id
stringlengths
12
19
title
stringlengths
0
237
description
stringlengths
35
3.87k
patches
listlengths
1
22
cwe
stringlengths
2
440
CVE-2012-6547
The __tun_chr_ioctl function in drivers/net/tun.c in the Linux kernel before 3.6 does not initialize a certain structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.
[ { "commit_message": "[PATCH] net/tun: fix ioctl() based info leaks The tun module leaks up to 36 bytes of memory by not fully initializing a structure located on the stack that gets copied to user memory by the TUNGETIFF and SIOCGIFHWADDR ioctl()s. Signed-off-by: Mathias Krause <minipli@googlemail.com> Signed-o...
n/a
GHSA-28jp-44vh-q42h
Duplicate Advisory: Keras keras.utils.get_file API is vulnerable to a path traversal attack
null
[ { "commit_message": "[PATCH] Use `filter=\"data\"` option of `TarFile.extractall`. (#21760) For Python versions between 3.12 (inclusive) and 3.14 (exclusive). The \"data\" filter performs a number of additional checks on links and paths. The `filter` option was added in Python 3.12. The `filter=\"data\"` option...
null
GHSA-379q-355j-w6rj
pnpm v10+ Bypass "Dependency lifecycle scripts execution disabled by default"
null
[ { "commit_message": "[PATCH] feat: support blockExoticSubdeps option to disallow non-trusted dep sources in subdeps (#10265) * feat(core): add onlyRegistryDependencies option to disallow non-registry subdependencies * fix: onlyRegistryDependencies=>registrySubdepsOnly * fix: allow resolution from custom resolve...
null
GHSA-6h58-c7r7-g2hw
UberFire Framework Improperly Restricts Paths
null
[ { "commit_message": "[PATCH] BZ(1169544,1169556, 1169557,1169559,1169560): improvements on security related to file access .../commons/regex}/util/AntPathMatcher.java | 229 ++++++++-------- .../org/uberfire/io/regex/AntPathMatcher.java | 89 +++++++ .../uberfire/io/regex/AntPathMatcherTest.java | 244 ++++++++...
null
GHSA-5f4h-mq48-hhq9
null
[ { "commit_message": "[PATCH] WBXML: add a basic sanity check for offset overflow This is a naive approach allowing to detact that something went wrong, without the need to replace all proto_tree_add_text() calls as what was done in master-2.0 branch. Bug: 12408 Change-Id: Ia14905005e17ae322c2fc639ad5e491fa08b01...
null
CVE-2018-12436
wolfcrypt/src/ecc.c in wolfSSL before 3.15.1.patch allows a memory-cache side-channel attack on ECDSA signatures, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.
[ { "commit_message": "[PATCH] Change ECDSA signing to use blinding. wolfcrypt/src/ecc.c | 68 +++++++++++++++++++++++++++++++++++---------- 1 file changed, 54 insertions(+), 14 deletions(-)", "patch_text_b64": "RnJvbSA5Yjk1NjhkNTAwZjMxZjk2NGFmMjZiYThkMDFlNTQyZTFmMjdlNWNhIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9...
n/a
PYSEC-2021-218
null
[ { "commit_message": "[PATCH] Fix SEGV in CTC ops PiperOrigin-RevId: 372430279 Change-Id: I7ec2ad9d6f4d0980c33de45d27c6b17df5c6e26f tensorflow/core/kernels/ctc_decoder_ops.cc | 3 +++ 1 file changed, 3 insertions(+)", "patch_text_b64": "RnJvbSBiMWIzMjMwNDIyNjQ3NDBjMzk4MTQwZGEzMmU5M2ZiOWMyYzlmMzNlIE1vbiBTZXAgM...
null
GHSA-765j-9r45-w2q2
Flask App Builder has an Authentication Bypass vulnerability when using non AUTH_DB methods
null
[ { "commit_message": "[PATCH] fix: don't register reset my password when not on AUTH_DB (#2384) * fix: don't register reset my password when not on AUTH_DB * fix: don't register reset my password when not on AUTH_DB * add test * fix lint flask_appbuilder/security/manager.py | 4 ++-- tests/security/test_auth_oau...
null
GHSA-3gv2-29qc-v67m
Symfony vulnerable to Session Fixation of CSRF tokens
null
[ { "commit_message": "[PATCH] [Security/Http] Remove CSRF tokens from storage on successful login Resources/config/security.xml | 1 + Tests/Functional/CsrfFormLoginTest.php | 6 ++++++ Tests/Functional/LogoutTest.php | 4 +--- composer.json | 2 +- 4 files changed, 9 inserti...
null
CVE-2023-30625
rudder-server vulnerable to SQL Injection
rudder-server is part of RudderStack, an open source Customer Data Platform (CDP). Versions of rudder-server prior to 1.3.0-rc.1 are vulnerable to SQL injection. This issue may lead to Remote Code Execution (RCE) due to the `rudder` role in PostgresSQL having superuser permissions by default. Version 1.3.0-rc.1 contains patches for this issue.
[ { "commit_message": "[PATCH] fix: always use a sql safe table name in failed events manager (#2664) router/failed-events-manager.go | 10 +++++++--- 1 file changed, 7 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSAwZDA2MWZmMmQ4YzE2ODQ1MTc5ZDIxNWJmODAxMmFmY2ViYTEyYTMwIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjA...
CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
GHSA-478m-xrv3-7r93
null
[ { "commit_message": "[PATCH] bugfix: prevented request smuggling in the ngx.location.capture API. Signed-off-by: Yichun Zhang (agentzh) <yichun@openresty.com> src/ngx_http_lua_subrequest.c | 196 +++++-------- t/020-subrequest.t | 520 +++++++++++++++++++++++++++++++++- 2 files changed, 585 insertions(...
null
CVE-2021-32855
vditor vulnerable to Cross-site Scripting
Vditor is a browser-side Markdown editor. Versions prior to 3.8.7 are vulnerable to copy-paste cross-site scripting (XSS). For this particular type of XSS, the victim needs to be fooled into copying a malicious payload into the text editor. Version 3.8.7 contains a patch for this issue.
[ { "commit_message": "[PATCH] :lock: https://github.com/Vanessa219/vditor/issues/1085 src/ts/util/fixBrowserBehavior.ts | 2 +- types/index.d.ts | 3 +++ 2 files changed, 4 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAxYjIzODJkN2Y4YTRlZTUwOWQ5MjQ1ZGI0NDUwZDkyNmEwYjI0MTQ2IE1vbiBTZXA...
CWE-79 Cross-site Scripting (XSS)
GHSA-fqcv-rfp6-wv92
Microweber Cross-site Scripting vulnerability
null
[ { "commit_message": "[PATCH] update .../Content/ContentManagerHelpers.php | 1 + .../ContentApiControllerLiveEditSaveTest.php | 72 ++++++++++--------- .../Database/DatabaseManager.php | 24 +++++-- .../Module/Models/Module.php | 16 +++-- 4 files changed, 70 insertions(+), 4...
null
GHSA-q43h-4xr8-j6fq
null
[ { "commit_message": "[PATCH] patch XXE vulnerability .../http/webdav/DefaultPropFindRequestFieldParser.java | 7 +++++-- .../java/io/milton/http/webdav/DefaultPropPatchParser.java | 4 ++++ 2 files changed, 9 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSA1ZjgxYjBjNDhhODE3ZDQzMzdkOGIwZTk5ZWEwYj...
null
GHSA-p2h4-7fp3-cmh8
TYPO3 Disclosure of Information about Installed Extensions
null
[ { "commit_message": "[PATCH] [SECURITY] Avoid disclosing loaded extensions Inline JavaScript settings for RequireJS and ajaxUrls disclose the existence of specific extensions in a TYPO3 installation. In case no backend user is logged in RequireJS settings are fetched using an according endpoint, ajaxUrls (for b...
null
GHSA-qxh2-x3x4-mxxw
null
[ { "commit_message": "[PATCH] extend minimum number of password .../app/src/server/middlewares/register-form-validator.ts | 5 +++-- packages/app/src/server/routes/apiv3/user-activation.ts | 5 +++-- 2 files changed, 6 insertions(+), 4 deletions(-)", "patch_text_b64": "RnJvbSBkMjkxMGFlNTE5OTk0MzA4ODlmO...
null
GHSA-fvjx-7cx6-588x
null
[ { "commit_message": "[PATCH] Discard job body bytes if the job is too big. Previously, a malicious user could craft a job payload and inject beanstalk commands without the client application knowing. (An extra-careful client library could check the size of the job body before sending the put command, but most l...
null
CVE-2022-31888
Session Fixation vulnerability in in function login in class.auth.php in osTicket through 1.16.2.
[ { "commit_message": "[PATCH] Security: Session Fixation This commit addresses possible session fixation on both agent and end user login. Upon login users are now issued new session with the old one invalidated. include/class.auth.php | 15 +- include/class.usersession.php | 263 +++++++++++++++++++------...
n/a
CVE-2020-5264
Reflected XSS in security compromised page of PrestaShop
In PrestaShop before version 1.7.6.5, there is a reflected XSS while running the security compromised page. It allows anyone to execute arbitrary action. The problem is patched in the 1.7.6.5.
[ { "commit_message": "[PATCH] Test if it's a correct url before continue .../Controller/Admin/SecurityController.php | 15 ++++++++++++--- 1 file changed, 12 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSAwZDY0OWJjOWMyY2RkMTI0MWQ0NTEwZDY3ZDg1YTM5YTg3ZmQ5MWVhIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQp...
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-46571
Open WebUI vulnerable to limited stored XSS vila uploaded html file
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to version 0.6.6, low privileged users can upload HTML files which contain JavaScript code via the `/api/v1/files/` backend endpoint. This endpoint returns a file id, which can be used to open the file in the browser and trigger the JavaScript code in the user's browser. Under the default settings, files uploaded by low-privileged users can only be viewed by admins or themselves, limiting the impact of this vulnerability. A link to such a file can be sent to an admin, and if clicked, will give the low-privileged user complete control over the admin's account, ultimately enabling RCE via functions. Version 0.6.6 contains a fix for the issue.
[ { "commit_message": "[PATCH] fix: only allow admin uploaded html to be rendered as html backend/open_webui/routers/files.py | 10 ++++++++++ 1 file changed, 10 insertions(+)", "patch_text_b64": "RnJvbSBlZjJhZWI3YzBlYjk3NmJhYzc1OWU1OWFjMzU5Yzk0YTViOGRjN2UwIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBUaW1vdGh5IE...
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
GHSA-w2hv-rcqr-2h7r
View name validation bypass in Jenkins
null
[ { "commit_message": "[PATCH] [SECURITY-1871] core/src/main/java/hudson/model/View.java | 4 ++- .../java/hudson/model/ViewSEC1871Test.java | 34 +++++++++++++++++++ 2 files changed, 37 insertions(+), 1 deletion(-) create mode 100644 test/src/test/java/hudson/model/ViewSEC1871Test.java", "patch_text_b6...
null
CVE-2025-2849
UPX p_lx_elf.cpp un_DT_INIT heap-based overflow
A vulnerability, which was classified as problematic, was found in UPX up to 5.0.0. Affected is the function PackLinuxElf64::un_DT_INIT of the file src/p_lx_elf.cpp. The manipulation leads to heap-based buffer overflow. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The patch is identified as e0b6ff192412f5bb5364c1948f4f6b27a0cd5ea2. It is recommended to apply a patch to fix this issue.
[ { "commit_message": "[PATCH] More checking in unpack() https://github.com/upx/upx/issues/898 modified: p_lx_elf.cpp src/p_lx_elf.cpp | 24 +++++++++++++++++++----- 1 file changed, 19 insertions(+), 5 deletions(-)", "patch_text_b64": "RnJvbSBlMGI2ZmYxOTI0MTJmNWJiNTM2NGMxOTQ4ZjRmNmIyN2EwY2Q1ZWEyIE1vbiBTZXAgM...
Heap-based Buffer Overflow
GHSA-h4rm-mm56-xf63
Fickling vulnerable to detection bypass due to "builtins" blindness
null
[ { "commit_message": "[PATCH] Emit AST nodes for builtins imports See GHSA-h4rm-mm56-xf63. fickling/fickle.py | 25 ++++++------------------- test/test_bypasses.py | 31 +++++++++++++++++++++++++++++++ test/test_pickle.py | 4 ++-- 3 files changed, 39 insertions(+), 21 deletions(-)", "patch_text_b64": "Rn...
null
GHSA-c52f-pq47-2r9j
plugin.yaml file allows for duplicate entries in helm
null
[ { "commit_message": "[PATCH] backported fixes from helm3 Signed-off-by: Matt Butcher <matt.butcher@microsoft.com> (cherry picked from commit 7c287078c1505fbe662fcb77fcb2b873b01d501f) pkg/chartutil/requirements.go | 13 ++++++++++ pkg/chartutil/requirements_test.go | 21 ++++++++++++++++...
null
GHSA-665w-mwrr-77q3
Arbitrary file read via Playwright's screenshot feature exploiting file wrapper
null
[ { "commit_message": "[PATCH] fix(security): require screenshot protocol to be http/https prevent file:// URI scheme in Playwright screenshots A critical vulnerability was discovered in a web application feature that utilizes Playwright's screenshot capability. Attackers could exploit this vulnerability by using...
null
GHSA-gj3m-w8pf-46c5
null
[ { "commit_message": "[PATCH] bn/asm/rsaz-avx2.pl: fix digit correction bug in rsaz_1024_mul_avx2. Credit to OSS-Fuzz for finding this. CVE-2017-3738 Reviewed-by: Rich Salz <rsalz@openssl.org> crypto/bn/asm/rsaz-avx2.pl | 15 +++++++-------- 1 file changed, 7 insertions(+), 8 deletions(-)", "patch_text_b64": ...
null
GHSA-r4r6-j2j3-7pp5
Contao: Remember-me tokens will not be cleared after a password change
null
[ { "commit_message": "[PATCH] Merge pull request from GHSA-r4r6-j2j3-7pp5 Co-authored-by: Leo Feyer <1192057+leofeyer@users.noreply.github.com> core-bundle/src/Repository/RememberMeRepository.php | 12 ++++++++++++ core-bundle/src/Resources/config/services.yml | 1 + .../contao/modules/ModuleChangePasswor...
null
CVE-2014-9279
The print_test_result function in admin/upgrade_unattended.php in MantisBT 1.1.0a3 through 1.2.x before 1.2.18 allows remote attackers to obtain database credentials via a URL in the hostname parameter and reading the parameters in the response sent to the URL.
[ { "commit_message": "[PATCH] DB Credentials leak in upgrade_unattended.php Retrieve credentials from Mantis system configuration instead of accepting them from POST parameters. This issue was reported by Matthias Karlsson (http://mathiaskarlsson.me) as part of Offensive Security's bug bounty program [1]. Paul R...
n/a
GHSA-rmq6-x837-659x
null
[ { "commit_message": "[PATCH] Add auth to UtilityService Extend auth check to UtiliyService endpoints: stats, config, subscription Issue: VRXEN-5 Change-Id: I52a4b4a42731c244a97f97610dcaddb6837e67fb .../vmware/xenon/common/UtilityService.java | 24 ++- .../xenon/common/TestAuthorization.java | 28 ++++ ....
null
GHSA-7wxf-r2qv-9xwr
Docassemble open redirect
null
[ { "commit_message": "[PATCH] fixed security issues; added pdftk option; added development site is protected Configuration directive; altered error message display so that end users will not see certain types of error messages, but they will be displayed in the log CHANGELOG.md |...
null
GHSA-2fvv-qxrq-7jq6
apollo-server-core vulnerable to URL-based XSS attack affecting IE11 on default landing page
null
[ { "commit_message": "[PATCH] Merge pull request from GHSA-2fvv-qxrq-7jq6 See https://github.com/apollographql/apollo-server/security/advisories/GHSA-2fvv-qxrq-7jq6 for details. Note that this doesn't affect the curl command shown in the colorful rendered non-embedded landing page, which is properly escaped by t...
null
GHSA-2vpq-fh52-j3wv
snowflake-connector-python vulnerable to SQL Injection in write_pandas
null
[ { "commit_message": "<jakub.szczerbinski@snowflake.com> [PATCH] SNOW-1902019: Python CVEs january batch 2 (#2155) Co-authored-by: Yijun Xie <yijun.xie@snowflake.com> src/snowflake/connector/cursor.py | 8 +- src/snowflake/connector/pandas_tools.py | 122 ++++++++++++++++++------ test/integ/pandas/test_pan...
null
CVE-2024-47529
OpenC3 COSMOS uses clear text storage of password/token (`GHSL-2024-129`)
OpenC3 COSMOS provides the functionality needed to send commands to and receive data from one or more embedded systems. OpenC3 COSMOS stores the password of a user unencrypted in the LocalStorage of a web browser. This makes the user password susceptible to exfiltration via Cross-site scripting (see GHSL-2024-128). This vulnerability is fixed in 5.19.0. This only affects Open Source edition, and not OpenC3 COSMOS Enterprise Edition.
[ { "commit_message": "[PATCH] Switch to session token based auth .../app/controllers/auth_controller.rb | 6 ++-- .../app/controllers/users_controller.rb | 1 + .../src/tools/base/components/Login.vue | 12 ++++--- .../app/controllers/scripts_controller.rb | 8 ++--- openc3/lib/openc3/model...
CWE-312: Cleartext Storage of Sensitive Information
CVE-2025-3264
Regular Expression Denial of Service (ReDoS) in huggingface/transformers
A Regular Expression Denial of Service (ReDoS) vulnerability was discovered in the Hugging Face Transformers library, specifically in the `get_imports()` function within `dynamic_module_utils.py`. This vulnerability affects versions 4.49.0 and is fixed in version 4.51.0. The issue arises from a regular expression pattern `\s*try\s*:.*?except.*?:` used to filter out try/except blocks from Python code, which can be exploited to cause excessive CPU consumption through crafted input strings due to catastrophic backtracking. This vulnerability can lead to remote code loading disruption, resource exhaustion in model serving, supply chain attack vectors, and development pipeline disruption.
[ { "commit_message": "[PATCH] Release: v4.51.0 examples/flax/question-answering/run_qa.py | 2 +- .../run_flax_speech_recognition_seq2seq.py | 2 +- .../flax/text-classification/run_flax_glue.py | 2 +- .../flax/token-classification/run_flax_ner.py | 2 +- .../run_audio_classification.py ...
CWE-1333 Inefficient Regular Expression Complexity
GHSA-qjq9-rwgx-jjhc
null
[ { "commit_message": "[PATCH] CVE-2013-6401: Change hash function, randomize hashes Thanks to Florian Weimer and Eric Sesterhenn for reporting, reviewing and testing. CMakeLists.txt | 49 ++- cmake/config.h.cmake | 46 ++- configure.ac ...
null
GHSA-67p6-88m2-4frh
null
[ { "commit_message": "[PATCH] avcodec/h264: do not trust last_pic_droppable when marking pictures as done This simplifies the code and fixes a deadlock Fixes Ticket2927 Signed-off-by: Michael Niedermayer <michaelni@gmx.at> libavcodec/h264.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-)", "patch_...
null
CVE-2024-27090
Decidim vulnerable to data disclosure through the embed feature
Decidim is a participatory democracy framework, written in Ruby on Rails, originally developed for the Barcelona City government online and offline participation website. If an attacker can infer the slug or URL of an unpublished or private resource, and this resource can be embbeded (such as a Participatory Process, an Assembly, a Proposal, a Result, etc), then some data of this resource could be accessed. This vulnerability is fixed in 0.27.6.
[ { "commit_message": "<andreslucena@users.noreply.github.com> [PATCH] Fix embeds for resources and spaces that shouldn't be embedded (#12528) * Check if the resources and spaces are unpublished when embedding * Check if the spaces are private when embedding * Fix the naming for the `skip_publication_checks` opti...
CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
GHSA-crh5-vv2v-c82q
@claviska/jquery-minicolors vulnerable to Cross-site Scripting
null
[ { "commit_message": "[PATCH] fix XSS vuln jquery.minicolors.js | 3 ++- jquery.minicolors.min.js | 2 +- 2 files changed, 3 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSBlZjEzNDgyNGE3ZjQxMTBhZGE1M2VhNmMxNzMxMTFhNGZhMmY0OGYzIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBDb3J5IExhVmlza2EgPGNvcnlAYWJ...
null
GHSA-8vvx-qvq9-5948
Flowise allows arbitrary file write to RCE
null
[ { "commit_message": "[PATCH] Bugfix/arbitrary create attachemnt file upload (#4171) fix arbitrary create attachemnt file upload .../PostgresRecordManager.ts | 1 - packages/components/src/index.ts | 1 + packages/components/src/storageUtils.ts | 12 +++---- packages/components...
null
PYSEC-2022-42975
null
[ { "commit_message": "[PATCH] =?UTF-8?q?=F0=9F=94=92=EF=B8=8F=20Close=20a=20sanity=20ch?= =?UTF-8?q?eck=20hole=20in=20language=20packs?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit A language pack containing a directory traversing symlink could be uploaded. Upon back...
null
CVE-2017-6890
A boundary error within the "foveon_load_camf()" function (dcraw_foveon.c) when initializing a huffman table in LibRaw-demosaic-pack-GPL2 before 0.18.2 can be exploited to cause a stack-based buffer overflow.
[ { "commit_message": "[PATCH] Fixed possible foveon buffer overrun (Secunia SA750000) dcraw_foveon.c | 8 ++++++-- 1 file changed, 6 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSAxOTRmNTkyZTIwNTk5MGVhOGZjZTcyYjZjNTcxYzE0MzUwYWNhNzE2IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBBbGV4IFR1dHViYWxpbiA8bG...
Stack-based buffer overflow
CVE-2017-6390
An issue was discovered in whatanime.ga before c334dd8499a681587dd4199e90b0aa0eba814c1d. The vulnerability exists due to insufficient filtration of user-supplied data passed to the "whatanime.ga-master/index.php" URL. An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website.
[ { "commit_message": "[PATCH] Fix #8 XSS issue index.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBjMzM0ZGQ4NDk5YTY4MTU4N2RkNDE5OWU5MGIwYWEwZWJhODE0YzFkIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBzb3J1bHkgPHNvcnVseUBnbWFpbC5jb20+CkRhdGU6IFR1ZSwgMjggRmViIDIwMTcgMTE6NDE6Mj...
n/a
GHSA-7767-wr3w-3hqg
null
[ { "commit_message": "[PATCH] bplist: Fix data range check for string/data/dict/array nodes Passing a size of 0xFFFFFFFFFFFFFFFF to parse_string_node() might result in a memcpy with a size of -1, leading to undefined behavior. This commit makes sure that the actual node data (which depends on the size) is in the...
null
GHSA-8r58-88c9-cfv7
null
[ { "commit_message": "[PATCH] Filter more mimetypes There's no need to allow more than those defined mimetypes for images. apps/dav/lib/CardDAV/ImageExportPlugin.php | 12 ++++ .../unit/CardDAV/ImageExportPluginTest.php | 60 ++++++++++++++++--- 2 files changed, 63 insertions(+), 9 deletions(-)", "patch_...
null
CVE-2024-31208
Synapse's V2 state resolution weakness allows DoS from remote room members
Synapse is an open-source Matrix homeserver. A remote Matrix user with malicious intent, sharing a room with Synapse instances before 1.105.1, can dispatch specially crafted events to exploit a weakness in the V2 state resolution algorithm. This can induce high CPU consumption and accumulate excessive data in the database of such instances, resulting in a denial of service. Servers in private federations, or those that do not federate, are not affected. Server administrators should upgrade to 1.105.1 or later. Some workarounds are available. One can ban the malicious users or ACL block servers from the rooms and/or leave the room and purge the room using the admin API.
[ { "commit_message": "[PATCH] Fix GHSA-3h7q-rfh9-xm4v Weakness in auth chain indexing allows DoS from remote room members through disk fill and high CPU usage. A remote Matrix user with malicious intent, sharing a room with Synapse instances before 1.104.1, can dispatch specially crafted events to exploit a weak...
CWE-770: Allocation of Resources Without Limits or Throttling
CVE-2017-13023
The IPv6 mobility parser in tcpdump before 4.9.2 has a buffer over-read in print-mobility.c:mobility_opt_print().
[ { "commit_message": "[PATCH] CVE-2017-13023/IPv6 mobility: Add a bounds check before fetching data This fixes a buffer over-read discovered by Bhargava Shastry, SecT/TU Berlin. Add a test using the capture file supplied by the reporter(s), modified so the capture file won't cause 'tcpdump: pcap_loop: truncated ...
n/a
GHSA-gxqf-4g4p-q3hc
usememos/memos vulnerable to stored Cross-site Scripting
null
[ { "commit_message": "[PATCH] chore: fix XSS in renderer (#875) chore: fix xss in renderer web/src/labs/marked/index.ts | 2 +- web/src/labs/marked/parser/Bold.ts | 3 +-- web/src/labs/marked/parser/BoldEmphasis.ts | 3 +-- web/src/labs/marked/parser/Emphasis.ts | 3 +-- web/src/labs/ma...
null
CVE-2025-1040
Server-Side Template Injection (SSTI) in significant-gravitas/autogpt
AutoGPT versions 0.3.4 and earlier are vulnerable to a Server-Side Template Injection (SSTI) that could lead to Remote Code Execution (RCE). The vulnerability arises from the improper handling of user-supplied format strings in the `AgentOutputBlock` implementation, where malicious input is passed to the Jinja2 templating engine without adequate security measures. Attackers can exploit this flaw to execute arbitrary commands on the host system. The issue is fixed in version 0.4.0.
[ { "commit_message": "[PATCH] fix(backend): Enable Jinja SandboxedEnvironment for TextFormatter (#8891) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit We still use plain Jinja objects for text formatting in our block codes. ### Changes 🏗️ Introduced a `TextFormatter` u...
CWE-1336 Improper Neutralization of Special Elements Used in a Template Engine
GHSA-crg2-6xv3-qg5f
Improper Neutralization of Input During Web Page Generation in Jenkins
null
[ { "commit_message": "[PATCH] [SECURITY-1793] .../java/hudson/model/FileParameterValue.java | 8 ++++ .../FileParameterValueSecurity1793Test.java | 47 +++++++++++++++++++ .../jobs/SECURITY-1793/builds/4/build.xml | 41 ++++++++++++++++ .../jobs/SECURITY-1793/builds/4/changelog.xml | 1 + .../builds/4/filePa...
null
CVE-2022-29186
Use of Hard-coded Cryptographic Key in rundeck/rundeck, rundeckpro/enterprise
Rundeck is an open source automation service with a web console, command line tools and a WebAPI. Rundeck community and rundeck-enterprise docker images contained a pre-generated SSH keypair. If the id_rsa.pub public key of the keypair was copied to authorized_keys files on remote host, those hosts would allow access to anyone with the exposed private credentials. This misconfiguration only impacts Rundeck Docker instances of PagerDuty® Process Automation On Prem (formerly Rundeck) version 4.0 and earlier, not Debian, RPM or .WAR. Additionally, the id_rsa.pub file would have to be copied from the Docker image filesystem contents without overwriting it and used to configure SSH access on a host. A patch on Rundeck's `main` branch has removed the pre-generated SSH key pair, but it does not remove exposed keys that have been configured. To patch, users must run a script on hosts in their environment to search for exposed keys and rotate them. Two workarounds are available: Do not use any pre-existing public key file from the rundeck docker images to allow SSH access by adding it to authorized_keys files and, if you have copied the public key file included in the docker image, remove it from any authorized_keys files.
[ { "commit_message": "[PATCH 1/2] Remove ssh-keygen from dockerfile docker/ubuntu-base/Dockerfile | 1 - 1 file changed, 1 deletion(-)", "patch_text_b64": "RnJvbSBlMjMzODBiMmVjNjVjNDk3YTcyZTA5N2FhYjE5NjFkODI2ZmI4YzM4IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBHcmVnIFNjaHVlbGVyIDxncmVnLnNjaHVlbGVyQGdtYWlsLmNvbT...
CWE-321: Use of Hard-coded Cryptographic Key
GHSA-hcg3-q754-cr77
golang.org/x/crypto Vulnerable to Denial of Service (DoS) via Slow or Incomplete Key Exchange
null
[ { "commit_message": "[PATCH] ssh: limit the size of the internal packet queue while waiting for KEX In the SSH protocol, clients and servers execute the key exchange to generate one-time session keys used for encryption and authentication. The key exchange is performed initially after the connection is establis...
null
GHSA-gcff-f9p7-hmfg
null
[ { "commit_message": "[PATCH] net_sched: cls_route: remove the right filter from hashtable route4_change() allocates a new filter and copies values from the old one. After the new filter is inserted into the hash table, the old filter should be removed and freed, as the final step of the update. However, the cur...
null
GHSA-5923-r76v-mprm
Open Redirect Vulnerability in Taguette
null
[ { "commit_message": "[PATCH] Validate 'next' URL from login and cookies prompt taguette/web/base.py | 14 ++++++++++++++ taguette/web/views.py | 8 ++------ tests.py | 35 +++++++++++++++++++++++++++++++++++ 3 files changed, 51 insertions(+), 6 deletions(-)", "patch_text_b64": "RnJvbSA2N2RlMmQyN...
null
GHSA-vhrg-v3cv-p247
Deserialization of Untrusted Data in Spring Security
null
[ { "commit_message": "[PATCH] Fix #1599 for 2.7(.10) release-notes/VERSION | 2 + .../deser/BeanDeserializerFactory.java | 23 +++++++++++ .../interop/IllegalTypesCheckTest.java | 40 +++++++++++++++++++ 3 files changed, 65 insertions(+) create mode 100644 src/test/java/com/fa...
null
PYSEC-2021-239
null
[ { "commit_message": "[PATCH] Prevent divisions by 0 PiperOrigin-RevId: 371003153 Change-Id: Idef56c95b9fcaeb97f87e18c7a674dbeb5173204 tensorflow/lite/kernels/depthwise_conv.cc | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSBjYmRhM2M2YjJkYmJkM2ZiZGM0ODJmZjhjMDE3MGE3OGVjM...
null
GHSA-qq3j-4f4f-9583
Hugging Face Transformers Regular Expression Denial of Service
null
[ { "commit_message": "[PATCH] Cleanup the regex used for doc preprocessing (#36648) * Cleanup the regex used for doc preprocessing * Run tests src/transformers/testing_utils.py | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSA4Y2I1MjJiNDE5MGJkNTU2Y2U1MWJlMDQ5NDI3MjA2NTBiMW...
null
PYSEC-2016-24
null
[ { "commit_message": "[PATCH] fix #913: Harden bottle against malformed headers. Bottle now checks against certain control characters (\\n, \\r and \\0) in header names or values and raises a ValueError if the application tries to set an invalid header. bottle.py | 25 ++++++++++++++----------- test/te...
null
GHSA-prcg-mc23-hgjh
phpmyadmin contains SQL Injection vulnerability
null
[ { "commit_message": "[PATCH] Add ChangeLog entry for #15898 Ref: e1f5dfcd167488a3a72706cb3ebb792a62452e38 Signed-off-by: William Desportes <williamdes@wdes.fr> ChangeLog | 1 + 1 file changed, 1 insertion(+)", "patch_text_b64": "RnJvbSBiYzk4MjQ2NmYwOGRkY2NhZDQ4MDRiYTkyOGY4NGZmOGUyNTEwN2NiIE1vbiBTZXAgMTcgMDA6...
null
GHSA-8vhr-8v52-w97w
null
[ { "commit_message": "[PATCH] pinctrl: amd: Use devm_pinctrl_register() for pinctrl registration Use devm_pinctrl_register() for pin control registration and clean error path. Signed-off-by: Laxman Dewangan <ldewangan@nvidia.com> Signed-off-by: Linus Walleij <linus.walleij@linaro.org> drivers/pinctrl/pinctrl-amd...
null
GHSA-69jw-4jj8-fcxm
gokey allows secret recovery from a seed file without the master password
null
[ { "commit_message": "[PATCH] Fix a logic bug for the encrypted seed unwrap Apparently the unwrapSeed() never puts decrypted seed bytes into the resulting buffer. This means that decrypted seed only had the initial vector and the authentication tag initialised. This is a breaking change: previously derived passw...
null
GHSA-5f5v-5c3v-gw5v
Silverstripe IE requests not properly behaving with rewritehashlinks
null
[ { "commit_message": "[PATCH] Fixed XSS vulnerability relating to rewrite_hash tests/view/SSViewerTest.php | 19 ++++++++++++++++--- view/SSTemplateParser.php | 2 +- view/SSTemplateParser.php.inc | 2 +- view/SSViewer.php | 4 ++-- 4 files changed, 20 insertions(+), 7 deletions(-)", "patch_...
null
CVE-2023-42452
Mastodon vulnerable to Stored XSS through the translation feature
Mastodon is a free, open-source social network server based on ActivityPub. In versions on the 4.x branch prior to versions 4.0.10, 4.2.8, and 4.2.0-rc2, under certain conditions, attackers can abuse the translation feature to bypass the server-side HTML sanitization, allowing unescaped HTML to execute in the browser. The impact is limited thanks to Mastodon's strict Content Security Policy, blocking inline scripts, etc. However a CSP bypass or loophole could be exploited to execute malicious XSS. Furthermore, it requires user interaction, as this can only occur upon clicking the “Translate” button on a malicious post. Versions 4.0.10, 4.2.8, and 4.2.0-rc2 contain a patch for this issue.
[ { "commit_message": "[PATCH] Merge pull request from GHSA-2693-xr3m-jhqr app/services/translate_status_service.rb | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBmZjMyNDc1ZjVmNGE4NGViZjk2MTllN2VlZjViZjhiNGMwNzVkMGUyIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBDbGFpcmUgPGNsY...
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2020-4068
Heap-based Buffer Overflow in APNSwift
In APNSwift 1.0.0, calling APNSwiftSigner.sign(digest:) is likely to result in a heap buffer overflow. This has been fixed in 1.0.1.
[ { "commit_message": "[PATCH] Resolves memory issue (#32) * Resolves #31 Sources/APNSwift/APNSwiftSigner.swift | 11 ++++------- 1 file changed, 4 insertions(+), 7 deletions(-)", "patch_text_b64": "RnJvbSA5N2ZhN2Y2OWRjZGQ4OTE2OGZmZjg0ZTBiYThmOTk5ODgxZWUzZDNmIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBLeWxlIEJy...
CWE-122: Heap-based Buffer Overflow
GHSA-2jff-xpp2-45x2
null
[ { "commit_message": "[PATCH] More changes to mitigate: CVE-2010-3843 CVE-2010-3844 src/interfaces/gtk/ec_gtk_conf.c | 4 +--- src/interfaces/gtk/ec_gtk_mitm.c | 6 +++--- 2 files changed, 4 insertions(+), 6 deletions(-)", "patch_text_b64": "RnJvbSA0ZWYzZWRlMzAxODFlY2E5YWRkNzQzMDVhZDI2ZGJjYjBjMzY4NmEwIE1vbiBTZ...
null
PYSEC-2015-26
null
[ { "commit_message": "[PATCH] Fix XSS reported on Security list MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit No CVE-ID yet August 18, 2015 Reported to Quantopian by Juan Broullón <thebrowfc@gmail.com>... If you create a new folder in the iPython file browser and set J...
null
GHSA-7xwj-5r4v-429p
NPE in TFLite
null
[ { "commit_message": "[PATCH] Fix a null pointer exception in SVDF This is due to not checking that `GetVariableInput` returns non-null tensor. Also fix a potential null pointer exception in `GetVariableInput`. PiperOrigin-RevId: 385160147 Change-Id: Iadf3f0705b036a9014d27caa5a8bbd91f4c4c401 tensorflow/lite/kern...
null
CVE-2012-1121
MantisBT before 1.2.9 does not properly check permissions, which allows remote authenticated users with manager privileges to (1) modify or (2) delete global categories.
[ { "commit_message": "[PATCH] User must have global access to update global categories The user's global access level must be >= $g_manage_site_threshold to be allowed to add, edit or delete global categories. Prior to this, once a user had been defined as Manager on at least one project, they could freely updat...
n/a
GHSA-j5vm-7qcc-2wwg
Kopia: Storage connection credentials written to console on "repository status" CLI command with JSON output
null
[ { "commit_message": "[PATCH] fix(cli): Ensure scrubber checks all fields recursively for sensitive tags (#3589) * Fix ScrubSensitiveData to scrub recursively * Extend test with additional cases internal/scrubber/scrub_sensitive.go | 17 ++++++++++++ internal/scrubber/scrub_sensitive_test.go | 32 +++++++++++...
null
GHSA-vh3x-525m-jp4r
heap-buffer-overflow in MicroPython
null
[ { "commit_message": "[PATCH] py/objint: Fix int.to_bytes() buffer size checks. Fixes and improvements to `int.to_bytes()` are: - No longer overflows if byte size is 0 (closes #13041). - Raises OverflowError in any case where number won't fit into byte length (now matches CPython, previously MicroPython would re...
null
PYSEC-2021-670
null
[ { "commit_message": "[PATCH] Fix `tf.raw_ops.QuantizeAndDequantizeV4Grad` CHECK failure. PiperOrigin-RevId: 370532425 Change-Id: I767721be266851b63d8fe55e7ac6be0af6017f6c tensorflow/core/kernels/quantize_and_dequantize_op.cc | 10 ++++++++++ 1 file changed, 10 insertions(+)", "patch_text_b64": "RnJvbSAyMDQzM...
null
CVE-2020-14214
Zammad before 3.3.1, when Domain Based Assignment is enabled, relies on a claimed e-mail address for authorization decisions. An attacker can register a new account that will have access to all tickets of an arbitrary Organization.
[ { "commit_message": "[PATCH] Fixes issue #2907 - Password strength settings are ignored when creating new customer accounts. Make login available to verified users only. .../app/controllers/email_verify.coffee | 57 ++++--------- .../javascripts/app/controllers/signup.coffee | 47 +++++++---- .../app/contro...
n/a
GHSA-92wm-vqxv-vpf9
null
[ { "commit_message": "[PATCH] add some additonal permission checks to the webdav backend apps/dav/lib/connector/sabre/objecttree.php | 33 ++++++++++++++++--- .../tests/unit/connector/sabre/objecttree.php | 20 +++++++++++ .../integration/features/bootstrap/WebDav.php | 18 +++++++++- .../features/webdav-related....
null
CVE-2023-49291
Improper Sanitization of Branch Name Leads to Arbitrary Code Injection
tj-actions/branch-names is a Github action to retrieve branch or tag names with support for all events. The `tj-actions/branch-names` GitHub Actions improperly references the `github.event.pull_request.head.ref` and `github.head_ref` context variables within a GitHub Actions `run` step. The head ref variable is the branch name and can be used to execute arbitrary code using a specially crafted branch name. As a result an attacker can use this vulnerability to steal secrets from or abuse `GITHUB_TOKEN` permissions. This vulnerability has been addressed in version 7.0.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.
[ { "commit_message": "[PATCH 1/4] security: prevent arbitrary code injection via untrusted inputs action.yml | 56 ++++++++++++++++++++++++++++++++++++------------------ 1 file changed, 37 insertions(+), 19 deletions(-)", "patch_text_b64": "RnJvbSA3M2I1ZTA1Yzg1NTFiMGVhMThlOTFmN2FlOGFjZDM4Y2U1ZWE0ZWRlIE1vbiBTZ...
CWE-20: Improper Input Validation
GHSA-4hr6-49g3-g573
null
[ { "commit_message": "[PATCH] fixed #2576 src/filters/dasher.c | 5 +++++ src/filters/dmx_avi.c | 1 + src/filters/reframe_mhas.c | 7 ++++--- src/scene_manager/swf_parse.c | 5 ++--- 4 files changed, 12 insertions(+), 6 deletions(-)", "patch_text_b64": "RnJvbSA0NjA3MDUyYzQ4MmE1MWRiZGFjZmUxYW...
null
GHSA-rp9c-7g4x-v5p2
null
[ { "commit_message": "[PATCH] [media] dvb-usb-v2: avoid use-after-free I ran into a stack frame size warning because of the on-stack copy of the USB device structure: drivers/media/usb/dvb-usb-v2/dvb_usb_core.c: In function 'dvb_usbv2_disconnect': drivers/media/usb/dvb-usb-v2/dvb_usb_core.c:1029:1: error: the fr...
null
GHSA-wv28-7fpw-fj49
Lektor does not sanitize database path traversal
null
[ { "commit_message": "[PATCH] Sanitize DB path traversal (#1179) * test: check that make_editor_session rejects funky paths * fix: validate path in make_editor_session * test: check that untrusted_to_os_path prevents traversal to parent * fix[untrusted_to_os_path]: prevent traversal to parent directories lektor/...
null
GHSA-h97q-54jx-527j
null
[ { "commit_message": "[PATCH] fix(accounts): security enhancement src/controllers/api/v1/routes.js | 1 + src/controllers/api/v1/users.js | 98 +++++++++++++++++++ .../js/angularjs/controllers/profile.js | 2 +- 3 files changed, 100 insertions(+), 1 deletion(-)", "patch_text_b...
null
CVE-2022-0266
Authorization Bypass Through User-Controlled Key in livehelperchat/livehelperchat
Authorization Bypass Through User-Controlled Key in Packagist remdex/livehelperchat prior to 3.92v.
[ { "commit_message": "[PATCH] Display logic should match backand logic lhc_web/modules/lhuser/delete.php | 5 +++++ lhc_web/modules/lhuser/deletegroup.php | 5 +++++ 2 files changed, 10 insertions(+)", "patch_text_b64": "RnJvbSBjYzExMjJhZWQwZDFhZDlmMDU3NTdlYWVhMmFiOWU2YTkyNDc3NmJkIE1vbiBTZXAgMTcgMDA6MDA6M...
CWE-639 Authorization Bypass Through User-Controlled Key
GHSA-vpq9-rx6p-23hj
null
[ { "commit_message": "[PATCH] Update VCounter Update VCounter mod/statistik/vcounter.php | 20 ++++++++++---------- 1 file changed, 10 insertions(+), 10 deletions(-)", "patch_text_b64": "RnJvbSA0ZmU5ZDBkMzFhMzJkZjM5MmY0ZDZjZWQ4ZTVjMjVlZDRhZjE5YWRlIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBBdXJhQ01TIDxhZG1pbkB...
null
GHSA-vw4j-wqq5-5pv6
null
[ { "commit_message": "[PATCH] Update trigger_referral.php to prevent SQL Injection Upload/plugins/gimmie/trigger_referral.php | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSA3MTk0YTA5MzUzZGQyNGEyNzQ2NzgzODNhNDQxOGYyZmQzZmNlNmY3IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBEY...
null
GHSA-7h2r-j97g-f327
null
[ { "commit_message": "[PATCH] fix CVE-2025-6257 html escaping editor input eurofxref.php | 12 ++++++++++-- 1 file changed, 10 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSAxMzExMDg0MjhmMGQ4OGRhYjEwNzAwNDgzNTBiZGQ1NGYxMGMzNmEwIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBqb29zdCBkZSBrZWlqemVyIDxqQGRr...
null
CVE-2022-2941
The WP-UserOnline plugin for WordPress has multiple Stored Cross-Site Scripting vulnerabilities in versions up to, and including 2.88.0. This is due to the fact that all fields in the "Naming Conventions" section do not properly sanitize user input, nor escape it on output. This makes it possible for authenticated attackers, with administrative privileges, to inject JavaScript code into the setting that will execute whenever a user accesses the injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
[ { "commit_message": "[PATCH] Fixed XSS. Props Juampa Rodriguez README.md | 5 ++++- admin.php | 18 ++++++++++++++---- wp-useronline.php | 2 +- 3 files changed, 19 insertions(+), 6 deletions(-)", "patch_text_b64": "RnJvbSA1OWM3NmIyMGU0ZTI3NDg5ZjkzZGVlNGVmMTI1NGQ2MjA0ZTA4YjNjIE1vbiBTZXAgMTcgM...
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
GHSA-7h8g-7wrh-4jfh
null
[ { "commit_message": "[PATCH] Implemented \"[ #315668 ] Disable loading of external entities in XML parsing by default\". .../xerces/XercesSAXParserFactoryImpl.java | 41 ++++++++----------- 1 file changed, 16 insertions(+), 25 deletions(-)", "patch_text_b64": "RnJvbSBhYmE2NjgxNjYwZjY1YWY3ZjE2NzY0MzRkYTY4Y...
null
GHSA-x92h-wmg2-6hp7
Invalid HTTP method overrides allow possible XSS or other attacks in Symfony
null
[ { "commit_message": "[PATCH] [HttpFoundation] reject invalid method override .../Component/HttpFoundation/Request.php | 43 +++++++++++++------ 1 file changed, 29 insertions(+), 14 deletions(-)", "patch_text_b64": "RnJvbSA5NDRlNjBmMDgzYzNiZmZiYzZhMGI1MTEyZGIxMjdhMTBhNjZhOGVjIE1vbiBTZXAgMTcgMDA6MDA6MDAgM...
null
GHSA-9wc2-3gq5-2f4c
null
[ { "commit_message": "[PATCH] Security: BigUpload: Remove unused method to upload file .../javascript/bigupload/inc/bigUpload.php | 65 ------------------- 1 file changed, 65 deletions(-)", "patch_text_b64": "RnJvbSAzYjQ4N2E1NTA3NmZiMDZmOTY4MDliNzkwYTM1ZGNkZDQyZjhlYzQ5IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm...
null
GHSA-rcx6-7jp6-pqf2
ember-source Cross-site Scripting vulnerability
null
[ { "commit_message": "[PATCH] [SECURITY CVE-2014-0014] Ensure {{group}} helper escapes properly. This vulnerability has been assigned the CVE identifier CVE-2014-0014. In general, Ember.js escapes or strips any user-supplied content before inserting it in strings that will be sent to innerHTML. However, we have...
null
GHSA-jcj3-xvr5-gp68
null
[ { "commit_message": "[PATCH] avformat/movenc: Do not pass AVCodecParameters in avpriv_request_sample MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Fixes: out of array read Fixes: ffmpeg_crash_8.avi Found-by: Thuan Pham, Marcel Böhme, Andrew Santosa and Alexandru Razva...
null
CVE-2022-2290
Cross-site Scripting (XSS) - Reflected in zadam/trilium
Cross-site Scripting (XSS) - Reflected in GitHub repository zadam/trilium prior to 0.52.4, 0.53.1-beta.
[ { "commit_message": "[PATCH] set correct content type for error messages package-lock.json | 4 ++-- src/routes/api/export.js | 8 ++++++-- src/routes/api/files.js | 4 +++- src/routes/api/image.js | 8 +++++--- src/routes/api/note_revisions.js | 8 ++++++-- src/routes/c...
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
GHSA-qg48-85hg-mqc5
Division by 0 in `DenseCountSparseOutput`
null
[ { "commit_message": "[PATCH] Fix FPE issue with `tf.raw_ops.DenseCountSparseOutput`. PiperOrigin-RevId: 370946862 Change-Id: I3752584ad04aaecb327ff6793a9640ac56acfe7a tensorflow/core/kernels/count_ops.cc | 3 +++ 1 file changed, 3 insertions(+)", "patch_text_b64": "RnJvbSBkYTVmZjJkYWY2MTg1OTFmNjRiMmI2MmQ5ZDk...
null
GHSA-66xq-fc4p-m6xv
null
[ { "commit_message": "[PATCH] avformat/rtmppkt: Convert ff_amf_get_field_value() to bytestream2 Fixes: out of array accesses Found-by: JunDong Xie of Ant-financial Light-Year Security Lab Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> libavformat/rtmppkt.c | 57 ++++++++++++++++++++++++++++----------...
null
CVE-2017-8064
drivers/media/usb/dvb-usb-v2/dvb_usb_core.c in the Linux kernel 4.9.x and 4.10.x before 4.10.12 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist.
[ { "commit_message": "[PATCH] [media] dvb-usb-v2: avoid use-after-free I ran into a stack frame size warning because of the on-stack copy of the USB device structure: drivers/media/usb/dvb-usb-v2/dvb_usb_core.c: In function 'dvb_usbv2_disconnect': drivers/media/usb/dvb-usb-v2/dvb_usb_core.c:1029:1: error: the fr...
n/a
CVE-2020-15102
Improper access control on dashboard form in PrestaShop
In PrestaShop Dashboard Productions before version 2.1.0, there is improper authorization which enables an attacker to change the configuration. The problem is fixed in 2.1.0.
[ { "commit_message": "[PATCH 1/3] Improve check on values dashproducts.php | 42 +++- views/templates/hook/dashboard_zone_two.tpl | 228 ++++++++++---------- 2 files changed, 157 insertions(+), 113 deletions(-)", "patch_text_b64": "RnJvbSBjODZmMTc1NzcxNWM2MDBmN2I4YzVlZDg4YjQ0NjcwOT...
CWE-284: Improper Access Control
CVE-2022-21644
SQL Injection via search in USOC
USOC is an open source CMS with a focus on simplicity. In affected versions USOC allows for SQL injection via usersearch.php. In search terms provided by the user were not sanitized and were used directly to construct a sql statement. The only users permitted to search are site admins. Users are advised to upgrade as soon as possible. There are not workarounds for this issue.
[ { "commit_message": "[PATCH] Update usersearch.php admin/pages/usersearch.php | 195 +++++++++++++++++++++---------------- 1 file changed, 112 insertions(+), 83 deletions(-)", "patch_text_b64": "RnJvbSAwNjIxN2M2NmM4ZjliMTE0NzI2YjIxNjMzZWFiY2Q4OGFjOTAzNGFhIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBBYXJvbiBKdW...
CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
GHSA-8xv4-c7rq-j577
ChakraCore Remote Code Execution Vulnerability
null
[ { "commit_message": "[PATCH] [CVE-2020-1037] Ensure JIT bails out when there is an object marked as temporary during an implicit call, to prevent objects stored on the stack to be used outside of the function. This is done by preventing removal of the Bailout instruction for that case during the DeadStore pass ...
null
CVE-2025-32387
Helm Allows A Specially Crafted JSON Schema To Cause A Stack Overflow
Helm is a package manager for Charts for Kubernetes. A JSON Schema file within a chart can be crafted with a deeply nested chain of references, leading to parser recursion that can exceed the stack size limit and trigger a stack overflow. This issue has been resolved in Helm v3.17.3.
[ { "commit_message": "[PATCH] Unarchiving fix Signed-off-by: Matt Farina <matt@mattfarina.com> pkg/chart/v2/loader/archive.go | 32 +++++++++++++++++++++++++++++++- pkg/chart/v2/loader/directory.go | 4 ++++ 2 files changed, 35 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAwNzQwZGZjN2E5NmQ2NTQyMD...
CWE-121: Stack-based Buffer Overflow
CVE-2019-13343
Butor Portal before 1.0.27 is affected by a Path Traversal vulnerability leading to a pre-authentication arbitrary file download. Effectively, a remote anonymous user can download any file on servers running Butor Portal. WhiteLabelingServlet is responsible for this vulnerability. It does not properly sanitize user input on the theme t parameter before reusing it in a path. This path is then used without validation to fetch a file and return its raw content to the user via the /wl?t=../../...&h= substring followed by a filename.
[ { "commit_message": "[PATCH] better check for theme exists! .../portal/web/servlet/WhiteLabelingServlet.java | 13 +++++++++++++ 1 file changed, 13 insertions(+)", "patch_text_b64": "RnJvbSBjZDcwNTVkMzNlMTk0ZmNmNTMwMTAwZWUxZDhkMTNhYTljZGUyMzBiIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBBaW1hbiBTYXdhbiA8QWl...
n/a
CVE-2024-32979
Reflected Cross-site Scripting potential in all object list views in Nautobot
Nautobot is a Network Source of Truth and Network Automation Platform built as a web application atop the Django Python framework with a PostgreSQL or MySQL database. It was discovered that due to improper handling and escaping of user-provided query parameters, a maliciously crafted Nautobot URL could potentially be used to execute a Reflected Cross-Site Scripting (Reflected XSS) attack against users. All filterable object-list views in Nautobot are vulnerable. This issue has been fixed in Nautobot versions 1.6.20 and 2.2.3. There are no known workarounds for this vulnerability.
[ { "commit_message": "[PATCH] Fix quoting of query parameters in list view (#5646) * Add proper quoting of object-list filters * Add unit test * Change fragment * Fix new bug caught by integration tests * Use location.assign rather than location.replace, close modal on form submit changes/5646.security ...
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-65092
ESP32-P4 JPEG Decoder Header Parsing Vulnerability
ESF-IDF is the Espressif Internet of Things (IOT) Development Framework. In versions 5.5.1, 5.4.3, and 5.3.4, when the ESP32-P4 uses its hardware JPEG decoder, the software parser lacks necessary validation checks. A specially crafted (malicious) JPEG image could exploit the parsing routine and trigger an out-of-bounds array access. This issue has been fixed in versions 5.5.2, 5.4.4, and 5.3.5. At time of publication versions 5.5.2, 5.4.4, and 5.3.5 have not been released but are fixed respectively in commits 4b8f585, c79cb4d, and 34e2726.
[ { "commit_message": "[PATCH] fix(jpeg): Add check for jpeg marker parser in order to enhance safety .../esp_driver_jpeg/jpeg_parse_marker.c | 44 ++++++++++++++----- 1 file changed, 33 insertions(+), 11 deletions(-)", "patch_text_b64": "RnJvbSAzNGUyNzI2MjU0MjAxOTg4ZTZlMjc1MmIyZGI0YjcwZDczOTY0ZDRjIE1vbi...
CWE-125: Out-of-bounds Read
GHSA-hxcm-v35h-mg2x
Prototype Pollution in querystringify
null
[ { "commit_message": "[PATCH] [security] Prevent overriding of build-in properties by default (#19) [security] Prevent overriding of build-in properties by default .travis.yml | 9 +++------ index.js | 21 ++++++++++++--------- package.json | 8 ++++---- test.js | 8 ++++++++ 4 files changed, 27 inserti...
null
GHSA-5xv5-wxfg-845r
null
[ { "commit_message": "[PATCH] scanner: don't crash on strings containing a NUL byte We crash if the input contains a string containing a NUL byte. Reported by Suhwan Song. https://lists.gnu.org/r/bug-bison/2020-07/msg00051.html * src/flex-scanner.h (STRING_FREE): Avoid accidental use of last_string. * src/scan-g...
null