id stringlengths 12 19 | title stringlengths 0 237 | description stringlengths 35 3.87k ⌀ | patches listlengths 1 22 | cwe stringlengths 2 440 ⌀ |
|---|---|---|---|---|
GHSA-45cf-8gr9-j528 | null | [
{
"commit_message": "[PATCH] [ots] Fix (potential) use-after-free bugs MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Make sure we don’t try to access the table after deleting it. Not all the changed files are affected, but I changed them all for the sake of consistenc... | null | |
GHSA-6gm7-j668-w6h9 | SQL Injection in Pimcore | null | [
{
"commit_message": "[PATCH] [Recyclebin] Quote condition filter bundles/AdminBundle/Controller/Admin/RecyclebinController.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSBhNjk3ODMwMzU5ZGYwNjI0NmFjY2E1MDJlZTI0NTU2MTRkZTY4MDE3IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBkcGF... | null |
CVE-2021-3736 | A flaw was found in the Linux kernel. A memory leak problem was found in mbochs_ioctl in samples/vfio-mdev/mbochs.c in Virtual Function I/O (VFIO) Mediated devices. This flaw could allow a local attacker to leak internal kernel information. | [
{
"commit_message": "[PATCH] vfio/mbochs: Fix missing error unwind of mbochs_used_mbytes Convert mbochs to use an atomic scheme for this like mtty was changed into. The atomic fixes various race conditions with probing. Add the missing error unwind. Also add the missing kfree of mdev_state->pages. Fixes: 681c16... | CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor | |
GHSA-8r4m-5p6p-52rp | Arbitrary file read via SQL injection | null | [
{
"commit_message": "[PATCH 1/2] Fix arbitrary file ready through sql manager classes/RequestSql.php | 11 ++++++++++- src/Adapter/SqlManager/SqlQueryValidator.php | 8 ++++++++ 2 files changed, 18 insertions(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSAwNDlhMzY0NTc5NTVmZmI2ZDNiNGRmNmE... | null |
GHSA-wm93-f238-7v37 | Integer overflow in Tensorflow | null | [
{
"commit_message": "[PATCH] Prevent integer overflow in `OpLevelCostEstimator::CalculateOutputSize`. In order to not change the API, we return a negative value in case of overflow. A better fix is to change the API to return a status instead. PiperOrigin-RevId: 408701427 Change-Id: Idf31e7f0bf18ca824d084fdd355... | null |
GHSA-cwpm-f78v-7m5c | Denial of service in `tf.ragged.constant` due to lack of validation | null | [
{
"commit_message": "[PATCH] Prevent denial of service in `tf.ragged.constant` Fixes #55199 PiperOrigin-RevId: 442029525 tensorflow/python/ops/ragged/ragged_factory_ops.py | 3 +++ 1 file changed, 3 insertions(+)",
"patch_text_b64": "RnJvbSBiZDRkNTU4M2ZmOWM4ZGYyNmQ0N2EyM2U1MDgyMDg4NDQyOTczMTBlIE1vbiBTZXAgMTc... | null |
GHSA-xrh7-m5pp-39r6 | XSS Attack with Express API | null | [
{
"commit_message": "[PATCH] Don't use data object for Eta configuration (#214) deno_dist/file-handlers.ts | 42 +++++++------------------------------- src/file-handlers.ts | 42 +++++++------------------------------- test/file-handlers.spec.ts | 26 ++++------------------- 3 files changed, 18 insertions(+),... | null |
GHSA-fj2x-735w-74vq | gnark-crypto allows unchecked memory allocation during vector deserialization | null | [
{
"commit_message": "[PATCH] perf: limit memory allocation during Vector deserialization (#759) ecc/bls12-377/fp/vector.go | 154 +++++++++--- ecc/bls12-377/fp/vector_test.go | 224 ++++++++++++++++- ecc/bls12-377/fr/vector.go | 154 +++++++++--- ecc/bls12-377/fr... | null |
CVE-2022-1886 | Heap-based Buffer Overflow in vim/vim | Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2. | [
{
"commit_message": "[PATCH] patch 8.2.5016: access before start of text with a put command Problem: Access before start of text with a put command. Solution: Check the length is more than zero. src/register.c | 7 +++++-- src/testdir/test_put.vim | 9 +++++++++ src/version.c | 2 ++ 3 fi... | CWE-122 Heap-based Buffer Overflow |
GHSA-r8r8-9qg3-423r | null | [
{
"commit_message": "[PATCH] Prevent Cross-Site Request Forgery edit.php | 1 + export.php | 1 + import.php | 1 + includes/common.inc.php | 18 ++++++++++++++++++ login.php | 1 + rename.php | 1 + ttl.php | 1 + 7 files change... | null | |
GHSA-23cm-x6j7-6hq3 | matrix-js-sdk can be tricked into disclosing E2EE room keys to a participating homeserver | null | [
{
"commit_message": "[PATCH] Verify target device key on reshare src/crypto/algorithms/megolm.ts | 38 +++++++++++++++++++++++++-------- 1 file changed, 29 insertions(+), 9 deletions(-)",
"patch_text_b64": "RnJvbSA4OTRjMjQ4ODBkYTBlMWNjODE4MThmNTFjMGRiODBlM2M5ZmIyYmU5IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOi... | null |
CVE-2020-7788 | Prototype Pollution | This affects the package ini before 1.3.6. If an attacker submits a malicious INI file to an application that parses it with ini.parse, they will pollute the prototype on the application. This can be exploited further depending on the context. | [
{
"commit_message": "[PATCH] do not allow invalid hazardous string as section name ini.js | 8 ++++++++ test/proto.js | 45 +++++++++++++++++++++++++++++++++++++++++++++ 2 files changed, 53 insertions(+) create mode 100644 test/proto.js",
"patch_text_b64": "RnJvbSA1NmQyODA1ZTA3Y2NkOTRlMmJhMDk4NGFjOTI0... | Prototype Pollution |
GHSA-mx8q-gfm8-hjx3 | null | [
{
"commit_message": "[PATCH] Bluetooth: bnep: fix buffer overflow Struct ca is copied from userspace. It is not checked whether the \"device\" field is NULL terminated. This potentially leads to BUG() inside of alloc_netdev_mqs() and/or information leak by creating a device with a name made of contents of ker... | null | |
CVE-2024-45296 | path-to-regexp outputs backtracking regular expressions | path-to-regexp turns path strings into a regular expressions. In certain cases, path-to-regexp will output a regular expression that can be exploited to cause poor performance. Because JavaScript is single threaded and regex matching runs on the main thread, poor performance will block the event loop and lead to a DoS. The bad regular expression is generated any time you have two parameters within a single segment, separated by something that is not a period (.). For users of 0.1, upgrade to 0.1.10. All other users should upgrade to 8.0.0. | [
{
"commit_message": "[PATCH] Add backtrack protection to parameters index.js | 90 ++++++++++++++++++++++++++++++++------------------------ test.js | 40 ++++++++++++++++++++++++- 2 files changed, 90 insertions(+), 40 deletions(-)",
"patch_text_b64": "RnJvbSAyOWI5NmI0YTFkZTUyODI0ZTFjYTBmNDlhNzAxMTgzY2M0ZWQ0N... | CWE-1333: Inefficient Regular Expression Complexity |
CVE-2023-46575 | A SQL injection vulnerability exists in Meshery prior to version v0.6.179, enabling a remote attacker to retrieve sensitive information and execute arbitrary code through the “order” parameter | [
{
"commit_message": "[PATCH] ## Add \"order by\" parameter filter ## and export SanitizeOrderInput function Signed-off-by: phant0ms <ph1nt0ms@gmail.com> server/handlers/database_handlers.go | 1 + server/models/meshery_application_persister.go | 2 +- server/models/meshery_filter_persister.go | 4 +... | n/a | |
CVE-2015-0917 | Cross-site scripting (XSS) vulnerability in the backend in Kajona before 4.6.3 allows remote attackers to inject arbitrary web script or HTML via the action parameter to index.php. | [
{
"commit_message": "[PATCH] BUG: / SECURITY: Fixed a possible xss injection when handling non-existent action-names. fixes SROEADV-2015-01. module_system/admin/class_admin_controller.php | 7 +++---- module_system/system/class_abstract_controller.php | 8 ++++---- 2 files changed, 7 insertions(+), 8 deletion... | n/a | |
CVE-2022-24739 | Server-Side Request Forgery (SSRF) and URL Redirection to Untrusted Site ('Open Redirect') in alltube | alltube is an html front end for youtube-dl. On releases prior to 3.0.3, an attacker could craft a special HTML page to trigger either an open redirect attack or a Server-Side Request Forgery attack (depending on how AllTube is configured). The impact is mitigated by the fact the SSRF attack is only possible when the `stream` option is enabled in the configuration. (This option is disabled by default.) 3.0.3 contains a fix for this vulnerability. | [
{
"commit_message": "[PATCH] Prevent SSRF requests By validating the provided URL before passing it to youtube-dl classes/Controller/BaseController.php | 21 +- classes/Controller/DownloadController.php | 74 +- classes/Controller/FrontController.php | 22 +- classes/Controller/JsonController.php | ... | CWE-601: URL Redirection to Untrusted Site ('Open Redirect') |
GHSA-69g3-qvqf-82hh | null | [
{
"commit_message": "[PATCH] ipv6: make fragment identifications less predictable IPv6 fragment identification generation is way beyond what we use for IPv4 : It uses a single generator. Its not scalable and allows DOS attacks. Now inetpeer is IPv6 aware, we can use it to provide a more secure and scalable frag... | null | |
GHSA-8vwv-2v7v-jmgr | Horizon-Orchestration Cross-site scripting (XSS) vulnerability through resource name | null | [
{
"commit_message": "[PATCH] Fix multiple Cross-Site Scripting (XSS) vulnerabilities * Ensure user emails are properly escaped User emails in the Users and Groups panel are being passed through the urlize filter to transform them into clickable links. However, urlize expects input to be already escaped and safe... | null |
CVE-2020-36621 | chedabob whatismyudid mobileconfig.js exports.enrollment cross site scripting | A vulnerability, which was classified as problematic, has been found in chedabob whatismyudid. Affected by this issue is the function exports.enrollment of the file routes/mobileconfig.js. The manipulation leads to cross site scripting. The attack may be launched remotely. The name of the patch is bb33d4325fba80e7ea68b79121dba025caf6f45f. It is recommended to apply a patch to fix this issue. VDB-216470 is the identifier assigned to this vulnerability. | [
{
"commit_message": "[PATCH] fix: set cookie securely, and prevent XSS in the `/enrollment` route app.js | 1 - routes/mobileconfig.js | 28 ++++++++++++++++++++++------ 2 files changed, 22 insertions(+), 7 deletions(-)",
"patch_text_b64": "RnJvbSBiYjMzZDQzMjVmYmE4MGU3ZWE2OGI3OTEyMWRiYTAyNWNh... | CWE-707 Improper Neutralization -> CWE-74 Injection -> CWE-79 Cross Site Scripting |
CVE-2010-10006 | michaelliao jopenid OpenIdManager.java getAuthentication timing discrepancy | A vulnerability, which was classified as problematic, was found in michaelliao jopenid. Affected is the function getAuthentication of the file JOpenId/src/org/expressme/openid/OpenIdManager.java. The manipulation leads to observable timing discrepancy. The complexity of an attack is rather high. The exploitability is told to be difficult. Upgrading to version 1.08 is able to address this issue. The name of the patch is c9baaa976b684637f0d5a50268e91846a7a719ab. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-218460. | [
{
"commit_message": "[PATCH] fix timing vulnerability. .../src/org/expressme/openid/OpenIdManager.java | 16 ++++++++++++++-- 1 file changed, 14 insertions(+), 2 deletions(-)",
"patch_text_b64": "RnJvbSBjOWJhYWE5NzZiNjg0NjM3ZjBkNWE1MDI2OGU5MTg0NmE3YTcxOWFiIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBhc2t4dWVm... | CWE-208 Observable Timing Discrepancy |
GHSA-jf6m-r534-hj93 | null | [
{
"commit_message": "[PATCH] refactoring for security (www.ackcent.com) lib/functions/testPlanUrgency.class.php | 14 ++++----- lib/plan/planUrgency.php | 38 +++++++++---------------- 2 files changed, 20 insertions(+), 32 deletions(-)",
"patch_text_b64": "RnJvbSA1OGYzY2MwM2Q1ZjgxY2Q1Y2MyYWQ4Yz... | null | |
GHSA-rfqq-wq6w-72jm | MLflow has a Local File Read/Path Traversal bypass | null | [
{
"commit_message": "[PATCH] Fix Local File Read/Path Traversal bypass (#11376) Signed-off-by: Weichen Xu <weichen.xu@databricks.com> mlflow/server/handlers.py | 15 +++++++++++---- tests/server/test_handlers.py | 35 +++++++++++++++++++++++++++++++++++ 2 files changed, 46 insertions(+), 4 deletions(-)",
... | null |
GHSA-8v8w-v8xg-79rf | tj-actions/branch-names's Improper Sanitization of Branch Name Leads to Arbitrary Code Injection | null | [
{
"commit_message": "[PATCH 1/4] security: prevent arbitrary code injection via untrusted inputs action.yml | 56 ++++++++++++++++++++++++++++++++++++------------------ 1 file changed, 37 insertions(+), 19 deletions(-)",
"patch_text_b64": "RnJvbSA3M2I1ZTA1Yzg1NTFiMGVhMThlOTFmN2FlOGFjZDM4Y2U1ZWE0ZWRlIE1vbiBTZ... | null |
CVE-2022-31101 | SQL Injection in prestashop/blockwishlist | prestashop/blockwishlist is a prestashop extension which adds a block containing the customer's wishlists. In affected versions an authenticated customer can perform SQL injection. This issue is fixed in version 2.1.1. Users are advised to upgrade. There are no known workarounds for this issue. | [
{
"commit_message": "[PATCH] Validate order by and order way src/Search/WishListProductSearchProvider.php | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSBiZTc5NTE2MTc1ZDU2NGY2MGE2NTc2Mjc0ODJiMGE2MGMzZGEzNTNlIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBUaG9tYXMgQkFDQ0VMTEk... | CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') |
CVE-2016-3136 | The mct_u232_msr_to_state function in drivers/usb/serial/mct_u232.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted USB device without two interrupt-in endpoint descriptors. | [
{
"commit_message": "[PATCH] USB: mct_u232: add sanity checking in probe An attack using the lack of sanity checking in probe is known. This patch checks for the existence of a second port. CVE-2016-3136 Signed-off-by: Oliver Neukum <ONeukum@suse.com> CC: stable@vger.kernel.org [johan: add error message ] Signe... | n/a | |
PYSEC-2022-229 | null | [
{
"commit_message": "[PATCH 1/4] sanitize flagging inputs before writing to csv Former-commit-id: f2d9f808c79abec7f2c8ff4a94b17a9b1cdd5651 gradio/flagging.py | 22 +++++++++++----------- gradio/utils.py | 35 ++++++++++++++++++++++++++++++++++- test/test_utils.py | 20 ++++++++++++++++++++ 3 files changed, 65 i... | null | |
GHSA-hhqm-f4m4-pq39 | RaspAP raspap-webgui Command Injection vulnerability | null | [
{
"commit_message": "[PATCH 1/2] Sanitize input with escapeshellarg() includes/hostapd.php | 18 +++++++++--------- 1 file changed, 9 insertions(+), 9 deletions(-)",
"patch_text_b64": "RnJvbSAxZTUyZmY1OThiMDIzNjc5MTE5ZDUwYTMwMDNjY2RlYmQzNmZiNWY0IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBiaWxseiA8YmlsbHppbW1l... | null |
GHSA-46xp-26xh-hpqh | KubeVirt Vulnerable to Arbitrary Host File Read and Write | null | [
{
"commit_message": "[PATCH 1/2] host-path: only chown files we created Signed-off-by: Jed Lejosne <jed@redhat.com> pkg/ephemeral-disk-utils/utils.go | 19 +++++++++++++++++-- pkg/host-disk/host-disk.go | 14 +++++++------- pkg/host-disk/host-disk_test.go | 17 +++++++++++------ 3 files changed, 35 insert... | null |
GHSA-vpg4-mfvr-xc5c | null | [
{
"commit_message": "[PATCH] fix #58 : access to invalid address by reg->dmin value src/regexec.c | 2 ++ 1 file changed, 2 insertions(+)",
"patch_text_b64": "RnJvbSA5NjkwZDNhYjFmOWJjZDJkYjhjYmUxZmUzZWU0YTVkYTYwNmI4ODE0IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiAiSy5Lb3Nha28iIDxrb3Nha29Ac29mbmVjLmNvLmpwPgpEYX... | null | |
CVE-2017-20006 | UnRAR 5.6.1.2 and 5.6.1.3 has a heap-based buffer overflow in Unpack::CopyString (called from Unpack::Unpack5 and CmdExtract::ExtractCurrentFile). | [
{
"commit_message": "[PATCH] 5.6.1.4: Use in-memory archive instead of file IO arccmt.cpp | 2 +- archive.cpp | 75 +++++++++++++++++++++++++++++++++++++++++++----- archive.hpp | 9 +++++- arcmem.cpp | 62 +++++++++++++++++++++++++++++++++++++++ arcmem.hpp | 22 ++++++++++++++ arcread.c... | n/a | |
GHSA-3c7w-rm52-555g | null | [
{
"commit_message": "[PATCH] acpi: Disable APEI error injection if securelevel is set ACPI provides an error injection mechanism, EINJ, for debugging and testing the ACPI Platform Error Interface (APEI) and other RAS features. If supported by the firmware, ACPI specification 5.0 and later provide for a way to s... | null | |
GHSA-9p56-p6mw-w8qc | Jenkins has a Denial of service vulnerability in HTTP-based CLI | null | [
{
"commit_message": "[PATCH] [SECURITY-3630] .../java/hudson/cli/PlainCLIProtocol.java | 3 +- core/src/main/java/hudson/cli/CLIAction.java | 13 +- .../jenkins/util/FullDuplexHttpService.java | 11 +- .../java/hudson/cli/Security3630Test.java | 135 ++++++++++++++++++ 4 files changed, 154 insertions... | null |
GHSA-3pq8-q8mf-9rph | null | [
{
"commit_message": "[PATCH] fixed potential crash in TS - cf #1264 src/media_tools/mpegts.c | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-)",
"patch_text_b64": "RnJvbSAyMzIwZWI3M2FmYmE3NTNiMzliNzE0N2JlOTFmN2JlN2FmYzBlZWI3IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBqZWFubGYgPGplYW5sZkB1c2... | null | |
GHSA-9hmj-m2q2-x92g | null | [
{
"commit_message": "[PATCH] Fix update session when auth fail src/webservice.c | 4 ---- 1 file changed, 4 deletions(-)",
"patch_text_b64": "RnJvbSAxMjUyODFmMWMwZDRiNmE4YjQ5ZjdlNTVhNzU3MjA1YTJlZjAxZmJlIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBiYWJlbG91ZXN0IDxnaXRodWJAYmFiZWxvdWVzdC5vcmc+CkRhdGU6IFdlZCwgMTU... | null | |
GHSA-43j2-r4v3-m8jp | Secrets are not masked by Jenkins Credentials Binding Plugin in builds without build steps | null | [
{
"commit_message": "[PATCH] [SECURITY-1374] .../impl/SecretBuildWrapper.java | 2 +- .../impl/SecretBuildWrapperTest.java | 48 +++++++++++++++++++ 2 files changed, 49 insertions(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSA1OWVhZDExYmNiM2ZkMTMyMjU4ZDFkN2RhNGEzNGQ0Nzc1MGY0MGQyIE1vbiBT... | null |
CVE-2014-8351 | SQL injection vulnerability in info.php in French National Commission on Informatics and Liberty (aka CNIL) CookieViz before 1.0.1 allows remote web servers to execute arbitrary SQL commands via the domain parameter. | [
{
"commit_message": "[PATCH] Patch vulnerabilities Patch vulnerabilities : CVE-2014-8352 CVE-2014-8351 cookieviz/info.php | 10 ++++++++-- cookieviz/json.php | 8 ++++++-- 2 files changed, 14 insertions(+), 4 deletions(-)",
"patch_text_b64": "RnJvbSA0ODliNjA1MGY2YzUzZmU3YjI0YzRiZWQzZWViOWMyNTU0Mzk2MGUyIE1vbi... | n/a | |
CVE-2015-5307 | The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c. | [
{
"commit_message": "[PATCH] KVM: x86: work around infinite loop in microcode when #AC is delivered It was found that a guest can DoS a host by triggering an infinite stream of \"alignment check\" (#AC) exceptions. This causes the microcode to enter an infinite loop where the core never receives another interr... | n/a | |
GHSA-9pg5-3pjc-f8wm | Path traversal in ginadmin | null | [
{
"commit_message": "[PATCH] fix:issues #8 #9 .../admin/setting/adminSystemController.go | 14 ++++++++-- pkg/utils/filesystem/filesystem.go | 26 +++++++++++++------ web/views/template/setting/systemlog.html | 2 +- 3 files changed, 31 insertions(+), 11 deletions(-)",
"patch_text_b64": "RnJ... | null |
CVE-2019-20422 | In the Linux kernel before 5.3.4, fib6_rule_lookup in net/ipv6/ip6_fib.c mishandles the RT6_LOOKUP_F_DST_NOREF flag in a reference-count decision, leading to (for example) a crash that was identified by syzkaller, aka CID-7b09c2d052db. | [
{
"commit_message": "[PATCH] ipv6: fix a typo in fib6_rule_lookup() Yi Ren reported an issue discovered by syzkaller, and bisected to the cited commit. Many thanks to Yi, this trivial patch does not reflect the patient work that has been done. Fixes: d64a1f574a29 (\"ipv6: honor RT6_LOOKUP_F_DST_NOREF in rule lo... | n/a | |
GHSA-rrvw-82f6-w56j | null | [
{
"commit_message": "[PATCH] CVE-2017-13039/IKEv1: Do more bounds checking. Have ikev1_attrmap_print() and ikev1_attr_print() do full bounds checking, and return null on a bounds overflow. Have their callers check for a null return. This fixes a buffer over-read discovered by Bhargava Shastry, SecT/TU Berlin. ... | null | |
CVE-2023-51697 | Audiobookshelf vulnerable to Blind SSRF in `podcastUtils.js` | Audiobookshelf is a self-hosted audiobook and podcast server. Prior to 2.7.0, Audiobookshelf is vulnerable to unauthenticated blind server-side request (SSRF) vulnerability in `podcastUtils.js`. This vulnerability has been addressed in version 2.7.0. There are no known workarounds for this vulnerability.
| [
{
"commit_message": "[PATCH] Update:API endpoint /podcasts/feed validates rssFeed URL and uses SSRF req filter server/controllers/PodcastController.js | 14 +++++++++++-- server/utils/index.js | 28 +++++++++++++++++++------ server/utils/podcastUtils.js | 28 ++++++++++++++++++++----- ... | CWE-918: Server-Side Request Forgery (SSRF) |
CVE-2024-25122 | Cross-site Scripting sidekiq-unique-jobs UI server vulnerability | sidekiq-unique-jobs is an open source project which prevents simultaneous Sidekiq jobs with the same unique arguments to run. Specially crafted GET request parameters handled by any of the following endpoints of sidekiq-unique-jobs' "admin" web UI, allow a super-user attacker, or an unwitting, but authorized, victim, who has received a disguised / crafted link, to successfully execute malicious code, which could potentially steal cookies, session data, or local storage data from the app the sidekiq-unique-jobs web UI is mounted in. 1. `/changelogs`, 2. `/locks` or 3. `/expiring_locks`. This issue has been addressed in versions 7.1.33 and 8.0.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.
| [
{
"commit_message": "[PATCH] fix(xss): sanitize parameters (#829) lib/sidekiq_unique_jobs/web.rb | 32 ++++++++++++++++---------------- 1 file changed, 16 insertions(+), 16 deletions(-)",
"patch_text_b64": "RnJvbSBlYzNhZmQ5MjBjMWI1NTg0M2M3MmY3NDhhODdiYWFjN2Y4YmU4MmVkIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOi... | CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') |
GHSA-4xcx-cwrq-w792 | Prototype Pollution in NASA Open MCT | null | [
{
"commit_message": "[PATCH] Protect against prototype pollution in import action (#7094) .../ImportFromJSONAction.js | 7 +- .../ImportFromJSONActionSpec.js | 85 ++++++++++++------- .../LocalStorageObjectProvider.js | 4 +- src/plugins/localStorage/pluginSpec.js ... | null |
GHSA-hq58-p9mv-338c | CometBFT's default for `BlockParams.MaxBytes` consensus parameter may increase block times and affect consensus participation | null | [
{
"commit_message": "[PATCH] feat(consensus): additional sanity checks for the size of proposed blocks (backport #1408) (#2140) This is an automatic backport of pull request #1408 done by [Mergify](https://mergify.com). Cherry-pick of 28ad4d2230134045e2f5ce9fdab6673e276f2579 has failed: ``` On branch mergify/bp... | null |
CVE-2018-19052 | An issue was discovered in mod_alias_physical_handler in mod_alias.c in lighttpd before 1.4.50. There is potential ../ path traversal of a single directory above an alias target, with a specific mod_alias configuration where the matched alias lacks a trailing '/' character, but the alias target filesystem path does have a trailing '/' character. | [
{
"commit_message": "[PATCH] [mod_alias] security: potential path traversal with specific configs Security: potential path traversal of a single directory above the alias target with a specific mod_alias config where the alias which is matched does not end in '/', but alias target filesystem path does end in '/... | n/a | |
CVE-2023-28436 | Non-interactive Tailscale SSH sessions on FreeBSD may use the effective group ID of the tailscaled process | Tailscale is software for using Wireguard and multi-factor authentication (MFA). A vulnerability identified in the implementation of Tailscale SSH starting in version 1.34.0 and prior to prior to 1.38.2 in FreeBSD allows commands to be run with a higher privilege group ID than that specified in Tailscale SSH access rules. A difference in the behavior of the FreeBSD `setgroups` system call from POSIX meant that the Tailscale client running on a FreeBSD-based operating system did not appropriately restrict groups on the host when using Tailscale SSH. When accessing a FreeBSD host over Tailscale SSH, the egid of the tailscaled process was used instead of that of the user specified in Tailscale SSH access rules.
Tailscale SSH commands may have been run with a higher privilege group ID than that specified in Tailscale SSH access rules if they met all of the following criteria: the destination node was a FreeBSD device with Tailscale SSH enabled; Tailscale SSH access rules permitted access for non-root users; and a non-interactive SSH session was used.
Affected users should upgrade to version 1.38.2 to remediate the issue.
| [
{
"commit_message": "[PATCH] ssh/tailssh: fix privilege dropping on FreeBSD; add tests On FreeBSD and Darwin, changing a process's supplementary groups with setgroups(2) will also change the egid of the process, setting it to the first entry in the provided list. This is distinct from the behaviour on other pla... | CWE-269: Improper Privilege Management |
GHSA-vx3x-hwph-grvw | YetiForce CRM vulnerable to stored Cross-site Scripting via SlaPolicy module | null | [
{
"commit_message": "[PATCH] Improved SLA Policy elements config/version.php | 2 +- languages/en-US/ServiceContracts.json | 8 - .../ServiceContracts/CustomConditions.tpl | 95 +++++----- .../modules/ServiceContracts/SlaPolicy.tpl | 4 +- .../ServiceContracts/SlaPol... | null |
CVE-2019-1010315 | WavPack 5.1 and earlier is affected by: CWE 369: Divide by Zero. The impact is: Divide by zero can lead to sudden crash of a software/service that tries to parse a .wav file. The component is: ParseDsdiffHeaderConfig (dsdiff.c:282). The attack vector is: Maliciously crafted .wav file. The fixed version is: After commit https://github.com/dbry/WavPack/commit/4c0faba32fddbd0745cbfaf1e1aeb3da5d35b9fc. | [
{
"commit_message": "[PATCH] issue #65: make sure DSDIFF files have a valid channel count cli/dsdiff.c | 10 ++++++++-- 1 file changed, 8 insertions(+), 2 deletions(-)",
"patch_text_b64": "RnJvbSA0YzBmYWJhMzJmZGRiZDA3NDVjYmZhZjFlMWFlYjNkYTVkMzViOWZjIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBEYXZpZCBCcnlhbnQg... | CWE 369: Divide by Zero | |
GHSA-2rhq-96q8-4vjq | LlamaIndex vulnerable to Path Traversal attack through its encode_image function | null | [
{
"commit_message": "[PATCH] ImageDocument path and url checking to ensure that the input is really an image (#18947) * ImageDocument path and url checking to ensure that the input is really an image * Correcting tests to fit new image validation * Adjust test pt2 llama-index-core/llama_index/core/schema.py |... | null |
GHSA-4cwr-57j7-96p4 | null | [
{
"commit_message": "[PATCH] Fix a comment vulnerability allowing scripts to be loaded. Due to the way that comments were loaded in, it was possible to terminate a script and inject a new one while loading the diff viewer. This isn't believed to have been a problem in the wild, but is certainly an important one... | null | |
GHSA-qm57-rv98-r7ch | null | [
{
"commit_message": "[PATCH] Fix another oobread segfault in the NE bin parser ##crash * Reported by @han0nly via huntr.dev * Reproducers: sample1 sample2 sample3 * BountyID: 47422cdf-aad2-4405-a6a1-6f63a3a93200 libr/bin/format/ne/ne.c | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-)",
"patch_text... | null | |
GHSA-2qj6-xmg8-mvxm | null | [
{
"commit_message": "[PATCH] Encode FreeRADIUS config file display output. Fixes #9866 net/pfSense-pkg-freeradius3/Makefile | 2 +- .../files/usr/local/www/freeradius_view_config.php | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-)",
"patch_text_b64": "RnJvbSAzM... | null | |
GHSA-c6jq-h4jp-72pr | Aubio is vulnerable to a NULL pointer dereference in new_aubio_notes function | null | [
{
"commit_message": "[PATCH] [notes] prevent null pointer dereference thanks to @niugx src/notes/notes.c | 4 ++++ 1 file changed, 4 insertions(+)",
"patch_text_b64": "RnJvbSBjNWVlMTMwN2JkYzAwNGU0MzMwMmFiZWNhMTgwMmMyNjkyYjMzYThlIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBQYXVsIEJyb3NzaWVyIDxwaWVtQHBpZW0ub3JnP... | null |
CVE-2021-25917 | In OpenEMR, versions 5.0.2 to 6.0.0 are vulnerable to Stored Cross-Site-Scripting (XSS) due to user input not being validated properly and rendered in the U2F USB Device authentication method page. A highly privileged attacker could inject arbitrary code into input fields when creating a new user. | [
{
"commit_message": "[PATCH] bug fixes (#4280) interface/orders/patient_match_dialog.php | 2 +- interface/patient_file/report/patient_report.php | 2 +- interface/usergroup/mfa_registrations.php | 4 ++-- interface/usergroup/mfa_totp.php | 4 ++-- interface/usergroup/mfa_u2f.php ... | Cross-Site-Scripting | |
GHSA-x3gm-3hr2-8g66 | null | [
{
"commit_message": "[PATCH] (for 4.9.3) VRRP: Add a missing bounds check In vrrp_print(). This fixes a buffer over-read discovered by Konrad Rieck and Bhargava Shastry. Add a test using the capture file supplied by the reporter(s) restricted to VRRP packets. print-vrrp.c | 4 +++- tests/T... | null | |
CVE-2022-3976 | MZ Automation libiec61850 MMS File Services mms_client_files.c path traversal | A vulnerability has been found in MZ Automation libiec61850 up to 1.4 and classified as critical. This vulnerability affects unknown code of the file src/mms/iso_mms/client/mms_client_files.c of the component MMS File Services. The manipulation of the argument filename leads to path traversal. Upgrading to version 1.5 is able to address this issue. The name of the patch is 10622ba36bb3910c151348f1569f039ecdd8786f. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-213556. | [
{
"commit_message": "[PATCH] - fixed path traversal vulnerability in MMS file services (LIB61850-357) hal/filesystem/linux/file_provider_linux.c | 1 - src/mms/inc_private/mms_common_internal.h | 3 ++ src/mms/iso_mms/client/mms_client_files.c | 51 ++++++++++++--------- src/mms/iso_mms/common/mms_common_msg.c... | CWE-22 Path Traversal |
PYSEC-2021-443 | null | [
{
"commit_message": "[PATCH] Validate `MatrixDiagV{2,3}` arguments to prevent breakage. PiperOrigin-RevId: 369056033 Change-Id: Ic2018c297d3dd6f252dc1dd3667f1ed5cb1eaa42 .../core/kernels/linalg/matrix_diag_op.cc | 19 ++++++++++++++++--- 1 file changed, 16 insertions(+), 3 deletions(-)",
"patch_text_b64"... | null | |
GHSA-8h9r-h75m-6w75 | null | [
{
"commit_message": "[PATCH] Fix qpress directory traversal vulnerability (#6) A bad actor user can prepare the payload as: ``` mkdir -p AAAAAAAAA/secure_file_priv_dir touch AAAAAAAAA/secure_file_priv_dir/evil.so qpress -r AAAAAAAAA payload.qp Then edit the payload.qp in a hex editor or sed to replace AAAAAAAAA... | null | |
GHSA-cf3q-gqg7-3fm9 | Envoy crashes when HTTP ext_proc processes local replies | null | [
{
"commit_message": "[PATCH] Fix a bug where local replies were incorrectly sent to the ext_proc (#38818) [CVE-2025-30157](https://github.com/envoyproxy/envoy/security/advisories/GHSA-cf3q-gqg7-3fm9): Fix a bug where local replies were incorrectly sent to the ext_proc server Signed-off-by: Yanjun Xiang <yanjunx... | null |
GHSA-fxrx-5j36-pwg5 | Chakra Scripting Engine RCE via Out-of-bounds write | null | [
{
"commit_message": "[PATCH 01/13] CVE-2019-0990 lib/Backend/InductionVariable.cpp | 34 +++++++++++++++++++++++++++++++ 1 file changed, 34 insertions(+)",
"patch_text_b64": "RnJvbSBlZDZkYjhkYzA1YWIxMWEwZjkwZmRiNmE1YmZiZDViMzhmODE3NTQ2IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBQYXVsIExlYXRoZXJzIDxwbGVhdGhAbW... | null |
CVE-2020-28451 | Command Injection | This affects the package image-tiler before 2.0.2. | [
{
"commit_message": "[PATCH] fix command injection vuln index.js | 30 +++++++++++++++--------------- spec/image-tiler.spec.js | 8 ++++---- 2 files changed, 19 insertions(+), 19 deletions(-)",
"patch_text_b64": "RnJvbSBmNGEwYjEzYTRiZjQzNjU1ZmM0MDEzZTA0YmJjZWFmNzdhZWNiZWI4IE1vbiBTZXAgMTcgMDA6... | Command Injection |
CVE-2024-45595 | D-Tale allows Remote Code Execution through the Query input on Chart Builder | D-Tale is a visualizer for Pandas data structures. Users hosting D-Tale publicly can be vulnerable to remote code execution allowing attackers to run malicious code on the server. Users should upgrade to version 3.14.1 where the "Custom Filter" input is turned off by default. | [
{
"commit_message": "[PATCH] Added check for custom filtering before using custom queries in charts dtale/dash_application/layout/layout.py | 44 ++++++++++++++----------- dtale/views.py | 5 ++- tests/dtale/test_views.py | 2 ++ 3 files changed, 30 insertions(+), 21 deleti... | CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') |
GHSA-fxff-wxxv-c2jc | PyPinkSign uses a non-random or static IV for Cipher Block Chaining (CBC) mode in AES encryption | null | [
{
"commit_message": "[PATCH] chore: Bump cryptography package for OpenSSL patch README.md | 3 +++ setup.py | 2 +- 2 files changed, 4 insertions(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSBlMjNiOGU3ZTFlMzU3YWVjMGJhNmM4YzgxNmRkN2Q0MzdhZWQ2ZDM1IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBTYW5nanVuIEp1bmcgPGJh... | null |
CVE-2024-53271 | HTTP/1.1 multiple issues with envoy.reloadable_features.http1_balsa_delay_reset in envoy | Envoy is a cloud-native high-performance edge/middle/service proxy. In affected versions envoy does not properly handle http 1.1 non-101 1xx responses. This can lead to downstream failures in networked devices. This issue has been addressed in versions 1.31.5 and 1.32.3. Users are advised to upgrade. There are no known workarounds for this issue. | [
{
"commit_message": "[PATCH] [balsa] fix for 1xx response mixup Signed-off-by: Paul Ogilby <pgal@google.com> Signed-off-by: Ryan Northey <ryan@synca.io> changelogs/current.yaml | 4 + source/common/http/http1/balsa_parser.cc | 5 +- source/common/http/http1/balsa_parser.h | 3 +... | CWE-670: Always-Incorrect Control Flow Implementation |
CVE-2021-3811 | Cross-site Scripting (XSS) - Reflected in pi-hole/adminlte | adminlte is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | [
{
"commit_message": "[PATCH] Apply htmlentities in a couple of places to prevent xss Co-authored-by: wtwver <wtwver@users.noreply.github.com> Signed-off-by: Adam Warner <me@adamwarner.co.uk> scripts/pi-hole/php/func.php | 1 + settings.php | 2 +- 2 files changed, 2 insertions(+), 1 deletion(-)",
... | CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') |
CVE-2017-15728 | In phpMyFAQ before 2.9.9, there is Stored Cross-site Scripting (XSS) via metaDescription or metaKeywords. | [
{
"commit_message": "[PATCH] Fixed possible admin XSS attack vector phpmyfaq/admin/configuration.php | 3 ++- phpmyfaq/index.php | 4 ++-- 2 files changed, 4 insertions(+), 3 deletions(-)",
"patch_text_b64": "RnJvbSAyZDJhODViNTllMDU4ODY5ZDdjYmNmZTJkNzNmZWQ0YTI4MmYyZTViIE1vbiBTZXAgMTcgMDA6MDA6MDA... | n/a | |
GHSA-hfgr-4f63-r7p9 | null | [
{
"commit_message": "[PATCH] Remove internal Samba shre mounting code, this had some privilege escalation issues, and is not well tested CMakeLists.txt | 10 +- ChangeLog | 2 + devices/avahi/CMakeLists.txt | 8 - devices/avah... | null | |
CVE-2024-56366 | PhpSpreadsheet vulnerable to unauthorized reflected XSS in the Accounting.php file | PhpSpreadsheet is a PHP library for reading and writing spreadsheet files. Versions prior to 3.7.0, 2.3.5, 2.1.6, and 1.29.7 are vulnerable to unauthorized reflected cross-site scripting in the `Accounting.php` file. Using the `/vendor/phpoffice/phpspreadsheet/samples/Wizards/NumberFormat/Accounting.php` script, an attacker can perform a cross-site scripting attack. Versions 3.7.0, 2.3.5, 2.1.6, and 1.29.7 contain a patch for the issue. | [
{
"commit_message": "[PATCH] Merge commit from fork * Validate Post Item in Convert-Online.php * Correct Samples - Currency, Accounting, and Downloader * Smarter Color Formatting for Currency * Use helper->log Rather than echo in Convert-Online Responding to comment from @PowerKiki about use of echo for error m... | CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') |
GHSA-c9fh-ff5v-mffg | null | [
{
"commit_message": "[PATCH] =?UTF-8?q?Patch=20s=C3=A9rurity?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit setup/data/doorgets.zip | Bin 4672228 -> 4672283 bytes 1 file changed, 0 insertions(+), 0 deletions(-)",
"patch_text_b64": "RnJvbSA2YjgxNTQxZmMxZTVkZDFjNzA... | null | |
CVE-2022-0869 | Multiple Open Redirect in nitely/spirit | Multiple Open Redirect in GitHub repository nitely/spirit prior to 0.12.3. | [
{
"commit_message": "[PATCH] fix unsafe redirect (#308) spirit/admin/views.py | 5 +++-- spirit/comment/flag/views.py | 7 ++++--- spirit/comment/like/views.py | 8 +++++--- spirit/comment/poll/views.py | 13 +++++++------ spirit/comment/views.py | 14 +++++++------- spir... | CWE-601 URL Redirection to Untrusted Site |
CVE-2023-32312 | Client secret not mandatory in UmbracoIdentityExtensions | UmbracoIdentityExtensions is an Umbraco add-on package that enables easy extensibility points for ASP.Net Identity integration. In affected versions client secrets are not required which may expose some endpoints to untrusted actors. Since Umbraco is not a single-page application, the implicit flow is not safe. For traditional MVC applications, it is recommended to use the authorization code flow, which requires the client to authenticate with the authorization server using a client secret. This flow provides better security, as it involves exchanging an authorization code for an access token and/or ID token, rather than directly returning tokens in the URL fragment. This issue has been patched in commit `e792429f9` and a release to Nuget is pending. Users are advised to upgrade when possible. | [
{
"commit_message": "[PATCH 1/2] ClientSecret for Azure AD Auth build/ActiveDirectory.Readme.txt | 5 +++-- src/App_Start/UmbracoADAuthExtensions.cs | 17 ++++++++++++++--- 2 files changed, 17 insertions(+), 5 deletions(-)",
"patch_text_b64": "RnJvbSA4YTI5ZmIzMWFkNjJkZGE1N2QzMTQ1MWMzYjExOGM4Njc4YjM5N... | CWE-200: Exposure of Sensitive Information to an Unauthorized Actor |
CVE-2025-22130 | Soft Serve allows path traversal attacks | Soft Serve is a self-hostable Git server for the command line. Prior to 0.8.2 , a path traversal attack allows existing non-admin users to access and take over other user's repositories. A malicious user then can modify, delete, and arbitrarily repositories as if they were an admin user without explicitly giving them permissions. This is patched in v0.8.2. | [
{
"commit_message": "[PATCH] fix: prevent path traversal attacks (#631) This commit fixes a path traversal vulnerability in the repository management code. The `SanitizeRepo` function now correctly returns a sanitized version of the given repository name. It uses an absolute path along with `path.Clean` to ensu... | CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') |
GHSA-29m8-wh9p-5wc4 | Apache Kylin Code Injection via JDBC Configuration Alteration | null | [
{
"commit_message": "[PATCH] KYLIN-5994 Fix JDBC source config validation src/common-service/pom.xml | 4 + .../kylin/rest/service/ProjectService.java | 9 +- .../CommonJdbcSourceConnectionValidator.java | 87 ++++++++++++++++++ ...mmonJdbcSourceConnectionValidatorTest.java | 65 ++++++++++... | null |
CVE-2021-3801 | Inefficient Regular Expression Complexity in prismjs/prism | prism is vulnerable to Inefficient Regular Expression Complexity | [
{
"commit_message": "[PATCH] Markup: Fixed ReDoS (#3078) components/prism-markup.js | 2 +- components/prism-markup.min.js | 2 +- prism.js | 2 +- 3 files changed, 3 insertions(+), 3 deletions(-)",
"patch_text_b64": "RnJvbSAwZmYzNzFiYjQ3NzVhMTMxNjM0ZjQ3ZDBmZTg1Nzk0YzU0NzIzMmY5IE1vbiB... | CWE-1333 Inefficient Regular Expression Complexity |
CVE-2016-10928 | The onelogin-saml-sso plugin before 2.2.0 for WordPress has a hardcoded @@@nopass@@@ password for just-in-time provisioned users. | [
{
"commit_message": "[PATCH] Generate random password for provisioned users onelogin-saml-sso/php/functions.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSBmYmU4MDhlMmZkOGZkZThjYjdlNmJmMzY1YzUzMzRiNTcwMjI2MmRhIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBTaXh0byBNYXJ0aW4gPH... | n/a | |
GHSA-74rg-6f92-g6wx | UnoPim has CSV Injection on Quick Export feature | null | [
{
"commit_message": "[PATCH] fix: escape formula operators when exporting to CSV/XLSX files .../Helpers/Exporters/Category/Exporter.php | 3 ++ .../Helpers/Exporters/Product/Exporter.php | 3 +- .../Formatters/EscapeFormulaOperators.php | 50 +++++++++++++++++++ .../Helpers/Importers/Category/Importer.p... | null |
GHSA-wxcg-59h3-c62v | null | [
{
"commit_message": "[PATCH] fix:fix xss #113 Signed-off-by: snow <> admin/globals.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSAzZjg5NjEwZjcyMTEyMGRlZDNmZjQ5MWNiOWNkOTlkOTkyN2M3NTgyIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBzbm93IDw+CkRhdGU6IFdlZCwgMTcgTm92IDIwMjEgMTU... | null | |
CVE-2016-4804 | The read_boot function in boot.c in dosfstools before 4.0 allows attackers to cause a denial of service (crash) via a crafted filesystem, which triggers a heap-based buffer overflow in the (1) read_fat function or an out-of-bounds heap read in (2) get_fat function. | [
{
"commit_message": "[PATCH] read_boot(): Handle excessive FAT size specifications MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit The variable used for storing the FAT size (in bytes) was an unsigned int. Since the size in sectors read from the BPB was not sufficiently... | n/a | |
CVE-2023-0266 | Use after free in SNDRV_CTL_IOCTL_ELEM in Linux Kernel | A use after free vulnerability exists in the ALSA PCM package in the Linux Kernel. SNDRV_CTL_IOCTL_ELEM_{READ|WRITE}32 is missing locks that can be used in a use-after-free that can result in a priviledge escalation to gain ring0 access from the system user. We recommend upgrading past commit 56b88b50565cd8b946a2d00b0c83927b7ebb055e | [
{
"commit_message": "[PATCH] ALSA: control: code refactoring for ELEM_READ/ELEM_WRITE operations ALSA control core handles ELEM_READ/ELEM_WRITE requests within lock acquisition of a counting semaphore. The lock is acquired in helper functions in the end of call path before calling implementations of each driver... | CWE-416 Use After Free |
GHSA-54xq-cgqr-rpm3 | sharp vulnerability in libwebp dependency CVE-2023-4863 | null | [
{
"commit_message": "[PATCH] Upgrade to libvips v8.14.5 docs/changelog.md | 4 +++- package.json | 24 ++++++++++++------------ src/common.h | 4 ++-- 3 files changed, 17 insertions(+), 15 deletions(-)",
"patch_text_b64": "RnJvbSBkYmNlNmZhYjc5NWNhNDI1MGJkYTliMWVmNTAyYzFmZGI3ZDRhMzBjIE1vbiBTZXAgMTcg... | null |
GHSA-4jwc-w2hc-78qv | Tonic has remotely exploitable denial of service vulnerability | null | [
{
"commit_message": "[PATCH] server: ignore more error kinds in incoming socket stream (#1885) tonic/src/transport/server/incoming.rs | 8 +++++++- 1 file changed, 7 insertions(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSBhNDQ3MmE4NmYzMjkwZTYwYzdjMDEzNDhiN2U2YTgxNjRkNmU3ZTQ4IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwM... | null |
GHSA-66pp-5p9w-q87j | Shescape has potential environment variable exposure on Windows with CMD | null | [
{
"commit_message": "[PATCH] Correct escaping of `%` escaping for CMD (#1916) Fix escaping of `%` for CMD (covering both the escape and qoute APIs) and at the same time simplify the logic. This removes the bit-flipping based on double quotes (`\"`) and instead just escapes the double quotes. This handles the bu... | null |
CVE-2013-1798 | The ioapic_read_indirect function in virt/kvm/ioapic.c in the Linux kernel through 3.8.4 does not properly handle a certain combination of invalid IOAPIC_REG_SELECT and IOAPIC_REG_WINDOW operations, which allows guest OS users to obtain sensitive information from host OS memory or cause a denial of service (host OS OOPS) via a crafted application. | [
{
"commit_message": "[PATCH] KVM: Fix bounds checking in ioapic indirect register reads (CVE-2013-1798) If the guest specifies a IOAPIC_REG_SELECT with an invalid value and follows that with a read of the IOAPIC_REG_WINDOW KVM does not properly validate that request. ioapic_read_indirect contains an ASSERT(red... | n/a | |
CVE-2021-3853 | Cross-site Scripting (XSS) - Stored in chaskiq/chaskiq | chaskiq is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | [
{
"commit_message": "[PATCH] add escape html to htmlContent on conversation list .../packages/components/src/utils/htmlSanitize.ts | 7 +++++++ app/javascript/src/pages/conversations/ItemList.tsx | 6 ++++-- 2 files changed, 11 insertions(+), 2 deletions(-)",
"patch_text_b64": "RnJvbSA1MTc2OGI... | CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') |
GHSA-6293-2vg2-pmp5 | Insufficient Session Expiration in NocoDB | null | [
{
"commit_message": "[PATCH 1/7] script: add nc_017_add_user_token_exp_column .../src/lib/migrations/XcMigrationSourcev2.ts | 6 ++- .../v2/nc_017_add_user_token_exp_column.ts | 37 +++++++++++++++++++ 2 files changed, 42 insertions(+), 1 deletion(-) create mode 100644 packages/nocodb/src/lib/migrations/v2/nc... | null |
GHSA-x3v3-8xg8-8v72 | Sentry's Astro SDK vulnerable to ReDoS | null | [
{
"commit_message": "[PATCH] fix(astro): Avoid RegExp creation during route interpolation (#9815) - iterate over route segments to replace parameter values - decode raw url to match previously unmatched param values - prioritize multi-segment [rest parameters](https://docs.astro.build/en/core-concepts/routing/#... | null |
GHSA-hgh7-wggh-fw3g | null | [
{
"commit_message": "[PATCH] Hardening: Add escaping to the language attributes used on `html` elements. Built from https://develop.svn.wordpress.org/trunk@42259 git-svn-id: http://core.svn.wordpress.org/trunk@42088 1a063a9b-81f0-0310-95a4-ce76da25c4cd wp-includes/general-template.php | 12 +++++++----- wp-inclu... | null | |
CVE-2023-2881 | Storing Passwords in a Recoverable Format in pimcore/customer-data-framework | Storing Passwords in a Recoverable Format in GitHub repository pimcore/customer-data-framework prior to 3.3.10. | [
{
"commit_message": "[PATCH] Remove password field from detals view (#469) * Remove password field from customer details * Apply php-cs-fixer changes * Update src/CustomerView/DefaultCustomerView.php Co-authored-by: Divesh Pahuja <divesh.pahuja@pimcore.com> Co-authored-by: aryaantony92 <aryaantony92@users.norep... | CWE-257 Storing Passwords in a Recoverable Format |
GHSA-f865-m6cq-j9vx | ReDOS in Mpmath | null | [
{
"commit_message": "[PATCH 1/2] Fix ReDOS vulnerability Fixes #548, with the workaround suggested by @yetingli. mpmath/ctx_mp.py | 4 ++-- mpmath/tests/test_convert.py | 10 ++++++++++ 2 files changed, 12 insertions(+), 2 deletions(-)",
"patch_text_b64": "RnJvbSBjODExYjM3YzY1YTQzNzJhN2NlNjEzMTEx... | null |
GHSA-xv83-x443-7rmw | HTML injection in search results via plaintext message highlighting | null | [
{
"commit_message": "[PATCH] Merge pull request from GHSA-xv83-x443-7rmw * Escape HTML for plaintext search results * Add tests src/HtmlUtils.tsx | 11 ++-- .../views/rooms/SearchResultTile.tsx | 2 +- test/HtmlUtils-test.tsx | 51 +++++++++++++++++-- 3 f... | null |
PYSEC-2021-382 | null | [
{
"commit_message": "[PATCH] CVE-2021-41146: Add --untrusted-args to avoid argument injection On Windows, if an application is registered as an URL handler like this: HKEY_CLASSES_ROOT https URL Protocol = \"\" [...] shell open command (Default) = \".../qutebrowser.exe\" \"%1\" one would think that Windows take... | null | |
GHSA-mpq5-cp4r-6mmw | null | [
{
"commit_message": "[PATCH] X3F: check for data offset limit src/x3f/x3f_utils_patched.cpp | 2 ++ 1 file changed, 2 insertions(+)",
"patch_text_b64": "RnJvbSBkNzVhZjAwNjgxYTc0ZGNjOGI5MjkyMDdlYjg5NTYxMWE2ZWNlYjY4IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBBbGV4IFR1dHViYWxpbiA8bGV4YUBsZXhhLnJ1PgpEYXRlOiBTYXQs... | null | |
GHSA-fr7x-fw4f-wmvr | null | [
{
"commit_message": "[PATCH] tjLoadImage(): Fix FPE triggered by malformed BMP In rdbmp.c, it is necessary to guard against 32-bit overflow/wraparound when allocating the row buffer, because since BMP files have 32-bit width and height fields, the value of biWidth can be up to 4294967295. Specifically, if biWid... | null | |
GHSA-32fq-m2q5-h83g | XWiki-Platform vulnerable to stored Cross-site Scripting via the HTML displayer in Live Data | null | [
{
"commit_message": "[PATCH] XWIKI-20143: Improved Live Data escaping Add missing components in LiveDataMacroComponentList. .../livedata/internal/macro/LiveDataMacroComponentList.java | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSAyM2Q1ZWE5YjIzZTg0YjVmM2QxZjFiMmQ1NjczZ... | null |
CVE-2022-23948 | A flaw was found in Keylime before 6.3.0. The logic in the Keylime agent for checking for a secure mount can be fooled by previously created unprivileged mounts allowing secrets to be leaked to other processes on the host. | [
{
"commit_message": "[PATCH] secure_mount: use /proc/self/mountinfo The function `check_mounted()` is parsing the output of the `mount` command. This command can have an unknown number of spaces, that can break the parsing logic (and produces security issues) This commit take the mount information data from `/... | CWE-200 | |
CVE-2014-125107 | Corveda PHPSandbox String protection mechanism | A vulnerability was found in Corveda PHPSandbox 1.3.4 and classified as critical. Affected by this issue is some unknown functionality of the component String Handler. The manipulation leads to protection mechanism failure. The attack may be launched remotely. Upgrading to version 1.3.5 is able to address this issue. The patch is identified as 48fde5ffa4d76014bad260a3cbab7ada3744a4cc. It is recommended to upgrade the affected component. VDB-248270 is the identifier assigned to this vulnerability. | [
{
"commit_message": "[PATCH] - Addressed potential vulnerabilities related to SandboxedStrings where sandboxed code could manipulate the strings in a way that could defeat their protection - Solved errors from casting sandboxed strings to int - Overwrote some internal PHP functions to further mask SandboxedStri... | CWE-693 Protection Mechanism Failure |
CVE-2019-20628 | An issue was discovered in libgpac.a in GPAC before 0.8.0, as demonstrated by MP4Box. It contains a Use-After-Free vulnerability in gf_m2ts_process_pmt in media_tools/mpegts.c that can cause a denial of service via a crafted MP4 file. | [
{
"commit_message": "[PATCH] fixed potential crash on PMT IOD parse - cf #1268 #1269 src/media_tools/mpegts.c | 35 +++++++++++++++++++++-------------- 1 file changed, 21 insertions(+), 14 deletions(-)",
"patch_text_b64": "RnJvbSAxYWI0ODYwNjA5ZjJlN2EzNTYzNDkzMDU3MWU3ZDA1MzEyOTdlMDkwIE1vbiBTZXAgMTcgMDA6MDA6MD... | n/a | |
CVE-2022-34133 | Benjamin BALET Jorani v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the Comment parameter at application/controllers/Leaves.php. | [
{
"commit_message": "[PATCH] BF:Persistent XSS fix #369 application/controllers/Leaves.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSAzZDAxY2VmNGVlOWNkZDcwY2ZlMWFjNGZkN2Y1ZDYwN2RkYTBkMGNhIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBCZW5qYW1pbiBCQUxFVCA8YmVuamFtaW4uYmFsZXR... | n/a | |
GHSA-c655-qv2v-73rm | null | [
{
"commit_message": "[PATCH] avcodec/speexdec: further check for sane frame_size values Prevent potential integer overflows. Signed-off-by: James Almer <jamrial@gmail.com> libavcodec/speexdec.c | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-)",
"patch_text_b64": "RnJvbSAwODk1ZWYwZDZkNjQwNmVlNmNkMTU... | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.