id
stringlengths
12
19
title
stringlengths
0
237
description
stringlengths
35
3.87k
patches
listlengths
1
22
cwe
stringlengths
2
440
GHSA-45cf-8gr9-j528
null
[ { "commit_message": "[PATCH] [ots] Fix (potential) use-after-free bugs MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Make sure we don’t try to access the table after deleting it. Not all the changed files are affected, but I changed them all for the sake of consistenc...
null
GHSA-6gm7-j668-w6h9
SQL Injection in Pimcore
null
[ { "commit_message": "[PATCH] [Recyclebin] Quote condition filter bundles/AdminBundle/Controller/Admin/RecyclebinController.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBhNjk3ODMwMzU5ZGYwNjI0NmFjY2E1MDJlZTI0NTU2MTRkZTY4MDE3IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBkcGF...
null
CVE-2021-3736
A flaw was found in the Linux kernel. A memory leak problem was found in mbochs_ioctl in samples/vfio-mdev/mbochs.c in Virtual Function I/O (VFIO) Mediated devices. This flaw could allow a local attacker to leak internal kernel information.
[ { "commit_message": "[PATCH] vfio/mbochs: Fix missing error unwind of mbochs_used_mbytes Convert mbochs to use an atomic scheme for this like mtty was changed into. The atomic fixes various race conditions with probing. Add the missing error unwind. Also add the missing kfree of mdev_state->pages. Fixes: 681c16...
CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
GHSA-8r4m-5p6p-52rp
Arbitrary file read via SQL injection
null
[ { "commit_message": "[PATCH 1/2] Fix arbitrary file ready through sql manager classes/RequestSql.php | 11 ++++++++++- src/Adapter/SqlManager/SqlQueryValidator.php | 8 ++++++++ 2 files changed, 18 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAwNDlhMzY0NTc5NTVmZmI2ZDNiNGRmNmE...
null
GHSA-wm93-f238-7v37
Integer overflow in Tensorflow
null
[ { "commit_message": "[PATCH] Prevent integer overflow in `OpLevelCostEstimator::CalculateOutputSize`. In order to not change the API, we return a negative value in case of overflow. A better fix is to change the API to return a status instead. PiperOrigin-RevId: 408701427 Change-Id: Idf31e7f0bf18ca824d084fdd355...
null
GHSA-cwpm-f78v-7m5c
Denial of service in `tf.ragged.constant` due to lack of validation
null
[ { "commit_message": "[PATCH] Prevent denial of service in `tf.ragged.constant` Fixes #55199 PiperOrigin-RevId: 442029525 tensorflow/python/ops/ragged/ragged_factory_ops.py | 3 +++ 1 file changed, 3 insertions(+)", "patch_text_b64": "RnJvbSBiZDRkNTU4M2ZmOWM4ZGYyNmQ0N2EyM2U1MDgyMDg4NDQyOTczMTBlIE1vbiBTZXAgMTc...
null
GHSA-xrh7-m5pp-39r6
XSS Attack with Express API
null
[ { "commit_message": "[PATCH] Don't use data object for Eta configuration (#214) deno_dist/file-handlers.ts | 42 +++++++------------------------------- src/file-handlers.ts | 42 +++++++------------------------------- test/file-handlers.spec.ts | 26 ++++------------------- 3 files changed, 18 insertions(+),...
null
GHSA-fj2x-735w-74vq
gnark-crypto allows unchecked memory allocation during vector deserialization
null
[ { "commit_message": "[PATCH] perf: limit memory allocation during Vector deserialization (#759) ecc/bls12-377/fp/vector.go | 154 +++++++++--- ecc/bls12-377/fp/vector_test.go | 224 ++++++++++++++++- ecc/bls12-377/fr/vector.go | 154 +++++++++--- ecc/bls12-377/fr...
null
CVE-2022-1886
Heap-based Buffer Overflow in vim/vim
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.
[ { "commit_message": "[PATCH] patch 8.2.5016: access before start of text with a put command Problem: Access before start of text with a put command. Solution: Check the length is more than zero. src/register.c | 7 +++++-- src/testdir/test_put.vim | 9 +++++++++ src/version.c | 2 ++ 3 fi...
CWE-122 Heap-based Buffer Overflow
GHSA-r8r8-9qg3-423r
null
[ { "commit_message": "[PATCH] Prevent Cross-Site Request Forgery edit.php | 1 + export.php | 1 + import.php | 1 + includes/common.inc.php | 18 ++++++++++++++++++ login.php | 1 + rename.php | 1 + ttl.php | 1 + 7 files change...
null
GHSA-23cm-x6j7-6hq3
matrix-js-sdk can be tricked into disclosing E2EE room keys to a participating homeserver
null
[ { "commit_message": "[PATCH] Verify target device key on reshare src/crypto/algorithms/megolm.ts | 38 +++++++++++++++++++++++++-------- 1 file changed, 29 insertions(+), 9 deletions(-)", "patch_text_b64": "RnJvbSA4OTRjMjQ4ODBkYTBlMWNjODE4MThmNTFjMGRiODBlM2M5ZmIyYmU5IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOi...
null
CVE-2020-7788
Prototype Pollution
This affects the package ini before 1.3.6. If an attacker submits a malicious INI file to an application that parses it with ini.parse, they will pollute the prototype on the application. This can be exploited further depending on the context.
[ { "commit_message": "[PATCH] do not allow invalid hazardous string as section name ini.js | 8 ++++++++ test/proto.js | 45 +++++++++++++++++++++++++++++++++++++++++++++ 2 files changed, 53 insertions(+) create mode 100644 test/proto.js", "patch_text_b64": "RnJvbSA1NmQyODA1ZTA3Y2NkOTRlMmJhMDk4NGFjOTI0...
Prototype Pollution
GHSA-mx8q-gfm8-hjx3
null
[ { "commit_message": "[PATCH] Bluetooth: bnep: fix buffer overflow Struct ca is copied from userspace. It is not checked whether the \"device\" field is NULL terminated. This potentially leads to BUG() inside of alloc_netdev_mqs() and/or information leak by creating a device with a name made of contents of ker...
null
CVE-2024-45296
path-to-regexp outputs backtracking regular expressions
path-to-regexp turns path strings into a regular expressions. In certain cases, path-to-regexp will output a regular expression that can be exploited to cause poor performance. Because JavaScript is single threaded and regex matching runs on the main thread, poor performance will block the event loop and lead to a DoS. The bad regular expression is generated any time you have two parameters within a single segment, separated by something that is not a period (.). For users of 0.1, upgrade to 0.1.10. All other users should upgrade to 8.0.0.
[ { "commit_message": "[PATCH] Add backtrack protection to parameters index.js | 90 ++++++++++++++++++++++++++++++++------------------------ test.js | 40 ++++++++++++++++++++++++- 2 files changed, 90 insertions(+), 40 deletions(-)", "patch_text_b64": "RnJvbSAyOWI5NmI0YTFkZTUyODI0ZTFjYTBmNDlhNzAxMTgzY2M0ZWQ0N...
CWE-1333: Inefficient Regular Expression Complexity
CVE-2023-46575
A SQL injection vulnerability exists in Meshery prior to version v0.6.179, enabling a remote attacker to retrieve sensitive information and execute arbitrary code through the “order” parameter
[ { "commit_message": "[PATCH] ## Add \"order by\" parameter filter ## and export SanitizeOrderInput function Signed-off-by: phant0ms <ph1nt0ms@gmail.com> server/handlers/database_handlers.go | 1 + server/models/meshery_application_persister.go | 2 +- server/models/meshery_filter_persister.go | 4 +...
n/a
CVE-2015-0917
Cross-site scripting (XSS) vulnerability in the backend in Kajona before 4.6.3 allows remote attackers to inject arbitrary web script or HTML via the action parameter to index.php.
[ { "commit_message": "[PATCH] BUG: / SECURITY: Fixed a possible xss injection when handling non-existent action-names. fixes SROEADV-2015-01. module_system/admin/class_admin_controller.php | 7 +++---- module_system/system/class_abstract_controller.php | 8 ++++---- 2 files changed, 7 insertions(+), 8 deletion...
n/a
CVE-2022-24739
Server-Side Request Forgery (SSRF) and URL Redirection to Untrusted Site ('Open Redirect') in alltube
alltube is an html front end for youtube-dl. On releases prior to 3.0.3, an attacker could craft a special HTML page to trigger either an open redirect attack or a Server-Side Request Forgery attack (depending on how AllTube is configured). The impact is mitigated by the fact the SSRF attack is only possible when the `stream` option is enabled in the configuration. (This option is disabled by default.) 3.0.3 contains a fix for this vulnerability.
[ { "commit_message": "[PATCH] Prevent SSRF requests By validating the provided URL before passing it to youtube-dl classes/Controller/BaseController.php | 21 +- classes/Controller/DownloadController.php | 74 +- classes/Controller/FrontController.php | 22 +- classes/Controller/JsonController.php | ...
CWE-601: URL Redirection to Untrusted Site ('Open Redirect')
GHSA-69g3-qvqf-82hh
null
[ { "commit_message": "[PATCH] ipv6: make fragment identifications less predictable IPv6 fragment identification generation is way beyond what we use for IPv4 : It uses a single generator. Its not scalable and allows DOS attacks. Now inetpeer is IPv6 aware, we can use it to provide a more secure and scalable frag...
null
GHSA-8vwv-2v7v-jmgr
Horizon-Orchestration Cross-site scripting (XSS) vulnerability through resource name
null
[ { "commit_message": "[PATCH] Fix multiple Cross-Site Scripting (XSS) vulnerabilities * Ensure user emails are properly escaped User emails in the Users and Groups panel are being passed through the urlize filter to transform them into clickable links. However, urlize expects input to be already escaped and safe...
null
CVE-2020-36621
chedabob whatismyudid mobileconfig.js exports.enrollment cross site scripting
A vulnerability, which was classified as problematic, has been found in chedabob whatismyudid. Affected by this issue is the function exports.enrollment of the file routes/mobileconfig.js. The manipulation leads to cross site scripting. The attack may be launched remotely. The name of the patch is bb33d4325fba80e7ea68b79121dba025caf6f45f. It is recommended to apply a patch to fix this issue. VDB-216470 is the identifier assigned to this vulnerability.
[ { "commit_message": "[PATCH] fix: set cookie securely, and prevent XSS in the `/enrollment` route app.js | 1 - routes/mobileconfig.js | 28 ++++++++++++++++++++++------ 2 files changed, 22 insertions(+), 7 deletions(-)", "patch_text_b64": "RnJvbSBiYjMzZDQzMjVmYmE4MGU3ZWE2OGI3OTEyMWRiYTAyNWNh...
CWE-707 Improper Neutralization -> CWE-74 Injection -> CWE-79 Cross Site Scripting
CVE-2010-10006
michaelliao jopenid OpenIdManager.java getAuthentication timing discrepancy
A vulnerability, which was classified as problematic, was found in michaelliao jopenid. Affected is the function getAuthentication of the file JOpenId/src/org/expressme/openid/OpenIdManager.java. The manipulation leads to observable timing discrepancy. The complexity of an attack is rather high. The exploitability is told to be difficult. Upgrading to version 1.08 is able to address this issue. The name of the patch is c9baaa976b684637f0d5a50268e91846a7a719ab. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-218460.
[ { "commit_message": "[PATCH] fix timing vulnerability. .../src/org/expressme/openid/OpenIdManager.java | 16 ++++++++++++++-- 1 file changed, 14 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSBjOWJhYWE5NzZiNjg0NjM3ZjBkNWE1MDI2OGU5MTg0NmE3YTcxOWFiIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBhc2t4dWVm...
CWE-208 Observable Timing Discrepancy
GHSA-jf6m-r534-hj93
null
[ { "commit_message": "[PATCH] refactoring for security (www.ackcent.com) lib/functions/testPlanUrgency.class.php | 14 ++++----- lib/plan/planUrgency.php | 38 +++++++++---------------- 2 files changed, 20 insertions(+), 32 deletions(-)", "patch_text_b64": "RnJvbSA1OGYzY2MwM2Q1ZjgxY2Q1Y2MyYWQ4Yz...
null
GHSA-rfqq-wq6w-72jm
MLflow has a Local File Read/Path Traversal bypass
null
[ { "commit_message": "[PATCH] Fix Local File Read/Path Traversal bypass (#11376) Signed-off-by: Weichen Xu <weichen.xu@databricks.com> mlflow/server/handlers.py | 15 +++++++++++---- tests/server/test_handlers.py | 35 +++++++++++++++++++++++++++++++++++ 2 files changed, 46 insertions(+), 4 deletions(-)", ...
null
GHSA-8v8w-v8xg-79rf
tj-actions/branch-names's Improper Sanitization of Branch Name Leads to Arbitrary Code Injection
null
[ { "commit_message": "[PATCH 1/4] security: prevent arbitrary code injection via untrusted inputs action.yml | 56 ++++++++++++++++++++++++++++++++++++------------------ 1 file changed, 37 insertions(+), 19 deletions(-)", "patch_text_b64": "RnJvbSA3M2I1ZTA1Yzg1NTFiMGVhMThlOTFmN2FlOGFjZDM4Y2U1ZWE0ZWRlIE1vbiBTZ...
null
CVE-2022-31101
SQL Injection in prestashop/blockwishlist
prestashop/blockwishlist is a prestashop extension which adds a block containing the customer's wishlists. In affected versions an authenticated customer can perform SQL injection. This issue is fixed in version 2.1.1. Users are advised to upgrade. There are no known workarounds for this issue.
[ { "commit_message": "[PATCH] Validate order by and order way src/Search/WishListProductSearchProvider.php | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBiZTc5NTE2MTc1ZDU2NGY2MGE2NTc2Mjc0ODJiMGE2MGMzZGEzNTNlIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBUaG9tYXMgQkFDQ0VMTEk...
CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2016-3136
The mct_u232_msr_to_state function in drivers/usb/serial/mct_u232.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted USB device without two interrupt-in endpoint descriptors.
[ { "commit_message": "[PATCH] USB: mct_u232: add sanity checking in probe An attack using the lack of sanity checking in probe is known. This patch checks for the existence of a second port. CVE-2016-3136 Signed-off-by: Oliver Neukum <ONeukum@suse.com> CC: stable@vger.kernel.org [johan: add error message ] Signe...
n/a
PYSEC-2022-229
null
[ { "commit_message": "[PATCH 1/4] sanitize flagging inputs before writing to csv Former-commit-id: f2d9f808c79abec7f2c8ff4a94b17a9b1cdd5651 gradio/flagging.py | 22 +++++++++++----------- gradio/utils.py | 35 ++++++++++++++++++++++++++++++++++- test/test_utils.py | 20 ++++++++++++++++++++ 3 files changed, 65 i...
null
GHSA-hhqm-f4m4-pq39
RaspAP raspap-webgui Command Injection vulnerability
null
[ { "commit_message": "[PATCH 1/2] Sanitize input with escapeshellarg() includes/hostapd.php | 18 +++++++++--------- 1 file changed, 9 insertions(+), 9 deletions(-)", "patch_text_b64": "RnJvbSAxZTUyZmY1OThiMDIzNjc5MTE5ZDUwYTMwMDNjY2RlYmQzNmZiNWY0IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBiaWxseiA8YmlsbHppbW1l...
null
GHSA-46xp-26xh-hpqh
KubeVirt Vulnerable to Arbitrary Host File Read and Write
null
[ { "commit_message": "[PATCH 1/2] host-path: only chown files we created Signed-off-by: Jed Lejosne <jed@redhat.com> pkg/ephemeral-disk-utils/utils.go | 19 +++++++++++++++++-- pkg/host-disk/host-disk.go | 14 +++++++------- pkg/host-disk/host-disk_test.go | 17 +++++++++++------ 3 files changed, 35 insert...
null
GHSA-vpg4-mfvr-xc5c
null
[ { "commit_message": "[PATCH] fix #58 : access to invalid address by reg->dmin value src/regexec.c | 2 ++ 1 file changed, 2 insertions(+)", "patch_text_b64": "RnJvbSA5NjkwZDNhYjFmOWJjZDJkYjhjYmUxZmUzZWU0YTVkYTYwNmI4ODE0IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiAiSy5Lb3Nha28iIDxrb3Nha29Ac29mbmVjLmNvLmpwPgpEYX...
null
CVE-2017-20006
UnRAR 5.6.1.2 and 5.6.1.3 has a heap-based buffer overflow in Unpack::CopyString (called from Unpack::Unpack5 and CmdExtract::ExtractCurrentFile).
[ { "commit_message": "[PATCH] 5.6.1.4: Use in-memory archive instead of file IO arccmt.cpp | 2 +- archive.cpp | 75 +++++++++++++++++++++++++++++++++++++++++++----- archive.hpp | 9 +++++- arcmem.cpp | 62 +++++++++++++++++++++++++++++++++++++++ arcmem.hpp | 22 ++++++++++++++ arcread.c...
n/a
GHSA-3c7w-rm52-555g
null
[ { "commit_message": "[PATCH] acpi: Disable APEI error injection if securelevel is set ACPI provides an error injection mechanism, EINJ, for debugging and testing the ACPI Platform Error Interface (APEI) and other RAS features. If supported by the firmware, ACPI specification 5.0 and later provide for a way to s...
null
GHSA-9p56-p6mw-w8qc
Jenkins has a Denial of service vulnerability in HTTP-based CLI
null
[ { "commit_message": "[PATCH] [SECURITY-3630] .../java/hudson/cli/PlainCLIProtocol.java | 3 +- core/src/main/java/hudson/cli/CLIAction.java | 13 +- .../jenkins/util/FullDuplexHttpService.java | 11 +- .../java/hudson/cli/Security3630Test.java | 135 ++++++++++++++++++ 4 files changed, 154 insertions...
null
GHSA-3pq8-q8mf-9rph
null
[ { "commit_message": "[PATCH] fixed potential crash in TS - cf #1264 src/media_tools/mpegts.c | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-)", "patch_text_b64": "RnJvbSAyMzIwZWI3M2FmYmE3NTNiMzliNzE0N2JlOTFmN2JlN2FmYzBlZWI3IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBqZWFubGYgPGplYW5sZkB1c2...
null
GHSA-9hmj-m2q2-x92g
null
[ { "commit_message": "[PATCH] Fix update session when auth fail src/webservice.c | 4 ---- 1 file changed, 4 deletions(-)", "patch_text_b64": "RnJvbSAxMjUyODFmMWMwZDRiNmE4YjQ5ZjdlNTVhNzU3MjA1YTJlZjAxZmJlIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBiYWJlbG91ZXN0IDxnaXRodWJAYmFiZWxvdWVzdC5vcmc+CkRhdGU6IFdlZCwgMTU...
null
GHSA-43j2-r4v3-m8jp
Secrets are not masked by Jenkins Credentials Binding Plugin in builds without build steps
null
[ { "commit_message": "[PATCH] [SECURITY-1374] .../impl/SecretBuildWrapper.java | 2 +- .../impl/SecretBuildWrapperTest.java | 48 +++++++++++++++++++ 2 files changed, 49 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA1OWVhZDExYmNiM2ZkMTMyMjU4ZDFkN2RhNGEzNGQ0Nzc1MGY0MGQyIE1vbiBT...
null
CVE-2014-8351
SQL injection vulnerability in info.php in French National Commission on Informatics and Liberty (aka CNIL) CookieViz before 1.0.1 allows remote web servers to execute arbitrary SQL commands via the domain parameter.
[ { "commit_message": "[PATCH] Patch vulnerabilities Patch vulnerabilities : CVE-2014-8352 CVE-2014-8351 cookieviz/info.php | 10 ++++++++-- cookieviz/json.php | 8 ++++++-- 2 files changed, 14 insertions(+), 4 deletions(-)", "patch_text_b64": "RnJvbSA0ODliNjA1MGY2YzUzZmU3YjI0YzRiZWQzZWViOWMyNTU0Mzk2MGUyIE1vbi...
n/a
CVE-2015-5307
The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c.
[ { "commit_message": "[PATCH] KVM: x86: work around infinite loop in microcode when #AC is delivered It was found that a guest can DoS a host by triggering an infinite stream of \"alignment check\" (#AC) exceptions. This causes the microcode to enter an infinite loop where the core never receives another interr...
n/a
GHSA-9pg5-3pjc-f8wm
Path traversal in ginadmin
null
[ { "commit_message": "[PATCH] fix:issues #8 #9 .../admin/setting/adminSystemController.go | 14 ++++++++-- pkg/utils/filesystem/filesystem.go | 26 +++++++++++++------ web/views/template/setting/systemlog.html | 2 +- 3 files changed, 31 insertions(+), 11 deletions(-)", "patch_text_b64": "RnJ...
null
CVE-2019-20422
In the Linux kernel before 5.3.4, fib6_rule_lookup in net/ipv6/ip6_fib.c mishandles the RT6_LOOKUP_F_DST_NOREF flag in a reference-count decision, leading to (for example) a crash that was identified by syzkaller, aka CID-7b09c2d052db.
[ { "commit_message": "[PATCH] ipv6: fix a typo in fib6_rule_lookup() Yi Ren reported an issue discovered by syzkaller, and bisected to the cited commit. Many thanks to Yi, this trivial patch does not reflect the patient work that has been done. Fixes: d64a1f574a29 (\"ipv6: honor RT6_LOOKUP_F_DST_NOREF in rule lo...
n/a
GHSA-rrvw-82f6-w56j
null
[ { "commit_message": "[PATCH] CVE-2017-13039/IKEv1: Do more bounds checking. Have ikev1_attrmap_print() and ikev1_attr_print() do full bounds checking, and return null on a bounds overflow. Have their callers check for a null return. This fixes a buffer over-read discovered by Bhargava Shastry, SecT/TU Berlin. ...
null
CVE-2023-51697
Audiobookshelf vulnerable to Blind SSRF in `podcastUtils.js`
Audiobookshelf is a self-hosted audiobook and podcast server. Prior to 2.7.0, Audiobookshelf is vulnerable to unauthenticated blind server-side request (SSRF) vulnerability in `podcastUtils.js`. This vulnerability has been addressed in version 2.7.0. There are no known workarounds for this vulnerability.
[ { "commit_message": "[PATCH] Update:API endpoint /podcasts/feed validates rssFeed URL and uses SSRF req filter server/controllers/PodcastController.js | 14 +++++++++++-- server/utils/index.js | 28 +++++++++++++++++++------ server/utils/podcastUtils.js | 28 ++++++++++++++++++++----- ...
CWE-918: Server-Side Request Forgery (SSRF)
CVE-2024-25122
Cross-site Scripting sidekiq-unique-jobs UI server vulnerability
sidekiq-unique-jobs is an open source project which prevents simultaneous Sidekiq jobs with the same unique arguments to run. Specially crafted GET request parameters handled by any of the following endpoints of sidekiq-unique-jobs' "admin" web UI, allow a super-user attacker, or an unwitting, but authorized, victim, who has received a disguised / crafted link, to successfully execute malicious code, which could potentially steal cookies, session data, or local storage data from the app the sidekiq-unique-jobs web UI is mounted in. 1. `/changelogs`, 2. `/locks` or 3. `/expiring_locks`. This issue has been addressed in versions 7.1.33 and 8.0.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.
[ { "commit_message": "[PATCH] fix(xss): sanitize parameters (#829) lib/sidekiq_unique_jobs/web.rb | 32 ++++++++++++++++---------------- 1 file changed, 16 insertions(+), 16 deletions(-)", "patch_text_b64": "RnJvbSBlYzNhZmQ5MjBjMWI1NTg0M2M3MmY3NDhhODdiYWFjN2Y4YmU4MmVkIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOi...
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
GHSA-4xcx-cwrq-w792
Prototype Pollution in NASA Open MCT
null
[ { "commit_message": "[PATCH] Protect against prototype pollution in import action (#7094) .../ImportFromJSONAction.js | 7 +- .../ImportFromJSONActionSpec.js | 85 ++++++++++++------- .../LocalStorageObjectProvider.js | 4 +- src/plugins/localStorage/pluginSpec.js ...
null
GHSA-hq58-p9mv-338c
CometBFT's default for `BlockParams.MaxBytes` consensus parameter may increase block times and affect consensus participation
null
[ { "commit_message": "[PATCH] feat(consensus): additional sanity checks for the size of proposed blocks (backport #1408) (#2140) This is an automatic backport of pull request #1408 done by [Mergify](https://mergify.com). Cherry-pick of 28ad4d2230134045e2f5ce9fdab6673e276f2579 has failed: ``` On branch mergify/bp...
null
CVE-2018-19052
An issue was discovered in mod_alias_physical_handler in mod_alias.c in lighttpd before 1.4.50. There is potential ../ path traversal of a single directory above an alias target, with a specific mod_alias configuration where the matched alias lacks a trailing '/' character, but the alias target filesystem path does have a trailing '/' character.
[ { "commit_message": "[PATCH] [mod_alias] security: potential path traversal with specific configs Security: potential path traversal of a single directory above the alias target with a specific mod_alias config where the alias which is matched does not end in '/', but alias target filesystem path does end in '/...
n/a
CVE-2023-28436
Non-interactive Tailscale SSH sessions on FreeBSD may use the effective group ID of the tailscaled process
Tailscale is software for using Wireguard and multi-factor authentication (MFA). A vulnerability identified in the implementation of Tailscale SSH starting in version 1.34.0 and prior to prior to 1.38.2 in FreeBSD allows commands to be run with a higher privilege group ID than that specified in Tailscale SSH access rules. A difference in the behavior of the FreeBSD `setgroups` system call from POSIX meant that the Tailscale client running on a FreeBSD-based operating system did not appropriately restrict groups on the host when using Tailscale SSH. When accessing a FreeBSD host over Tailscale SSH, the egid of the tailscaled process was used instead of that of the user specified in Tailscale SSH access rules. Tailscale SSH commands may have been run with a higher privilege group ID than that specified in Tailscale SSH access rules if they met all of the following criteria: the destination node was a FreeBSD device with Tailscale SSH enabled; Tailscale SSH access rules permitted access for non-root users; and a non-interactive SSH session was used. Affected users should upgrade to version 1.38.2 to remediate the issue.
[ { "commit_message": "[PATCH] ssh/tailssh: fix privilege dropping on FreeBSD; add tests On FreeBSD and Darwin, changing a process's supplementary groups with setgroups(2) will also change the egid of the process, setting it to the first entry in the provided list. This is distinct from the behaviour on other pla...
CWE-269: Improper Privilege Management
GHSA-vx3x-hwph-grvw
YetiForce CRM vulnerable to stored Cross-site Scripting via SlaPolicy module
null
[ { "commit_message": "[PATCH] Improved SLA Policy elements config/version.php | 2 +- languages/en-US/ServiceContracts.json | 8 - .../ServiceContracts/CustomConditions.tpl | 95 +++++----- .../modules/ServiceContracts/SlaPolicy.tpl | 4 +- .../ServiceContracts/SlaPol...
null
CVE-2019-1010315
WavPack 5.1 and earlier is affected by: CWE 369: Divide by Zero. The impact is: Divide by zero can lead to sudden crash of a software/service that tries to parse a .wav file. The component is: ParseDsdiffHeaderConfig (dsdiff.c:282). The attack vector is: Maliciously crafted .wav file. The fixed version is: After commit https://github.com/dbry/WavPack/commit/4c0faba32fddbd0745cbfaf1e1aeb3da5d35b9fc.
[ { "commit_message": "[PATCH] issue #65: make sure DSDIFF files have a valid channel count cli/dsdiff.c | 10 ++++++++-- 1 file changed, 8 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSA0YzBmYWJhMzJmZGRiZDA3NDVjYmZhZjFlMWFlYjNkYTVkMzViOWZjIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBEYXZpZCBCcnlhbnQg...
CWE 369: Divide by Zero
GHSA-2rhq-96q8-4vjq
LlamaIndex vulnerable to Path Traversal attack through its encode_image function
null
[ { "commit_message": "[PATCH] ImageDocument path and url checking to ensure that the input is really an image (#18947) * ImageDocument path and url checking to ensure that the input is really an image * Correcting tests to fit new image validation * Adjust test pt2 llama-index-core/llama_index/core/schema.py |...
null
GHSA-4cwr-57j7-96p4
null
[ { "commit_message": "[PATCH] Fix a comment vulnerability allowing scripts to be loaded. Due to the way that comments were loaded in, it was possible to terminate a script and inject a new one while loading the diff viewer. This isn't believed to have been a problem in the wild, but is certainly an important one...
null
GHSA-qm57-rv98-r7ch
null
[ { "commit_message": "[PATCH] Fix another oobread segfault in the NE bin parser ##crash * Reported by @han0nly via huntr.dev * Reproducers: sample1 sample2 sample3 * BountyID: 47422cdf-aad2-4405-a6a1-6f63a3a93200 libr/bin/format/ne/ne.c | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-)", "patch_text...
null
GHSA-2qj6-xmg8-mvxm
null
[ { "commit_message": "[PATCH] Encode FreeRADIUS config file display output. Fixes #9866 net/pfSense-pkg-freeradius3/Makefile | 2 +- .../files/usr/local/www/freeradius_view_config.php | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSAzM...
null
GHSA-c6jq-h4jp-72pr
Aubio is vulnerable to a NULL pointer dereference in new_aubio_notes function
null
[ { "commit_message": "[PATCH] [notes] prevent null pointer dereference thanks to @niugx src/notes/notes.c | 4 ++++ 1 file changed, 4 insertions(+)", "patch_text_b64": "RnJvbSBjNWVlMTMwN2JkYzAwNGU0MzMwMmFiZWNhMTgwMmMyNjkyYjMzYThlIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBQYXVsIEJyb3NzaWVyIDxwaWVtQHBpZW0ub3JnP...
null
CVE-2021-25917
In OpenEMR, versions 5.0.2 to 6.0.0 are vulnerable to Stored Cross-Site-Scripting (XSS) due to user input not being validated properly and rendered in the U2F USB Device authentication method page. A highly privileged attacker could inject arbitrary code into input fields when creating a new user.
[ { "commit_message": "[PATCH] bug fixes (#4280) interface/orders/patient_match_dialog.php | 2 +- interface/patient_file/report/patient_report.php | 2 +- interface/usergroup/mfa_registrations.php | 4 ++-- interface/usergroup/mfa_totp.php | 4 ++-- interface/usergroup/mfa_u2f.php ...
Cross-Site-Scripting
GHSA-x3gm-3hr2-8g66
null
[ { "commit_message": "[PATCH] (for 4.9.3) VRRP: Add a missing bounds check In vrrp_print(). This fixes a buffer over-read discovered by Konrad Rieck and Bhargava Shastry. Add a test using the capture file supplied by the reporter(s) restricted to VRRP packets. print-vrrp.c | 4 +++- tests/T...
null
CVE-2022-3976
MZ Automation libiec61850 MMS File Services mms_client_files.c path traversal
A vulnerability has been found in MZ Automation libiec61850 up to 1.4 and classified as critical. This vulnerability affects unknown code of the file src/mms/iso_mms/client/mms_client_files.c of the component MMS File Services. The manipulation of the argument filename leads to path traversal. Upgrading to version 1.5 is able to address this issue. The name of the patch is 10622ba36bb3910c151348f1569f039ecdd8786f. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-213556.
[ { "commit_message": "[PATCH] - fixed path traversal vulnerability in MMS file services (LIB61850-357) hal/filesystem/linux/file_provider_linux.c | 1 - src/mms/inc_private/mms_common_internal.h | 3 ++ src/mms/iso_mms/client/mms_client_files.c | 51 ++++++++++++--------- src/mms/iso_mms/common/mms_common_msg.c...
CWE-22 Path Traversal
PYSEC-2021-443
null
[ { "commit_message": "[PATCH] Validate `MatrixDiagV{2,3}` arguments to prevent breakage. PiperOrigin-RevId: 369056033 Change-Id: Ic2018c297d3dd6f252dc1dd3667f1ed5cb1eaa42 .../core/kernels/linalg/matrix_diag_op.cc | 19 ++++++++++++++++--- 1 file changed, 16 insertions(+), 3 deletions(-)", "patch_text_b64"...
null
GHSA-8h9r-h75m-6w75
null
[ { "commit_message": "[PATCH] Fix qpress directory traversal vulnerability (#6) A bad actor user can prepare the payload as: ``` mkdir -p AAAAAAAAA/secure_file_priv_dir touch AAAAAAAAA/secure_file_priv_dir/evil.so qpress -r AAAAAAAAA payload.qp Then edit the payload.qp in a hex editor or sed to replace AAAAAAAAA...
null
GHSA-cf3q-gqg7-3fm9
Envoy crashes when HTTP ext_proc processes local replies
null
[ { "commit_message": "[PATCH] Fix a bug where local replies were incorrectly sent to the ext_proc (#38818) [CVE-2025-30157](https://github.com/envoyproxy/envoy/security/advisories/GHSA-cf3q-gqg7-3fm9): Fix a bug where local replies were incorrectly sent to the ext_proc server Signed-off-by: Yanjun Xiang <yanjunx...
null
GHSA-fxrx-5j36-pwg5
Chakra Scripting Engine RCE via Out-of-bounds write
null
[ { "commit_message": "[PATCH 01/13] CVE-2019-0990 lib/Backend/InductionVariable.cpp | 34 +++++++++++++++++++++++++++++++ 1 file changed, 34 insertions(+)", "patch_text_b64": "RnJvbSBlZDZkYjhkYzA1YWIxMWEwZjkwZmRiNmE1YmZiZDViMzhmODE3NTQ2IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBQYXVsIExlYXRoZXJzIDxwbGVhdGhAbW...
null
CVE-2020-28451
Command Injection
This affects the package image-tiler before 2.0.2.
[ { "commit_message": "[PATCH] fix command injection vuln index.js | 30 +++++++++++++++--------------- spec/image-tiler.spec.js | 8 ++++---- 2 files changed, 19 insertions(+), 19 deletions(-)", "patch_text_b64": "RnJvbSBmNGEwYjEzYTRiZjQzNjU1ZmM0MDEzZTA0YmJjZWFmNzdhZWNiZWI4IE1vbiBTZXAgMTcgMDA6...
Command Injection
CVE-2024-45595
D-Tale allows Remote Code Execution through the Query input on Chart Builder
D-Tale is a visualizer for Pandas data structures. Users hosting D-Tale publicly can be vulnerable to remote code execution allowing attackers to run malicious code on the server. Users should upgrade to version 3.14.1 where the "Custom Filter" input is turned off by default.
[ { "commit_message": "[PATCH] Added check for custom filtering before using custom queries in charts dtale/dash_application/layout/layout.py | 44 ++++++++++++++----------- dtale/views.py | 5 ++- tests/dtale/test_views.py | 2 ++ 3 files changed, 30 insertions(+), 21 deleti...
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
GHSA-fxff-wxxv-c2jc
PyPinkSign uses a non-random or static IV for Cipher Block Chaining (CBC) mode in AES encryption
null
[ { "commit_message": "[PATCH] chore: Bump cryptography package for OpenSSL patch README.md | 3 +++ setup.py | 2 +- 2 files changed, 4 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBlMjNiOGU3ZTFlMzU3YWVjMGJhNmM4YzgxNmRkN2Q0MzdhZWQ2ZDM1IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBTYW5nanVuIEp1bmcgPGJh...
null
CVE-2024-53271
HTTP/1.1 multiple issues with envoy.reloadable_features.http1_balsa_delay_reset in envoy
Envoy is a cloud-native high-performance edge/middle/service proxy. In affected versions envoy does not properly handle http 1.1 non-101 1xx responses. This can lead to downstream failures in networked devices. This issue has been addressed in versions 1.31.5 and 1.32.3. Users are advised to upgrade. There are no known workarounds for this issue.
[ { "commit_message": "[PATCH] [balsa] fix for 1xx response mixup Signed-off-by: Paul Ogilby <pgal@google.com> Signed-off-by: Ryan Northey <ryan@synca.io> changelogs/current.yaml | 4 + source/common/http/http1/balsa_parser.cc | 5 +- source/common/http/http1/balsa_parser.h | 3 +...
CWE-670: Always-Incorrect Control Flow Implementation
CVE-2021-3811
Cross-site Scripting (XSS) - Reflected in pi-hole/adminlte
adminlte is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
[ { "commit_message": "[PATCH] Apply htmlentities in a couple of places to prevent xss Co-authored-by: wtwver <wtwver@users.noreply.github.com> Signed-off-by: Adam Warner <me@adamwarner.co.uk> scripts/pi-hole/php/func.php | 1 + settings.php | 2 +- 2 files changed, 2 insertions(+), 1 deletion(-)", ...
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2017-15728
In phpMyFAQ before 2.9.9, there is Stored Cross-site Scripting (XSS) via metaDescription or metaKeywords.
[ { "commit_message": "[PATCH] Fixed possible admin XSS attack vector phpmyfaq/admin/configuration.php | 3 ++- phpmyfaq/index.php | 4 ++-- 2 files changed, 4 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSAyZDJhODViNTllMDU4ODY5ZDdjYmNmZTJkNzNmZWQ0YTI4MmYyZTViIE1vbiBTZXAgMTcgMDA6MDA6MDA...
n/a
GHSA-hfgr-4f63-r7p9
null
[ { "commit_message": "[PATCH] Remove internal Samba shre mounting code, this had some privilege escalation issues, and is not well tested CMakeLists.txt | 10 +- ChangeLog | 2 + devices/avahi/CMakeLists.txt | 8 - devices/avah...
null
CVE-2024-56366
PhpSpreadsheet vulnerable to unauthorized reflected XSS in the Accounting.php file
PhpSpreadsheet is a PHP library for reading and writing spreadsheet files. Versions prior to 3.7.0, 2.3.5, 2.1.6, and 1.29.7 are vulnerable to unauthorized reflected cross-site scripting in the `Accounting.php` file. Using the `/vendor/phpoffice/phpspreadsheet/samples/Wizards/NumberFormat/Accounting.php` script, an attacker can perform a cross-site scripting attack. Versions 3.7.0, 2.3.5, 2.1.6, and 1.29.7 contain a patch for the issue.
[ { "commit_message": "[PATCH] Merge commit from fork * Validate Post Item in Convert-Online.php * Correct Samples - Currency, Accounting, and Downloader * Smarter Color Formatting for Currency * Use helper->log Rather than echo in Convert-Online Responding to comment from @PowerKiki about use of echo for error m...
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
GHSA-c9fh-ff5v-mffg
null
[ { "commit_message": "[PATCH] =?UTF-8?q?Patch=20s=C3=A9rurity?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit setup/data/doorgets.zip | Bin 4672228 -> 4672283 bytes 1 file changed, 0 insertions(+), 0 deletions(-)", "patch_text_b64": "RnJvbSA2YjgxNTQxZmMxZTVkZDFjNzA...
null
CVE-2022-0869
Multiple Open Redirect in nitely/spirit
Multiple Open Redirect in GitHub repository nitely/spirit prior to 0.12.3.
[ { "commit_message": "[PATCH] fix unsafe redirect (#308) spirit/admin/views.py | 5 +++-- spirit/comment/flag/views.py | 7 ++++--- spirit/comment/like/views.py | 8 +++++--- spirit/comment/poll/views.py | 13 +++++++------ spirit/comment/views.py | 14 +++++++------- spir...
CWE-601 URL Redirection to Untrusted Site
CVE-2023-32312
Client secret not mandatory in UmbracoIdentityExtensions
UmbracoIdentityExtensions is an Umbraco add-on package that enables easy extensibility points for ASP.Net Identity integration. In affected versions client secrets are not required which may expose some endpoints to untrusted actors. Since Umbraco is not a single-page application, the implicit flow is not safe. For traditional MVC applications, it is recommended to use the authorization code flow, which requires the client to authenticate with the authorization server using a client secret. This flow provides better security, as it involves exchanging an authorization code for an access token and/or ID token, rather than directly returning tokens in the URL fragment. This issue has been patched in commit `e792429f9` and a release to Nuget is pending. Users are advised to upgrade when possible.
[ { "commit_message": "[PATCH 1/2] ClientSecret for Azure AD Auth build/ActiveDirectory.Readme.txt | 5 +++-- src/App_Start/UmbracoADAuthExtensions.cs | 17 ++++++++++++++--- 2 files changed, 17 insertions(+), 5 deletions(-)", "patch_text_b64": "RnJvbSA4YTI5ZmIzMWFkNjJkZGE1N2QzMTQ1MWMzYjExOGM4Njc4YjM5N...
CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CVE-2025-22130
Soft Serve allows path traversal attacks
Soft Serve is a self-hostable Git server for the command line. Prior to 0.8.2 , a path traversal attack allows existing non-admin users to access and take over other user's repositories. A malicious user then can modify, delete, and arbitrarily repositories as if they were an admin user without explicitly giving them permissions. This is patched in v0.8.2.
[ { "commit_message": "[PATCH] fix: prevent path traversal attacks (#631) This commit fixes a path traversal vulnerability in the repository management code. The `SanitizeRepo` function now correctly returns a sanitized version of the given repository name. It uses an absolute path along with `path.Clean` to ensu...
CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
GHSA-29m8-wh9p-5wc4
Apache Kylin Code Injection via JDBC Configuration Alteration
null
[ { "commit_message": "[PATCH] KYLIN-5994 Fix JDBC source config validation src/common-service/pom.xml | 4 + .../kylin/rest/service/ProjectService.java | 9 +- .../CommonJdbcSourceConnectionValidator.java | 87 ++++++++++++++++++ ...mmonJdbcSourceConnectionValidatorTest.java | 65 ++++++++++...
null
CVE-2021-3801
Inefficient Regular Expression Complexity in prismjs/prism
prism is vulnerable to Inefficient Regular Expression Complexity
[ { "commit_message": "[PATCH] Markup: Fixed ReDoS (#3078) components/prism-markup.js | 2 +- components/prism-markup.min.js | 2 +- prism.js | 2 +- 3 files changed, 3 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSAwZmYzNzFiYjQ3NzVhMTMxNjM0ZjQ3ZDBmZTg1Nzk0YzU0NzIzMmY5IE1vbiB...
CWE-1333 Inefficient Regular Expression Complexity
CVE-2016-10928
The onelogin-saml-sso plugin before 2.2.0 for WordPress has a hardcoded @@@nopass@@@ password for just-in-time provisioned users.
[ { "commit_message": "[PATCH] Generate random password for provisioned users onelogin-saml-sso/php/functions.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBmYmU4MDhlMmZkOGZkZThjYjdlNmJmMzY1YzUzMzRiNTcwMjI2MmRhIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBTaXh0byBNYXJ0aW4gPH...
n/a
GHSA-74rg-6f92-g6wx
UnoPim has CSV Injection on Quick Export feature
null
[ { "commit_message": "[PATCH] fix: escape formula operators when exporting to CSV/XLSX files .../Helpers/Exporters/Category/Exporter.php | 3 ++ .../Helpers/Exporters/Product/Exporter.php | 3 +- .../Formatters/EscapeFormulaOperators.php | 50 +++++++++++++++++++ .../Helpers/Importers/Category/Importer.p...
null
GHSA-wxcg-59h3-c62v
null
[ { "commit_message": "[PATCH] fix:fix xss #113 Signed-off-by: snow <> admin/globals.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAzZjg5NjEwZjcyMTEyMGRlZDNmZjQ5MWNiOWNkOTlkOTkyN2M3NTgyIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBzbm93IDw+CkRhdGU6IFdlZCwgMTcgTm92IDIwMjEgMTU...
null
CVE-2016-4804
The read_boot function in boot.c in dosfstools before 4.0 allows attackers to cause a denial of service (crash) via a crafted filesystem, which triggers a heap-based buffer overflow in the (1) read_fat function or an out-of-bounds heap read in (2) get_fat function.
[ { "commit_message": "[PATCH] read_boot(): Handle excessive FAT size specifications MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit The variable used for storing the FAT size (in bytes) was an unsigned int. Since the size in sectors read from the BPB was not sufficiently...
n/a
CVE-2023-0266
Use after free in SNDRV_CTL_IOCTL_ELEM in Linux Kernel
A use after free vulnerability exists in the ALSA PCM package in the Linux Kernel. SNDRV_CTL_IOCTL_ELEM_{READ|WRITE}32 is missing locks that can be used in a use-after-free that can result in a priviledge escalation to gain ring0 access from the system user. We recommend upgrading past commit 56b88b50565cd8b946a2d00b0c83927b7ebb055e
[ { "commit_message": "[PATCH] ALSA: control: code refactoring for ELEM_READ/ELEM_WRITE operations ALSA control core handles ELEM_READ/ELEM_WRITE requests within lock acquisition of a counting semaphore. The lock is acquired in helper functions in the end of call path before calling implementations of each driver...
CWE-416 Use After Free
GHSA-54xq-cgqr-rpm3
sharp vulnerability in libwebp dependency CVE-2023-4863
null
[ { "commit_message": "[PATCH] Upgrade to libvips v8.14.5 docs/changelog.md | 4 +++- package.json | 24 ++++++++++++------------ src/common.h | 4 ++-- 3 files changed, 17 insertions(+), 15 deletions(-)", "patch_text_b64": "RnJvbSBkYmNlNmZhYjc5NWNhNDI1MGJkYTliMWVmNTAyYzFmZGI3ZDRhMzBjIE1vbiBTZXAgMTcg...
null
GHSA-4jwc-w2hc-78qv
Tonic has remotely exploitable denial of service vulnerability
null
[ { "commit_message": "[PATCH] server: ignore more error kinds in incoming socket stream (#1885) tonic/src/transport/server/incoming.rs | 8 +++++++- 1 file changed, 7 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBhNDQ3MmE4NmYzMjkwZTYwYzdjMDEzNDhiN2U2YTgxNjRkNmU3ZTQ4IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwM...
null
GHSA-66pp-5p9w-q87j
Shescape has potential environment variable exposure on Windows with CMD
null
[ { "commit_message": "[PATCH] Correct escaping of `%` escaping for CMD (#1916) Fix escaping of `%` for CMD (covering both the escape and qoute APIs) and at the same time simplify the logic. This removes the bit-flipping based on double quotes (`\"`) and instead just escapes the double quotes. This handles the bu...
null
CVE-2013-1798
The ioapic_read_indirect function in virt/kvm/ioapic.c in the Linux kernel through 3.8.4 does not properly handle a certain combination of invalid IOAPIC_REG_SELECT and IOAPIC_REG_WINDOW operations, which allows guest OS users to obtain sensitive information from host OS memory or cause a denial of service (host OS OOPS) via a crafted application.
[ { "commit_message": "[PATCH] KVM: Fix bounds checking in ioapic indirect register reads (CVE-2013-1798) If the guest specifies a IOAPIC_REG_SELECT with an invalid value and follows that with a read of the IOAPIC_REG_WINDOW KVM does not properly validate that request. ioapic_read_indirect contains an ASSERT(red...
n/a
CVE-2021-3853
Cross-site Scripting (XSS) - Stored in chaskiq/chaskiq
chaskiq is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
[ { "commit_message": "[PATCH] add escape html to htmlContent on conversation list .../packages/components/src/utils/htmlSanitize.ts | 7 +++++++ app/javascript/src/pages/conversations/ItemList.tsx | 6 ++++-- 2 files changed, 11 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSA1MTc2OGI...
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
GHSA-6293-2vg2-pmp5
Insufficient Session Expiration in NocoDB
null
[ { "commit_message": "[PATCH 1/7] script: add nc_017_add_user_token_exp_column .../src/lib/migrations/XcMigrationSourcev2.ts | 6 ++- .../v2/nc_017_add_user_token_exp_column.ts | 37 +++++++++++++++++++ 2 files changed, 42 insertions(+), 1 deletion(-) create mode 100644 packages/nocodb/src/lib/migrations/v2/nc...
null
GHSA-x3v3-8xg8-8v72
Sentry's Astro SDK vulnerable to ReDoS
null
[ { "commit_message": "[PATCH] fix(astro): Avoid RegExp creation during route interpolation (#9815) - iterate over route segments to replace parameter values - decode raw url to match previously unmatched param values - prioritize multi-segment [rest parameters](https://docs.astro.build/en/core-concepts/routing/#...
null
GHSA-hgh7-wggh-fw3g
null
[ { "commit_message": "[PATCH] Hardening: Add escaping to the language attributes used on `html` elements. Built from https://develop.svn.wordpress.org/trunk@42259 git-svn-id: http://core.svn.wordpress.org/trunk@42088 1a063a9b-81f0-0310-95a4-ce76da25c4cd wp-includes/general-template.php | 12 +++++++----- wp-inclu...
null
CVE-2023-2881
Storing Passwords in a Recoverable Format in pimcore/customer-data-framework
Storing Passwords in a Recoverable Format in GitHub repository pimcore/customer-data-framework prior to 3.3.10.
[ { "commit_message": "[PATCH] Remove password field from detals view (#469) * Remove password field from customer details * Apply php-cs-fixer changes * Update src/CustomerView/DefaultCustomerView.php Co-authored-by: Divesh Pahuja <divesh.pahuja@pimcore.com> Co-authored-by: aryaantony92 <aryaantony92@users.norep...
CWE-257 Storing Passwords in a Recoverable Format
GHSA-f865-m6cq-j9vx
ReDOS in Mpmath
null
[ { "commit_message": "[PATCH 1/2] Fix ReDOS vulnerability Fixes #548, with the workaround suggested by @yetingli. mpmath/ctx_mp.py | 4 ++-- mpmath/tests/test_convert.py | 10 ++++++++++ 2 files changed, 12 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSBjODExYjM3YzY1YTQzNzJhN2NlNjEzMTEx...
null
GHSA-xv83-x443-7rmw
HTML injection in search results via plaintext message highlighting
null
[ { "commit_message": "[PATCH] Merge pull request from GHSA-xv83-x443-7rmw * Escape HTML for plaintext search results * Add tests src/HtmlUtils.tsx | 11 ++-- .../views/rooms/SearchResultTile.tsx | 2 +- test/HtmlUtils-test.tsx | 51 +++++++++++++++++-- 3 f...
null
PYSEC-2021-382
null
[ { "commit_message": "[PATCH] CVE-2021-41146: Add --untrusted-args to avoid argument injection On Windows, if an application is registered as an URL handler like this: HKEY_CLASSES_ROOT https URL Protocol = \"\" [...] shell open command (Default) = \".../qutebrowser.exe\" \"%1\" one would think that Windows take...
null
GHSA-mpq5-cp4r-6mmw
null
[ { "commit_message": "[PATCH] X3F: check for data offset limit src/x3f/x3f_utils_patched.cpp | 2 ++ 1 file changed, 2 insertions(+)", "patch_text_b64": "RnJvbSBkNzVhZjAwNjgxYTc0ZGNjOGI5MjkyMDdlYjg5NTYxMWE2ZWNlYjY4IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBBbGV4IFR1dHViYWxpbiA8bGV4YUBsZXhhLnJ1PgpEYXRlOiBTYXQs...
null
GHSA-fr7x-fw4f-wmvr
null
[ { "commit_message": "[PATCH] tjLoadImage(): Fix FPE triggered by malformed BMP In rdbmp.c, it is necessary to guard against 32-bit overflow/wraparound when allocating the row buffer, because since BMP files have 32-bit width and height fields, the value of biWidth can be up to 4294967295. Specifically, if biWid...
null
GHSA-32fq-m2q5-h83g
XWiki-Platform vulnerable to stored Cross-site Scripting via the HTML displayer in Live Data
null
[ { "commit_message": "[PATCH] XWIKI-20143: Improved Live Data escaping Add missing components in LiveDataMacroComponentList. .../livedata/internal/macro/LiveDataMacroComponentList.java | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAyM2Q1ZWE5YjIzZTg0YjVmM2QxZjFiMmQ1NjczZ...
null
CVE-2022-23948
A flaw was found in Keylime before 6.3.0. The logic in the Keylime agent for checking for a secure mount can be fooled by previously created unprivileged mounts allowing secrets to be leaked to other processes on the host.
[ { "commit_message": "[PATCH] secure_mount: use /proc/self/mountinfo The function `check_mounted()` is parsing the output of the `mount` command. This command can have an unknown number of spaces, that can break the parsing logic (and produces security issues) This commit take the mount information data from `/...
CWE-200
CVE-2014-125107
Corveda PHPSandbox String protection mechanism
A vulnerability was found in Corveda PHPSandbox 1.3.4 and classified as critical. Affected by this issue is some unknown functionality of the component String Handler. The manipulation leads to protection mechanism failure. The attack may be launched remotely. Upgrading to version 1.3.5 is able to address this issue. The patch is identified as 48fde5ffa4d76014bad260a3cbab7ada3744a4cc. It is recommended to upgrade the affected component. VDB-248270 is the identifier assigned to this vulnerability.
[ { "commit_message": "[PATCH] - Addressed potential vulnerabilities related to SandboxedStrings where sandboxed code could manipulate the strings in a way that could defeat their protection - Solved errors from casting sandboxed strings to int - Overwrote some internal PHP functions to further mask SandboxedStri...
CWE-693 Protection Mechanism Failure
CVE-2019-20628
An issue was discovered in libgpac.a in GPAC before 0.8.0, as demonstrated by MP4Box. It contains a Use-After-Free vulnerability in gf_m2ts_process_pmt in media_tools/mpegts.c that can cause a denial of service via a crafted MP4 file.
[ { "commit_message": "[PATCH] fixed potential crash on PMT IOD parse - cf #1268 #1269 src/media_tools/mpegts.c | 35 +++++++++++++++++++++-------------- 1 file changed, 21 insertions(+), 14 deletions(-)", "patch_text_b64": "RnJvbSAxYWI0ODYwNjA5ZjJlN2EzNTYzNDkzMDU3MWU3ZDA1MzEyOTdlMDkwIE1vbiBTZXAgMTcgMDA6MDA6MD...
n/a
CVE-2022-34133
Benjamin BALET Jorani v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the Comment parameter at application/controllers/Leaves.php.
[ { "commit_message": "[PATCH] BF:Persistent XSS fix #369 application/controllers/Leaves.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAzZDAxY2VmNGVlOWNkZDcwY2ZlMWFjNGZkN2Y1ZDYwN2RkYTBkMGNhIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBCZW5qYW1pbiBCQUxFVCA8YmVuamFtaW4uYmFsZXR...
n/a
GHSA-c655-qv2v-73rm
null
[ { "commit_message": "[PATCH] avcodec/speexdec: further check for sane frame_size values Prevent potential integer overflows. Signed-off-by: James Almer <jamrial@gmail.com> libavcodec/speexdec.c | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSAwODk1ZWYwZDZkNjQwNmVlNmNkMTU...
null