id
stringlengths
12
19
title
stringlengths
0
237
description
stringlengths
35
3.87k
patches
listlengths
1
22
cwe
stringlengths
2
440
GHSA-7cfm-r6gg-c84j
null
[ { "commit_message": "[PATCH] When decompressing with -N or -NT, strip any path from header name. This uses the path of the compressed file combined with the name from the header as the name of the decompressed output file. Any path information in the header name is stripped. This avoids a possible vulnerabili...
null
GHSA-gj5m-m88j-v7c3
Apache ActiveMQ's default configuration doesn't secure the API web context
null
[ { "commit_message": "[PATCH] AMF-9476 - Fix Jetty constraint mapping assembly/src/release/conf/jetty.xml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAwOWUzMjUxYzg3ZjU0OTNmOTQxMGVlZGJmMjA1NjRlN2M4ZDVhZGJlIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiAiQ2hyaXN0b3BoZXIgTC4gU2hhb...
null
CVE-2023-51449
Make the `/file` secure against file traversal attacks
Gradio is an open-source Python package that allows you to quickly build a demo or web application for your machine learning model, API, or any arbitary Python function. Versions of `gradio` prior to 4.11.0 contained a vulnerability in the `/file` route which made them susceptible to file traversal attacks in which an attacker could access arbitrary files on a machine running a Gradio app with a public URL (e.g. if the demo was created with `share=True`, or on Hugging Face Spaces) if they knew the path of files to look for. This issue has been patched in version 4.11.0.
[ { "commit_message": "[PATCH] Prevent file traversals (#6833) * prevent file traversal * fix * add changeset * unit test Co-authored-by: gradio-pr-bot <gradio-pr-bot@users.noreply.github.com> .changeset/tough-zoos-move.md | 5 +++++ gradio/utils.py | 2 +- test/test_utils.py | 1 + 3 files ...
CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2025-8267
Versions of the package ssrfcheck before 1.2.0 are vulnerable to Server-Side Request Forgery (SSRF) due to an incomplete denylist of IP address ranges. Specifically, the package fails to classify the reserved IP address space 224.0.0.0/4 (Multicast) as invalid. This oversight allows attackers to craft requests targeting these multicast addresses.
[ { "commit_message": "[PATCH] added 224.0.0.0/4 as private address - https://gist.github.com/lirantal/2976840639df824cb3abe60d13c65e04 package-lock.json | 2 +- package.json | 2 +- src/is-private-ip.js | 1 + 3 files changed, 3 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSA5NTA3YjQ5ZmQ3N...
Server-Side Request Forgery (SSRF)
GHSA-cxgw-r5jg-7xwq
Code injection in grav
null
[ { "commit_message": "[PATCH] Fixed Twig `|filter()` allowing code execution CHANGELOG.md | 1 + .../Common/Twig/Extension/GravExtension.php | 21 +++++++++++++++++++ 2 files changed, 22 insertions(+)", "patch_text_b64": "RnJvbSA5ZDZhMmRiYTA5ZmQ0ZTU2ZjVjZGZiOWEzOTljYWVhMzU1Y...
null
CVE-2023-46737
Possible endless data attack from attacker-controlled registry in cosign
Cosign is a sigstore signing tool for OCI containers. Cosign is susceptible to a denial of service by an attacker controlled registry. An attacker who controls a remote registry can return a high number of attestations and/or signatures to Cosign and cause Cosign to enter a long loop resulting in an endless data attack. The root cause is that Cosign loops through all attestations fetched from the remote registry in pkg/cosign.FetchAttestations. The attacker needs to compromise the registry or make a request to a registry they control. When doing so, the attacker must return a high number of attestations in the response to Cosign. The result will be that the attacker can cause Cosign to go into a long or infinite loop that will prevent other users from verifying their data. In Kyvernos case, an attacker whose privileges are limited to making requests to the cluster can make a request with an image reference to their own registry, trigger the infinite loop and deny other users from completing their admission requests. Alternatively, the attacker can obtain control of the registry used by an organization and return a high number of attestations instead the expected number of attestations. The issue can be mitigated rather simply by setting a limit to the limit of attestations that Cosign will loop through. The limit does not need to be high to be within the vast majority of use cases and still prevent the endless data attack. This issue has been patched in version 2.2.1 and users are advised to upgrade.
[ { "commit_message": "[PATCH] Merge pull request from GHSA-vfp6-jrw2-99g9 * Add limit to number of sigs and attestations Signed-off-by: AdamKorcz <44787359+AdamKorcz@users.noreply.github.com> * Update pkg/cosign/fetch.go Co-authored-by: Cody Soyland <codysoyland@gmail.com> Signed-off-by: AdamKorcz <44787359+Adam...
CWE-400: Uncontrolled Resource Consumption
GHSA-37q4-2qvp-vjq9
null
[ { "commit_message": "[PATCH] CVE-2017-13019: Clean up PGM option processing. Add #defines for option lengths or the lengths of the fixed-length part of the option. Sometimes those #defines differ from what was there before; what was there before was wrong, probably because the option lengths given in RFC 3208 ...
null
GHSA-r92x-f52r-x54g
regular expression denial of service (ReDoS)
null
[ { "commit_message": "[PATCH] Fixed regular expression denial of service (ReDoS) vulnerability date-and-time.js | 2 +- date-and-time.min.js | 14 +++++++------- 2 files changed, 8 insertions(+), 8 deletions(-)", "patch_text_b64": "RnJvbSA5ZTRiNTAxZWFjZGRjY2M4YjFmNTU5ZmI0MTRmNDg0NzJlZTE3YzJhIE1vbiBTZXAgMT...
null
CVE-2024-21642
D-Tale server-side request forgery through Web uploads
D-Tale is a visualizer for Pandas data structures. Users hosting versions D-Tale prior to 3.9.0 publicly can be vulnerable to server-side request forgery (SSRF), allowing attackers to access files on the server. Users should upgrade to version 3.9.0, where the `Load From the Web` input is turned off by default. The only workaround for versions earlier than 3.9.0 is to only host D-Tale to trusted users.
[ { "commit_message": "[PATCH] Updated web data uploads to be turned off by default .circleci/config.yml | 4 + README.md | 13 +++ docs/CONFIGURATION.md | 1 + dtale/__init__.py | 1 + dtale/app.py ...
CWE-918: Server-Side Request Forgery (SSRF)
CVE-2015-0856
daemon/Greeter.cpp in sddm before 0.13.0 does not properly disable the KDE crash handler, which allows local users to gain privileges by crashing a greeter when using certain themes, as demonstrated by the plasma-workspace breeze theme.
[ { "commit_message": "[PATCH] Disable greeters from loading KDE's debug hander Some themes may use KDE components which will automatically load KDE's crash handler. If the greeter were to then somehow crash, that would leave a crash handler allowing other actions, albeit as the locked down SDDM user. Only SDDM u...
n/a
GHSA-6wv2-qrc6-q345
null
[ { "commit_message": "[PATCH] Refactor connection definition of userId to wait for validateAuthToken .../server/handlers/validateAuthToken.js | 51 ++++++++++++++++++- .../users/server/methods/validateAuthToken.js | 21 ++------ .../server/store/pendingAuthentications.js | 43 ++++++++++++++++ 3 files chang...
null
GHSA-8r9q-7v3j-jr4g
Anthropic's MCP TypeScript SDK has a ReDoS vulnerability
null
[ { "commit_message": "[PATCH] fix: prevent ReDoS in UriTemplate regex patterns (v1.x backport) (#1365) package-lock.json | 4 ++-- package.json | 2 +- src/shared/uriTemplate.ts | 4 ++-- test/shared/uriTemplate.test.ts | 27 +++++++++++++++++++++++++++ 4 files changed, 32 i...
null
GHSA-hp2x-2ccv-5893
null
[ { "commit_message": "[PATCH] Fixed stack overflow caused by missing length check Signed-off-by: Toni Uhlig <matzeton@googlemail.com> src/lib/protocols/tls.c | 10 +++++++++- tests/pcap/tls-rdn-extract.pcap | Bin 0 -> 7325 bytes tests/result/tls-rdn-extract.pcap.out | 7 +++++++ 3 files chan...
null
GHSA-wvh5-78h5-gmgr
Cross-site Scripting in moodle
null
[ { "commit_message": "[PATCH] MDL-74204 mod_assign: escape identity fields in allocate marker form. mod/assign/classes/output/renderer.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA2YWJlOTY0YmJhYzQxYjVlNDBhODFiNDA5NjJmNzA0NGIwZGMyMDFlIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpG...
null
GHSA-m5h8-2pjw-vg3j
Apache StreamPark Improper Input Validation vulnerability
null
[ { "commit_message": "[PATCH] [Bug] update password bug fixed (#2123) .../system/controller/UserController.java | 6 ++---- .../console/system/entity/User.java | 2 ++ .../console/system/service/UserService.java | 7 +++---- .../system/service/impl/UserServiceImpl.java | 18 ++++++++++++++---- .....
null
CVE-2017-15129
A use-after-free vulnerability was found in network namespaces code affecting the Linux kernel before 4.14.11. The function get_net_ns_by_id() in net/core/net_namespace.c does not check for the net::count value after it has found a peer network in netns_ids idr, which could lead to double free and memory corruption. This vulnerability could allow an unprivileged local user to induce kernel memory corruption on the system, leading to a crash. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although it is thought to be unlikely.
[ { "commit_message": "[PATCH] net: Fix double free and memory corruption in get_net_ns_by_id() (I can trivially verify that that idr_remove in cleanup_net happens after the network namespace count has dropped to zero --EWB) Function get_net_ns_by_id() does not check for net::count after it has found a peer in ne...
CWE-362
GHSA-x3h8-62x9-952g
Astro Development Server has Arbitrary Local File Read
null
[ { "commit_message": "[PATCH] Merge commit from fork * fix: refactor image source loading * Split entrypoints * Add more tests .changeset/calm-mammals-grow.md | 5 + .changeset/thick-bees-sneeze.md | 7 + packages/astro/src/assets/endpoint/config.ts | 2 +- packages/astro/src/asse...
null
GHSA-h63h-5c77-77p5
XWiki Platform vulnerable to remote code execution from account via SearchSuggestConfigSheet
null
[ { "commit_message": "[PATCH] XWIKI-21699: Add new API to help evaluate xobjects XWIKI-21473: Improve search suggest evaluation (cherry picked from commit 742cd4591642be4cdcaf68325f17540e0934e64e) .../main/java/com/xpn/xwiki/api/Object.java | 19 ++ .../com/xpn/xwiki/objects/BaseObject.java | 20 ++ .../or...
null
GHSA-682g-c99v-9r2g
Jenkins Gitlab Authentication Plugin vulnerable to Session Fixation
null
[ { "commit_message": "[PATCH] JENKINS-59069 / SECURITY-795: Fix session fixation vulnerability (#16) Ported fix from github-oauth-plugin: https://github.com/jenkinsci/github-oauth-plugin/commit/3fcc367022c58486e5f52def3edbac92ed258ba4 .../org/jenkinsci/plugins/GitLabSecurityRealm.java | 11 ++++++++++- 1 file ...
null
GHSA-fgjj-5jmr-gh83
Fides JavaScript Injection Vulnerability in Privacy Center URL
null
[ { "commit_message": "[PATCH] Merge pull request from GHSA-fgjj-5jmr-gh83 * feat: use a pydantic URL type for privacy policy URLs * fix: static_checks * fix: more tests, but still some failures on patching * fix: update other uses of invalid URLs in the tests * Update src/fides/api/schemas/privacy_experience.py ...
null
CVE-2022-36005
`CHECK` fail in `FakeQuantWithMinMaxVarsGradient` in TensorFlow
TensorFlow is an open source platform for machine learning. When `tf.quantization.fake_quant_with_min_max_vars_gradient` receives input `min` or `max` that is nonscalar, it gives a `CHECK` fail that can trigger a denial of service attack. We have patched the issue in GitHub commit f3cf67ac5705f4f04721d15e485e192bb319feed. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
[ { "commit_message": "[PATCH] Add IsScalar / IsVector (rank) checks to input min/max tensors for FakeQuantWithMinMaxVarsPerChannelGradientOp and FakeQuantWithMinMaxVarsGradientOp. PiperOrigin-RevId: 462542629 tensorflow/core/kernels/fake_quant_ops.cc | 12 ++++ .../quantization_ops/quantization_ops_test.py | ...
CWE-617: Reachable Assertion
GHSA-p2p2-56jv-7xwv
null
[ { "commit_message": "[PATCH] fix: [security] lfi via custom terms file setting, as reported by Ianis BERNARD - NATO Cyber Security Centre app/View/Users/terms.ctp | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA4Y2M5MzY4N2RjZDY4ZTE3NzRiNTVhNWM0ZTgxMjVjMGM4ZGRjMjg4IE1vbiBTZ...
null
GHSA-x3xw-8fvc-gxxx
null
[ { "commit_message": "[PATCH] ALSA: timer: Fix double unlink of active_list ALSA timer instance object has a couple of linked lists and they are unlinked unconditionally at snd_timer_stop(). Meanwhile snd_timer_interrupt() unlinks it, but it calls list_del() which leaves the element list itself unchanged. This...
null
GHSA-vch7-92vf-jm44
Apache Tomcat does not follow ServletSecurity annotations
null
[ { "commit_message": "[PATCH] CVE-2011-1088 Complete the fix for this issue. The optimisation not to configure an authenticator of there were no security constraints meant that in that case @ServletSecurity annotations had no effect. The unit tests did not pick this up since they added an authenticator directly....
null
CVE-2017-5506
Double free vulnerability in magick/profile.c in ImageMagick allows remote attackers to have unspecified impact via a crafted file.
[ { "commit_message": "[PATCH] https://github.com/ImageMagick/ImageMagick/issues/354 MagickCore/profile.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA5YTA2OWUwZjJlMDI3ZWM1MTM4Zjk5ODAyM2NmOWNiNjJjMDQ4ODlmIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBDcmlzdHkgPHVyYmFuLXdhcnJpb3...
n/a
CVE-2022-25887
Regular Expression Denial of Service (ReDoS)
The package sanitize-html before 2.7.1 are vulnerable to Regular Expression Denial of Service (ReDoS) due to insecure global regular expression replacement logic of HTML comment removal.
[ { "commit_message": "[PATCH 1/3] credit CHANGELOG.md | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA3YzdjY2I0MmQ2ZGE3YzA3YTQ4ZTgxOWU5NDE3MmE2MDg5NzgyYjVkIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBUaG9tYXMgQm91dGVsbCA8dG9tQGFwb3N0cm9waGVjbXMuY29tPgpEYXRlOiBUaHUsIDE0IEp1bC...
Regular Expression Denial of Service (ReDoS)
CVE-2024-38396
An issue was discovered in iTerm2 3.5.x before 3.5.2. Unfiltered use of an escape sequence to report a window title, in combination with the built-in tmux integration feature (enabled by default), allows an attacker to inject arbitrary code into the terminal, a different vulnerability than CVE-2024-38395.
[ { "commit_message": "[PATCH] Send ^C immediately after tmux integration begins sources/PTYSession.m | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBmYzYwMjM2YTkxNGQ2M2ZiNzBhNWM2MzJlMjExMjAzYTRmMWJkNGRkIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBHZW9yZ2UgTmFjaG1hbiA8Z25hY2htYW...
n/a
CVE-2022-31502
The operatorequals/wormnest repository through 0.4.7 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.
[ { "commit_message": "[PATCH] # Absolute Path Traversal due to incorrect use of `send_file` call MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit A path traversal attack (also known as directory traversal) aims to access files and directories that are stored outside the w...
n/a
CVE-2023-45132
IgnoreIP/IgnoreCIDR should not trust X-Forwarded-For
NAXSI is an open-source maintenance web application firewall (WAF) for NGINX. An issue present starting in version 1.3 and prior to version 1.6 allows someone to bypass the WAF when a malicious `X-Forwarded-For` IP matches `IgnoreIP` `IgnoreCIDR` rules. This old code was arranged to allow older NGINX versions to also support `IgnoreIP` `IgnoreCIDR` when multiple reverse proxies were present. The issue is patched in version 1.6. As a workaround, do not set any `IgnoreIP` `IgnoreCIDR` for older versions.
[ { "commit_message": "[PATCH] Remove X-Forwarded-For header special processing (#103) * Change tests IgnoreCIDR/IgnoreIP with/without real_ip support * Remove X-Forwarding-For header special processing * Change tests IgnoreCIDR/IgnoreIP set_real_ip_from 127.0.0.1 for IPv6 (for IPv4 machine only) * Change tests I...
CWE-693: Protection Mechanism Failure
CVE-2020-5219
Remote Code Execution in Angular Expressions
Angular Expressions before version 1.0.1 has a remote code execution vulnerability if you call expressions.compile(userControlledInput) where userControlledInput is text that comes from user input. If running angular-expressions in the browser, an attacker could run any browser script when the application code calls expressions.compile(userControlledInput). If running angular-expressions on the server, an attacker could run any Javascript expression, thus gaining Remote Code Execution.
[ { "commit_message": "[PATCH] Disallow access to prototype chain (CVE-2020-5219) .editorconfig | 13 + .eslintignore | 1 - .eslintrc | 191 +- README.md | 62 +- lib/main.js | 63 +- lib/parse.js | 5938 ++++++++++++++++++++----------------- package-lock.json | 7178 ++++++...
CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
CVE-2024-12580
Logs Debug Injection in danny-avila/librechat
A vulnerability in danny-avila/librechat prior to version 0.7.6 allows for logs debug injection. The parameters sessionId, fileId, userId, and file_id in the /code/download/:sessionId/:fileId and /download/:userId/:file_id APIs are not validated or filtered, leading to potential log injection attacks. This can cause distortion of monitoring and investigation information, evade detection from security systems, and create difficulties in maintenance and operation.
[ { "commit_message": "[PATCH] feat: Code Interpreter API & File Search Agent Uploads MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit chore: add back code files wip: first pass, abstract key dialog refactor: influence checkbox on key changes refactor: update localization ...
CWE-117 Improper Output Neutralization for Logs
GHSA-3phv-83cj-p8p7
nope-validator Regular Expression Denial of Service vulnerability
null
[ { "commit_message": "[PATCH] Update email and url regex (#421) src/__tests__/NopeString.spec.ts | 27 +++++++++++++++++++++------ src/consts.ts | 4 ++-- 2 files changed, 23 insertions(+), 8 deletions(-)", "patch_text_b64": "RnJvbSA0NTY0Yjc0NDRkY2Q5Mjc2OWU1YzViODA0MjA0NjljOWYxOGI3YTA1IE1vb...
null
GHSA-wjx8-w8hq-76c5
null
[ { "commit_message": "[PATCH] Encode user descr before output. Fixes #103241 src/usr/local/www/system_usermanager_addprivs.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAzYzFlNTNkYWJlOTY2ZjI3YzkwOTdhNWE5MjNlNzdmNDlhZTVmZmZhIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBqaW0t...
null
GHSA-44w5-q257-8428
Exposure of password hashes in notrinos/notrinos-erp
null
[ { "commit_message": "[PATCH] changed password hash method from md5 to bcrypt. admin/change_current_user_password.php | 6 +++--- admin/create_coy.php | 8 ++++---- admin/db/users_db.inc | 25 +++++++++++++++++++++---- admin/users.php | 4 ++-- includes/cu...
null
GHSA-fg42-vwxx-xx5j
Data race in tiny_future
null
[ { "commit_message": "[PATCH] Require `Send` for underlying types to fix https://github.com/KizzyCode/tiny_future/issues/1 src/lib.rs | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBjNzkxOTE5OWEwZjZkMWNlMGUzYzMzNDk5ZDFiMzdmODYyYzk5MGU0IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tO...
null
GHSA-9xgv-x5fv-g6vp
null
[ { "commit_message": "[PATCH] Fix integer underflow vulnerability in L3 decode. Marcin 'Icewall' Noga of Cisco TALOS discovered that the level 3 header decoding routines were vulnerable to an integer underflow, if the 32-bit header length was less than the base level 3 header length. This could lead to an exploi...
null
CVE-2025-62372
vLLM vulnerable to DoS with incorrect shape of multimodal embedding inputs
vLLM is an inference and serving engine for large language models (LLMs). From version 0.5.5 to before 0.11.1, users can crash the vLLM engine serving multimodal models by passing multimodal embedding inputs with correct ndim but incorrect shape (e.g. hidden dimension is wrong), regardless of whether the model is intended to support such inputs (as defined in the Supported Models page). This issue has been patched in version 0.11.1.
[ { "commit_message": "[PATCH] [Frontend] Require flag for loading text and image embeds (#27204) Signed-off-by: DarkLight1337 <tlleungac@connect.ust.hk> Co-authored-by: DarkLight1337 <tlleungac@connect.ust.hk> docs/features/multimodal_inputs.md | 29 +++++++-- docs/features/prompt_embeds.md ...
CWE-129: Improper Validation of Array Index
CVE-2025-52887
cpp-httplib has unlimited number of http header fields, which causes memory leak
cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library. In version 0.21.0, when many http headers fields are passed in, the library does not limit the number of headers, and the memory associated with the headers will not be released when the connection is disconnected. This leads to potential exhaustion of system memory and results in a server crash or unresponsiveness. Version 0.22.0 contains a patch for the issue.
[ { "commit_message": "[PATCH] Merge commit from fork httplib.h | 17 ++++++++++++ test/test.cc | 74 ++++++++++++++++++++++++++++++++++++++++++++++++++++ 2 files changed, 91 insertions(+)", "patch_text_b64": "RnJvbSAyOGRjZjM3OWU4MmEyY2RiNTQ0ZDgxMjY5NmE3ZmQ0NjA2N2ViN2Y5IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9...
CWE-400: Uncontrolled Resource Consumption
CVE-2012-4968
Multiple cross-site scripting (XSS) vulnerabilities in SilverStripe 2.3.x before 2.3.13 and 2.4.x before 2.4.7 allow remote attackers to inject arbitrary web script or HTML via (1) a crafted string to the AbsoluteLinks, (2) BigSummary, (3) ContextSummary, (4) EscapeXML, (5) FirstParagraph, (6) FirstSentence, (7) Initial, (8) LimitCharacters, (9) LimitSentences, (10) LimitWordCount, (11) LimitWordCountXML, (12) Lower, (13) LowerCase, (14) NoHTML, (15) Summary, (16) Upper, (17) UpperCase, or (18) URL method in a template, different vectors than CVE-2012-0976.
[ { "commit_message": "[PATCH] BUGFIX Casting return values on text helper methods in StringField, Text, Varchar core/model/fieldtypes/HTMLText.php | 21 +++++++++++++++++++- core/model/fieldtypes/StringField.php | 6 ++++++ core/model/fieldtypes/Text.php | 14 +++++++++++++- core/model/fieldtypes/Varchar...
n/a
CVE-2016-4998
The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel before 4.6 allows local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary.
[ { "commit_message": "[PATCH] netfilter: x_tables: make sure e->next_offset covers remaining blob size Otherwise this function may read data beyond the ruleset blob. Signed-off-by: Florian Westphal <fw@strlen.de> Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org> net/ipv4/netfilter/arp_tables.c | 6 ++++-- ne...
n/a
CVE-2020-8815
Improper connection handling in the base connection handler in IKTeam BearFTP before v0.3.1 allows a remote attacker to achieve denial of service via a Slowloris approach by sending a large volume of small packets.
[ { "commit_message": "[PATCH] Anonymous configuration fix, base thread vulnerability fix. v0.3.1 BearFTP/Program.cs | 44 ++++++++++---------------------------------- CHANGELOG.txt | 14 ++++---------- 2 files changed, 14 insertions(+), 44 deletions(-)", "patch_text_b64": "RnJvbSAxN2E2ZWFkNzJkNGEyNWNiZmNl...
n/a
CVE-2010-1630
Unspecified vulnerability in posting.php in phpBB before 3.0.5 has unknown impact and attack vectors related to the use of a "forum id" in circumstances related to a "global announcement."
[ { "commit_message": "[PATCH] Only use forum id supplied for posting if global announcement detected. (Reported by nickvergessen) git-svn-id: file:///svn/phpbb/branches/phpBB-3_0_0@9499 89ea8834-ac86-4346-8a33-228a782c2dd0 phpBB/docs/CHANGELOG.html | 13 +++++++------ phpBB/posting.php | 20 ++++++++++++++...
n/a
GHSA-3r2m-6v2h-6jqr
null
[ { "commit_message": "[PATCH] fixed a security bug introduced in 3.13.0 version that lead the HTTP built-in server to bypass Basic Authentication when the option 'hosts_deny' is not defined #309 lib/HTTPServer.pm | 4 ++++ 1 file changed, 4 insertions(+)", "patch_text_b64": "RnJvbSBkNjgxNmUyMGRhMWE5OGJjZGM2Mz...
null
CVE-2023-30847
H2O vulnerable to read from uninitialized pointer in the reverse proxy handler
H2O is an HTTP server. In versions 2.3.0-beta2 and prior, when the reverse proxy handler tries to processes a certain type of invalid HTTP request, it tries to build an upstream URL by reading from uninitialized pointer. This behavior can lead to crashes or leak of information to back end HTTP servers. Pull request number 3229 fixes the issue. The pull request has been merged to the `master` branch in commit f010336. Users should upgrade to commit f010336 or later.
[ { "commit_message": "[PATCH 1/2] die when `h2o_url_init` fails unexpectedly lib/core/proxy.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBhNzBhZjY3NTMyOGRkYTQzOGVjZDlkOGExNjczYzE3MTVmZDkzY2M3IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBLYXp1aG8gT2t1IDxrYXp1aG9va3VAZ21haWw...
CWE-824: Access of Uninitialized Pointer
CVE-2021-30070
An issue was discovered in HestiaCP before v1.3.5. Attackers are able to arbitrarily install packages due to values taken from the pgk [] parameter in the update request being transmitted to the operating system's package manager.
[ { "commit_message": "[PATCH] Prevent install via CLI / API / WebGUI via command v-update-sys-hestia package Current script accepts all valid packages now limiited to hestia, hestia-nginx, hestia-php @numanturle bin/v-update-sys-hestia | 1 + func/main.sh | 6 ++++++ 2 files changed, 7 insertions(+)", ...
n/a
GHSA-vj9x-w7ch-f46p
pimcore is vulnerable to SQL Injection
null
[ { "commit_message": "[PATCH] [Data Object] Classification Store quote filtering .../Admin/DataObject/ClassificationstoreController.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA2NjI4MWMxMjQ3OWRjMDFhMDYyNThkODUzM2VhZGRmYjE3NzBkNWJkIE1vbiBTZXAgMTcgMDA6MDA6MDAgMj...
null
GHSA-jj53-8fmw-f2w2
Adding a private/unlisted room to a community exposes room metadata in an unauthorised manner.
null
[ { "commit_message": "[PATCH] Merge pull request from GHSA-jj53-8fmw-f2w2 synapse/groups/groups_server.py | 18 ++++++++-- tests/rest/client/v2_alpha/test_groups.py | 43 +++++++++++++++++++++++ 2 files changed, 59 insertions(+), 2 deletions(-) create mode 100644 tests/rest/client/v2_alpha/test_groups.py...
null
CVE-2022-2817
Use After Free in vim/vim
Use After Free in GitHub repository vim/vim prior to 9.0.0213.
[ { "commit_message": "[PATCH] patch 9.0.0213: using freed memory with error in assert argument Problem: Using freed memory with error in assert argument. Solution: Make a copy of the error. src/testdir/test_assert.vim | 4 ++++ src/testing.c | 18 ++++++++++++------ src/version.c ...
CWE-416 Use After Free
PYSEC-2021-43
null
[ { "commit_message": "[PATCH] Enforce access control on snapshot files and folders. CHANGES.rst | 2 +- src/Products/GenericSetup/context.py | 11 +++++++-- src/Products/GenericSetup/tests/test_tool.py | 24 ++++++++++++++++---- 3 files changed, 29 insertions(+), 8 deletion...
null
CVE-2023-2800
Insecure Temporary File in huggingface/transformers
Insecure Temporary File in GitHub repository huggingface/transformers prior to 4.30.0.
[ { "commit_message": "[PATCH] Use `mkstemp` to replace deprecated `mktemp` (#23372) * Use `mkstemp` to replace deprecated `mktemp` The `tempfile.mktemp` function is [deprecated](https://docs.python.org/3/library/tempfile.html#tempfile.mktemp) due to [security issues](https://cwe.mitre.org/data/definitions/377.ht...
CWE-377 Insecure Temporary File
CVE-2021-23365
Authentication Bypass
The package github.com/tyktechnologies/tyk-identity-broker before 1.1.1 are vulnerable to Authentication Bypass via the Go XML parser which can cause SAML authentication bypass. This is because the XML parser doesn’t guarantee integrity in the XML round-trip (encoding/decoding XML data).
[ { "commit_message": "[PATCH 1/2] Remove dependency on broken certs package go.mod | 13 +- go.sum | 698 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++- 2 files changed, 700 insertions(+), 11 deletions(-)", "patch_text_b64": "RnJvbSA3MTQ4YzAyNTZhZTdhZjQ4YzQ3ZmM2YTFkYjNiNTIzNTk5YjMzZGYwIE1vbiBTZXAgM...
Authentication Bypass
GHSA-87j2-w75f-pvcg
null
[ { "commit_message": "[PATCH] KEYS: Sort out big_key initialisation big_key has two separate initialisation functions, one that registers the key type and one that registers the crypto. If the key type fails to register, there's no problem if the crypto registers successfully because there's no way to reach the...
null
GHSA-x422-6qhv-p29g
Relative path traversal in mlflow
null
[ { "commit_message": "[PATCH] Disable ability to provide relative paths in sources (#8281) * Disable ability to provide relative paths in sources Signed-off-by: Ben Wilson <benjamin.wilson@databricks.com> * no relative paths allowed Signed-off-by: Ben Wilson <benjamin.wilson@databricks.com> Signed-off-by: Ben Wi...
null
CVE-2022-4633
Auto Upload Images Settings setting-page.php cross-site request forgery
A vulnerability was found in Auto Upload Images up to 3.3.0 and classified as problematic. Affected by this issue is some unknown functionality of the file src/setting-page.php of the component Settings Handler. The manipulation leads to cross-site request forgery. The attack may be launched remotely. Upgrading to version 3.3.1 is able to address this issue. The name of the patch is 895770ee93887ec78429c78ffdfb865bee6f9436. It is recommended to upgrade the affected component. VDB-216482 is the identifier assigned to this vulnerability.
[ { "commit_message": "[PATCH] fix security vulnerability protecting settings form from xss and csrf attacks src/WpAutoUpload.php | 4 ++-- src/setting-page.php | 15 ++++++++------- 2 files changed, 10 insertions(+), 9 deletions(-)", "patch_text_b64": "RnJvbSA4OTU3NzBlZTkzODg3ZWM3ODQyOWM3OGZmZGZiODY1YmVlNmY5N...
CWE-352 Cross-Site Request Forgery
GHSA-j586-x8f6-9xf2
null
[ { "commit_message": "[PATCH] e1000: fail early for evil descriptor During procss_tx_desc(), driver can try to chain data descriptor with legacy descriptor, when will lead underflow for the following calculation in process_tx_desc() for bytes: if (tp->size + bytes > msh) bytes = msh - tp->size; This will lead a ...
null
GHSA-8wp3-cp9v-44fm
Cross-Site Scripting in marked
null
[ { "commit_message": "[PATCH] sanatize uppercase hexidecimal fixes #925 lib/marked.js | 4 ++-- test/tests/uppercase_hex.sanitize.html | 2 ++ test/tests/uppercase_hex.sanitize.text | 2 ++ 3 files changed, 6 insertions(+), 2 deletions(-) create mode 100644 test/tests/uppercase_hex.sanitize...
null
GHSA-jw8h-4jr7-fcf3
null
[ { "commit_message": "[PATCH] CVE-2017-12895/ICMP: Check the availability of data before checksumming it. MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit This fixes a buffer over-read discovered by Forcepoint's security researchers Otto Airamo & Antti Levomäki. Add tests...
null
CVE-2016-9467
Nextcloud Server before 9.0.54 and 10.0.1 & ownCloud Server before 9.0.6 and 9.1.2 suffer from content spoofing in the files app. The location bar in the files app was not verifying the passed parameters. An attacker could craft an invalid link to a fake directory structure and use this to display an attacker-controlled error message to the user.
[ { "commit_message": "[PATCH] Also prevent null byte character apps/files/js/filelist.js | 3 ++- apps/files/tests/js/filelistSpec.js | 1 + 2 files changed, 3 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA1ZGQyMTFjYzg4NDVmZDQ1MzM5NjZiZjhkN2E3ZjJhNjM1OWVhMDEzIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjA...
User Interface (UI) Misrepresentation of Critical Information (CWE-451)
CVE-2025-48957
AstrBot Has Path Traversal Vulnerability in /api/chat/get_file
AstrBot is a large language model chatbot and development framework. A path traversal vulnerability present in versions 3.4.4 through 3.5.12 may lead to information disclosure, such as API keys for LLM providers, account passwords, and other sensitive data. The vulnerability has been addressed in Pull Request #1676 and is included in version 3.5.13. As a workaround, users can edit the `cmd_config.json` file to disable the dashboard feature as a temporary workaround. However, it is strongly recommended to upgrade to version v3.5.13 or later to fully resolve this issue.
[ { "commit_message": "[PATCH 1/4] =?UTF-8?q?=F0=9F=90=9B=20fix:=20fixed=20a=20potential?= =?UTF-8?q?=20vulnerability=20in=20/api/chat/get=5Ffile=20endpoint.?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit I have fixed a potential vulnerability in the `/api/chat/get_fil...
CWE-23: Relative Path Traversal
CVE-2020-26301
Command injection in mscdex/ssh2
ssh2 is client and server modules written in pure JavaScript for node.js. In ssh2 before version 1.4.0 there is a command injection vulnerability. The issue only exists on Windows. This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input. This is fixed in version 1.4.0.
[ { "commit_message": "[PATCH] examples,lib,test: switch to code rewrite For more information see: https://github.com/mscdex/ssh2/issues/935 .eslint-plugins/eslint-plugin-mscdex/index.js | 22 + .../eslint-plugin-mscdex/rules/curly.js | 500 +++ .../eslint-plugin-mscdex/rules/quotes.js | 332 ++ .esli...
CWE-78 OS Command Injection
GHSA-xqhh-253w-4q5f
Moodle Cross-site Scripting (XSS)
null
[ { "commit_message": "[PATCH] MDL-81354 core: Escape string of fullname group/classes/output/user_groups_editable.php | 1 + user/classes/output/user_roles_editable.php | 6 ++++-- user/classes/table/participants.php | 2 +- 3 files changed, 6 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvb...
null
CVE-2024-23839
Suricata http: heap use after free with http.request_header and http.response_header keywords
Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to 7.0.3, specially crafted traffic can cause a heap use after free if the ruleset uses the http.request_header or http.response_header keyword. The vulnerability has been patched in 7.0.3. To work around the vulnerability, avoid the http.request_header and http.response_header keywords.
[ { "commit_message": "[PATCH] detect: fixes use-after-free with http.request_header Ticket: #6441 This keyword and the response one use a multiple inspection buffer. But the different instances point to the same memory address that comes from HttpHeaderGetBufferSpace and is not owned by the transaction, and is r...
CWE-416: Use After Free
GHSA-q98c-rqx7-7ghf
Improper handling of untrusted branches in Gitea Jenkins Plugin
null
[ { "commit_message": "[PATCH] [SECURITY-1046] .../gitea/ForkPullRequestDiscoveryTrait.java | 3 +- .../plugin/gitea/GiteaSCMSource.java | 29 +++++++++++++++++++ 2 files changed, 31 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA3NTU1Y2I3YzE2OGNmYTQ5ZDMxMjcxZTdkNjVkNzZjMWZhYjMxMWY3IE1vbiBT...
null
GHSA-x7rv-cr6v-4vm4
Cross-site Scripting in loofah
null
[ { "commit_message": "[PATCH] tests and fix for CVE-2018-8048 libxml2 >= 2.9.2 fails to escape comments within some attributes. It wants to ensure these comments can be treated as \"server-side includes\", but as a result fails to ensure that serialization is well-formed, resulting in an opportunity for XSS inje...
null
CVE-2021-39194
Denial of service while parsing polymorphic input with tagged polymorphism style in kaml
kaml is an open source implementation of the YAML format with support for kotlinx.serialization. In affected versions attackers that could provide arbitrary YAML input to an application that uses kaml could cause the application to endlessly loop while parsing the input. This could result in resource starvation and denial of service. This only affects applications that use polymorphic serialization with the default tagged polymorphism style. Applications using the property polymorphism style are not affected. YAML input for a polymorphic type that provided a tag but no value for the object would trigger the issue. Version 0.35.3 or later contain the fix for this issue.
[ { "commit_message": "[PATCH] Fix issue where decoding a polymorphic type that uses the tag polymorphism style could hang if no value was provided after the tag. Fixes #179. .../kotlin/com/charleskorn/kaml/YamlInput.kt | 3 ++- .../com/charleskorn/kaml/YamlReadingTest.kt | 19 +++++++++++++++++++ 2 files chang...
CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop')
CVE-2025-32800
Conda-build vulnerable to supply chain attack vector due to pyproject.toml referring to dependencies not present in PyPI
Conda-build contains commands and tools to build conda packages. Prior to version 25.3.0, the pyproject.toml lists conda-index as a Python dependency. This package is not published in PyPI. An attacker could claim this namespace and upload arbitrary (malicious) code to the package, and then exploit pip install commands by injecting the malicious dependency in the solve. This issue has been fixed in version 25.3.0. A workaround involves using --no-deps for pip install-ing the project from the repository.
[ { "commit_message": "[PATCH] Merge commit from fork * Handle conda-index import error and disable dependency in pyproject.toml. * Update conda_build/index.py conda_build/index.py | 9 ++++++++- pyproject.toml | 3 ++- 2 files changed, 10 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSBmNWE2YWV...
CWE-1357: Reliance on Insufficiently Trustworthy Component
CVE-2023-4913
Cross-site Scripting (XSS) - Reflected in cecilapp/cecil
Cross-site Scripting (XSS) - Reflected in GitHub repository cecilapp/cecil prior to 7.47.1.
[ { "commit_message": "[PATCH] Fix security issues (#1782) resources/server/router.php | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSAwMGRjNzlmMTBjZTcyMzAzNGI3MTQwZDc5ZjRhYzczMWQxZDkwMmViIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBBcm5hdWQgTGlnbnkgPGFybmF1ZEBsaWdueS5vcmc+C...
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
GHSA-85wq-pqhp-hmq6
Cross-Site Request Forgery in Jenkins
null
[ { "commit_message": "[PATCH] [SECURITY-412] Simplify implementation as suggested by jglick core/src/main/java/jenkins/model/Jenkins.java | 20 ++++--------------- 1 file changed, 4 insertions(+), 16 deletions(-)", "patch_text_b64": "RnJvbSAyM2Y0ODA5ZTZjMTBhMjIxZTlkNjdmMmU4NDE1MzY4NDUzODdiNDJkIE1vbiBTZXAgMTcg...
null
CVE-2025-34173
Netgate pfSense CE Snort package v4.1.6_25 Directory Traversal Information Disclosure
In pfSense CE /usr/local/www/snort/snort_ip_reputation.php, the value of the iplist parameter is not sanitized of directory traversal-related characters/strings before being used to check if a file exists. While the contents of the file cannot be read, the server reveals whether a file exists, which allows an attacker to enumerate files on the target. The attacker must be authenticated with at least "WebCfg - Services: Snort package" permissions.
[ { "commit_message": "[PATCH] Snort IP Rep file check fix. Fixes #16412 Ensure Snort only tests for IP rep files in the proper path since all other IP rep actions are also limited to that path. security/pfSense-pkg-snort/Makefile | 2 +- .../files/usr/local/www/snort/snort_ip_reputation....
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2018-18586
chmextract.c in the chmextract sample program, as distributed with libmspack before 0.8alpha, does not protect against absolute/relative pathnames in CHM files, leading to Directory Traversal. NOTE: the vendor disputes that this is a libmspack vulnerability, because chmextract.c was only intended as a source-code example, not a supported application
[ { "commit_message": "[PATCH] add anti \"../\" and leading slash protection to chmextract libmspack/ChangeLog | 10 +++ libmspack/src/chmextract.c | 140 +++++-------------------------------- 2 files changed, 27 insertions(+), 123 deletions(-)", "patch_text_b64": "RnJvbSA3Y2FkZDQ4OTY5OGJlMTE3YzQ3ZWZjYW...
n/a
GHSA-52f5-9888-hmc6
tmp allows arbitrary temporary file / directory write via symbolic link `dir` parameter
null
[ { "commit_message": "[PATCH] Fix GHSA-52f5-9888-hmc6 lib/tmp.js | 326 +++++++++++++++++++++++++++++++---------------------- 1 file changed, 192 insertions(+), 134 deletions(-)", "patch_text_b64": "RnJvbSAxODhiMjVlNTI5NDk2ZTM3YWRhZjFhMWQ5ZGNjYjQwMDE5YTA4YjFiIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiA9P1VURi0...
null
GHSA-747x-5m58-mq97
svix vulnerable to Authentication Bypass
null
[ { "commit_message": "[PATCH] Rust verification library: fix comparison of different length signatures (#1190) There was a bug in the code which meant that the signatures are only compared up to the length of the shorter signature, which means that an attacker can just pass `v1,` as the signature and that will a...
null
GHSA-4chg-535w-wpv8
null
[ { "commit_message": "[PATCH] USB: usbip: fix potential out-of-bounds write Fix potential out-of-bounds write to urb->transfer_buffer usbip handles network communication directly in the kernel. When receiving a packet from its peer, usbip code parses headers according to protocol. As part of this parsing urb->ac...
null
CVE-2015-3339
Race condition in the prepare_binprm function in fs/exec.c in the Linux kernel before 3.19.6 allows local users to gain privileges by executing a setuid program at a time instant when a chown to root is in progress, and the ownership is changed but the setuid bit is not yet stripped.
[ { "commit_message": "[PATCH] fs: take i_mutex during prepare_binprm for set[ug]id executables This prevents a race between chown() and execve(), where chowning a setuid-user binary to root would momentarily make the binary setuid root. This patch was mostly written by Linus Torvalds. Signed-off-by: Jann Horn <j...
n/a
CVE-2015-4036
Array index error in the tcm_vhost_make_tpg function in drivers/vhost/scsi.c in the Linux kernel before 4.0 might allow guest OS users to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted VHOST_SCSI_SET_ENDPOINT ioctl call. NOTE: the affected function was renamed to vhost_scsi_make_tpg before the vulnerability was announced.
[ { "commit_message": "[PATCH] vhost/scsi: potential memory corruption This code in vhost_scsi_make_tpg() is confusing because we limit \"tpgt\" to UINT_MAX but the data type of \"tpg->tport_tpgt\" and that is a u16. I looked at the context and it turns out that in vhost_scsi_set_endpoint(), \"tpg->tport_tpgt\" i...
n/a
CVE-2025-30358
Mesop Class Pollution vulnerability leads to DoS and Jailbreak attacks
Mesop is a Python-based UI framework that allows users to build web applications. A class pollution vulnerability in Mesop prior to version 0.14.1 allows attackers to overwrite global variables and class attributes in certain Mesop modules during runtime. This vulnerability could directly lead to a denial of service (DoS) attack against the server. Additionally, it could also result in other severe consequences given the application's implementation, such as identity confusion, where an attacker could impersonate an assistant or system role within conversations. This impersonation could potentially enable jailbreak attacks when interacting with large language models (LLMs). Just like the Javascript's prototype pollution, this vulnerability could leave a way for attackers to manipulate the intended data-flow or control-flow of the application at runtime and lead to severe consequences like remote code execution when gadgets are available. Users should upgrade to version 0.14.1 to obtain a fix for the issue.
[ { "commit_message": "[PATCH] Harden dataclass utils (#1171) mesop/dataclass_utils/dataclass_utils.py | 4 ++++ mesop/dataclass_utils/dataclass_utils_test.py | 19 +++++++++++++++++++ 2 files changed, 23 insertions(+)", "patch_text_b64": "RnJvbSA3NDhlMjBkNGEzNjNkODliODQxZDYyMjEzZjViMGM2YjRiZWQ3ODhmIE1vbi...
CWE-915: Improperly Controlled Modification of Dynamically-Determined Object Attributes
PYSEC-2023-139
null
[ { "commit_message": "[PATCH] Explicitly create an SSL context when emailing (#574) changelog.d/574.bugfix | 1 + sydent/util/emailutils.py | 8 ++++++-- 2 files changed, 7 insertions(+), 2 deletions(-) create mode 100644 changelog.d/574.bugfix", "patch_text_b64": "RnJvbSAxY2Q3NDgzMDdjNmIxNjhiNjYxNTRlNmM0ZG...
null
GHSA-rcxc-3w2m-mp8h
Unsafe deserialisation in the PKI implementation scheme of NVFlare
null
[ { "commit_message": "[PATCH] Replace pickle in state persistence in provision cert with json (#412) nvflare/lighter/impl/cert.py | 30 +++++++++++++++++------------- 1 file changed, 17 insertions(+), 13 deletions(-)", "patch_text_b64": "RnJvbSBmZDAxOGVlYTlkZmY5MjVhNzY1MDc5YTk0YzJmMDE3OTIwZmNkYTY3IE1vbiBTZXAg...
null
CVE-2021-26926
A flaw was found in jasper before 2.0.25. An out of bounds read issue was found in jp2_decode function whic may lead to disclosure of information or program crash.
[ { "commit_message": "[PATCH] Fixes #264. The JP2 decoder was allowing the decoding of a code stream to be attempted when the stream has inconsistent values for the number of components and/or the component types. For such invalid streams, only a warning would be issued and decoding would proceed. This is dang...
CWE-125
GHSA-3x4h-m49h-pxr3
null
[ { "commit_message": "[PATCH] fix(mail): Fix security @import css injection SoObjects/SOGo/NSString+Utilities.m | 9 +++++++++ Tests/Unit/TestNSString+Utilities.m | 1 + 2 files changed, 10 insertions(+)", "patch_text_b64": "RnJvbSAyMTQ2ODcwMDcxOGVkNzE3NzRlYWYyOTc5ZWU1OTMzMGZjNTY5NDI0IE1vbiBTZXAgMTcgMDA6MDA6MD...
null
CVE-2023-2194
An out-of-bounds write vulnerability was found in the Linux kernel's SLIMpro I2C device driver. The userspace "data->block[0]" variable was not capped to a number between 0-255 and was used as the size of a memcpy, possibly writing beyond the end of dma_buffer. This flaw could allow a local privileged user to crash the system or potentially achieve code execution.
[ { "commit_message": "[PATCH] i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer() The data->block[0] variable comes from user and is a number between 0-255. Without proper check, the variable may be very large to cause an out-of-bounds when performing memcpy in slimpro_i2c_blkwr. Fix this bug b...
CWE-787
GHSA-j494-7x2v-vvvp
mx-chain-go's relayed transactions always increment nonce
null
[ { "commit_message": "[PATCH 1/9] - added semi-integration test .../vm/txsFee/relayedMoveBalance_test.go | 30 +++++++++++++++++++ 1 file changed, 30 insertions(+)", "patch_text_b64": "RnJvbSA1ZmI0MTEyZWQyOGRkZjRmNDM3Y2RlM2UxYTc0NGI3NjI2ODJmMmNmIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBqdWxlczAxIDxpdWxp...
null
GHSA-jfqq-mmmm-xrc9
null
[ { "commit_message": "[PATCH] KEYS: Fix ASN.1 indefinite length object parsing This fixes CVE-2016-0758. In the ASN.1 decoder, when the length field of an ASN.1 value is extracted, it isn't validated against the remaining amount of data before being added to the cursor. With a sufficiently large size indicated,...
null
GHSA-rmm5-g63h-m6g9
Improper Restriction of XML External Entity Reference in pippo-core
null
[ { "commit_message": "[PATCH] Fix #486 .../src/main/java/ro/pippo/jaxb/JaxbEngine.java | 15 ++++++++++++--- 1 file changed, 12 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSA5ZjM2ZTU4OTFjMGIxMWY4NDBlMWUxNTYxYWU5NmQ4M2JhOWNlNzU5IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBEZWNlYmFsIFN1aXUgPGRlY2ViY...
null
GHSA-r5w3-pfq8-3r82
Jenkins SAML Plugin allows bypassing CSRF protection for any URL
null
[ { "commit_message": "[PATCH] Integrate 2.0.8 security update (#122) * [SECURITY-2469] * [maven-release-plugin] prepare release saml-2.0.8 * [maven-release-plugin] prepare for next development iteration Co-authored-by: Ivan Fernandez Calvo <kuisathaverat@yahoo.com> Co-authored-by: Jenkins Security Team <jenkinsc...
null
GHSA-82j3-hf72-7x93
Reposilite vulnerable to path traversal while serving javadoc expanded files (arbitrary file read) (`GHSL-2024-074`)
null
[ { "commit_message": "[PATCH] GHSA-82j3-hf72-7x93 Make Location a bit safer to use out-of-the-box by immediately sanitazing invalid symbols gradle/wrapper/gradle-wrapper.properties | 2 +- .../infrastructure/FrontendHandler.kt | 5 +-- .../com/reposilite/storage/api/Location.kt | 45 ++++++++++++-...
null
GHSA-xhmf-mmv2-4hhx
Go-CVSS has Out-of-bounds Read vulnerability in ParseVector function
null
[ { "commit_message": "[PATCH] Improve CVSS v2.0 implementation (0/1 allocs/op) 20/cvss20.go | 288 ++++++++++++++++++++++++++-------------- 20/cvss20_bench_test.go | 100 ++++++++++++++ 20/cvss20_fuzz_test.go | 6 +- 20/cvss20_test.go | 259 ++++++++++++++++++++---------------- 20/errors.go ...
null
CVE-2025-62596
youki container escape and denial of service due to arbitrary write gadgets and procfs write redirects
Youki is a container runtime written in Rust. In versions 0.5.6 and below, youki’s apparmor handling performs insufficiently strict write-target validation, and when combined with path substitution during pathname resolution, can allow writes to unintended procfs locations. While resolving a path component-by-component, a shared-mount race can substitute intermediate components and redirect the final target. This issue is fixed in version 0.5.7.
[ { "commit_message": "[PATCH] Merge commit from fork * apparmor: use safe procfs API for labels Signed-off-by: Yusuke Sakurai <yusuke.sakurai@3-shake.com> * remove ensure_procfs Signed-off-by: Yusuke <yusuke.sakurai@3-shake.com> * sysctl: use safe procfs API from libpathrs Signed-off-by: Aleksa Sarai <cyphar@cyp...
CWE-61: UNIX Symbolic Link (Symlink) Following
CVE-2021-41689
DCMTK through 3.6.6 does not handle string copy properly. Sending specific requests to the dcmqrdb program, it would query its database and copy the result even if the result is null, which can incur a head-based overflow. An attacker can use it to launch a DoS attack.
[ { "commit_message": "[PATCH] Fixed possible NULL pointer dereference. Thanks to Jinsheng Ba <bajinsheng@u.nus.edu> for the report and patch. dcmnet/libsrc/diutil.cc | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA1YzE0YmY1M2ZiNDJjZWNhMTJiYmNjMDAxNmU4NzA0YjE1ODA5MjBkIE1vbiB...
n/a
GHSA-4www-5p9h-95mh
http-proxy-middleware can call writeBody twice because "else if" is not used
null
[ { "commit_message": "[PATCH] fix(fixRequestBody): prevent multiple .write() calls (#1089) src/handlers/fix-request-body.ts | 18 ++++++++++-------- test/unit/fix-request-body.spec.ts | 15 +++++++++++++++ 2 files changed, 25 insertions(+), 8 deletions(-)", "patch_text_b64": "RnJvbSAwMjA5NzYwNDRkMTEzZmMwYmNi...
null
CVE-2013-7013
The g2m_init_buffers function in libavcodec/g2meet.c in FFmpeg before 2.1 uses an incorrect ordering of arithmetic operations, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted Go2Webinar data.
[ { "commit_message": "[PATCH] avcodec/g2meet: Fix order of align and pixel size multiplication. Fixes out of array accesses Fixes Ticket2922 Found-by: ami_stuff Signed-off-by: Michael Niedermayer <michaelni@gmx.at> libavcodec/g2meet.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "...
n/a
GHSA-jjr8-m8g8-p6wv
Null pointer dereference in TFLite's `Reshape` operator
null
[ { "commit_message": "[PATCH] Prevent a null pointer dereference in TFLite. PiperOrigin-RevId: 370800353 Change-Id: Ic9c9712ce5c6e384c954dcd640a5bd9ff05c9a05 tensorflow/lite/core/subgraph.cc | 13 ++++++++++--- 1 file changed, 10 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSBmODM3ODkyMDM0NWY0ZjQ2M...
null
CVE-2017-1000491
Shiba markdown live preview app version 1.1.0 is vulnerable to XSS which leads to code execution due to enabled node integration.
[ { "commit_message": "[PATCH] improve marked renderer package.json | 3 +- renderer/markdown-preview.ts | 5 +- renderer/marked.d.ts | 166 ----------------------------------- renderer/tsconfig.json | 1 - 4 files changed, 6 insertions(+), 169 deletions(-) delete mode 100644 rende...
n/a
GHSA-r4gx-x67v-jqmv
null
[ { "commit_message": "[PATCH] Update voicemail_greeting_edit.php .../voicemail_greeting_edit.php | 15 +++++++-------- 1 file changed, 7 insertions(+), 8 deletions(-)", "patch_text_b64": "RnJvbSA5ZTgzN2ZhZGVjZGQ1MTk5ODE5YTk0OWI1YjFiZDg0YjE5ZjcxNmYyIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBG...
null
GHSA-jqx4-9gpq-rppm
@misskey-dev/summaly allows IP Filter Bypass via Redirect
null
[ { "commit_message": "[PATCH] Fix GHSA-jqx4-9gpq-rppm src/utils/got.ts | 19 ++++++++----------- test/index.ts | 7 ++++++- 2 files changed, 14 insertions(+), 12 deletions(-)", "patch_text_b64": "RnJvbSBkZmU2NDUxMDEyYWFjNDJlYWJlNzFkNGVkNzIxZDgwNThjNDA2NmI0IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBKdWxpYSB...
null
GHSA-q7q2-qf2q-rw3w
Django Vulnerable to Cache Poisoning
null
[ { "commit_message": "[PATCH] [1.6.x] Dropped fix_IE_for_vary/attach. This is a security fix. Disclosure following shortly. django/core/handlers/base.py | 2 -- django/http/__init__.py | 3 +- django/http/utils.py | 55 ---------------------------------- tests/utils_tests/test_http.py | 44 ----...
null
CVE-2014-9730
The udf_pc_to_char function in fs/udf/symlink.c in the Linux kernel before 3.18.2 relies on component lengths that are unused, which allows local users to cause a denial of service (system crash) via a crafted UDF filesystem image.
[ { "commit_message": "[PATCH] udf: Check component length before reading it Check that length specified in a component of a symlink fits in the input buffer we are reading. Also properly ignore component length for component types that do not use it. Otherwise we read memory after end of buffer for corrupted udf...
n/a
GHSA-9jrx-fg8j-rhxp
null
[ { "commit_message": "[PATCH] fix: Fixed a reflected XSS in the sharing group creator tool - Fixed a reflected XSS in the sharing group editor that requires malicious organisation names - Low impact due to the following requirements: - organisation names with malicious org names (JS in the orgname) - sharing gro...
null
CVE-2018-11092
An issue was discovered in the Admin Notes plugin 1.1 for MyBB. CSRF allows an attacker to remotely delete all admin notes via an admin/index.php?empty=table (aka Clear Table) action.
[ { "commit_message": "[PATCH] Add CSRF Token to Clear Table Upload/admin/modules/home/index.php | 204 ++++++++++++++-------------- 1 file changed, 102 insertions(+), 102 deletions(-)", "patch_text_b64": "RnJvbSAzZGVhZTcwMWNkZDg5NzUzY2I2Njg4MzAyYWVlNWI5M2E3MmJjNThiIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiAwe...
n/a
CVE-2021-41714
In Tipask < 3.5.9, path parameters entered by the user are not validated when downloading attachments, a registered user can download arbitrary files on the Tipask server such as .env, /etc/passwd, laravel.log, causing infomation leakage.
[ { "commit_message": "[PATCH] =?UTF-8?q?=E6=96=87=E4=BB=B6=E4=B8=8B=E8=BD=BD=E6=BC=8F?= =?UTF-8?q?=E6=B4=9E=E4=BF=AE=E6=AD=A3?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit app/Http/Controllers/AttachController.php | 5 +++-- app/Http/Controllers/ImageController.php ...
n/a