_alu.v | 103 +++++++++++++++++++++------------- rtl/verilog/or1200_cpu.v | 21 ++++++- rtl/verilog/or1200_defines.v | 27 +++++++-- rtl/verilog/or1200_except.v | 14 ++++- rtl/verilog/or1200_mult_ma...
n/a
GHSA-22m9-m3ww-53h3
Flarum post mentions can be used to read any post on the forum without access control
null
[ { "commit_message": "[PATCH] Merge pull request from GHSA-22m9-m3ww-53h3 * fix: check post visibility when mentioning Signed-off-by: Sami Mazouz <sychocouldy@gmail.com> * fix: `mentionsPosts` include is not used and leaks private posts Signed-off-by: Sami Mazouz <sychocouldy@gmail.com> * chre: use `PostReposito...
null
CVE-2016-9909
The serializer in html5lib before 0.99999999 might allow remote attackers to conduct cross-site scripting (XSS) attacks by leveraging mishandling of the < (less than) character in attribute values.
[ { "commit_message": "[PATCH] Fix #11, #12: quote attributes that need escaping in legacy browsers These are mostly out of the market now, so this isn't massively needed any more; nevertheless, avoiding XSS as much as possible is inevitably desirable. This alters the API so that quote_attr_values is now a ternar...
n/a
GHSA-9crj-hpxh-f6qg
pgAdmin 4 vulnerable to directory traversal
null
[ { "commit_message": "[PATCH] Ensure that the authenticated users can't access each other's directories and files by providing relative paths. #5734 web/pgadmin/tools/backup/__init__.py | 41 ++-------- web/pgadmin/tools/import_export/__init__.py | 36 ++------- .../tools/import_export_servers/__init__....
null
GHSA-9wv6-86v2-598j
path-to-regexp outputs backtracking regular expressions
null
[ { "commit_message": "[PATCH] Add backtrack protection to parameters index.js | 90 ++++++++++++++++++++++++++++++++------------------------ test.js | 40 ++++++++++++++++++++++++- 2 files changed, 90 insertions(+), 40 deletions(-)", "patch_text_b64": "RnJvbSAyOWI5NmI0YTFkZTUyODI0ZTFjYTBmNDlhNzAxMTgzY2M0ZWQ0N...
null
GHSA-58h4-9m7m-j9m4
@okta/oidc-middlewareOpen Redirect vulnerability
null
[ { "commit_message": "[PATCH] Prevent open redirects (#53) OKTA-499372 fix: addresses open redirect CHANGELOG.md | 4 +++ src/oidcUtil.js | 3 +- test/e2e/harness/server.js | 4 +++ test/e2e/page-objects/OktaSignInPage.js | 2 ++ test/e2e/page-objec...
null
GHSA-5qg9-ccww-5w4r
null
[ { "commit_message": "[PATCH] irda: validate peer name and attribute lengths Length fields provided by a peer for names and attributes may be longer than the destination array sizes. Validate lengths to prevent stack buffer overflows. Signed-off-by: Dan Rosenberg <drosenberg@vsecurity.com> Cc: stable@kernel.org...
null
GHSA-wv8g-fx9j-q2jg
phpMyAdmin cross-site scripting Vulnerability via ENUM value
null
[ { "commit_message": "[PATCH] Bug 4544: additional fix for 4.2.x Signed-off-by: Marc Delisle <marc@infomarc.info> libraries/TableSearch.class.php | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAzMDRmYjJiNjQ1YjM2YTM5ZTAzYjk1NGZkYmQ1NjcxNzNlYmU2NDQ4IE1vbiBTZXAgMTcgMDA6MDA6MDA...
null
PYSEC-2022-71
null
[ { "commit_message": "[PATCH] Test for case that would lead to undefined behaviour and throw error if found tensorflow/core/kernels/sequence_ops.cc | 19 ++++++++++++------- tensorflow/core/ops/math_ops.cc | 7 +++++++ .../kernel_tests/array_ops/init_ops_test.py | 2 +- 3 files changed, 20 i...
null
CVE-2022-23074
Recipes - Stored XSS in Name Parameter
In Recipes, versions 0.17.0 through 1.2.5 are vulnerable to Stored Cross-Site Scripting (XSS), in the ‘Name’ field of Keyword, Food and Unit components. When a victim accesses the Keyword/Food/Unit endpoints, the XSS payload will trigger. A low privileged attacker will have the victim's API key and can lead to admin's account takeover.
[ { "commit_message": "[PATCH] improved output sanitization of several views vue/package-lock.json | 43534 ++++++++++++++++ vue/package.json | 3 +- .../ExportResponseView/ExportResponseView.vue | 5 +- .../ImportResponseView/ImportResponseView.vue | ...
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
PYSEC-2023-312
null
[ { "commit_message": "[PATCH] Prevent replicas from sending commands that interact with keyspace (#8868) This solves an issue reported in #8712 in which a replica would bypass the client write pause check and cause an assertion due to executing a write command during failover. The fact is that we don't expect re...
null
CVE-2025-24357
vLLM allows a malicious model RCE by torch.load in hf_model_weights_iterator
vLLM is a library for LLM inference and serving. vllm/model_executor/weight_utils.py implements hf_model_weights_iterator to load the model checkpoint, which is downloaded from huggingface. It uses the torch.load function and the weights_only parameter defaults to False. When torch.load loads malicious pickle data, it will execute arbitrary code during unpickling. This vulnerability is fixed in v0.7.0.
[ { "commit_message": "[PATCH] Set weights_only=True when using torch.load() (#12366) Signed-off-by: Russell Bryant <rbryant@redhat.com> vllm/assets/image.py | 2 +- vllm/lora/models.py | 3 ++- vllm/model_executor/model_loader/weight_utils.py | 8 +++++--- vl...
CWE-502: Deserialization of Untrusted Data
GHSA-637h-ch24-xp9m
XWiki Full Calendar Macro vulnerable to data leak through Calendar.JSONService
null
[ { "commit_message": "[PATCH] Merge commit from fork * security fix * security fix * add a check if the property exists Co-authored-by: Michael Hamann <michael@content-space.de> * security fix * security fix Co-authored-by: Michael Hamann <michael@content-space.de> .../main/resources/Calendar/JSONService.xml |...
null
GHSA-87m9-rv8p-rgmg
go-grpc-compression has a zstd decompression bombing vulnerability
null
[ { "commit_message": "[PATCH] Do not use zstd.Decoder.DecodeAll on untrusted data Otherwise, malicious peers could DoS us with decompression bombs. This issue was uncovered during a security audit performed by 7ASecurity, facilitated by OSTIF, for the OpenTelemetry project. https://opentelemetry.io/blog/2024/cve...
null
GHSA-9323-4x78-29mv
null
[ { "commit_message": "[PATCH] avcodec/h264: Clear delayed_pic on deallocation Fixes use of freed memory Fixes: case5_av_frame_copy_props.mp4 Found-by: Michal Zalewski <lcamtuf@coredump.cx> Signed-off-by: Michael Niedermayer <michaelni@gmx.at> libavcodec/h264.c | 1 + 1 file changed, 1 insertion(+)", "patch_te...
null
CVE-2019-11069
Sequelize version 5 before 5.3.0 does not properly ensure that standard conforming strings are used.
[ { "commit_message": "[PATCH] feat(postgres): enable standard conforming strings when required (#10746) lib/dialects/abstract/connection-manager.js | 5 ++- lib/dialects/postgres/connection-manager.js | 34 ++++++++++++++++++--- 2 files changed, 33 insertions(+), 6 deletions(-)", "patch_text_b64": "RnJvbSA4NT...
n/a
CVE-2021-4049
Cross-Site Request Forgery (CSRF) in livehelperchat/livehelperchat
livehelperchat is vulnerable to Cross-Site Request Forgery (CSRF)
[ { "commit_message": "[PATCH] csrf for logout url .../design/defaulttheme/tpl/lhuser/wentinactive.tpl.php | 2 +- .../defaulttheme/tpl/pagelayouts/parts/user_box.tpl.php | 2 +- lhc_web/modules/lhuser/logout.php | 7 ++++++- lhc_web/modules/lhuser/module.php |...
CWE-352 Cross-Site Request Forgery (CSRF)
CVE-2023-51652
OWASP.AntiSamy mXSS when preserving comments
OWASP AntiSamy .NET is a library for performing cleansing of HTML coming from untrusted sources. Prior to version 1.2.0, there is a potential for a mutation cross-site scripting (mXSS) vulnerability in AntiSamy caused by flawed parsing of the HTML being sanitized. To be subject to this vulnerability the `preserveComments` directive must be enabled in your policy file and also allow for certain tags at the same time. As a result, certain crafty inputs can result in elements in comment tags being interpreted as executable when using AntiSamy's sanitized output. This is patched in OWASP AntiSamy .NET 1.2.0 and later. See important remediation details in the reference given below. As a workaround, manually edit the AntiSamy policy file (e.g., antisamy.xml) by deleting the `preserveComments` directive or setting its value to `false`, if present. Also it would be useful to make AntiSamy remove the `noscript` tag by adding a line described in the GitHub Security Advisory to the tag definitions under the `<tagrules>` node, or deleting it entirely if present. As the previously mentioned policy settings are preconditions for the mXSS attack to work, changing them as recommended should be sufficient to protect you against this vulnerability when using a vulnerable version of this library. However, the existing bug would still be present in AntiSamy or its parser dependency (HtmlAgilityPack). The safety of this workaround relies on configurations that may change in the future and don't address the root cause of the vulnerability. As such, it is strongly recommended to upgrade to a fixed version of AntiSamy.
[ { "commit_message": "[PATCH] Add more tests for mXSS OWASP.AntiSamyTests/Html/AntiSamyTest.cs | 4 ++++ 1 file changed, 4 insertions(+)", "patch_text_b64": "RnJvbSA3ZTUwMGRhZWY2YWQ5YzEwZTk3YzY4ZmVhYjc4ZjRjYjZlMzA4M2M2IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiA9P1VURi04P3E/U2ViYXN0aT1DMz1BMW49MjBQYXNzYXJvPz0g...
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
GHSA-ch8j-q2rq-5c87
null
[ { "commit_message": "[PATCH] Log Injection Attack Vulnerability By logging the unsanitized user input, a log injection attack can occur. This commit removes user-provided values from the logs. resolverapi/endpoints.py | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA5ZWJhNmJh...
null
CVE-2025-58438
internetarchive is vulnerable to Directory Traversal through file downloads
internetarchive is a Python and Command-Line Interface to Archive.org In versions 5.5.0 and below, there is a directory traversal (path traversal) vulnerability in the File.download() method of the internetarchive library. The file.download() method does not properly sanitize user-supplied filenames or validate the final download path. A maliciously crafted filename could contain path traversal sequences (e.g., ../../../../windows/system32/file.txt) or illegal characters that, when processed, would cause the file to be written outside of the intended target directory. An attacker could potentially overwrite critical system files or application configuration files, leading to a denial of service, privilege escalation, or remote code execution, depending on the context in which the library is used. The vulnerability is particularly critical for users on Windows systems, but all operating systems are affected. This issue is fixed in version 5.5.1.
[ { "commit_message": "[PATCH 1/9] Add robust cross-platform filename sanitization and unsanitization utilities - Sanitize filenames for Windows and POSIX systems with percent-encoding - Handle invalid characters and trailing spaces/dots on Windows - Optionally avoid colon encoding for macOS compatibility - Provi...
CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2015-9405
The wp-piwik plugin before 1.0.5 for WordPress has XSS.
[ { "commit_message": "[PATCH] Security fix + translations Security fix (XSS vulnerability) + several updated translations: Portuguese (Brazil), Italian, Albanian classes/WP_Piwik.php | 2 +- classes/WP_Piwik/Admin/Settings.php | 6 +- classes/WP_Piwik/Widget/Search.php | 4 +- languages/wp-piw...
n/a
GHSA-pvgh-6wjg-x887
null
[ { "commit_message": "[PATCH] IKEv1: packet retransmit fixes for Main/Aggr/Xauth modes - Do not schedule retransmits for inI1outR1 packets (prevent DDOS) - Do schedule retransmits for XAUTH packets programs/pluto/ikev1.c | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-)", "patch_text_b64": "RnJvbS...
null
GHSA-h8jm-2x53-xhp5
X.509 Email Address Variable Length Buffer Overflow
null
[ { "commit_message": "[PATCH] Bump to OpenSSL 3.0.7 Cargo.toml | 2 +- openssl | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSA0YTMxYzE0ZjMxZTFhMDhjMTg4OTNhMzdlMzA0ZGQxZGQ0YjdkYWEzIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBTdGV2ZW4gRmFja2xlciA8c2ZhY2tsZXJAZ21haWwuY29tPgp...
null
GHSA-9q9v-qgwx-84mr
Command injection in PaddlePaddle
null
[ { "commit_message": "[PATCH] fix mkdir python/paddle/distributed/fleet/launch_utils.py | 10 +++++----- python/paddle/distributed/fleet/utils/fs.py | 2 +- python/paddle/distributed/utils/launch_utils.py | 2 +- 3 files changed, 7 insertions(+), 7 deletions(-)", "patch_text_b64": "RnJvbSAyYmZlMzU4MDQzMDk...
null
GHSA-f7gq-h8jv-h3cq
ash_authentication_phoenix has Insufficient Session Expiration
null
[ { "commit_message": "[PATCH] improvement: revoke stored sessions on log out (#634) dev/dev_web/controllers/auth_controller.ex | 2 +- documentation/tutorials/get-started.md | 2 +- lib/ash_authentication_phoenix/controller.ex | 43 ++++++++++++++----- lib/ash_authentication_phoenix/plug.ex | 12...
null
GHSA-jhcg-4vw7-q849
null
[ { "commit_message": "[PATCH] KVM: x86: Introduce segmented_write_std Introduces segemented_write_std. Switches from emulated reads/writes to standard read/writes in fxsave, fxrstor, sgdt, and sidt. This fixes CVE-2017-2584, a longstanding kernel memory leak. Since commit 283c95d0e389 (\"KVM: x86: emulate FXSAV...
null
CVE-2021-4164
Cross-Site Request Forgery (CSRF) in janeczku/calibre-web
calibre-web is vulnerable to Cross-Site Request Forgery (CSRF)
[ { "commit_message": "[PATCH] Migrated some routes to POST - delete shelf, import ldap users - delete_kobo token, kobo force full sync - shutdown, reconnect, shutdown cps/admin.py | 10 +++++----- cps/editbooks.py | 17 ++++++----------- cps/kobo_auth.py | 8 ++------ cps/shelf.py ...
CWE-352 Cross-Site Request Forgery (CSRF)
GHSA-2474-2566-3qxp
Apache Batik information disclosure vulnerability
null
[ { "commit_message": "[PATCH] BATIK-1347: Switch to empty whitelist for rhino git-svn-id: https://svn.apache.org/repos/asf/xmlgraphics/batik/trunk@1905011 13f79535-47bb-0310-9956-ffa450edef68 .../org/apache/batik/script/rhino/RhinoClassShutter.java | 5 ----- .../java/org/apache/batik/test/xml/JUnitRunnerTest...
null
GHSA-2w7w-2j92-44hx
HTTP Request Smuggling in akka-http-core
null
[ { "commit_message": "[PATCH] core: disallow parsing of Transfer-Encoding other than chunked (#3754) ...-transfer-encoding-header-parsing.excludes | 2 + .../engine/parsing/HttpMessageParser.scala | 64 +++++++++------- .../engine/parsing/HttpRequestParser.scala | 63 +++++++-------- .../engine/parsing/HttpR...
null
GHSA-27r7-3m9x-r533
traQ Allows Insertion of Sensitive Information into Log File
null
[ { "commit_message": "[PATCH 1/2] =?UTF-8?q?chore(gorm):=20=E4=B8=80=E6=99=82=E7=9A=84?= =?UTF-8?q?=E3=81=ABGORM=E3=81=AE=E3=83=AD=E3=82=B0=E3=82=92=E5=88=87?= =?UTF-8?q?=E3=82=8B?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit cmd/serve.go | 3 ++- 1 file changed, 2 in...
null
CVE-2018-6834
static/js/pad_utils.js in Etherpad Lite before v1.6.3 has XSS via window.location.href.
[ { "commit_message": "[PATCH] better sanitize window location in error messages src/static/js/pad_utils.js | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAzOGIxZTBhMzVlNDJlNGQyZTFmZjk5YWZjNTk4NzI1YzVmN2YyYTZhIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBSb2JlcnQgSGVsbWVyIDxyaGVs...
n/a
CVE-2012-10012
BestWebSoft Facebook Like Button facebook-button-plugin.php fcbk_bttn_plgn_settings_page cross-site request forgery
A vulnerability has been found in BestWebSoft Facebook Like Button up to 2.13 and classified as problematic. Affected by this vulnerability is the function fcbk_bttn_plgn_settings_page of the file facebook-button-plugin.php. The manipulation leads to cross-site request forgery. The attack can be launched remotely. The patch is named 33144ae5a45ed07efe7fceca901d91365fdbf7cb. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-225355.
[ { "commit_message": "[PATCH] V2.14 - Arabic language file is added to the plugin. Cross Site Request Forgery bug was fixed. git-svn-id: https://plugins.svn.wordpress.org/facebook-button-plugin/trunk@576704 b8457f37-d9ea-0310-8a92-e5e31aec5664 facebook-button-plugin.php | 7 +- languages/facebook-ar_AR.mo | Bi...
CWE-352 Cross-Site Request Forgery
CVE-2024-54819
I, Librarian before and including 5.11.1 is vulnerable to Server-Side Request Forgery (SSRF) due to improper input validation in classes/security/validation.php
[ { "commit_message": "[PATCH] SSRF fix classes/security/validation.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBlZDM2ZjZmMjU4MzkyZmEyZWM3MmY5ODIwNjYxZGVkNzVkOTFhY2NjIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBNYXJ0aW4gS3VjZWogPGkubGlicmFyaWFuLnNvZnR3YXJlQGdtYWlsLmNvbT4K...
n/a
CVE-2018-9159
In Spark before 2.7.2, a remote attacker can read unintended static files via various representations of absolute or relative pathnames, as demonstrated by file: URLs and directory traversal sequences. NOTE: this product is unrelated to Ignite Realtime Spark.
[ { "commit_message": "[PATCH] Fix for #981, patch 2 .../spark/resource/ClassPathResource.java | 30 +++++++++++++++---- .../jetty/EmbeddedJettyFactoryTest.java | 26 ++++++++++------ .../staticresources/StaticResources.java | 4 +-- 3 files changed, 44 insertions(+), 16 deletions(-)", "patch_tex...
n/a
CVE-2025-64521
authentik deactivated service accounts can authenticate to OAuth
authentik is an open-source Identity Provider. Prior to versions 2025.8.5 and 2025.10.2, when authenticating with client_id and client_secret to an OAuth provider, authentik creates a service account for the provider. In previous authentik versions, authentication for this account was possible even when the account was deactivated. Other permissions are correctly applied and federation with other providers still take assigned policies correctly into account. authentik versions 2025.8.5 and 2025.10.2 fix this issue. A workaround involves adding a policy to the application that explicitly checks if the service account is still valid, and deny access if not.
[ { "commit_message": "<135050075+authentik-automation[bot]@users.noreply.github.com> [PATCH] internal: Automated internal backport: 1498-oauth2-cc-user-active.sec.patch to authentik-main (#18265) Automated internal backport of patch 1498-oauth2-cc-user-active.sec.patch to authentik-main Co-authored-by: authentik...
CWE-289: Authentication Bypass by Alternate Name
GHSA-8jg3-rx43-3fv4
Answer vulnerable to Exposure of Sensitive Information Through Metadata
null
[ { "commit_message": "[PATCH] remove exif go.mod | 13 ++++++++++--- go.sum | 26 ++++++++++++++++++++++---- internal/service/uploader/upload.go | 19 +++++++++++++++++++ 3 files changed, 51 insertions(+), 7 deletions(-)", "patch_text_b64": "RnJvbSBhYzNm...
null
CVE-2025-62419
DataEase vulnerable to JDBC URL injection in DB2 and MongoDB data source configuration
DataEase is a data visualization and analytics platform. In DataEase versions through 2.10.13, a JDBC URL injection vulnerability exists in the DB2 and MongoDB data source configuration handlers. In the DB2 data source handler, when the extraParams field is empty, the HOSTNAME, PORT, and DATABASE values are directly concatenated into the JDBC URL without filtering illegal parameters. This allows an attacker to inject a malicious JDBC string into the HOSTNAME field to bypass previously patched vulnerabilities CVE-2025-57773 and CVE-2025-58045. The vulnerability is fixed in version 2.10.14. No known workarounds exist.
[ { "commit_message": "[PATCH] =?UTF-8?q?fix:=20=E4=BF=AE=E5=A4=8D=20jdbc=20=E6=BC=8F?= =?UTF-8?q?=E6=B4=9E?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit .../java/io/dataease/datasource/type/Db2.java | 17 +++++++++-------- .../java/io/dataease/datasource/type/H2.java ...
CWE-502: Deserialization of Untrusted Data
GHSA-q4hg-rmq2-52q9
Improper Locking in Apache Tomcat
null
[ { "commit_message": "[PATCH] Expand HTTP/2 timeout handling to connection window exhaustion on write. .../coyote/http2/Http2UpgradeHandler.java | 32 +++++++++++++++++-- java/org/apache/coyote/http2/Stream.java | 27 +++++++++------- webapps/docs/changelog.xml | 4 +++ 3 files changed,...
null
GHSA-p37h-rg3w-23wx
ChakraCore RCE Vulnerability
null
[ { "commit_message": "[PATCH] [CVE-2018-8505] Edge - Chakra::TypeConfusion_8_16 JIT - Qihoo 360 lib/Runtime/Language/JavascriptOperators.cpp | 7 ++++++- lib/Runtime/Library/JavascriptArray.cpp | 10 +++------- 2 files changed, 9 insertions(+), 8 deletions(-)", "patch_text_b64": "RnJvbSAwOGYxMWRmNDVhZWYy...
null
GHSA-44r7-7p62-q3fr
miekg/dns insecurely generates random numbers
null
[ { "commit_message": "[PATCH] Use crypto/rand for random id generation. (#1044) * Use crypto/rand for random id generation. Fixes #1043 and #1037 * Panic on rare crypto/rand error. * Fixes in response to review. msg.go | 52 ++++++++++------------------------------------------ 1 file changed, 10 insertions(+), 42...
null
CVE-2025-53098
Roo Code Vulnerable to Potential Remote Code Execution via Model Context Protocol
Roo Code is an AI-powered autonomous coding agent. The project-specific MCP configuration for the Roo Code agent is stored in the `.roo/mcp.json` file within the VS Code workspace. Because the MCP configuration format allows for execution of arbitrary commands, prior to version 3.20.3, it would have been possible for an attacker with access to craft a prompt to ask the agent to write a malicious command to the MCP configuration file. If the user had opted-in to auto-approving file writes within the project, this would have led to arbitrary command execution. This issue is of moderate severity, since it requires the attacker to already be able to submit prompts to the agent (for instance through a prompt injection attack), for the user to have MCP enabled (on by default), and for the user to have enabled auto-approved file writes (off by default). Version 3.20.3 fixes the issue by adding an additional layer of opt-in configuration for auto-approving writing to Roo's configuration files, including all files within the `.roo/` folder.
[ { "commit_message": "[PATCH] Add logic to prevent auto-approving edits of configuration files (#4667) * Add logic to prevent auto-approving edits of configuration files * Fix tests * Update patterns packages/types/src/global-settings.ts | 2 + packages/types/src/message.ts | 1 + .../p...
CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')
CVE-2025-66471
urllib3 Streaming API improperly handles highly compressed data
urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.0 and prior to 2.6.0, the Streaming API improperly handles highly compressed data. urllib3's streaming API is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. When streaming a compressed response, urllib3 can perform decoding or decompression based on the HTTP Content-Encoding header (e.g., gzip, deflate, br, or zstd). The library must read compressed data from the network and decompress it until the requested chunk size is met. Any resulting decompressed data that exceeds the requested amount is held in an internal buffer for the next read operation. The decompression logic could cause urllib3 to fully decode a small amount of highly compressed data in a single operation. This can result in excessive resource consumption (high CPU usage and massive memory allocation for the decompressed data.
[ { "commit_message": "[PATCH] Merge commit from fork * Prevent decompression bomb for zstd in Python 3.14 * Add experimental `decompress_iter` for Brotli * Update changes for Brotli * Add `GzipDecoder.decompress_iter` * Test https://github.com/python-hyper/brotlicffi/pull/207 * Pin Brotli * Add `decompress_iter`...
CWE-409: Improper Handling of Highly Compressed Data (Data Amplification)
CVE-2023-1361
SQL Injection in unilogies/bumsys
SQL Injection in GitHub repository unilogies/bumsys prior to v2.0.2.
[ { "commit_message": "[PATCH] Fix SQL Injection core/ajax/ajax_data.php | 618 ++++++++++++++++++++++++++++++++++++---- 1 file changed, 564 insertions(+), 54 deletions(-)", "patch_text_b64": "RnJvbSA2YTMyOGViNWJmOWRiYjQ0MzI5YTNkZjgyZTk1NjgzYjc3YzQ3MzBkIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBLaHVyc2hpZCBBbG...
CWE-89 Improper Neutralization of Special Elements used in an SQL Command
CVE-2025-62719
LinkAce: Limited Server-Side Request Forgery (SSRF) in Keyword Fetching Functionality
LinkAce is a self-hosted archive to collect website links. In versions 2.3.0 and below, the htmlKeywordsFromUrl function in the FetchController class accepts user-provided URLs and makes HTTP requests to them without validating that the destination is not an internal or private network resource. This Server-Side Request Forgery (SSRF) vulnerability allows authenticated attackers to use the application server to perform port scanning and service discovery on internal networks. Practical impact is very limited because the function only extracts content from HTML meta keywords tags, which prevents meaningful data exfiltration from databases, APIs, or cloud metadata endpoints. This issue is fixed in version 2.4.0.
[ { "commit_message": "[PATCH] Discard fetching keywords from private IP addresses app/Http/Controllers/FetchController.php | 5 +++-- lang/en_US/validation.php | 1 + tests/Controller/FetchControllerTest.php | 28 ++++++++++++++++++++++++ 3 files changed, 32 insertions(+), 2 deletions(-)", "pat...
CWE-918: Server-Side Request Forgery (SSRF)
GHSA-wrwf-pmmj-w989
Observable Discrepancy in BouncyCastle
null
[ { "commit_message": "[PATCH] Confirm size of decrypted PMS before using .../impl/jcajce/JceDefaultTlsCredentialedDecryptor.java | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBhMDBiNjg0NDY1YjM4ZDcyMmNhOWEzNTQzYjhhZjg1NjhlNmJhZDVjIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGc...
null
CVE-2022-4456
falling-fruit cross site scripting
A vulnerability has been found in falling-fruit and classified as problematic. This vulnerability affects unknown code. The manipulation leads to cross site scripting. The attack can be initiated remotely. The name of the patch is 15adb8e1ea1f1c3e3d152fc266071f621ef0c621. It is recommended to apply a patch to fix this issue. VDB-215446 is the identifier assigned to this vulnerability.
[ { "commit_message": "[PATCH 1/3] Fix XSS vulnerability passing categories array app/views/layouts/application.html.erb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA5MjA2ZDc4ZGQwOWMwY2M4Mzg5N2U3ODMyNjZkYTgwMGZhYjFjOTAzIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBlendlbHR5IDx...
CWE-707 Improper Neutralization -> CWE-74 Injection -> CWE-79 Cross Site Scripting
CVE-2025-23035
Cross-Site Scripting (XSS) Stored endpoint 'adicionar_tipo_quadro_horario.php' parameter 'tipo' in WeGIA
WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. A Stored Cross-Site Scripting (XSS) vulnerability was identified in the `adicionar_tipo_quadro_horario.php` endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the `tipo` parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk. The application fails to properly validate and sanitize user inputs in the `adicionar_tipo_quadro_horario.php` parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim's browser, potentially compromising the user's data and system. This issue has been addressed in version 3.2.6. All users are advised to upgrade. There are no known workarounds for this vulnerability.
[ { "commit_message": "[PATCH] =?UTF-8?q?Resolu=C3=A7=C3=A3o=20XSS=20[Issue=20#863]?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit controle/QuadroHorarioControle.php | 43 ++++++++++++++++------- html/funcionario/cadastro_funcionario.php | 4 +-- 2 files changed,...
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2022-24377
Command Injection
The package cycle-import-check before 1.3.2 are vulnerable to Command Injection via the writeFileToTmpDirAndOpenIt function due to improper user-input sanitization.
[ { "commit_message": "[PATCH] chore: dep update src/file.ts | 25 +++++-------------------- src/index.ts | 2 -- 2 files changed, 5 insertions(+), 22 deletions(-)", "patch_text_b64": "RnJvbSAxY2E5N2I1OWRmN2U5YzcwNDQ3MWZjYjRjZjA0MmNlNzZkN2M5ODkwIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBUaGVvIFN1biA8dGhlby5zd...
Command Injection
PYSEC-2020-253
null
[ { "commit_message": "[PATCH] Fix integer overflow in BMP decoder by making the checks in DecodeBmp more stringent. Add fuzzer to improve the robustness of the decoder in the future. PiperOrigin-RevId: 185780111 tensorflow/core/kernels/decode_bmp_op.cc | 27 +++++++++++++---- tensorflow/core/kernels/fuzzing...
null
CVE-2024-8196
Missing Authentication for Critical Function in mintplex-labs/anything-llm
In mintplex-labs/anything-llm v1.5.11 desktop version for Windows, the application opens server port 3001 on 0.0.0.0 with no authentication by default. This vulnerability allows an attacker to gain full backend access, enabling them to perform actions such as deleting all data from the workspace.
[ { "commit_message": "[PATCH] Opt-in network discover collector/index.js | 24 +-- frontend/src/App.jsx | 5 + .../src/components/SettingsSidebar/index.jsx | 6 + frontend/src/pages/Admin/System/index.jsx | 159 ++++++++---------- server/index.js ...
CWE-306 Missing Authentication for Critical Function
GHSA-5gmg-xg53-5783
null
[ { "commit_message": "[PATCH] Add eval folder path (#191) Fixes: https://github.com/xataio/agent/issues/179 apps/dbagent/.env.eval.example | 1 + apps/dbagent/.env.example | 2 +- apps/dbagent/src/app/api/evals/route.ts | 18 ++++++++++++++---- apps/dbagent/src/evals/lib/test-id.ts | 9 +...
null
GHSA-jx6q-fq9h-6g7q
Pedroetb TTS-API OS Command Injection
null
[ { "commit_message": "[PATCH] Fix command injection vulnerability and other bugs Change command execution approach, from 'child_process.exec' to 'child_process.spawn', removing the chance to send shell commands to API. This increase code complexity, but fix a serious problem in return. Improve logging, showing e...
null
GHSA-crg9-44h2-xw35
Apache ActiveMQ is vulnerable to Remote Code Execution
null
[ { "commit_message": "[PATCH] AMQ-9370 - Openwire marshaller should validate Throwable class type (cherry picked from commit 3eaf3107f4fb9a3ce7ab45c175bfaeac7e866d5b) (cherry picked from commit d0ccdd31544ada83185554c87c7aa141064020f0) activemq-client/pom.xml | 11 ++ .../activemq/openwire/...
null
CVE-2023-24181
LuCI openwrt-22.03 branch git-22.361.69894-438c598 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the component /openvpn/pageswitch.htm.
[ { "commit_message": "[PATCH] luci-app-openvpn: fix potential XSS in pageswitch template Ensure to escape URL instance parameter displayed in the heading. Signed-off-by: Jo-Philipp Wich <jo@mein.io> .../luci-app-openvpn/luasrc/view/openvpn/pageswitch.htm | 2 +- 1 file changed, 1 insertion(+), 1 deletion(...
n/a
CVE-2014-4660
Ansible before 1.5.5 constructs filenames containing user and password fields on the basis of deb lines in sources.list, which might allow local users to obtain sensitive credential information in opportunistic circumstances by leveraging existence of a file that uses the "deb http://user:pass@server:port/" format.
[ { "commit_message": "[PATCH] Backporting apt_repository module from devel library/packaging/apt_repository | 91 +++++++++++++++++--------------- 1 file changed, 48 insertions(+), 43 deletions(-)", "patch_text_b64": "RnJvbSBjNGI1ZTQ2MDU0Yzc0MTc2YjI0NDZjODJkNGRmMWEyNjEwZWRkYzA4IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAw...
n/a
CVE-2025-55300
Komari Allows Cross-site WebSocket Hijacking
Komari is a lightweight, self-hosted server monitoring tool designed to provide a simple and efficient solution for monitoring server performance. Prior to 1.0.4-fix1, WebSocket upgrader has disabled origin checking, enabling Cross-Site WebSocket Hijacking (CSWSH) attacks against authenticated users. Any third party website can send requests to the terminal websocket endpoint with browser's cookies, resulting in remote code execution. This vulnerability is fixed in 1.0.4-fix1.
[ { "commit_message": "[PATCH] =?UTF-8?q?fix:=20WS=E8=B7=A8=E5=9F=9F=E6=A3=80=E6=9F=A5?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit api/terminal.go | 12 +++++++++++- 1 file changed, 11 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAzNzE1ZjJiM2Y5NWFkNGQ0...
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
GHSA-cgcg-p68q-3w7v
langchain-experimental vulnerable to Arbitrary Code Execution
null
[ { "commit_message": "[PATCH] Remove python eval from vector sql db chain (#10937) <!-- Thank you for contributing to LangChain! Replace this entire comment with: - **Description:** a description of the change, - **Issue:** the issue # it fixes (if applicable), - **Dependencies:** any dependencies required for t...
null
CVE-2025-11917
WPeMatico RSS Feed Fetcher <= 2.8.11 - Authenticated (Subscriber+) Server-Side Request Forgery via wpematico_test_feed
The WPeMatico RSS Feed Fetcher plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 2.8.11 via the wpematico_test_feed() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
[ { "commit_message": "[PATCH 1/2] fix vulnerability app/campaign_edit.php | 1 + app/js/campaign_edit.js | 2 ++ app/wpematico_functions.php | 28 ++++++++++++++++++++++++++++ wpematico.php | 4 ++-- 4 files changed, 33 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSAzN2M0MTE...
CWE-918 Server-Side Request Forgery (SSRF)
GHSA-qjh8-8mpw-pg76
null
[ { "commit_message": "[PATCH] Prevent XSS with section's name and nav group This commit adds sanitization of the section's name and naviguation group, which permitted authenticated XSS. Reported by Pradeep Kumar <pradeepch99@gmail.com> cc @michael-e @brendo symphony/content/content.blueprintssections.php | 12 ...
null
CVE-2017-2599
Jenkins before versions 2.44 and 2.32.2 is vulnerable to an insufficient permission check. This allows users with permissions to create new items (e.g. jobs) to overwrite existing items they don't have access to (SECURITY-321).
[ { "commit_message": "[PATCH 1/2] [SECURITY-321] Prevent existing items from being overwritten even if you cannot DISCOVER them. .../main/java/hudson/model/AbstractItem.java | 24 +- .../java/hudson/model/ItemGroupMixIn.java | 9 +- core/src/main/java/hudson/model/Items.java | 33 +- .../hudson/model/Ab...
CWE-863
GHSA-hmmh-292h-3364
Weaviate OSS has path traversal vulnerability via the Shard Movement API
null
[ { "commit_message": "[PATCH] Return correct path adapters/repos/db/shard_backup.go | 16 +++++++++++----- 1 file changed, 11 insertions(+), 5 deletions(-)", "patch_text_b64": "RnJvbSA0ZmYyY2M4OTI3N2MyNjRjMzdkMGY3MzE2ZDllYjYzNjhjZmMzMGZmIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBEaXJrIEt1bGF3aWFrIDxkaXJrQHNlb...
null
GHSA-m8v7-469p-5x89
Hard-coded System User Credentials in Folio Data Export Spring module
null
[ { "commit_message": "[PATCH 1/5] MODRS-174: Hard-coded system user credentials README.md | 38 ++++++++++--------- .../folio/rs/ModRemoteStorageApplication.java | 5 +++ .../folio/rs/controller/TenantController.java | 8 +++- .../rs/integration/KafkaMessageListener.java | 11 ...
null
GHSA-jv35-xqg7-f92r
set-getter Prototype Pollution Vulnerability
null
[ { "commit_message": "[PATCH] filter out invalid keys - since this is just a patch bump, the invalid keys are only being filtered out to fix the bug - in a future version, throw an error on invalid keys index.js | 10 ++++++++-- test.js | 8 ++++---- 2 files changed, 12 insertions(+), 6 deletions(-)", "patch...
null
GHSA-6xm3-xq5h-wg4m
null
[ { "commit_message": "[PATCH] fix #418 libde265/decctx.cc | 9 +++++---- 1 file changed, 5 insertions(+), 4 deletions(-)", "patch_text_b64": "RnJvbSA2M2I1OTZjOTE1OTc3ZjAzOGVhZmQ3NjQ3ZDFkYjI1NDg4YThjMTMzIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBEaXJrIEZhcmluIDxkaXJrLmZhcmluQGdtYWlsLmNvbT4KRGF0ZTogRnJpLCAxIFNl...
null
CVE-2018-18546
ThinkPHP 3.2.4 has SQL Injection via the order parameter because the Library/Think/Db/Driver.class.php parseOrder function mishandles the key variable.
[ { "commit_message": "[PATCH] =?UTF-8?q?=E6=94=B9=E8=BF=9B?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit ThinkPHP/Library/Think/Db/Driver.class.php | 26 +++++++++++----------- 1 file changed, 13 insertions(+), 13 deletions(-)", "patch_text_b64": "RnJvbSA5NzQ4Y2I4...
n/a
CVE-2018-10528
An issue was discovered in LibRaw 0.18.9. There is a stack-based buffer overflow in the utf2char function in libraw_cxx.cpp.
[ { "commit_message": "[PATCH] X3F parser possible buffer overrun src/libraw_cxx.cpp | 12 +++++++----- 1 file changed, 7 insertions(+), 5 deletions(-)", "patch_text_b64": "RnJvbSBlZmQ4Y2ZhYmI5M2ZkMDM5NjI2NmE3NjA3MDY5OTAxNjU3YzA4MmUzIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBBbGV4IFR1dHViYWxpbiA8bGV4YUBsZXhhLn...
n/a
GHSA-23v5-3rr6-rp4h
null
[ { "commit_message": "[PATCH] smart_pkt: verify packet length exceeds PKT_LEN_SIZE Each packet line in the Git protocol is prefixed by a four-byte length of how much data will follow, which we parse in `git_pkt_parse_line`. The transmitted length can either be equal to zero in case of a flush packet or has to be...
null
CVE-2024-52596
SimpleSAMLphp xml-common XXE vulnerability
SimpleSAMLphp xml-common is a common classes for handling XML-structures. When loading an (untrusted) XML document, for example the SAMLResponse, it's possible to induce an XXE. This vulnerability is fixed in 1.19.0.
[ { "commit_message": "[PATCH 1/7] Explicitly disable the loading of external entities src/DOMDocumentFactory.php | 2 ++ 1 file changed, 2 insertions(+)", "patch_text_b64": "RnJvbSAwZmZmNzg2ZmJhNThkY2I3OWIwMjRjYWYyNmYyYWE0NTEyYjZmMDAxIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBUaW0gdmFuIERpamVuIDx0dmRpamVuQGdt...
CWE-611: Improper Restriction of XML External Entity Reference
CVE-2025-67746
Composer vulnerable to ANSI sequence injection
Composer is a dependency manager for PHP. In versions on the 2.x branch prior to 2.2.26 and 2.9.3, attackers controlling remote sources that Composer downloads from might in some way inject ANSI control characters in the terminal output of various Composer commands, causing mangled output and potentially leading to confusion or DoS of the terminal application. There is no proven exploit and this has thus a low severity but we still publish a CVE as it has potential for abuse, and we want to be on the safe side informing users that they should upgrade. Versions 2.2.26 and 2.9.3 contain a patch for the issue.
[ { "commit_message": "[PATCH] Merge commit from fork src/Composer/IO/ConsoleIO.php | 46 +++++++++++++++++++++++++++++++---- 1 file changed, 41 insertions(+), 5 deletions(-)", "patch_text_b64": "RnJvbSAxZDQwYTk1YzlkMzlhNmI3ZjgwZDQwNGFiMzAzMzZjNTg2ZGE5OTE3IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBKb3JkaSBCb2d...
CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
GHSA-h76p-mprh-fvmv
null
[ { "commit_message": "[PATCH] atm: Fix Use-After-Free in do_vcc_ioctl Because do_vcc_ioctl() accesses sk->sk_receive_queue without holding a sk->sk_receive_queue.lock, it can cause a race with vcc_recvmsg(). A use-after-free for skb occurs with the following flow. ``` do_vcc_ioctl() -> skb_peek() vcc_recvmsg() -...
null
GHSA-68g8-c275-xf2m
Directus vulnerable to SSRF Loopback IP filter bypass
null
[ { "commit_message": "[PATCH] Merge commit from fork * Exclude all auth from response caching * Add changeset .changeset/orange-suns-fry.md | 5 +++++ api/src/middleware/respond.ts | 1 + 2 files changed, 6 insertions(+) create mode 100644 .changeset/orange-suns-fry.md", "patch_text_b64": "RnJvbSA0YWFjZTBiYmU1...
null
GHSA-4wx8-5gm2-2j97
filebrowser allows Stored Cross-Site Scripting through the Markdown preview function
null
[ { "commit_message": "[PATCH] Merge commit from fork frontend/package.json | 1 + frontend/pnpm-lock.yaml | 30 ++++++++++++++++++++++------- frontend/src/views/files/Editor.vue | 3 ++- 3 files changed, 26 insertions(+), 8 deletions(-)", "patch_text_b64": "RnJvbSBmMTk5NDNhNDJlOGUwOT...
null
GHSA-6f5q-28vf-cqgr
null
[ { "commit_message": "[PATCH] xkbcomp: fix crashes in the parser when geometry tokens appear In the XKB format, floats and various keywords can only be used in the xkb_geometry section. xkbcommon removed support xkb_geometry, but still parses it for backward compatibility. As part of ignoring it, the float AST n...
null
GHSA-38jr-29fh-w9vm
ansys-geometry-core OS Command Injection vulnerability
null
[ { "commit_message": "[PATCH] feat: accept bandit advisories in-line for subprocess (#1077) Co-authored-by: pyansys-ci-bot <pyansys.github.bot@ansys.com> doc/changelog.d/1077.added.md | 1 + .../geometry/core/connection/product_instance.py | 12 ++++++++---- 2 files changed, 9 insertion...
null
GHSA-fjqm-246c-mwqg
In Bouncy Castle JCE Provider the other party DH public key is not fully validated
null
[ { "commit_message": "[PATCH] Added TLS validation check for DH keys Added further agreement result checks .../crypto/agreement/DHAgreement.java | 14 ++++++++++--- .../crypto/agreement/DHBasicAgreement.java | 10 ++++++++- .../crypto/engines/IESEngine.java | 4 ++++ .../crypto/params/DHPubl...
null
GHSA-4pwq-fj89-6rjc
Apache Airflow Cross-site Scripting
null
[ { "commit_message": "[PATCH] Webserver: Sanitize values passed to origin param (#10334) airflow/www/views.py | 33 +++++++++++++++++++++++---------- tests/www/test_views.py | 15 +++++++++++++++ 2 files changed, 38 insertions(+), 10 deletions(-)", "patch_text_b64": "RnJvbSA1YzJiYjdiMGIwZTcxN2IxMWYwOTM5MTBi...
null
CVE-2015-1347
Cross-site scripting (XSS) vulnerability in client.inc.php in osTicket before 1.9.5.1 allows remote attackers to inject arbitrary web script or HTML via the lang parameter.
[ { "commit_message": "[PATCH] xss: Fix possible vuln setting client lang pref client.inc.php | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBiMzhiM2NhNzIzNTAwMjEzN2NjOWZmNzRiM2MyNGE0YTc4YzljMmQxIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBKYXJlZCBIYW5jb2NrIDxqYXJlZEBvc3RpY2tl...
n/a
GHSA-cr4j-59jc-xqhg
null
[ { "commit_message": "[PATCH] bpf: fix integer overflows There were various issues related to the limited size of integers used in the verifier: - `off + size` overflow in __check_map_access() - `off + reg->off` overflow in check_mem_access() - `off + reg->var_off.value` overflow or 32-bit truncation of `reg->va...
null
CVE-2020-10966
In the Password Reset Module in VESTA Control Panel through 0.9.8-25 and Hestia Control Panel before 1.1.1, Host header manipulation leads to account takeover because the victim receives a reset URL containing an attacker-controlled server name.
[ { "commit_message": "[PATCH] Preventing manipulation with $_SERVER['HTTP_HOST'] web/reset/index.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBjM2M0ZGU0M2Q2NzAxNTYwZjYwNGNhNzk5NmY3MTdiMDhlM2Q3ZDFkIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBkcGVjYSA8cGVjYUBteWNpdHkucnM+Ck...
n/a
CVE-2024-41656
Sentry vulnerable to stored Cross-Site Scripting (XSS)
Sentry is an error tracking and performance monitoring platform. Starting in version 10.0.0 and prior to version 24.7.1, an unsanitized payload sent by an Integration platform integration allows storing arbitrary HTML tags on the Sentry side with the subsequent rendering them on the Issues page. Self-hosted Sentry users may be impacted in case of untrustworthy Integration platform integrations sending external issues from their side to Sentry. A patch has been released in Sentry 24.7.1. For Sentry SaaS customers, no action is needed. This has been patched on July 23, and even prior to the fix, the exploitation was not possible due to the strict Content Security Policy deployed on sentry.io site. For self-hosted users, the maintainers of Sentry strongly recommend upgrading Sentry to the latest version. If it is not possible, one could enable CSP on one's self-hosted installation with `CSP_REPORT_ONLY = False` (enforcing mode). This will mitigate the risk of cross-site scripting.
[ { "commit_message": "[PATCH] fix(issues): structured issue annotations (#74648) src/sentry/api/serializers/models/group.py | 7 ++++++- src/sentry/integrations/mixins/issues.py | 2 +- src/sentry/models/platformexternalissue.py | 2 +- src/sentry/plugins/bases/issue.py | 10 ++...
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')