id
stringlengths
12
19
title
stringlengths
0
237
description
stringlengths
35
3.87k
patches
listlengths
1
22
cwe
stringlengths
2
440
GHSA-xq59-7jf3-rjc6
piccolo SQL Injection via named transaction savepoints
null
[ { "commit_message": "[PATCH] Merge pull request from GHSA-xq59-7jf3-rjc6 Co-authored-by: skelmis <ethan.mckee-harris@zxsecurity.co.nz> piccolo/engine/base.py | 15 +++++++++++++++ piccolo/engine/postgres.py | 5 ++++- piccolo/engine/sqlite.py | 5 ++++- tests/engine/test_transaction.py | ...
null
GHSA-crx8-5gw7-25m9
null
[ { "commit_message": "[PATCH] Vulnerabilities fixed, thanks to huntr.dev system/controllers/admin/actions/menu_tree_ajax.php | 2 +- system/controllers/tags/actions/autocomplete.php | 4 ++-- system/core/user.php | 6 ++++-- system/fields/string.php |...
null
CVE-2011-1589
Directory traversal vulnerability in Path.pm in Mojolicious before 1.16 allows remote attackers to read arbitrary files via a %2f..%2f (encoded slash dot dot slash) in a URI.
[ { "commit_message": "[PATCH] fixed critical security issue that can expose files on your system and prepared emergency release Changes | 6 +++++- lib/Mojo/Path.pm | 4 +++- lib/Mojolicious.pm | 2 +- t/mojo/path.t | 17 ++++++++++++++++- 4 files changed, 25 insertions(+), 4 deletions(-)", ...
n/a
GHSA-4j4g-qvh2-m3wx
null
[ { "commit_message": "[PATCH] vhost: actually track log eventfd file MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit While reviewing vhost log code, I found out that log_file is never set. Note: I haven't tested the change (QEMU doesn't use LOG_FD yet). Cc: stable@vger.k...
null
GHSA-x2jp-hh65-4xvf
Cross-site scripting (XSS) and Server side request forgery (SSRF) in moodle
null
[ { "commit_message": "[PATCH] MDL-70767 feedback: Prevent xss in feedback answer text. mod/feedback/classes/complete_form.php | 2 +- mod/feedback/classes/responses_table.php | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSBhMzAzZWI5ZTllMzg3Zjk1ZWEyYTgwY2IxY2U2YzBiMTMyZWMx...
null
GHSA-hw4x-q63w-42vp
null
[ { "commit_message": "[PATCH] Mitigate arbitrary file read With this change the URL is restricted to http and https. So no local files can be read. This still is a Server-side request forgery (SSRF). share/server/core/classes/NagVisHoverUrl.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_te...
null
GHSA-qvjc-g5vr-mfgr
Regular Expression Denial of Service in papaparse
null
[ { "commit_message": "[PATCH] Avoid ReDOS on float dynamic typing (#779) Fixes #777 papaparse.js | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAyMzVhMTI3NThjZDc3MjY2ZDJlOThmZDcxNWY1MzUzNmIzNGFkNjIxIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBTZXJnaSBBbG1hY2VsbGFzIEFiZWxsYW5hID...
null
GHSA-vxxr-cwrh-ff4m
null
[ { "commit_message": "[PATCH] Remove the Export feature. This feature is a security risk; it provided multiple vectors by which contents of files could be exposed. API change: remove Network.Gitit.Export. README.markdown | 9 +- data/default.conf | 9 +- data/templ...
null
GHSA-gxmr-6cg7-7q62
null
[ { "commit_message": "[PATCH] cred: copy_process() should clear child->replacement_session_keyring keyctl_session_to_parent(task) sets ->replacement_session_keyring, it should be processed and cleared by key_replace_session_keyring(). However, this task can fork before it notices TIF_NOTIFY_RESUME and the new ch...
null
GHSA-552p-pmcq-pm57
null
[ { "commit_message": "[PATCH] crypto: algif_skcipher - Require setkey before accept(2) Some cipher implementations will crash if you try to use them without calling setkey first. This patch adds a check so that the accept(2) call will fail with -ENOKEY if setkey hasn't been done on the socket yet. Cc: stable@vg...
null
GHSA-5v7r-jg9r-vq44
Insecure Cryptography Algorithm in simple-crypto-js
null
[ { "commit_message": "[PATCH] Mitigating padding oracle attack src/SimpleCrypto.ts | 39 ++++++++++++++++++++++++++++++++++----- 1 file changed, 34 insertions(+), 5 deletions(-)", "patch_text_b64": "RnJvbSA3ZTA4MTZiZjUzNDkwYzQxOWMxODBiZjA3OGJiMGRhNjQ1Y2MyN2UxIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBBZGl0eWE...
null
GHSA-r89v-cgv7-3jhx
Bypass of fix for CVE-2020-15247, Twig sandbox escape
null
[ { "commit_message": "[PATCH] Improve Twig security policy Follow up to https://github.com/octobercms/october/compare/106daa2930de4cebb18732732d47d4056f01dd5b...7cb148c1677373ac30ccfd3069d18098e403e1ca. Thanks to @ka1n4t for the additional review. modules/system/twig/SecurityPolicy.php | 2 ++ 1 file changed, 2 i...
null
CVE-2021-21363
Generator Web Application: Local Privilege Escalation Vulnerability via System Temp Directory
swagger-codegen is an open-source project which contains a template-driven engine to generate documentation, API clients and server stubs in different languages by parsing your OpenAPI / Swagger definition. In swagger-codegen before version 2.4.19, on Unix like systems, the system's temporary directory is shared between all users on that system. A collocated user can observe the process of creating a temporary sub directory in the shared temporary directory and race to complete the creation of the temporary subdirectory. This vulnerability is local privilege escalation because the contents of the `outputFolder` can be appended to by an attacker. As such, code written to this directory, when executed can be attacker controlled. For more details refer to the referenced GitHub Security Advisory. This vulnerability is fixed in version 2.4.19. Note this is a distinct vulnerability from CVE-2021-21364.
[ { "commit_message": "[PATCH] security: use java.nio.files in Generator. .../src/main/java/io/swagger/generator/online/Generator.java | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSAzYjQwNTM5YjIyNjBmYmYxYzgxOThkY2ViODc5NzU5OWMzOTQ0ZWY3IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQp...
CWE-379 Creation of Temporary File in Directory with Incorrect Permissions
CVE-2025-26153
A Stored XSS vulnerability exists in the message compose feature of Chamilo LMS 1.11.28. Attackers can inject malicious scripts into messages, which execute when victims, such as administrators, reply to the message.
[ { "commit_message": "[PATCH] Security: Remove on-attributes when showing an HTML editor in forms Refs advisory GHSA-24cc-9jp9-rxx6 main/inc/lib/formvalidator/Element/HtmlEditor.php | 9 +++++++++ 1 file changed, 9 insertions(+)", "patch_text_b64": "RnJvbSBiZWIwNzc3MGQ2NzRmY2M5ZGI2ZGYwZTU5YWFiMTA3Njc4YzI4Njgy...
n/a
GHSA-hvvv-j3j9-xhr9
null
[ { "commit_message": "[PATCH] powerpc/perf: Fix crash in perf_instruction_pointer() when ppmu is not set On systems without any specific PMU driver support registered, running perf record causes Oops. The relevant portion from call trace: BUG: Kernel NULL pointer dereference on read at 0x00000040 Faulting instru...
null
CVE-2025-24011
Umbraco CMS Vulnerable to User Enumeration Feasible Based On Management API Timing and Response Codes
Umbraco is a free and open source .NET content management system. Starting in version 14.0.0 and prior to versions 14.3.2 and 15.1.2, it's possible to determine whether an account exists based on an analysis of response codes and timing of Umbraco management API responses. Versions 14.3.2 and 15.1.2 contain a patch. No known workarounds are available.
[ { "commit_message": "[PATCH] Merge commit from fork * Add TimedScope * Use TimedScope in login endpoint * Use seperate default duration and only calculate average of actual successful responses * Only return detailed error responses if credentials are valid * Cancel timed scope when credentials are valid * Add ...
CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CVE-2024-43803
BMO can expose particularly named secrets from other namespaces via BMH CRD
The Bare Metal Operator (BMO) implements a Kubernetes API for managing bare metal hosts in Metal3. The `BareMetalHost` (BMH) CRD allows the `userData`, `metaData`, and `networkData` for the provisioned host to be specified as links to Kubernetes Secrets. There are fields for both the `Name` and `Namespace` of the Secret, meaning that versions of the baremetal-operator prior to 0.8.0, 0.6.2, and 0.5.2 will read a `Secret` from any namespace. A user with access to create or edit a `BareMetalHost` can thus exfiltrate a `Secret` from another namespace by using it as e.g. the `userData` for provisioning some host (note that this need not be a real host, it could be a VM somewhere). BMO will only read a key with the name `value` (or `userData`, `metaData`, or `networkData`), so that limits the exposure somewhat. `value` is probably a pretty common key though. Secrets used by _other_ `BareMetalHost`s in different namespaces are always vulnerable. It is probably relatively unusual for anyone other than cluster administrators to have RBAC access to create/edit a `BareMetalHost`. This vulnerability is only meaningful, if the cluster has users other than administrators and users' privileges are limited to their respective namespaces. The patch prevents BMO from accepting links to Secrets from other namespaces as BMH input. Any BMH configuration is only read from the same namespace only. The problem is patched in BMO releases v0.7.0, v0.6.2 and v0.5.2 and users should upgrade to those versions. Prior upgrading, duplicate the BMC Secrets to the namespace where the corresponding BMH is. After upgrade, remove the old Secrets. As a workaround, an operator can configure BMO RBAC to be namespace scoped for Secrets, instead of cluster scoped, to prevent BMO from accessing Secrets from other namespaces.
[ { "commit_message": "[PATCH] Disallow fetching secrets from namespaces different from the host's one The BareMetalHost CRD allows the UserData, MetaData, and NetworkData for the provisioned host to be specified as links to k8s Secrets. There are fields for both the Name and Namespace of the Secret, meaning that...
CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
GHSA-vm23-73fg-gcq2
null
[ { "commit_message": "[PATCH] Fix incorrect bounds check for sector count. (Francisco Alonso and Jan Kaluza at RedHat) src/cdf.c | 9 +++++---- 1 file changed, 5 insertions(+), 4 deletions(-)", "patch_text_b64": "RnJvbSA0MGJhZGU4MGNiZTJhZjFkMGIyY2QwNDIwY2ViZDVkNTkwNWEyMzgyIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGc...
null
CVE-2021-37659
Out of bounds read via null pointer dereference in TensorFlow
TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can cause undefined behavior via binding a reference to null pointer in all binary cwise operations that don't require broadcasting (e.g., gradients of binary cwise operations). The [implementation](https://github.com/tensorflow/tensorflow/blob/84d053187cb80d975ef2b9684d4b61981bca0c41/tensorflow/core/kernels/cwise_ops_common.h#L264) assumes that the two inputs have exactly the same number of elements but does not check that. Hence, when the eigen functor executes it triggers heap OOB reads and undefined behavior due to binding to nullptr. We have patched the issue in GitHub commit 93f428fd1768df147171ed674fee1fc5ab8309ec. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
[ { "commit_message": "[PATCH] Fix nullptr deref and heap OOB access in binary cwise ops. PiperOrigin-RevId: 387936777 Change-Id: I608b8074cec36a982cca622b7144cb2c43e6e19f tensorflow/core/kernels/cwise_ops_common.h | 5 +++++ 1 file changed, 5 insertions(+)", "patch_text_b64": "RnJvbSA5M2Y0MjhmZDE3NjhkZjE0NzE3...
CWE-476: NULL Pointer Dereference
GHSA-2f7h-crmc-cqw4
null
[ { "commit_message": "[PATCH] XSS #2 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Erweiterte Ausgabevalidierung für die normalen Chatfunktionen. Siehe https://www.owasp.org/index.php/XSS Eventuelle Überlegung die Validierung der Datentelegramme serverseitig durchzufüh...
null
GHSA-m6wq-66p2-c8pc
Babylon Nil BlockHash in BLS vote extensions triggers panics in consensus handlers
null
[ { "commit_message": "[PATCH] chore: backport sec adv blk (#1889) * add nil check of block hash * changelog * pr comments * changes based on review comments Co-authored-by: Cirrus Gai <greferry@gmail.com> Co-authored-by: tom <tomasguerraalda@hotmail.com> CHANGELOG.md | 6 ++ cryp...
null
CVE-2017-15194
include/global_session.php in Cacti 1.1.25 has XSS related to (1) the URI or (2) the refresh page.
[ { "commit_message": "[PATCH] XSS fix (#1017) Fix for issue #1010 include/global_session.php | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSA5M2Y2NjFkOGFkY2ZhNjYxOGIxMTUyMmNkYWIzMGU5N2JhZGEzM2ZkIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBQYXRyaWNrIDxwYXRyaWNrQHBhdHJpY2tyYW...
n/a
GHSA-ppm5-jv84-2xg2
Aimeos HTML client may potentially reveal sensitive information in error log
null
[ { "commit_message": "[PATCH] Don't log security relevant data to prevent revealing information src/Client/Html/Checkout/Confirm/Standard.php | 6 +----- 1 file changed, 1 insertion(+), 5 deletions(-)", "patch_text_b64": "RnJvbSBiYjM4OTYyMGZmYzNjZjRhMmYyOWMxMWExZTVmNTEyMDQ5ZTBjMTMyIE1vbiBTZXAgMTcgMDA6MDA6MDAg...
null
GHSA-3q8j-9w3h-v6p5
null
[ { "commit_message": "[PATCH] Command to show in the UI should not be escaped, but the actual command must be software/apt-lib.pl | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSAxM2Y3YmY5NjIxYTgyZDkzZjFlOWRiZDgzOGQxZTIyMDIwMjIxYmRlIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tO...
null
GHSA-7pmh-vrww-25xx
freewvs's nested directory structure can interrupt scan
null
[ { "commit_message": "[PATCH] protect against deep recursion of directories freewvs | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA4M2E2YjU1YzA0MzVjNjlmNDQ3NDg4Yjc5MTU1NWU2MDc4ODAzMTQzIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiA9P1VURi04P3E/SGFubm89MjBCPUMzPUI2Y2s/PSA8aG...
null
CVE-2025-62720
LinkAce: Data Exfiltration via Export Functions Allow Access to All Users' Private Links
LinkAce is a self-hosted archive to collect website links. Versions 2.3.1 and below allow any authenticated user to export the entire database of links from all users in the system, including private links that should only be accessible to their owners. The HTML and CSV export functions in the ExportController class retrieve all links without applying any ownership or visibility filtering, effectively bypassing all access controls implemented elsewhere in the application. This issue is fixed in version 2.4.0.
[ { "commit_message": "[PATCH] Only export links, lists and tags visible for the user during HTML/CSV export app/Http/Controllers/App/ExportController.php | 8 ++++---- tests/Controller/App/ExportControllerTest.php | 9 +++++++++ 2 files changed, 13 insertions(+), 4 deletions(-)", "patch_text_b64": "RnJvbSAwYmE...
CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
GHSA-r659-6fh2-v3gv
null
[ { "commit_message": "[PATCH] fix sqlcipher_export handling of NULL parameters src/crypto.c | 22 +++++++++++++++++++--- test/sqlcipher-compatibility.test | 26 ++++++++++++++++++++++++++ 2 files changed, 45 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSBjYjcxZjUzZThjZWE0ODAyNTA...
null
GHSA-75j8-mr4c-4x59
null
[ { "commit_message": "[PATCH] Fix - Buffer overflow causing segfault - CVE-2023-41101 Signed-off-by: Rob White <rob@blue-wave.net> src/http_microhttpd.c | 133 +++++++++++++++++++++++------------------- 1 file changed, 73 insertions(+), 60 deletions(-)", "patch_text_b64": "RnJvbSBjMjk0Y2YzMGUwYTI1MTIwNjJjNjZl...
null
CVE-2013-4511
Multiple integer overflows in Alchemy LCD frame-buffer drivers in the Linux kernel before 3.12 allow local users to create a read-write memory mapping for the entirety of kernel memory, and consequently gain privileges, via crafted mmap operations, related to the (1) au1100fb_fb_mmap function in drivers/video/au1100fb.c and the (2) au1200fb_fb_mmap function in drivers/video/au1200fb.c.
[ { "commit_message": "[PATCH] Fix a few incorrectly checked [io_]remap_pfn_range() calls Nico Golde reports a few straggling uses of [io_]remap_pfn_range() that really should use the vm_iomap_memory() helper. This trivially converts two of them to the helper, and comments about why the third one really needs to...
n/a
CVE-2021-3813
Improper Privilege Management in chatwoot/chatwoot
Improper Privilege Management in GitHub repository chatwoot/chatwoot prior to v2.2.
[ { "commit_message": "[PATCH] Fix: Conversation filter permissions (#3908) fixes: chatwoot/product#225 app/finders/conversation_finder.rb | 2 +- spec/finders/conversation_finder_spec.rb | 28 ++++++++++++++++++++++++ 2 files changed, 29 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA5NDU0YzZi...
CWE-269 Improper Privilege Management
CVE-2020-15263
XSS in platform
In platform before version 9.4.4, inline attributes are not properly escaped. If the data that came from users was not escaped, then an XSS vulnerability is possible. The issue was introduced in 9.0.0 and fixed in 9.4.4.
[ { "commit_message": "[PATCH] refs #1313 Escape inline attributes (#1314) CHANGELOG.md | 5 +++++ src/Platform/Dashboard.php | 2 +- src/Screen/Field.php | 10 ++++++---- src/Screen/Fields/Upload.php | 1 - tests/Unit/Screen/Fields/InputTest.php | ...
{"CWE-79":"Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')"}
GHSA-c57m-8jqr-v2wc
null
[ { "commit_message": "[PATCH] fix xss blog/templatetags/blog_tags.py | 9 ++++++++- djangoblog/utils.py | 10 ++++++++++ templates/comments/tags/comment_item.html | 2 +- templates/comments/tags/comment_item_tree.html | 2 +- 4 files changed, 20 insertions(+), 3 del...
null
CVE-2011-4324
The encode_share_access function in fs/nfs/nfs4xdr.c in the Linux kernel before 2.6.29 allows local users to cause a denial of service (BUG and system crash) by using the mknod system call with a pathname on an NFSv4 filesystem.
[ { "commit_message": "[PATCH] NFSv4: Convert the open and close ops to use fmode Signed-off-by: Trond Myklebust <Trond.Myklebust@netapp.com> fs/nfs/inode.c | 2 +- fs/nfs/nfs4_fs.h | 8 +-- fs/nfs/nfs4proc.c | 126 ++++++++++++++++++++++------------------ fs/nfs/nfs4state.c | 24 ++++...
n/a
GHSA-822f-jfpg-hg7h
Liferay Portal and Liferay DXP fails to check permissions to view sites/groups
null
[ { "commit_message": "[PATCH] LPS-134264 Ensure that the groups are filtered even if a userId is not passed in. With this users who can update other users can no longer see all sites when assigning users to sites. .../context/SiteBrowserDisplayContext.java | 3 + .../service/impl/GroupLocalServiceImpl.java ...
null
GHSA-7h5p-mmpp-hgmm
Nuclei Template Signature Verification Bypass
null
[ { "commit_message": "[PATCH] Merge commit from fork MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit * fix template signature verification * fix signature pattern check * add tests * remove signature count constraint, check for lines len * Add more tests * Centralize sig...
null
CVE-2021-32717
Private files publicly accessible with Cloud Storage providers
Shopware is an open source eCommerce platform. In versions prior to 6.4.1.1 private files publicly accessible with Cloud Storage providers when the hashed URL is known. Users are recommend to first change their configuration to set the correct visibility according to the documentation. The visibility must be at the same level as `type`. When the Storage is saved on Amazon AWS we recommending disabling public access to the bucket containing the private files: https://docs.aws.amazon.com/AmazonS3/latest/userguide/access-control-block-public-access.html. Otherwise, update to Shopware 6.4.1.1 or install or update the Security plugin (https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659) and run the command `./bin/console s3:set-visibility` to correct your cloud file visibilities.
[ { "commit_message": "[PATCH] NEXT-14744 - fix visibility setting in s3 storage fs ...fix-visibility-setting-in-s3-storage-fs.md | 10 ++ .../Command/S3FilesystemVisibilityCommand.php | 112 ++++++++++++++++++ .../Adapter/Filesystem/FilesystemFactory.php | 4 + .../DependencyInjection/services.xml | ...
CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
GHSA-xfrx-cmv6-fgvj
null
[ { "commit_message": "[PATCH] Validate width values to avoid unlikely security vulnerabilities. If the database were compromised, a value like `500\" onclick=\"alert(1)\" foo=\"` could be inserted into the `custom_content_width` option, resulting in XSS. If the attacker had full access to the database, then they...
null
GHSA-4rwr-8c3m-55f6
TorrentPier is Vulnerable to Authenticated SQL Injection through Moderator Control Panel's topic_id parameter
null
[ { "commit_message": "[PATCH] fix(security): prevent SQL injection in moderator panel topic_id parameter (#2216) modcp.php | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSA2YTBmNjQ5OWQ4OWZhNWQ2ZTJhZmE4ZWU1MzgwMmExYWQxMWVjZTgwIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBSb2...
null
CVE-2024-34068
Server-side Request Forgery during remote file pull in Pterodactyl wings
Pterodactyl wings is the server control plane for Pterodactyl Panel. An authenticated user who has access to a game server is able to bypass the previously implemented access control (GHSA-6rg3-8h8x-5xfv) that prevents accessing internal endpoints of the node hosting Wings in the pull endpoint. This would allow malicious users to potentially access resources on local networks that would otherwise be inaccessible. This issue has been addressed in version 1.11.2 and users are advised to upgrade. Users unable to upgrade may enable the `api.disable_remote_download` option as a workaround.
[ { "commit_message": "[PATCH] downloader: move internal subnet validation into http Transport router/downloader/downloader.go | 125 +++++++++++++------------------- 1 file changed, 52 insertions(+), 73 deletions(-)", "patch_text_b64": "RnJvbSBjMTUyZTM2MTAxYWJhNDVkODg2OGE5YTBlZWI4OTA5OTVlODkzNGI4IE1vbiBTZXAgM...
CWE-284: Improper Access Control
PYSEC-2021-605
null
[ { "commit_message": "[PATCH] fix segfault on string tensors with mismatched dimensions tensorflow/go/tensor.go | 30 +++++++++++++++++------------- 1 file changed, 17 insertions(+), 13 deletions(-)", "patch_text_b64": "RnJvbSA0OTQ5OWMxNzc5NGIzOWEyYTdkNWJlMmI0NzdlZDdkNTcwNGQwNjI5IE1vbiBTZXAgMTcgMDA6MDA6MDAgMj...
null
GHSA-q55m-8f9f-jgg3
null
[ { "commit_message": "[PATCH] node delte might fail Change-Id: Ifa3694efacc0e0ac71792b0d67999c946b4f4712 tine20/Filemanager/js/NodeEditDialog.js | 1 + tine20/Filemanager/js/nodeActions.js | 10 +++------- tine20/Tinebase/js/widgets/container/TreePanel.js | 7 +++++-- 3 files changed, 9 ins...
null
CVE-2023-4878
Server-Side Request Forgery (SSRF) in instantsoft/icms2
Server-Side Request Forgery (SSRF) in GitHub repository instantsoft/icms2 prior to 2.16.1-git.
[ { "commit_message": "[PATCH] Fixed xss in admin panel, complete fix SSRF in upload by link, option for store via html filter, jQuery v3.7.1, update Toastr. system/controllers/admin/actions/widgets.php | 8 +- .../admin/forms/form_ctypes_basic.php | 1 + .../admin/forms/form_ctypes_dataset.php | ...
CWE-918 Server-Side Request Forgery (SSRF)
GHSA-cq2q-g8h5-4923
null
[ { "commit_message": "[PATCH] (for 4.9.3) CVE-2018-14467/BGP: Fix BGP_CAPCODE_MP. Add a bounds check and a comment to bgp_capabilities_print(). This fixes a buffer over-read discovered by Bhargava Shastry, SecT/TU Berlin. Add a test using the capture file supplied by the reporter(s). print-bgp.c ...
null
CVE-2023-25665
TensorFlow has Null Pointer Error in SparseSparseMaximum
TensorFlow is an open source platform for machine learning. Prior to versions 2.12.0 and 2.11.1, when `SparseSparseMaximum` is given invalid sparse tensors as inputs, it can give a null pointer error. A fix is included in TensorFlow version 2.12 and version 2.11.1.
[ { "commit_message": "[PATCH] Add validation checks in sparse binary ops. Fixes a nullptr security vulnerability. PiperOrigin-RevId: 503501621 .../kernels/sparse_sparse_binary_op_shared.cc | 43 ++++--------------- .../sparse_ops/sparse_ops_test.py | 13 ++++++ 2 files changed, 21 insertions(+), 35 del...
CWE-476: NULL Pointer Dereference
CVE-2022-0173
Out-of-bounds Read in radareorg/radare2
radare2 is vulnerable to Out-of-bounds Read
[ { "commit_message": "[PATCH] Fix use-after-free in iobank rbtree usage ##io * See havoc4 bin for reproducer * Reported via huntr.dev by 'Cen Zhang' libr/io/io_bank.c | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAzNzg5NzIyNmExYTMxZjk4MmJmZWZkYzRhZWVmYzJlNTAzNTVjNzNjIE1v...
CWE-125 Out-of-bounds Read
CVE-2025-62717
Emlog Pro session verification code error due to clearing logic error
Emlog is an open source website building system. In version 2.5.23, Emlog Pro is vulnerable to a session verification code error due to a clearing logic error. This means the verification code could be reused anywhere an email verification code is required. This issue has been fixed in commit 1f726df.
[ { "commit_message": "[PATCH] fix(user): correct session variable name for mail code include/service/user.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAxZjcyNmRmMGNlNTZhMWJjNmU4MjI1ZGQ5NTM4OTk3NDE3M2JkMGMwIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBzbm93IDw0MzQ0MjM1K2Vtb...
CWE-287: Improper Authentication
CVE-2016-6828
The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option.
[ { "commit_message": "[PATCH] tcp: fix use after free in tcp_xmit_retransmit_queue() MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit When tcp_sendmsg() allocates a fresh and empty skb, it puts it at the tail of the write queue using tcp_add_write_queue_tail() Then it att...
n/a
GHSA-wf9g-696p-j466
null
[ { "commit_message": "[PATCH] dracut.sh: create the initramfs non-world readable also if early cpio is used Fixes: 5f2c30d9bcd614d546d5c55c6897e33f88b9ab90 Previously fixed CVE-2012-4453: e1b48995c26c4f06d1a718539cb1bd5b0179af91 Signed-off-by: Andreas Stieger <astieger@suse.com> dracut.sh | 2 +- 1 file changed, ...
null
GHSA-wpwj-69cm-q9c5
go-mail has insufficient address encoding when passing mail addresses to the SMTP client
null
[ { "commit_message": "[PATCH 1/7] Refactored recipient handling to make use of net/mail's mail address stringification - Updated `msg.go` to properly format recipient strings. - Fixed tests in `msg_test.go` by ensuring recipient strings use proper formatting with angle brackets. - Added new test for handling quo...
null
GHSA-g2r3-4g8q-h5rj
Missing authorization in Jenkins Kubernetes Plugin
null
[ { "commit_message": "[PATCH] [SECURITY-2103] .../jenkins/plugins/kubernetes/KubectlBuildWrapper.java | 8 +++++++- 1 file changed, 7 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBmMjYxMzAxNDljNDg3YjFlZjhlY2U5YjdiODgxNzM5YzJmOGM2NzM2IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBKZXNzZSBHbGljayA8amds...
null
GHSA-m2gf-x3f6-8hq3
Deno is Vulnerable to Command Injection on Windows During Batch File Execution
null
[ { "commit_message": "[PATCH] fix: reject running `.bat` and `.cmd` directly on windows (#30818) ext/process/lib.rs | 15 +++++++++++++++ tests/unit/command_test.ts | 22 ++++++++++++++++++++++ 2 files changed, 37 insertions(+)", "patch_text_b64": "RnJvbSA4YTA5OTBjY2QzN2JhZmQ4NzY4MTc2Y2E2NGI5MDZiYTJkYT...
null
GHSA-35pr-gqm6-r366
Moodle allows attackers to obtain sensitive personal-contact and unread-message-count information
null
[ { "commit_message": "[PATCH] MDL-49204 core_message: Checking current user message/index.php | 4 +--- 1 file changed, 1 insertion(+), 3 deletions(-)", "patch_text_b64": "RnJvbSAyOTI0YmExYzczZjllZDNkNTI1OTg3ODA3ZjlkMjg5YjNlYjM4MTU0IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBEYXZpZCBNb25sbGFvIDxkYXZpZG1AbW9vZG...
null
GHSA-29m4-mx89-3mjg
TYPO3 Denial of Service in Online Media Asset Handling
null
[ { "commit_message": "[PATCH] [SECURITY] Avoid DoS in Online Media Helper Using large media files (*.youtube, *.vimeo in the TYPO3 core) might lead to denial of service scenarios. In order to avoid that, media files are limited to have a content size of 2048 bytes as a maximum. Usually these files contain just t...
null
GHSA-rjx6-v474-2ch9
Segfault in `CompositeTensorVariantToComponents`
null
[ { "commit_message": "[PATCH] [Security] Add a check for empty variant tensor input to CompositeTensorVariantToComponents. So an exception will be raised instead of segfault. PiperOrigin-RevId: 474397914 tensorflow/core/kernels/composite_tensor_ops.cc | 6 ++++++ .../kernel_tests/composite_tensor_ops_test.py ...
null
CVE-2025-54572
Ruby SAML DOS vulnerability with large SAML response
The Ruby SAML library is for implementing the client side of a SAML authorization. In versions 1.18.0 and below, a denial-of-service vulnerability exists in ruby-saml even with the message_max_bytesize setting configured. The vulnerability occurs because the SAML response is validated for Base64 format prior to checking the message size, leading to potential resource exhaustion. This is fixed in version 1.18.1.
[ { "commit_message": "[PATCH] Prevent DOS due large SAML Message lib/ruby_saml/xml/decoder.rb | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSBmZDJmNTMyODYyYjY0NTMwNjlkNjlkMDdhNTQxZTY2ODYwOWMyYmJjIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBTaXh0byBNYXJ0aW4gPHNpeHRvLm1hcnRpb...
CWE-400: Uncontrolled Resource Consumption
CVE-2022-24726
Unauthenticated control plane denial of service attack in Istio
Istio is an open platform to connect, manage, and secure microservices. In affected versions the Istio control plane, istiod, is vulnerable to a request processing error, allowing a malicious attacker that sends a specially crafted message which results in the control plane crashing when the validating webhook for a cluster is exposed publicly. This endpoint is served over TLS port 15017, but does not require any authentication from the attacker. For simple installations, Istiod is typically only reachable from within the cluster, limiting the blast radius. However, for some deployments, especially [external istiod](https://istio.io/latest/docs/setup/install/external-controlplane/) topologies, this port is exposed over the public internet. This issue has been patched in versions 1.13.2, 1.12.5 and 1.11.8. Users are advised to upgrade. Users unable to upgrade should disable access to a validating webhook that is exposed to the public internet or restrict the set of IP addresses that can query it to a set of known, trusted entities.
[ { "commit_message": "[PATCH] [release-1.13] pilot: limit reads from untrusted inputs (#37792) * pilot: limit reads from untrusted inputs * revert jwks Co-authored-by: John Howard <howardjohn@google.com> pkg/kube/inject/webhook.go | 6 ++++-- pkg/kube/util.go | 26 ++++++++++...
CWE-400: Uncontrolled Resource Consumption
CVE-2024-29029
memos vulnerable to an SSRF in /o/get/image
memos is a privacy-first, lightweight note-taking service. In memos 0.13.2, an SSRF vulnerability exists at the /o/get/image that allows unauthenticated users to enumerate the internal network and retrieve images. The response from the image request is then copied into the response of the current server request, causing a reflected XSS vulnerability. Version 0.22.0 of memos removes the vulnerable file.
[ { "commit_message": "[PATCH] chore: retire legacy api internal/jobs/presign_link.go | 38 +- server/integration/telegram.go | 5 +- server/route/api/v1/auth.go | 253 -- server/route/api/v1/common.go | 15 - server/route/api/v1/docs.go | 3393 -----------------...
CWE-918: Server-Side Request Forgery (SSRF)
GHSA-gwxv-jv83-6qjr
JStachio XSS vulnerability: Unescaped single quotes
null
[ { "commit_message": "[PATCH] Fix #157 add more aggressive html5 escaping .../io/jstach/jstachio/escapers/Html.java | 43 ++++++++++++--- .../jstach/jstachio/escapers/HtmlEscaper.java | 54 ++++++++++++++----- .../examples/htmlescaper/HtmlEscapeTest.java | 33 ++++++++++++ .../examples/htmlescaper/package-info...
null
CVE-2025-9801
SimStudioAI sim path traversal
A security vulnerability has been detected in SimStudioAI sim up to ed9b9ad83f1a7c61f4392787fb51837d34eeb0af. This affects an unknown part. The manipulation of the argument filePath leads to path traversal. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used. This product follows a rolling release approach for continuous delivery, so version details for affected or updated releases are not provided. The identifier of the patch is 45372aece5e05e04b417442417416a52e90ba174. To fix this issue, it is recommended to deploy a patch.
[ { "commit_message": "[PATCH] fix(files): fix vulnerabilities in file uploads/deletes (#1130) * fix(vulnerability): fix arbitrary file deletion vuln * fix(uploads): fix vuln during upload * cleanup apps/sim/app/api/files/upload/route.test.ts | 187 ++++++++++ apps/sim/app/api/files/upload/route.ts | 36 ...
Path Traversal
GHSA-qrgf-9gpc-vrxw
Bypass of CSRF protection in the presence of predictable userInfo
null
[ { "commit_message": "[PATCH] Merge pull request from GHSA-qrgf-9gpc-vrxw * fix: enforce hmac key * fix: check only if fastify/cookie is enabled * fix: restored working testts * fix: update README.md Co-authored-by: Uzlopak <aras.abbasi@googlemail.com> * Update index.d.ts * Update index.test-d.ts * Update index....
null
CVE-2021-43798
Grafana path traversal
Grafana is an open-source platform for monitoring and observability. Grafana versions 8.0.0-beta1 through 8.3.0 (except for patched versions) iss vulnerable to directory traversal, allowing access to local files. The vulnerable URL path is: `<grafana_host_url>/public/plugins//`, where is the plugin ID for any installed plugin. At no time has Grafana Cloud been vulnerable. Users are advised to upgrade to patched versions 8.0.7, 8.1.8, 8.2.7, or 8.3.1. The GitHub Security Advisory contains more information about vulnerable URL paths, mitigation, and the disclosure timeline.
[ { "commit_message": "[PATCH] Security: Fix directory traversal issue (#42846) * security: fix dir traversal issue (cherry picked from commit 00e38ba555cfb120361c9623de3285d70c60172f) * Improve comments and error message. Co-authored-by: Kyle Brandt <kyle@grafana.com> pkg/api/plugins.go | 19 +++++++++++++++...
CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
GHSA-2gxp-6r36-m97r
Cadwyn vulnerable to XSS on the docs page
null
[ { "commit_message": "[PATCH] Fix reported vulnerability (#290) .all-contributorsrc | 2 +- CHANGELOG.md | 6 ++++++ cadwyn/applications.py | 5 +++-- pyproject.toml | 2 +- uv.lock | 2 +- 5 files changed, 12 insertions(+), 5 deletions(-)", "patch_text_b64": "RnJvbSBiNDI0ZWNkN...
null
CVE-2022-2796
Cross-site Scripting (XSS) - Stored in pimcore/pimcore
Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.5.4.
[ { "commit_message": "[PATCH] [Admin] Translations - properly escape key on roweditor .../Resources/public/js/pimcore/settings/translation.js | 7 +++++-- 1 file changed, 5 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSAyZmQ0Njg1OWMxZGVmNmI1YWI3OWFlMmI5Y2I4OGMzMDk3Njk0NDNkIE1vbiBTZXAgMTcgMDA6MDA...
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
GHSA-mgjw-2wrp-r535
Remote code execution in xwiki-platform
null
[ { "commit_message": "[PATCH] XAADMINISTRATION-196: Reset Password fails in private wikis XAADMINISTRATION-197: Make the password reset form compliant with the vertical form standard XAADMINISTRATION-198: Improve translations for the 'Forgot your password or username' application Done, git-svn-id: https://svn.xw...
null
GHSA-8c93-4hch-xgxp
Cloudflare Wrangler directory traversal vulnerability
null
[ { "commit_message": "[PATCH] Prevent `wrangler pages dev` from serving asset files outside of the build output directory (#3498) .changeset/fuzzy-flowers-kneel.md | 5 +++++ fixtures/pages-simple-assets/tests/index.test.ts | 12 ++++++++++++ packages/wrangler/src/miniflare-cli/assets.ts | 8 ++...
null
GHSA-c2jg-hw38-jrqq
Inconsistent Interpretation of HTTP Requests in twisted.web
null
[ { "commit_message": "[PATCH 01/13] Some tests for GHSA-c2jg-hw38-jrqq src/twisted/web/test/test_http.py | 102 ++++++++++++++++++++++++++++++ 1 file changed, 102 insertions(+)", "patch_text_b64": "RnJvbSAyMmIwNjc3OTNjYmNkMGZiNWRlZTA0Y2ZkOTExNWZhODVhN2NhMTEwIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBUb20gTW9z...
null
CVE-2021-45098
An issue was discovered in Suricata before 6.0.4. It is possible to bypass/evade any HTTP-based signature by faking an RST TCP packet with random TCP options of the md5header from the client side. After the three-way handshake, it's possible to inject an RST ACK with a random TCP md5header option. Then, the client can send an HTTP GET request with a forbidden URL. The server will ignore the RST ACK and send the response HTTP packet for the client's request. These packets will not trigger a Suricata reject action.
[ { "commit_message": "[PATCH] stream/tcp: handle RST with MD5 or AO header Special handling for RST packets if they have an TCP MD5 or AO header option. The options hash can't be validated. The end host might be able to validate it, as it can have a key/password that was communicated out of band. The sender coul...
n/a
GHSA-55jh-84jv-8mx8
Lightning Flow Scanner Vulnerable to Code Injection via Unsafe Use of `new Function()` in APIVersion Rule
null
[ { "commit_message": "[PATCH] core: fix (CWE-94) when implemented in vs code/ browser env packages/core/src/main/rules/APIVersion.ts | 91 ++++++++++++++-------- 1 file changed, 59 insertions(+), 32 deletions(-)", "patch_text_b64": "RnJvbSAxMGY2NGE1ZWIxOTNkOGE3NzdlNDUzYjI1ZTkxMDE0NGU0NTQwNzk1IE1vbiBTZXAgMTcgM...
null
CVE-2022-3242
HTML code Injection in template search keyword in microweber/microweber
Code Injection in GitHub repository microweber/microweber prior to 1.3.2.
[ { "commit_message": "[PATCH] update composer.json | 6 +- composer.lock | 890 ++++++++++++++++++++++++-------------------------- 2 files changed, 433 insertions(+), 463 deletions(-)", "patch_text_b64": "RnJvbSA2OGYwNzIxNTcxNjUzZGI4NjVhNWZhMDFjNzk4NjY0MmM4MmU5MTljIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBQ...
CWE-94 Improper Control of Generation of Code
CVE-2024-42360
Command Injection in sequenceserver
SequenceServer lets you rapidly set up a BLAST+ server with an intuitive user interface for personal or group use. Several HTTP endpoints did not properly sanitize user input and/or query parameters. This could be exploited to inject and run unwanted shell commands. This vulnerability has been fixed in 3.1.2.
[ { "commit_message": "[PATCH 1/4] Move fasta sequence ID to a reusable constant lib/sequenceserver/blast.rb | 6 ++++++ lib/sequenceserver/sequence.rb | 3 +-- 2 files changed, 7 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSA3MTM5Nzk4YTdmMzk1ODBjNTA4NTUxMjNkMDM0MTI4ODM2ZTYyMDgwIE1vbiBTZXAgMTcgMD...
CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')
GHSA-hcvp-2cc7-jrwr
changedetection.io API endpoint is not secured with API token
null
[ { "commit_message": "[PATCH] Security update - Adding API token secure check for API endpoint `/api/v1/watch/<uuid>/history` @rozpuszczalny changedetectionio/api/api_v1.py | 1 + 1 file changed, 1 insertion(+)", "patch_text_b64": "RnJvbSA0MDJmMWU0N2U3OGVjZDE1NWIxZTkwZjMwY2NlNDI0ZmY3NzYzZTBmIE1vbiBTZXAgMTcgMD...
null
CVE-2024-34083
STARTTLS unencrypted commands injection
aiosmptd is a reimplementation of the Python stdlib smtpd.py based on asyncio. Prior to version 1.4.6, servers based on aiosmtpd accept extra unencrypted commands after STARTTLS, treating them as if they came from inside the encrypted connection. This could be exploited by a man-in-the-middle attack. Version 1.4.6 contains a patch for the issue.
[ { "commit_message": "[PATCH] starttls: Clear unencrypted commands from buffer (#380) aiosmtpd/docs/NEWS.rst | 4 ++++ aiosmtpd/smtp.py | 3 +++ 2 files changed, 7 insertions(+)", "patch_text_b64": "RnJvbSBiM2E0YTJjNmVjZmQyMjg4NTZhMjBkNjM3ZGMzODM1NDFmY2RiZmRhIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBBcn...
CWE-349: Acceptance of Extraneous Untrusted Data With Trusted Data
GHSA-9c9v-w225-v5rg
Ghost vulnerable to arbitrary file read via symlinks in content import
null
[ { "commit_message": "[PATCH] =?UTF-8?q?=F0=9F=94=92=20Fixed=20arbitrary=20file=20read?= =?UTF-8?q?=20via=20symlinks=20in=20content=20import?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit refs https://github.com/TryGhost/Product/issues/3726 refs https://github.com/Try...
null
CVE-2018-10101
Before WordPress 4.9.5, the URL validator assumed URLs with the hostname localhost were on the same host as the WordPress server.
[ { "commit_message": "[PATCH] HTTP: Don't treat `localhost` as same host by default. Built from https://develop.svn.wordpress.org/trunk@42894 git-svn-id: http://core.svn.wordpress.org/trunk@42724 1a063a9b-81f0-0310-95a4-ce76da25c4cd wp-includes/http.php | 2 +- wp-includes/version.php | 2 +- 2 files changed, 2...
n/a
GHSA-xw6r-chmh-vpmj
Mailgen has HTML Injection and XSS Filter Bypass in Plaintext Emails
null
[ { "commit_message": "[PATCH] index.js: Fix additional HTML injection security issue in plaintext e-mails (thanks @edoardottt) index.js | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSA3Mjc5YTk4MzQ4MWQwNWM1MWFhNDUxZTg2MTQ2Zjk4YWFhNDJmZWU5IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwM...
null
GHSA-f62v-xpxf-3v68
Code injection in Apache Ant
null
[ { "commit_message": "[PATCH] fallback to a separate owner-only tempdir if possible src/main/org/apache/tools/ant/MagicNames.java | 10 +++ .../org/apache/tools/ant/util/FileUtils.java | 36 +++++++++-- .../apache/tools/ant/util/FileUtilsTest.java | 64 +++++++++++++++++++ 3 files changed, 105 insertions(+), 5 de...
null
GHSA-m2q3-53fq-7h66
Gollum Exposure of Sensitive Information
null
[ { "commit_message": "[PATCH] Added security check. lib/gollum/app.rb | 1 + 1 file changed, 1 insertion(+)", "patch_text_b64": "RnJvbSBjZTY4YTg4MjkzY2UzYjE4YzI2MTMxMjM5MmFkMzNhODhiYjY5ZWExIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBCYXJ0IEthbXBob3JzdCA8YmFydEBrYW1waG9yc3QuY29tPgpEYXRlOiBTdW4sIDIwIFNlcCAyMDE1I...
null
CVE-2022-2522
Heap-based Buffer Overflow in vim/vim
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0061.
[ { "commit_message": "[PATCH] patch 9.0.0061: ml_get error with nested autocommand Problem: ml_get error with nested autocommand. Solution: Also check line numbers for a nested autocommand. (closes #10761) src/autocmd.c | 6 +++++- src/proto/window.pro | 1 + src/testdir/test_autocmd....
CWE-122 Heap-based Buffer Overflow
GHSA-q49x-mf7w-873r
null
[ { "commit_message": "[PATCH] backend-sql-injection-protection create_user.php delete_user.php edit_user.php Added sql statement using prepare and bind param users.php: Added sql using prepare and bind param Added account number generator always starting with SAVE220 scripts/create_user.php | 40 +++++++++++----...
null
CVE-2023-46240
CodeIgniter4 vulnerable to information disclosure when detailed error report is displayed in production environment
CodeIgniter is a PHP full-stack web framework. Prior to CodeIgniter4 version 4.4.3, if an error or exception occurs, a detailed error report is displayed even if in the production environment. As a result, confidential information may be leaked. Version 4.4.3 contains a patch. As a workaround, replace `ini_set('display_errors', '0')` with `ini_set('display_errors', 'Off')` in `app/Config/Boot/production.php`.
[ { "commit_message": "[PATCH 1/8] fix: detailed error report is displayed in production environment php > ini_set('display_errors', '0'); php > var_dump(ini_get('display_errors')); string(1) \"0\" php > ini_set('display_errors', 0); php > var_dump(ini_get('display_errors')); string(1) \"0\" php > ini_set('displa...
CWE-209: Generation of Error Message Containing Sensitive Information
CVE-2022-2128
Unrestricted Upload of File with Dangerous Type in polonel/trudesk
Unrestricted Upload of File with Dangerous Type in GitHub repository polonel/trudesk prior to 1.2.4.
[ { "commit_message": "[PATCH] fix(attachments): file type security fix .../containers/Tickets/IssuePartial.jsx | 4 ++- src/controllers/tickets.js | 26 ++++++++++++++++++- src/routes/index.js | 7 ++++- 3 files changed, 34 insertions(+), 3 deletions(-)", "pa...
CWE-434 Unrestricted Upload of File with Dangerous Type
GHSA-gw7p-96wm-f9qw
null
[ { "commit_message": "[PATCH] - replaced unsafe function StringUtils_createStringFromBufferInBuffer with function with length check to not exceed target buffer (LIB61850-447) src/common/inc/string_utilities.h | 3 ++ src/common/string_utilities.c | 12 ++++++ src/iec61850/server/mms_ma...
null
CVE-2016-7838
Untrusted search path vulnerability in WinSparkle versions prior to 0.5.3 allows remote attackers to execute arbitrary code via a specially crafted executable file in an unspecified directory.
[ { "commit_message": "[PATCH] Verify UpdateTempDir isn't maliciously modified Don't just delete the stored updates temporary directory on launch, but validate the registry key to ensure it is in an expected location and follows WinSparkle's naming convention. This is to prevent malicious users from modifying thi...
Untrusted search path vulnerability
CVE-2020-15273
Cross-Site Scripting in baserCMS
baserCMS before version 4.4.1 is vulnerable to Cross-Site Scripting. The issue affects the following components: Edit feed settings, Edit widget area, Sub site new registration, New category registration. Arbitrary JavaScript may be executed by entering specific characters in the account that can access the file upload function category list, subsite setting list, widget area edit, and feed list on the management screen. The issue was introduced in version 4.0.0. It is fixed in version 4.4.1.
[ { "commit_message": "[PATCH] =?UTF-8?q?=E3=83=86=E3=83=BC=E3=83=9E=E7=B7=A8=E9=9B=86?= =?UTF-8?q?=E3=81=AE=E8=A8=B1=E5=8F=AF=E8=A8=AD=E5=AE=9A=E5=80=A4=E3=82=92?= =?UTF-8?q?=E8=BF=BD=E5=8A=A0=E3=80=81=E3=83=87=E3=83=95=E3=82=A9=E3=83=AB?= =?UTF-8?q?=E3=83=88=E3=81=A7=E3=81=AF=E7=B7=A8=E9=9B=86=E4=B8=8D=E5=8F=AF...
CWE-79 Cross-site Scripting (XSS)
CVE-2024-5642
Buffer overread when using an empty list with SSLContext.set_npn_protocols()
CPython 3.9 and earlier doesn't disallow configuring an empty list ("[]") for SSLContext.set_npn_protocols() which is an invalid value for the underlying OpenSSL API. This results in a buffer over-read when NPN is used (see CVE-2024-5535 for OpenSSL). This vulnerability is of low severity due to NPN being not widely used and specifying an empty list likely being uncommon in-practice (typically a protocol name would be configured).
[ { "commit_message": "[PATCH] bpo-43669: PEP 644: Require OpenSSL 1.1.1 or newer (GH-23014) - Remove HAVE_X509_VERIFY_PARAM_SET1_HOST check - Update hashopenssl to require OpenSSL 1.1.1 - multissltests only OpenSSL > 1.1.0 - ALPN is always supported - SNI is always supported - Remove deprecated NPN code. Python ...
CWE-1333 Inefficient Regular Expression Complexity
GHSA-gprr-v9f2-px3c
Azure PromptFlow remote code execution related to Jinja templates
null
[ { "commit_message": "[PATCH] RCE-fix-promptflow-tools (#3959) src/promptflow-tools/promptflow/tools/common.py | 12 ++++++++++-- src/promptflow-tools/tests/test_common.py | 15 +++++++++++++++ 2 files changed, 25 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSA1ZjRhNDFhYjRjYjE1NjA3YWRlN2YyNjEz...
null
GHSA-pf55-fj96-xf37
@lobehub/chat vulnerable to unauthorized access to plugins
null
[ { "commit_message": "[PATCH] =?UTF-8?q?=F0=9F=9A=91=EF=B8=8F=20fix:=20fix=20plugin=20g?= =?UTF-8?q?ateway=20auth=20(#1195)?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit * 🚑️ fix: fix plugin auth * 💚 fix: fix build * 🐛 fix: fix query of chat settings * 🐛 fix: fix...
null
GHSA-2hfw-w739-p7x5
nano-id reduced entropy due to inadequate character set usage
null
[ { "commit_message": "[PATCH] bump: v0.4.0 Cargo.toml | 2 +- src/lib.rs | 47 ++++++++++++++++++++++++++++++++++++++--------- 2 files changed, 39 insertions(+), 10 deletions(-)", "patch_text_b64": "RnJvbSAyMjA5YjMxN2FlNGVhNGNhYTk4MmEwOWIwYThlNWMwNjIxZGQ0ZjgzIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBGYW5nZHV...
null
GHSA-f3v8-7jfc-xgvg
null
[ { "commit_message": "[PATCH] Prepare 3.6.4 Stable Release administrator/manifests/files/joomla.xml | 2 +- components/com_users/controllers/user.php | 81 ----------------------- libraries/cms/version/version.php | 8 +-- 3 files changed, 5 insertions(+), 86 deletions(-)", "patch_text_b64": "RnJvbSB...
null
GHSA-f756-c9x3-wxmg
null
[ { "commit_message": "[PATCH] usb: mon: make mmapped memory read only Syzbot found an issue in usbmon module, where the user space client can corrupt the monitor's internal memory, causing the usbmon module to crash the kernel with segfault, UAF, etc. The reproducer mmaps the /dev/usbmon memory to user space, an...
null
CVE-2025-14546
Versions of the package fastapi-sso before 0.19.0 are vulnerable to Cross-site Request Forgery (CSRF) due to the improper validation of the OAuth state parameter during the authentication callback. While the get_login_url method allows for state generation, it does not persist the state or bind it to the user's session. Consequently, the verify_and_process method accepts the state received in the query parameters without verifying it against a trusted local value. This allows a remote attacker to trick a victim into visiting a malicious callback URL, which can result in the attacker's account being linked to the victim's internal account.
[ { "commit_message": "[PATCH] fix: enforce state validation (#267) fastapi_sso/sso/base.py | 10 ++++++++++ 1 file changed, 10 insertions(+)", "patch_text_b64": "RnJvbSA2MTE3ZDFhNWFkNDk4YmE1N2Q2NzFlOGEwNTllYmUyMGRiNWFiZTAyIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBkYXZpZGJvcnMtc255ayA8ZGF2aWQuYm9yc0BzbnlrLmlv...
Cross-site Request Forgery (CSRF)
GHSA-j86v-p27c-73fm
Unitialized access in `EinsumHelper::ParseEquation`
null
[ { "commit_message": "[PATCH] Fix EinsumHelper::ParseEquation to avoid uninitialized accesses. EinsumHelper::ParseEquation is supposed to return true or false in input_has_ellipsis and output_has_ellipsis to indicate whether there is ellipsis in the inputs and output. Previously, when there is no ellipsis in the...
null
CVE-2016-2548
sound/core/timer.c in the Linux kernel before 4.4.1 retains certain linked lists after a close or stop action, which allows local users to cause a denial of service (system crash) via a crafted ioctl call, related to the (1) snd_timer_close and (2) _snd_timer_stop functions.
[ { "commit_message": "[PATCH] ALSA: timer: Harden slave timer list handling A slave timer instance might be still accessible in a racy way while operating the master instance as it lacks of locking. Since the master operation is mostly protected with timer->lock, we should cope with it while changing the slave ...
n/a
GHSA-2fjw-whxm-9v4q
libnftnl has Heap-based Buffer Overflow in nftnl::Batch::with_page_size (nftnl-rs)
null
[ { "commit_message": "[PATCH] Panic if Batch::with_page_size would overflow nftnl/src/batch.rs | 7 +++++++ 1 file changed, 7 insertions(+)", "patch_text_b64": "RnJvbSA5NGEyODZmODdlODhmNDMxOTEzZDE5NjY4MjQ2ZGU5MDA2NzkwMTI1IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBKb2FraW0gSHVsdGhlIDxqb2FraW0uaHVsdGhlQG11bGx2Y...
null
PYSEC-2021-610
null
[ { "commit_message": "[PATCH] Fix crash with tf.summary.create_file_writer when non-scalar values are passed This PR tries to fix the issue raised in 46909 where tf.summary.create_file_writer crashes when non-scalar values are passed. This PR fixes 46909. Signed-off-by: Yong Tang <yong.tang.github@outlook.com> t...
null
CVE-2024-25641
Cacti RCE vulnerability when importing packages
Cacti provides an operational monitoring and fault management framework. Prior to version 1.2.27, an arbitrary file write vulnerability, exploitable through the "Package Import" feature, allows authenticated users having the "Import Templates" permission to execute arbitrary PHP code on the web server. The vulnerability is located within the `import_package()` function defined into the `/lib/import.php` script. The function blindly trusts the filename and file content provided within the XML data, and writes such files into the Cacti base path (or even outside, since path traversal sequences are not filtered). This can be exploited to write or overwrite arbitrary files on the web server, leading to execution of arbitrary PHP code or other security impacts. Version 1.2.27 contains a patch for this issue.
[ { "commit_message": "[PATCH] Merge pull request from GHSA-7cmj-g5qc-pj88 lib/import.php | 17 ++++++++++++++--- package_import.php | 2 ++ 2 files changed, 16 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSBlZmYzNWIwZmYyNmNjMjdjODJkNzg4MDQ2OWVkNmQ1ZTNiZWY2MjEwIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQp...
CWE-20: Improper Input Validation
CVE-2018-13304
In libavcodec in FFmpeg 4.0.1, improper maintenance of the consistency between the context profile field and studio_profile in libavcodec may trigger an assertion failure while converting a crafted AVI file to MPEG4, leading to a denial of service, related to error_resilience.c, h263dec.c, and mpeg4videodec.c.
[ { "commit_message": "[PATCH] avcodec/mpeg4videodec: Remove use of FF_PROFILE_MPEG4_SIMPLE_STUDIO as indicator of studio profile MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit The profile field is changed by code inside and outside the decoder, its not a reliable indica...
n/a
GHSA-whmq-v94q-34p9
Improper Control of Generation of Code in Apache Struts
null
[ { "commit_message": "[PATCH] Disable eval expressions git-svn-id: https://svn.apache.org/repos/asf/struts/struts2/branches/STRUTS_2_3_14_X@1469249 13f79535-47bb-0310-9956-ffa450edef68 .../org/apache/struts2/StrutsConstants.java | 3 ++ .../struts2/config/BeanSelectionProvider.java | 1 + .../opensymphony/xwor...
null
CVE-2020-12058
Several XSS vulnerabilities in osCommerce CE Phoenix before 1.0.6.0 allow an attacker to inject and execute arbitrary JavaScript code. The malicious code can be injected as follows: the page parameter to catalog/admin/order_status.php, catalog/admin/tax_rates.php, catalog/admin/languages.php, catalog/admin/countries.php, catalog/admin/tax_classes.php, catalog/admin/reviews.php, or catalog/admin/zones.php; or the zpage or spage parameter to catalog/admin/geo_zones.php.
[ { "commit_message": "[PATCH] Harden _GET page parameter TY to the guys at SISL Chicago admin/advert_manager.php | 4 +-- admin/countries.php | 24 +++++++-------- admin/currencies.php | 20 ++++++------- admin/customer_data_groups.php ...
n/a
CVE-2024-36123
Citizen has a Stored Cross-Site Scripting Vulnerability by editing MediaWiki:Tagline
Citizen is a MediaWiki skin that makes extensions part of the cohesive experience. The page `MediaWiki:Tagline` has its contents used unescaped, so custom HTML (including Javascript) can be injected by someone with the ability to edit the MediaWiki namespace (typically those with the `editinterface` permission, or sysops). This vulnerability is fixed in 2.16.0.
[ { "commit_message": "[PATCH] =?UTF-8?q?fix(components):=20=F0=9F=90=9B=20escape=20the?= =?UTF-8?q?=20contents=20of=20MediaWiki:Tagline?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Co-authored-by: BlankEclair <blankeclair@waifu.club> includes/Components/CitizenCompo...
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')