id
stringlengths
12
19
title
stringlengths
0
237
description
stringlengths
35
3.87k
patches
listlengths
1
22
cwe
stringlengths
2
440
GHSA-6xj8-rrqx-r4cv
MLflow Weak Password Requirements Authentication Bypass Vulnerability
null
[ { "commit_message": "[PATCH] Validate auth password to be string longer than 8 chars (#15287) Signed-off-by: Weichen Xu <weichen.xu@databricks.com> mlflow/server/auth/__init__.py | 2 +- mlflow/server/auth/basic_auth.ini | 2 +- mlflow/server/auth/sqlalchemy_store.py | 3 ++- mlflow/utils/validation.p...
null
GHSA-c8hm-7hpq-7jhg
com.fasterxml.jackson.core:jackson-databind vulnerable to Deserialization of Untrusted Data
null
[ { "commit_message": "[PATCH] Fix #2186 release-notes/VERSION | 4 ++++ .../jackson/databind/jsontype/impl/SubTypeValidator.java | 6 ++++++ 2 files changed, 10 insertions(+)", "patch_text_b64": "RnJvbSA3MmNkNDAyNWEyMjlmYjI4ZWMxMzMyMzUwMDNkZDQ2MTZmNzBhZmFhIE1vbiBTZXAgMT...
null
GHSA-j96r-xvjq-r9pg
activesupport vulnerable to Denial of Service via large XML document depth
null
[ { "commit_message": "[PATCH] enforce a depth limit on XML documents XML documents that are too deep can cause an stack overflow, which in turn will cause a potential DoS attack. CVE-2015-3227 activesupport/lib/active_support/xml_mini.rb | 3 +++ activesupport/lib/active_support/xml_mini/jdom.rb | 11 ++++...
null
CVE-2022-39208
Git Repository Disclosure in Onedev
Onedev is an open source, self-hosted Git Server with CI/CD and Kanban. All files in the /opt/onedev/sites/ directory are exposed and can be read by unauthenticated users. This directory contains all projects, including their bare git repos and build artifacts. This file disclosure vulnerability can be used by unauthenticated attackers to leak all project files of any project. Since project IDs are incremental, an attacker could iterate through them and leak all project data. This issue has been resolved in version 7.3.0 and users are advised to upgrade. There are no known workarounds for this issue.
[ { "commit_message": "[PATCH] Fix security vulnerability issue regarding site/* access pom.xml | 2 +- server-core/pom.xml | 2 +- .../io/onedev/server/maintenance/Upgrade.java | 39 ++++++++++++++++-- .../web/avatar/DefaultAvatarManager.java ...
CWE-552: Files or Directories Accessible to External Parties
GHSA-6hhv-cvx8-rhvf
null
[ { "commit_message": "[PATCH] Proper fix for #248 src/gd_tga.c | 48 +++++++++++++++++++----------------------------- 1 file changed, 19 insertions(+), 29 deletions(-)", "patch_text_b64": "RnJvbSAwMWM2MWY4YWIxMTBhNzdhZTY0YjVjYTY3YzI0NGM3MjhjNTA2ZjAzIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiA9P1VURi04P3E/T25kP...
null
GHSA-hpr6-f4vq-mxch
Command injection in LocalStack
null
[ { "commit_message": "[PATCH] replace AWS CLI commands with boto3 calls for /graph endpoint (#3824) localstack/dashboard/infra.py | 264 ++++++++++------------------- localstack/utils/aws/aws_models.py | 2 +- 2 files changed, 90 insertions(+), 176 deletions(-)", "patch_text_b64": "RnJvbSAwMWNkMTY5YWU1Z...
null
CVE-2021-40323
Cobbler before 3.3.0 allows log poisoning, and resultant Remote Code Execution, via an XMLRPC method that logs to the logfile for template injection.
[ { "commit_message": "[PATCH 1/7] Safeguard XMLRPC against rce - The XMLRPC methods generate_script & upload_log_file are not secured against injection which lead to remote code execution - Add types to clarify what we expect in the XMLRPC-API cobbler/api.py | 9 ++-- cobbler/remote.py | 106 ++++++++++++...
n/a
CVE-2020-26243
Memory leak in nanopb
Nanopb is a small code-size Protocol Buffers implementation. In Nanopb before versions 0.4.4 and 0.3.9.7, decoding specifically formed message can leak memory if dynamic allocation is enabled and an oneof field contains a static submessage that contains a dynamic field, and the message being decoded contains the submessage multiple times. This is rare in normal messages, but it is a concern when untrusted data is parsed. This is fixed in versions 0.3.9.7 and 0.4.4. The following workarounds are available: 1) Set the option `no_unions` for the oneof field. This will generate fields as separate instead of C union, and avoids triggering the problematic code. 2) Set the type of the submessage field inside oneof to `FT_POINTER`. This way the whole submessage will be dynamically allocated and the problematic code is not executed. 3) Use an arena allocator for nanopb, to make sure all memory can be released afterwards.
[ { "commit_message": "[PATCH] Fix memory leak with oneofs and PB_ENABLE_MALLOC (#615) Nanopb would leak memory when all of the following conditions were true: - PB_ENABLE_MALLOC is defined at the compile time - Message definitions contains an oneof field, the oneof contains a static submessage, and the static su...
CWE-20: Improper Input Validation
CVE-2016-9026
Exponent CMS before 2.6.0 has improper input validation in fileController.php.
[ { "commit_message": "[PATCH] second effort to greatly enhance system security (xss, sql inject, file exploit, rce, etc...), thanks to felixk3y cron/find_help.php | 2 +- .../ecommerce/controllers/cartController.php | 48 +++++++++---------- .../controllers/purchaseOrderController.php ...
n/a
GHSA-hr2q-hp5q-x767
Astro vulnerable to URL manipulation via headers, leading to middleware and CVE-2025-61925 bypass
null
[ { "commit_message": "[PATCH] Prevent cache poisoning in x-forwarded headers (#14743) * Restrict X-Forwarded-Proto and X-Forwarded-Port * Fix X-Forwarded header security vulnerabilities - Sanitize hostnames to reject paths and prevent path injection - Validate X-Forwarded-Proto, X-Forwarded-Host, X-Forwarded-Por...
null
GHSA-3vjh-xrhf-v9xh
Improper Restriction of XML External Entity Reference in dompdf/dompdf
null
[ { "commit_message": "[PATCH] Validate SVG image references src/Image/Cache.php | 33 +++++++++++++++++++++++++++++++++ 1 file changed, 33 insertions(+)", "patch_text_b64": "RnJvbSBmNTZiYzhlNDBiZTZjMGFlMDgyNWU2YzczOTZmNGRiODA2MjBiNzk5IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBCcmlhbiBTd2VlbmV5IDxicmlhbkBlY2xl...
null
GHSA-g2hp-mx9f-q582
null
[ { "commit_message": "[PATCH] Issue 23433 in oss-fuzz: Heap-buffer-overflow in findNextBorderPixel() * Check pix boundary when looking for the next pixel. src/ccbord.c | 2 ++ 1 file changed, 2 insertions(+)", "patch_text_b64": "RnJvbSA4ZDZlMTc1NTUxOGNmYjk4NTM2ZDZjM2RhZjA2MDFmMjI2ZDE2ODQyIE1vbiBTZXAgMTcgMDA6M...
null
GHSA-x5jc-34xf-c24q
User Plugin for October CSS Allows XSS
null
[ { "commit_message": "[PATCH] KISS and form_value() doesn't use escaping components/account/update.htm | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-)", "patch_text_b64": "RnJvbSAwOThjMmJjOTA3NDQzZDY3ZTllMTg2NDVmODUwZTNkZTQyOTQxZDIwIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBTYW11ZWwgR2VvcmdlcyA8...
null
GHSA-5j5m-fgcp-mj4f
null
[ { "commit_message": "[PATCH] Fix h1 report 107879 Reflected XSS Johan Caluwe has reported via HackerOne that www/admin/stats.php was vulnerable to reflected XSS attacks via multiple parameters that were not properly sanitised or escaped when displayed, such as \"setPerPage\", \"pageId\", \"bannerid\", \"pereiod...
null
GHSA-7mqg-g2q4-78m2
null
[ { "commit_message": "[PATCH] Resoving Issue #3026 Unsafe deserialization in of selected objects in Cacti lib/functions.php | 23 +++++++++++++++-------- 1 file changed, 15 insertions(+), 8 deletions(-)", "patch_text_b64": "RnJvbSBhZGYyMjEzNDQzNTlmNWIwMmI4YWVkNDNkZmI2YjMzYWU1ZDcwOGM4IE1vbiBTZXAgMTcgMDA6MDA6MD...
null
CVE-2024-4941
Local File Inclusion in JSON component in gradio-app/gradio
A local file inclusion vulnerability exists in the JSON component of gradio-app/gradio version 4.25. The vulnerability arises from improper input validation in the `postprocess()` function within `gradio/components/json_component.py`, where a user-controlled string is parsed as JSON. If the parsed JSON object contains a `path` key, the specified file is moved to a temporary directory, making it possible to retrieve it later via the `/file=..` endpoint. This issue is due to the `processing_utils.move_files_to_cache()` function traversing any object passed to it, looking for a dictionary with a `path` key, and then copying the specified file to a temporary directory. The vulnerability can be exploited by an attacker to read files on the remote system, posing a significant security risk.
[ { "commit_message": "[PATCH] Ensure JSON component outputs handled properly in postprocess (#8292) * Add code * Json postprocess * add changeset * add changeset * Fix json tests * fix flag * Address comments Co-authored-by: gradio-pr-bot <gradio-pr-bot@users.noreply.github.com> .changeset/gentle-socks-pay.md ...
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
GHSA-jq3h-g8hj-7pmh
null
[ { "commit_message": "[PATCH] prevent access to repos which are in the process of bring migrated MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Björn Kautler pointed out that, when a repo is being migrated into gitolite as per the documentation [1], there is a gap betwe...
null
CVE-2021-43787
XSS via prototype pollution
Nodebb is an open source Node.js based forum software. In affected versions a prototype pollution vulnerability in the uploader module allowed a malicious user to inject arbitrary data (i.e. javascript) into the DOM, theoretically allowing for an account takeover when used in conjunction with a path traversal vulnerability disclosed at the same time as this report. The vulnerability has been patched as of v1.18.5. Users are advised to upgrade as soon as possible.
[ { "commit_message": "<barisusakli@gmail.com> [PATCH] fix: guard against prototype pollution src/socket.io/uploads.js | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSAxNzgzZjkxOGJjMTk1NjhmNDIxNDczODI0NDYxZmYyZWQ3NzU1ZTRjIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiA9P1VURi04...
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
GHSA-gpjm-9f6c-xwfg
null
[ { "commit_message": "[PATCH] 1.2 release, forgot to add release notes in 1.1 README.md | 9 +++++++++ ajax/redraw-field.php | 10 ++++++---- classes/btx-form-builder.php | 15 ++++++++++++--- manifest.json ...
null
CVE-2023-40185
Shescape on Windows escaping may be bypassed in threaded context
shescape is simple shell escape library for JavaScript. This may impact users that use Shescape on Windows in a threaded context. The vulnerability can result in Shescape escaping (or quoting) for the wrong shell, thus allowing attackers to bypass protections depending on the combination of expected and used shell. This bug has been patched in version 1.7.4.
[ { "commit_message": "[PATCH] Provide explicit `$PATH` value to which (#1142) Update the implementation of `resolveExecutable` to accept the environment variables so that they can explicitly be provided to which [1]. All internal code and tests have been updated accordingly, no external changes. This is in an ef...
CWE-150: Improper Neutralization of Escape, Meta, or Control Sequences
CVE-2023-41040
GitPython blind local file inclusion
GitPython is a python library used to interact with Git repositories. In order to resolve some git references, GitPython reads files from the `.git` directory, in some places the name of the file being read is provided by the user, GitPython doesn't check if this file is located outside the `.git` directory. This allows an attacker to make GitPython read any file from the system. This vulnerability is present in https://github.com/gitpython-developers/GitPython/blob/1c8310d7cae144f74a671cbe17e51f63a830adbf/git/refs/symbolic.py#L174-L175. That code joins the base directory with a user given string without checking if the final path is located outside the base directory. This vulnerability cannot be used to read the contents of files but could in theory be used to trigger a denial of service for the program. This issue has been addressed in version 3.1.37.
[ { "commit_message": "[PATCH 1/2] Fix CVE-2023-41040 This change adds a check during reference resolving to see if it contains an up-level reference ('..'). If it does, it raises an exception. This fixes CVE-2023-41040, which allows an attacker to access files outside the repository's directory. git/refs/symboli...
CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
GHSA-v2v2-hph8-q5xp
@fastify/reply-from JSON Content-Type parsing confusion
null
[ { "commit_message": "[PATCH] Merge pull request from GHSA-v2v2-hph8-q5xp * Fix for content-type confusion Signed-off-by: Matteo Collina <hello@matteocollina.com> * fixup Signed-off-by: Matteo Collina <hello@matteocollina.com> * fix: suggestion * fix: lint Signed-off-by: Matteo Collina <hello@matteocollina.com> ...
null
GHSA-hx53-jchx-cr52
Symfony2 improper IP based access control
null
[ { "commit_message": "[PATCH 01/16] Use Norm Data instead of Data This listener is triggered when normalized data are binded. We have to use $event->getForm()->getNormData() instead of $event->getForm()->getData(). .../Doctrine/Form/EventListener/MergeCollectionListener.php | 2 +- 1 file changed, 1 insertion...
null
CVE-2025-3015
Open Asset Import Library Assimp ASE File ASELoader.cpp BuildUniqueRepresentation out-of-bounds
A vulnerability classified as critical has been found in Open Asset Import Library Assimp 5.4.3. This affects the function Assimp::ASEImporter::BuildUniqueRepresentation of the file code/AssetLib/ASE/ASELoader.cpp of the component ASE File Handler. The manipulation of the argument mIndices leads to out-of-bounds read. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 6.0 is able to address this issue. The patch is named 7c705fde418d68cca4e8eff56be01b2617b0d6fe. It is recommended to apply a patch to fix this issue.
[ { "commit_message": "[PATCH] ASE: Fix possible out of bound access. (#6045) code/AssetLib/ASE/ASELoader.cpp | 4 ++++ 1 file changed, 4 insertions(+)", "patch_text_b64": "RnJvbSA3YzcwNWZkZTQxOGQ2OGNjYTRlOGVmZjU2YmUwMWIyNjE3YjBkNmZlIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBLaW0gS3VsbGluZyA8a2lta3VsbGluZ0B1c2...
Out-of-Bounds Read
CVE-2018-17104
An issue was discovered in Microweber 1.0.7. There is a CSRF attack (against the admin user) that can add an administrative account via api/save_user.
[ { "commit_message": "[PATCH] fix of issue #484 editing user now requires csrf token src/Microweber/Providers/UserManager.php | 19 +++++++++++++++++++ userfiles/modules/users/edit_user.php | 3 ++- .../modules/users/profile/confirm_edit.php | 11 +++++++++++ 3 files changed, 32 insertions(+), 1 de...
n/a
GHSA-fjpm-hf7c-xgc2
Stored XSS vulnerability in Jenkins Publish Over SSH Plugin
null
[ { "commit_message": "[PATCH] [SECURITY-2287] avoid xss storage for server name Signed-off-by: Olivier Lamy <olamy@apache.org> .../plugins/publish_over_ssh/BapSshPublisherPlugin/config.jelly | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBlZGY0ZTk4MTY4NDMyNmQzNzEyMDA1NDFkNDQw...
null
CVE-2015-5078
SQL injection vulnerability in the insert function in application/controllers/admin/dataentry.php in LimeSurvey 2.06+ allows remote authenticated users to execute arbitrary SQL commands via the closedate parameter.
[ { "commit_message": "[PATCH] Fixed issue #9720: SQL injection vulnerability in data entry application/controllers/admin/dataentry.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA2NWQ3MTc0MTVhMjcxMjQyYjlhMzBhNTMzMGQ0ZWFiYWMxYzFhODM3IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9t...
n/a
GHSA-vc7g-4269-f7hw
Missing permission check in Blue Ocean Plugin
null
[ { "commit_message": "[PATCH] [SECURITY-1961] add permission check for creating servers Signed-off-by: olivier lamy <olamy@apache.org> acceptance-tests/pom.xml | 6 +- blueocean-bitbucket-pipeline/pom.xml | 6 ++ .../BitbucketServerEndpointContainer.java | 14 ++- .../BitbucketSe...
null
PYSEC-2021-256
null
[ { "commit_message": "[PATCH] Fix segfaults in `tf.raw_ops.SparseCountSparseOutput`. PiperOrigin-RevId: 360547563 Change-Id: I781c7af4b54a63d867c6e18d43a44d64a5c4e7c9 tensorflow/core/kernels/count_ops.cc | 12 ++++++++++++ 1 file changed, 12 insertions(+)", "patch_text_b64": "RnJvbSA4MmU2MjAzMjIxODY1ZGU0MDA4N...
null
CVE-2023-0323
Cross-site Scripting (XSS) - Stored in pimcore/pimcore
Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.5.14.
[ { "commit_message": "[PATCH] Fix: X-site-scripting (#13916) models/DataObject/ClassDefinition/Service.php | 5 +++++ 1 file changed, 5 insertions(+)", "patch_text_b64": "RnJvbSA3NDZmYWMxYTM0Mjg0MTYyNGY2M2FiMTNlZGNkMzQwMzU4ZTFiYzA0IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiByb2JlcnRTdDcgPDEwNDc3MDc1MCtyb2JlcnR...
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
GHSA-6gg3-pmm7-97xc
DOM-based XSS in auth0-lock
null
[ { "commit_message": "[PATCH] Merge pull request from GHSA-6gg3-pmm7-97xc * Replace usage of i18n.html with i18n.str on vcode ask screen * Add tests for passwordless email xss issue * Change enterprise HRD screen to use i18n.str .../__snapshots__/hrd_screen.test.js.snap | 59 +++++++++++++++ .../connection/en...
null
GHSA-p3q7-v2h9-whv5
null
[ { "commit_message": "[PATCH] Fixed an XSS vulnerability and 'Undefined index' error for 'theme' GET parameter (#12) * Fixed an 'index not found' error when there is no 'theme' parameter in the URL * Fixes XSS vulnerability with `theme` URL parameter and reverts to default theme if theme doesn't exist. php/swmp....
null
GHSA-g2jw-fqx3-5mwq
null
[ { "commit_message": "[PATCH] chsh, chfn, vipw: fix filenames collision The utils when compiled WITHOUT libuser then mkostemp()ing \"/etc/%s.XXXXXX\" where the filename prefix is argv[0] basename. An attacker could repeatedly execute the util with modified argv[0] and after many many attempts mkostemp() may gene...
null
GHSA-xxxw-3j6h-q7h6
Grafana plugin SDK Information Leakage
null
[ { "commit_message": "[PATCH] Remove repo info from binary (#1091) build/common.go | 5 ++- build/common_test.go | 6 ++-- build/info.go | 76 -------------------------------------------- build/info_test.go | 57 --------------------------------- 4 files changed, 7 insertions(+), 137 deletions(-) del...
null
CVE-2022-24785
Path Traversal in Moment.js
Moment.js is a JavaScript date library for parsing, validating, manipulating, and formatting dates. A path traversal vulnerability impacts npm (server) users of Moment.js between versions 1.0.1 and 2.29.1, especially if a user-provided locale string is directly used to switch moment locale. This problem is patched in 2.29.2, and the patch can be applied to all affected versions. As a workaround, sanitize the user-provided locale name before passing it to Moment.js.
[ { "commit_message": "[PATCH] [bugfix] Avoid loading path-looking locales from fs src/lib/locale/locales.js | 8 +++++++- 1 file changed, 7 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA0MjExYmZjOGYxNTc0NmJlNDAxOWJiYTU1N2UyOWE3YmE4M2Q1NGM1IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBJc2tyZW4gQ2hlcm5l...
CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2022-3457
Origin Validation Error in ikus060/rdiffweb
Origin Validation Error in GitHub repository ikus060/rdiffweb prior to 2.5.0a5.
[ { "commit_message": "[PATCH] Enforce 'Origin' validation README.md | 1 + rdiffweb/controller/tests/test_secure_headers.py | 9 +++++++++ rdiffweb/tools/secure_headers.py | 2 +- 3 files changed, 11 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSB...
CWE-346 Origin Validation Error
CVE-2023-46321
iTermSessionLauncher.m in iTerm2 before 3.5.0beta12 does not sanitize paths in x-man-page URLs. They may have shell metacharacters for a /usr/bin/man command line.
[ { "commit_message": "[PATCH] Sanitize paths in x-man-page URL sources/iTermSessionLauncher.m | 18 ++++++++++++++---- 1 file changed, 14 insertions(+), 4 deletions(-)", "patch_text_b64": "RnJvbSBkZTNkMzUxZTFiZDNiYzFjMWE0Zjg1ZmU5NzZjNTkyZTQ5N2RkMDcxIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBHZW9yZ2UgTmFjaG1hb...
n/a
CVE-2024-28662
A Cross Site Scripting vulnerability exists in Piwigo before 14.3.0 script because of missing sanitization in create_tag in admin/include/functions.php.
[ { "commit_message": "[PATCH] (cp 917cab5a4) fixes GHSA-7379-w44f-mfw4 and fixes GHSA-8g2g-6f2c-6h7j protect tag name from XSS admin/include/functions.php | 3 +++ 1 file changed, 3 insertions(+)", "patch_text_b64": "RnJvbSA1MDY5NjEwYWFlYjFkYTZkOTZkMzg5NjUxYTViYTliMzg2OTBjNTgwIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwM...
n/a
CVE-2017-1000487
Plexus-utils before 3.0.16 is vulnerable to command injection because it does not correctly process the contents of double quoted strings.
[ { "commit_message": "[PATCH] [PLXUTILS-161] Commandline shell injection problems Patch by Charles Duffy, applied unmodified .../codehaus/plexus/util/cli/Commandline.java | 38 +++++++++--- .../plexus/util/cli/shell/BourneShell.java | 60 ++++++------------- .../codehaus/plexus/util/cli/shell/Shell.java | 35 ++...
n/a
GHSA-vwgf-7f9h-h499
Cross site scripting in zenml
null
[ { "commit_message": "[PATCH] Prepare release 0.56.2 (#2564) * git commit -m 'Prepare release 0.56.2' * Fix migration issues and introduce new features README.md | 2 +- RELEASE_NOTES.md | 47 ++++++++++--------- pyproject.toml ...
null
PYSEC-2022-23
null
[ { "commit_message": "[PATCH] Kobo sync token is now also created if accessed from localhost(fixes #1990) Create kobo sync token button is now \"unclicked\" after closing dialog Additional localhost route is catched If book format is deleted this also deletes the book synced to kobo status cps/admin.py ...
null
CVE-2020-15261
Unquoted service path vulnerability on Veyon
On Windows the Veyon Service before version 4.4.2 contains an unquoted service path vulnerability, allowing locally authenticated users with administrative privileges to run malicious executables with LocalSystem privileges. Since Veyon users (both students and teachers) usually don't have administrative privileges, this vulnerability is only dangerous in anyway unsafe setups. The problem has been fixed in version 4.4.2. As a workaround, the exploitation of the vulnerability can be prevented by revoking administrative privileges from all potentially untrustworthy users.
[ { "commit_message": "[PATCH] WindowsServiceControl: quote service binary path Fix unquoted service path vulnerability. Closes #657. plugins/platform/windows/WindowsServiceControl.cpp | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBmMjMxZWM1MTFiOWEwOWY0M2Y0OWIyYzdiYjdjNjBi...
CWE-428 Unquoted Search Path or Element
GHSA-rf5m-h8q9-9w6q
Information Disclosure in TYPO3 Page Tree
null
[ { "commit_message": "[PATCH] [SECURITY] Show only explicitly configured page tree information Backend users were able see page tree items without having access: - in case no DB mounts were configured for a particular user and page permissions configured to allow \"everybody\" - in case DB mounts were pointing t...
null
GHSA-v5p2-vg3c-pmrr
Apache Tomcat Path Traversal Vulnerability
null
[ { "commit_message": "[PATCH] Fix CVE-2007-5461. git-svn-id: https://svn.apache.org/repos/asf/tomcat/tc6.0.x/trunk@585934 13f79535-47bb-0310-9956-ffa450edef68 STATUS | 5 ----- java/org/apache/catalina/servlets/WebdavServlet.java | 1 + webapps/docs/changelog.xml ...
null
GHSA-g26h-h44q-fqf3
null
[ { "commit_message": "[PATCH] udf: Check component length before reading it Check that length specified in a component of a symlink fits in the input buffer we are reading. Also properly ignore component length for component types that do not use it. Otherwise we read memory after end of buffer for corrupted udf...
null
GHSA-6jvm-3j5h-79f6
paperclip Cross-site Scripting vulnerability
null
[ { "commit_message": "[PATCH] Fix a possible security issue with spoofing Thanks to MORI Shingo of DeNA Co., Ltd. for reporting this. There is an issue where if an HTML file is uploaded with a .html extension, but the content type is listed as being `image/jpeg`, this will bypass a validation checking for images...
null
GHSA-wmwf-43vq-qhq2
null
[ { "commit_message": "[PATCH] avcodec/utils: Check close before calling it Fixes: NULL pointer dereference Fixes: 15733/clusterfuzz-testcase-minimized-ffmpeg_AV_CODEC_ID_IDF_fuzzer-5658616977162240 Reviewed-by: Paul B Mahol <onemda@gmail.com> Found-by: continuous fuzzing process https://github.com/google/oss-fuz...
null
GHSA-q586-xpwr-jc3j
phpMyAdmin cross-site scripting vulnerability in crafted view name
null
[ { "commit_message": "[PATCH] bug #4505 [security] XSS in view operations page Signed-off-by: Marc Delisle <marc@infomarc.info> ChangeLog | 3 +++ js/functions.js | 2 +- 2 files changed, 4 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAwY2QyOTNmNWUxM2FhMjQ1ZTRhNTdiOGQzNzM1OTdjYzBlNDIxYjZmIE1vb...
null
GHSA-cq47-8w25-m65v
null
[ { "commit_message": "[PATCH] Fix potential Cross-site Scripting (XSS) exploits in demos html/audiobridgetest.js | 17 +++++++++++++---- html/recordplaytest.js | 13 +++++++++++-- html/screensharingtest.js | 11 ++++++++++- html/streamingtest.js | 13 +++++++++++-- html/textroomtest.js | 23 +++++++++++...
null
GHSA-69fp-7c8p-crjr
Keycloak exposes sensitive information in Pushed Authorization Requests (PAR)
null
[ { "commit_message": "[PATCH] Encrypted KC_RESTART cookie and removed sensitive notes (#167) Closes #keycloak/keycloak-private#162 Signed-off-by: Giuseppe Graziano <g.graziano94@gmail.com> docs/documentation/release_notes/index.adoc | 3 + .../release_notes/topics/24_0_5.adoc | 5 ++ .../jose/jws/Defa...
null
CVE-2024-39302
Some bbb-record-core files installed with wrong file permission
BigBlueButton is an open-source virtual classroom designed to help teachers teach and learners learn. An attacker may be able to exploit the overly elevated file permissions in the `/usr/local/bigbluebutton/core/vendor/bundle/ruby/2.7.0/gems/resque-2.6.0` directory with the goal of privilege escalation, potentially exposing sensitive information on the server. This issue has been patched in version(s) 2.6.18, 2.7.8 and 3.0.0-alpha.7.
[ { "commit_message": "[PATCH] build: set permissions for resque files [2.7] build/packages-template/bbb-record-core/build.sh | 2 ++ 1 file changed, 2 insertions(+)", "patch_text_b64": "RnJvbSAwNGU5MTY3OThiNmIxZjUzZjg4NTEzZGYzMTY4ZjAwOWI1N2I4ZjE4IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBBbnRvbiBHZW9yZ2lldiA8...
CWE-269: Improper Privilege Management
GHSA-wc24-5j7x-rp2x
null
[ { "commit_message": "[PATCH] Pass the ARCHIVE_EXTRACT_SECURE_SYMLINKS flag to libarchive There are archive types which allow to first create a symlink and then later on dereference it. If the symlink points outside of the archive, this results in writing outside of the destination directory. With the ARCHIVE_EX...
null
GHSA-5w9x-5g27-3wqv
null
[ { "commit_message": "[PATCH] pkp/pkp-lib#9376 Add CSRF check to navigation menu item delete .../grid/navigationMenus/NavigationMenuItemsGridHandler.inc.php | 2 ++ 1 file changed, 2 insertions(+)", "patch_text_b64": "RnJvbSA0ZDc3YTAwYmU5MDUwZmFjN2ViOGQyZDFjYmVkY2RhYWExYTVhODAzIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAw...
null
CVE-2024-31206
Use of Unencrypted HTTP Request in dectalk-tts
dectalk-tts is a Node package to interact with the aeiou Dectalk web API. In `dectalk-tts@1.0.0`, network requests to the third-party API are sent over HTTP, which is unencrypted. Unencrypted traffic can be easily intercepted and modified by attackers. Anyone who uses the package could be the victim of a man-in-the-middle (MITM) attack. The network request was upgraded to HTTPS in version `1.0.1`. There are no workarounds, but some precautions include not sending any sensitive information and carefully verifying the API response before saving it.
[ { "commit_message": "[PATCH] Send request over HTTPS (#4) src/index.ts | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAzNjAwZDhhYzE1NmYyN2RhNTUzYWM0ZWFkNDZkMTY5ODlhMzUwMTA1IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBKdXN0aW4gTWNCcmlkZSA8anN0bm1jYnJkQG91dGxvb2suY29tPgpEYXRlOiB...
CWE-300: Channel Accessible by Non-Endpoint
CVE-2022-0763
Cross-site Scripting (XSS) - Stored in microweber/microweber
Cross-site Scripting (XSS) - Stored in GitHub repository microweber/microweber prior to 1.3.
[ { "commit_message": "[PATCH] add xss clean to create media dir method src/MicroweberPackages/Media/MediaManager.php | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBjODk3ZDBkYzE1OTg0OTc2M2E4MTMxODRkOWI3NWI5NjZjNjM2MGJmIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBCb3poaWRh...
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
GHSA-2qxp-xmx6-cq4f
Cross-Site Request Forgery (CSRF) in wallabag/wallabag
null
[ { "commit_message": "[PATCH] Fix CSRF on user deletion .../CoreBundle/Controller/ConfigController.php | 6 +++++- .../views/themes/material/Config/index.html.twig | 10 ++++++---- .../CoreBundle/Controller/ConfigControllerTest.php | 6 +++--- 3 files changed, 14 insertions(+), 8 deletions(-)", ...
null
GHSA-pw64-74q3-2v7r
null
[ { "commit_message": "[PATCH] ucount: Remove the atomicity from ucount->count Always increment/decrement ucount->count under the ucounts_lock. The increments are there already and moving the decrements there means the locking logic of the code is simpler. This simplification in the locking logic fixes a race b...
null
CVE-2016-6354
Heap-based buffer overflow in the yy_get_next_buffer function in Flex before 2.6.1 might allow context-dependent attackers to cause a denial of service or possibly execute arbitrary code via vectors involving num_to_read.
[ { "commit_message": "[PATCH] Fixed incorrect integer type src/flex.skl | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBhNWNiZTkyOWFjMzI1NWQzNzFlNjk4ZjYyZGMyNTZhZmU3MDA2NDY2IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBXaWxsIEVzdGVzIDx3ZXN0ZXM1NzVAZ21haWwuY29tPgpEYXRlOiBTYXQsIDI...
n/a
GHSA-cwh7-28vg-jmpr
pastebinit Path Traversal vulnerability
null
[ { "commit_message": "[PATCH] Fix path traversal and storage path leak server.go | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSBkNzk0ZTIxZjhjMWY1ODAzMjc5OWFlNDBmY2IzOTcxZjZkYWZhOWY3IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBJbHlhIEdsb3RvdiA8aWx5YS5nbG90b3ZAZ21haWwuY29tP...
null
CVE-2020-10683
dom4j before 2.0.3 and 2.1.x before 2.1.3 allows external DTDs and External Entities by default, which might enable XXE attacks. However, there is popular external documentation from OWASP showing how to enable the safe, non-default behavior in any application that uses dom4j.
[ { "commit_message": "[PATCH] SAXReader uses system default XMLReader with its defaults. New factory method SAXReader.createDefault() sets more secure defaults. src/main/java/org/dom4j/DocumentHelper.java | 65 +- src/main/java/org/dom4j/io/SAXHelper.java | 37 +- src/main/java/org/dom4j/io/SAXReader.java ...
n/a
GHSA-2xwx-3gmg-f9vj
null
[ { "commit_message": "[PATCH] Fix host_name_lookup (Close 2747) Thanks to Nico R for providing a reproducing configuration. host_lookup = * message_size_limit = ${if def:sender_host_name {32M}{32M}} acl_smtp_connect = acl_smtp_connect acl_smtp_rcpt = acl_smtp_rcpt begin acl acl_...
null
CVE-2022-39308
GoCD API authentication of user access tokens subject to timing attack during comparison
GoCD is a continuous delivery server. GoCD helps you automate and streamline the build-test-release cycle for continuous delivery of your product. GoCD versions from 19.2.0 to 19.10.0 (inclusive) are subject to a timing attack in validation of access tokens due to use of regular string comparison for validation of the token rather than a constant time algorithm. This could allow a brute force attack on GoCD server API calls to observe timing differences in validations in order to guess an access token generated by a user for API access. This issue is fixed in GoCD version 19.11.0. As a workaround, users can apply rate limiting or insert random delays to API calls made to GoCD Server via a reverse proxy or other fronting web server. Another workaround, users may disallow use of access tokens by users by having an administrator revoke all access tokens through the "Access Token Management" admin function.
[ { "commit_message": "[PATCH] Access Token APIs (#5797) * Define a AuthTokenSqlMapDao to store and retrieve token information from DB * Introduce Auth Token API to manage auth tokens * Store the hashed token instead of storing the raw value * Some tests * Store information of the user who has created the auth t...
CWE-208: Observable Timing Discrepancy
GHSA-x7cm-hcx8-ccgj
null
[ { "commit_message": "[PATCH] added sanitizeUserString and sanitizeEmail functions added sanitize to uploaded image names added sanitize to tabs, categories, users and bookmarks removed svg files from approved image lists api/classes/organizr.class.php | 72 ++++++++++++++++++++++++++-- api/functions/log-fu...
null
GHSA-j8rg-4hjm-8r95
Path traversal vulnerability in Jenkins Publish Over SSH Plugin
null
[ { "commit_message": "[PATCH] [SECURITY-2307] do not validate file path to avoid path transversal Signed-off-by: Olivier Lamy <olamy@apache.org> .../descriptor/BapSshCredentialsDescriptor.java | 8 +------- 1 file changed, 1 insertion(+), 7 deletions(-)", "patch_text_b64": "RnJvbSA3OWY2NTk4YTE3Mjc5M...
null
CVE-2025-54882
Himmelblau's Kerberos credential cache collection is world readable
Himmelblau is an interoperability suite for Microsoft Azure Entra ID and Intune. In versions 0.8.0 through 0.9.21 and 1.0.0-beta through 1.1.0, Himmelblau stores the cloud TGT received during logon in the Kerberos credential cache. The created credential cache collection and received credentials are stored as world readable. This is fixed in versions 0.9.22 and 1.2.0. To work around this issue, remove all read access to Himmelblau caches for all users except for owners.
[ { "commit_message": "[PATCH] Fix Kerberos credential cache permissions CVE-2025-54882 Signed-off-by: Samuel Cabrero <scabrero@samba.org> src/daemon/src/tasks_daemon.rs | 105 ++++++++++++++++++++------------- 1 file changed, 63 insertions(+), 42 deletions(-)", "patch_text_b64": "RnJvbSBiNTYyMDUzZGYzZGZmYjFkZ...
CWE-522: Insufficiently Protected Credentials
GHSA-mmhx-hmjr-r674
DOMPurify allows tampering by prototype pollution
null
[ { "commit_message": "[PATCH] fix: Hardened the depth tracking code against prototype pollution dist/purify.cjs.js | 15 +++++-- dist/purify.cjs.js.map | 2 +- dist/purify.es.mjs | 15 +++++-- dist/purify.es.mjs.map | 2 +- dist/purify.js | 15 +++++-- dist/purify.js.map | 2 +- dist/purify.min....
null
GHSA-qw64-22p9-qw2r
null
[ { "commit_message": "[PATCH] [jan] SECURITY: Fix XSS vulnerability in menu bar exposed by only a few applications (Bug #14213). horde/docs/CHANGES | 2 ++ horde/package.xml | 4 ++-- horde/templates/topbar/_menubar.html.php | 2 +- 3 files changed, 5 insertions(+), 3 de...
null
CVE-2018-6767
A stack-based buffer over-read in the ParseRiffHeaderConfig function of cli/riff.c file of WavPack 5.1.0 allows a remote attacker to cause a denial-of-service attack or possibly have unspecified other impact via a maliciously crafted RF64 file.
[ { "commit_message": "[PATCH] issue #27, do not overwrite stack on corrupt RF64 file cli/riff.c | 39 ++++++++++++++++++++++++++++++++------- 1 file changed, 32 insertions(+), 7 deletions(-)", "patch_text_b64": "RnJvbSBkNWJmNzZiNWE4OGQwNDRhMWJlMWQ1NjU2Njk4ZTNiYTczNzE2N2U1IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm...
n/a
GHSA-qvmf-36h5-3f5v
Improper Input Validation in Jenkins Script Security Plugin
null
[ { "commit_message": "[PATCH] [SECURITY-1713] Block illegal annotations on imports and nested in other annotations .../groovy/RejectASTTransformsCustomizer.java | 4 ++ .../groovy/SandboxInterceptorTest.java | 70 +++++++++++++++---- 2 files changed, 59 insertions(+), 15 deletions(-)", "patch_text_b64"...
null
CVE-2019-15164
rpcapd/daemon.c in libpcap before 1.9.1 allows SSRF because a URL may be provided as a capture source.
[ { "commit_message": "[PATCH] In the open request, reject capture sources that are URLs. You shouldn't be able to ask a server to open a remote device on some *other* server; just open it yourself. This addresses Include Security issue F13: [libpcap] Remote Packet Capture Daemon Allows Opening Capture URLs. rpca...
n/a
GHSA-rc2q-x9mf-w3vf
TestNG is vulnerable to Path Traversal
null
[ { "commit_message": "[PATCH] vuln-fix: Zip Slip Vulnerability This fixes a Zip-Slip vulnerability. This change does one of two things. This change either 1. Inserts a guard to protect against Zip Slip. OR 2. Replaces `dir.getCanonicalPath().startsWith(parent.getCanonicalPath())`, which is vulnerable to partial ...
null
GHSA-fhjf-83wg-r2j9
Prototype Pollution in mixin-deep
null
[ { "commit_message": "[PATCH] disallow constructor and prototype keys .travis.yml | 2 -- .verb.md | 7 +++++++ README.md | 20 ++++++++++++-------- index.js | 18 +++++++++++------- package.json | 7 ++++--- 5 files changed, 34 insertions(+), 20 deletions(-)", "patch_text_b64": "RnJvbSA4ZjQ2NGM4Y2...
null
GHSA-f5xq-vjwc-pqqj
null
[ { "commit_message": "[PATCH] Fix a NULL profile dereference in dbi_profile() hv_fetch() documentation requires checking for NULL and the code does that. But then calls SvOK(profile) uncoditionally two lines later. This patch fixes it. DBI.xs | 8 ++++++-- 1 file changed, 6 insertions(+), 2 deletions(-)", "pa...
null
GHSA-7838-j28v-c2rp
null
[ { "commit_message": "[PATCH] Remove uncontrolled format string vulnerability demod_flex.c | 11 +++++++++++ 1 file changed, 11 insertions(+)", "patch_text_b64": "RnJvbSBlNWE1MWM1MDhlZjk1MmU4MWE2ZGEyNWI0MzAzNGRkMWVkMDIzYzA3IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiByZmFybGV5IDxyeWFuamZhcmxleUBnbWFpbC5jb20+CkR...
null
GHSA-xv68-rrmw-9xwf
Mautic vulnerable to Cross-site Scripting (XSS) - stored (edit form HTML field)
null
[ { "commit_message": "[PATCH 1/7] add new twigfunction to sanitize attributes tags .../Resources/views/Field/freehtml.html.twig | 2 +- .../Twig/Extension/FormFieldExtension.php | 22 +++++++++++++++++++ 2 files changed, 23 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBlOGUzNmY3ZmJiNjc1ZDRhMTl...
null
CVE-2022-41900
FractionalMaxPool and FractionalAVGPool heap out-of-bounds acess in Tensorflow
TensorFlow is an open source platform for machine learning. The security vulnerability results in FractionalMax(AVG)Pool with illegal pooling_ratio. Attackers using Tensorflow can exploit the vulnerability. They can access heap memory which is not in the control of user, leading to a crash or remote code execution. We have patched the issue in GitHub commit 216525144ee7c910296f5b05d214ca1327c9ce48. The fix will be included in TensorFlow 2.11.0. We will also cherry pick this commit on TensorFlow 2.10.1.
[ { "commit_message": "[PATCH] Fix security vulnerability with FractionalMax(AVG)Pool with illegal pooling_ratio PiperOrigin-RevId: 483486453 .../core/kernels/fractional_avg_pool_op.cc | 14 ++++++-- .../core/kernels/fractional_max_pool_op.cc | 6 ++++ tensorflow/core/ops/nn_ops.cc | 7 ++++ ...
CWE-787: Out-of-bounds Write
CVE-2023-49508
Directory Traversal vulnerability in YetiForceCompany YetiForceCRM versions 6.4.0 and before allows a remote authenticated attacker to obtain sensitive information via the license parameter in the LibraryLicense.php component.
[ { "commit_message": "[PATCH] Improved loading of details and licenses of dependent libraries config/version.php | 4 +-- .../Settings/Dependencies/LibraryMoreInfo.tpl | 2 +- .../Dependencies/views/LibraryLicense.php | 5 ++-- .../Dependencies/views/LibraryMoreInfo.php | 28 +++...
n/a
GHSA-2wf5-4mf7-vmh3
CSRF vulnerability in Jenkins Active Directory Plugin
null
[ { "commit_message": "[PATCH] [SECURITY-2126] .../plugins/active_directory/ActiveDirectoryDomain.java | 7 ++++--- .../active_directory/ActiveDirectorySecurityRealm.java | 4 +++- 2 files changed, 7 insertions(+), 4 deletions(-)", "patch_text_b64": "RnJvbSAzNTU4OTcxMjM3YjgwZTcxZTkxM2VhZDllODJhNzIyZTlkNT...
null
GHSA-7wv8-g97r-432h
Exposure of Sensitive Information to an Unauthorized Actor in microweber
null
[ { "commit_message": "[PATCH] search_authors only admins src/MicroweberPackages/User/helpers/api_user.php | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSBlNjgwZTEzNGE0MjE1Yzk3OWJmZDJlYWY1ODMzNmJlMzRjOGZjNmU2IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBCb3poaWRhciBTbGF2ZXlrb...
null
CVE-2022-4631
WP-Ban ban-options.php cross site scripting
A vulnerability, which was classified as problematic, was found in WP-Ban. Affected is an unknown function of the file ban-options.php. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The name of the patch is 22b925449c84faa9b7496abe4f8f5661cb5eb3bf. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216480.
[ { "commit_message": "[PATCH] Fixed XSS .travis.yml | 13 ------ README.md | 10 ++--- ban-options.php | 111 ++++++++++++++++++++++++++---------------------- wp-ban.php | 66 ++++++++++++++-------------- 4 files changed, 98 insertions(+), 102 deletions(-) delete mode 100644 .travis.yml", "patc...
CWE-707 Improper Neutralization -> CWE-74 Injection -> CWE-79 Cross Site Scripting
CVE-2022-23073
Recipes - Stored XSS in Clipboard
In Recipes, versions 1.0.5 through 1.2.5 are vulnerable to Stored Cross-Site Scripting (XSS), in copy to clipboard functionality. When a victim accesses the food list page, then adds a new Food with a malicious javascript payload in the ‘Name’ parameter and clicks on the clipboard icon, an XSS payload will trigger. A low privileged attacker will have the victim's API key and can lead to admin's account takeover.
[ { "commit_message": "[PATCH] improved output sanitization of several views vue/package-lock.json | 43534 ++++++++++++++++ vue/package.json | 3 +- .../ExportResponseView/ExportResponseView.vue | 5 +- .../ImportResponseView/ImportResponseView.vue | ...
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
GHSA-x32c-59v5-h7fg
Langchain OS Command Injection vulnerability
null
[ { "commit_message": "[PATCH] Replace JIRA Arbitrary Code Execution vulnerability with finer grain API wrapper (#6992) This fixes #4833 and the critical vulnerability https://nvd.nist.gov/vuln/detail/CVE-2023-34540 Previously, the JIRA API Wrapper had a mode that simply pipelined user input into an `exec()` func...
null
CVE-2024-47815
Cross-site Scripting in IncidentReporting
IncidentReporting is a MediaWiki extension for moving incident reports from wikitext to database tables. There are a variety of Cross-site Scripting issues, though all of them require elevated permissions. Some are available to anyone who has the `editincidents` right, some are available to those who can edit interface messages (typically administrators and interface admins), and one is available to those who can edit LocalSettings.php. These issues have been addressed in commit `43896a4` and all users are advised to upgrade. Users unable to upgrade should prevent access to the Special:IncidentReports page.
[ { "commit_message": "[PATCH] Merge commit from fork * SECURITY: T12702: Stop various XSSes * Remove double-escapes At best, they're an annoying bug. At worst, they are security complications: https://issue-tracker.miraheze.org/T12702#254762 * Remove insecure warning suppression includes/IncidentReportingFormFac...
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2015-2310
Integer overflow in layout.c++ in Sandstorm Cap'n Proto before 0.4.1.1 and 0.5.x before 0.5.1.1 allows remote peers to cause a denial of service or possibly obtain sensitive information from memory via a crafted message, related to pointer validation.
[ { "commit_message": "[PATCH] SECURITY: Integer overflow in pointer validation. Details: https://github.com/sandstorm-io/capnproto/tree/master/security-advisories/2014-03-02-0-c++-integer-overflow.md c++/src/capnp/layout.c++ | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJ...
n/a
CVE-2012-3426
OpenStack Keystone before 2012.1.1, as used in OpenStack Folsom before Folsom-1 and OpenStack Essex, does not properly implement token expiration, which allows remote authenticated users to bypass intended authorization restrictions by (1) creating new tokens through token chaining, (2) leveraging possession of a token for a disabled user account, or (3) leveraging possession of a token for an account with a changed password.
[ { "commit_message": "[PATCH] Invalidate user tokens when a user is disabled Fixes Bug 997194 Delete valid tokens for a user when they have been disabled Moved logic to delete tokens into update_user, as this can be called directly form the REST API. Also checks if a user is enabled when creating a token from an...
n/a
GHSA-86cv-9gpx-6hwj
Openstack Aodh can be used to launder Keystone trusts
null
[ { "commit_message": "[PATCH] Don't include trust IDs in Alarm action output It was originally envisaged that we would allow users to specify trust IDs in trust+*:// alarm action URLs, and only create trusts internally when none was specified. This made storage of trust IDs in the username field of the URL part ...
null
CVE-2020-27790
A floating point exception issue was discovered in UPX in PackLinuxElf64::invert_pt_dynamic() function of p_lx_elf.cpp file. An attacker with a crafted input file could trigger this issue that could cause a crash leading to a denial of service. The highest impact is to Availability.
[ { "commit_message": "[PATCH] Detect bogus DT_SYMENT. https://github.com/upx/upx/issues/331 modified: p_lx_elf.cpp src/p_lx_elf.cpp | 16 ++++++++++++++++ 1 file changed, 16 insertions(+)", "patch_text_b64": "RnJvbSBlYjkwZWFiNjMyNWQwMDkwMDRmZmIxNTVlM2UzM2YyMmQ0ZDNjYTI2IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9...
CWE-369 - Divide By Zero
CVE-2013-7456
gd_interpolation.c in the GD Graphics Library (aka libgd) before 2.1.1, as used in PHP before 5.5.36, 5.6.x before 5.6.22, and 7.x before 7.0.7, allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted image that is mishandled by the imagescale function.
[ { "commit_message": "[PATCH] Fixed bug #72227: imagescale out-of-bounds read Ported from https://github.com/libgd/libgd/commit/4f65a3e4eedaffa1efcf9ee1eb08f0b504fbc31a ext/gd/libgd/gd_interpolation.c | 16 ++++++++-------- ext/gd/tests/bug72227.phpt | 15 +++++++++++++++ 2 files changed, 23 insertions(+), 8 ...
n/a
GHSA-rx8g-88g5-qh64
min-document vulnerable to prototype pollution
null
[ { "commit_message": "[PATCH 1/2] Fix prototype pollution in removeAttributeNS dom-element.js | 4 ++++ 1 file changed, 4 insertions(+)", "patch_text_b64": "RnJvbSAwZDRlODE5MmVmNzIzZmI4Njk2NDUyNTYxMDJhNTZlZDkyMmVmZDY4IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBqYW1lc3dhc3NpbmsgPGphbWVzLndhc3NpbmtAZ21haWwuY29tP...
null
CVE-2019-6112
A Cross-site scripting (XSS) vulnerability in /inc/class-search.php in the Sell Media plugin v2.4.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via the keyword parameter (aka $search_term or the Search field).
[ { "commit_message": "[PATCH] Fixed masonry layouts, sanitized search input, and misc PHP notices inc/class-layouts.php | 14 +++++++++----- inc/class-search.php | 4 ++-- inc/helpers.php | 2 +- inc/scripts.php | 9 ++++----- js/macy.min.js | 2 +- 5 files changed, 17 insertions(+), 14 deleti...
n/a
CVE-2023-32681
Unintended leak of Proxy-Authorization header in requests
Requests is a HTTP library. Since Requests 2.3.0, Requests has been leaking Proxy-Authorization headers to destination servers when redirected to an HTTPS endpoint. This is a product of how we use `rebuild_proxies` to reattach the `Proxy-Authorization` header to requests. For HTTP connections sent through the tunnel, the proxy will identify the header in the request itself and remove it prior to forwarding to the destination server. However when sent over HTTPS, the `Proxy-Authorization` header must be sent in the CONNECT request as the proxy has no visibility into the tunneled request. This results in Requests forwarding proxy credentials to the destination server unintentionally, allowing a malicious actor to potentially exfiltrate sensitive information. This issue has been patched in version 2.31.0.
[ { "commit_message": "[PATCH] Merge pull request from GHSA-j8r2-6x86-q33q requests/sessions.py | 4 +++- tests/test_requests.py | 20 ++++++++++++++++++++ 2 files changed, 23 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA3NGVhN2NmN2E2YTI3YTRlZWIyYWUyNGUxNjJiY2M5NDJhNjcwNmQ1IE1vbiBTZXAgMTcgMDA6MDA...
CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
GHSA-rf3w-29h3-r636
Arbitrary Code Execution in feehi/cms
null
[ { "commit_message": "[PATCH] fix:backend upload admin user avatar and artice thumb only permit to png/jpg/jpeg/gif/webp backend/models/User.php | 10 ++++++++++ common/models/Article.php | 10 +++++++++- 2 files changed, 19 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBlY2JmYjBjYTc3ODc0ZWFkNWI2ZT...
null
GHSA-57pm-66vj-3hh7
null
[ { "commit_message": "[PATCH] fixed #2255 src/isomedia/box_code_base.c | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSA3NzUxMDc3ODUxNjgwM2I3Zjc0MDJkNzQyM2M2ZDZiZWY1MDI1NGMzIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBqZWFubGYgPGplYW5sZkBncGFjLmlvPgpEYXRlOiBNb24sIDEyIFNlcCA...
null
GHSA-q898-frwq-f3qp
Minecraft MOTD Parser's HtmlGenerator vulnerable to XSS
null
[ { "commit_message": "[PATCH 1/3] Escape input from `MotdItem::getColor` and `MotdItem::getText` src/Generator/HtmlGenerator.php | 9 +++++++-- 1 file changed, 7 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSBiOTYzY2RiNjViNmU4NGMzYTI5ZjczNTQ4NmRiNjU0ZmZlODBjZWM0IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGc...
null
CVE-2024-23337
jq has signed integer overflow in jv.c:jvp_array_write
jq is a command-line JSON processor. In versions up to and including 1.7.1, an integer overflow arises when assigning value using an index of 2147483647, the signed integer limit. This causes a denial of service. Commit de21386681c0df0104a99d9d09db23a9b2a78b1e contains a patch for the issue.
[ { "commit_message": "[PATCH] Fix signed integer overflow in jvp_array_write and jvp_object_rehash This commit fixes signed integer overflow and SEGV issues on growing arrays and objects. The size of arrays and objects is now limited to `536870912` (`0x20000000`). This fixes CVE-2024-23337 and fixes #3262. src/j...
CWE-190: Integer Overflow or Wraparound
GHSA-qr7g-w49q-3pg6
null
[ { "commit_message": "[PATCH] ALSA: timer: Fix race among timer ioctls ALSA timer ioctls have an open race and this may lead to a use-after-free of timer instance object. A simplistic fix is to make each ioctl exclusive. We have already tread_sem for controlling the tread, and extend this as a global mutex to ...
null
CVE-2025-47288
Discourse Policy plugin private group members visible
Discourse Policy plugin gives the ability to confirm users have seen or done something. Prior to version 0.1.1, if there was a policy posted to a public topic that was tied to a private group then the group members could be shown to non-group members. This issue has been patched in version 0.1.1. A workaround involves moving any policy topics with private groups to restricted categories.
[ { "commit_message": "[PATCH] SECURITY: Policy group members (#165) Restrict access to policy group members. app/controllers/policy_controller.rb | 19 ++++++++++ config/locales/server.en.yml | 2 + lib/extensions/post_serializer_extension.rb | 7 +++- plugin.rb ...
CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
PYSEC-2024-26
null
[ { "commit_message": "[PATCH] Improve validation in HTTP parser (#8074) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Co-authored-by: Paul J. Dorn <pajod@users.noreply.github.com> Co-authored-by: Sviatoslav Sydorenko (Святослав Сидоренко) <sviat@redhat.com> CHANGES/807...
null
GHSA-3h92-xgh6-5m97
null
[ { "commit_message": "[PATCH] bugfix: private history download ChuanhuChatbot.py | 27 ++++++++++----------------- modules/models/base_model.py | 23 ++++++++++++++++++----- modules/utils.py | 24 +++++++++++++++--------- 3 files changed, 43 insertions(+), 31 deletions(-)", "patch_text_b6...
null
CVE-2025-8851
LibTIFF tiffcrop tiffcrop.c readSeparateStripsetoBuffer stack-based overflow
A vulnerability was determined in LibTIFF up to 4.5.1. Affected by this issue is the function readSeparateStripsetoBuffer of the file tools/tiffcrop.c of the component tiffcrop. The manipulation leads to stack-based buffer overflow. Local access is required to approach this attack. The patch is identified as 8a7a48d7a645992ca83062b3a1873c951661e2b3. It is recommended to apply a patch to fix this issue.
[ { "commit_message": "[PATCH] Attempt to address tiffcrop Coverity scan issues 1605444, 1605445, and 1605449. tools/tiffcrop.c | 17 ++++++++++++----- 1 file changed, 12 insertions(+), 5 deletions(-)", "patch_text_b64": "RnJvbSA4YTdhNDhkN2E2NDU5OTJjYTgzMDYyYjNhMTg3M2M5NTE2NjFlMmIzIE1vbiBTZXAgMTcgMDA6MDA6MDAgM...
Stack-based Buffer Overflow