id
stringlengths
12
19
title
stringlengths
0
237
description
stringlengths
35
3.87k
patches
listlengths
1
22
cwe
stringlengths
2
440
GHSA-wx7c-8j35-mpg8
Fat Free CRM Cross-Site Request Forgery vulnerability
null
[ { "commit_message": "[PATCH] Fix for CVE-2015-1585 - CSRF vulnerability. app/controllers/application_controller.rb | 10 ++++++++++ 1 file changed, 10 insertions(+)", "patch_text_b64": "RnJvbSA4NmZkN2Y5OGM5NTgzZmQzNjM4NDk4NzI4MmQxYzA4NmZkY2VjZDdjIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBTdGV2ZSBLZW53b3J0aHk...
null
CVE-2010-4250
Memory leak in the inotify_init1 function in fs/notify/inotify/inotify_user.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service (memory consumption) via vectors involving failed attempts to create files.
[ { "commit_message": "[PATCH] inotify: stop kernel memory leak on file creation failure If inotify_init is unable to allocate a new file for the new inotify group we leak the new group. This patch drops the reference on the group on file allocation failure. Reported-by: Vegard Nossum <vegard.nossum@gmail.com> c...
n/a
CVE-2011-4348
Race condition in the sctp_rcv function in net/sctp/input.c in the Linux kernel before 2.6.29 allows remote attackers to cause a denial of service (system hang) via SCTP packets. NOTE: in some environments, this issue exists because of an incomplete fix for CVE-2011-2482.
[ { "commit_message": "[PATCH] sctp: Fix another socket race during accept/peeloff There is a race between sctp_rcv() and sctp_accept() where we have moved the association from the listening socket to the accepted socket, but sctp_rcv() processing cached the old socket and continues to use it. The easy solution i...
n/a
CVE-2021-45942
OpenEXR 3.1.x before 3.1.4 has a heap-based buffer overflow in Imf_3_1::LineCompositeTask::execute (called from IlmThread_3_1::NullThreadPoolProvider::addTask and IlmThread_3_1::ThreadPool::addGlobalTask). NOTE: db217f2 may be inapplicable.
[ { "commit_message": "[PATCH] DeepScanlineInputFile now uses chunk size test from DeepTiledInputFile (#1205) Signed-off-by: Peter Hillman <peterh@wetafx.co.nz> src/lib/OpenEXR/ImfDeepScanLineInputFile.cpp | 18 ++++++++++++------ 1 file changed, 12 insertions(+), 6 deletions(-)", "patch_text_b64": "RnJvbSBkYj...
n/a
GHSA-27wq-qx3q-fxm9
Improper Handling of Unexpected Data Type in ced
null
[ { "commit_message": "[PATCH] Throw TypeError if argument is not a buffer index.js | 4 ++++ test.js | 6 ++++++ 2 files changed, 10 insertions(+)", "patch_text_b64": "RnJvbSBhNGQ5ZjEwYjZiZjFjZDQ2OGQxYTViOWEyODNjZGY0MzdmOGJiN2IzIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBKYWtvYiBLcmlnb3Zza3kgPGpha29iQGtyaWdvdn...
null
GHSA-f3pw-mpwc-pw7v
null
[ { "commit_message": "[PATCH] gf_isom_use_compact_size() check sampleCount!=0 (fixes #2657) src/isomedia/isom_write.c | 13 ++++++------- 1 file changed, 6 insertions(+), 7 deletions(-)", "patch_text_b64": "RnJvbSBhN2I0NjdiMTUxZDliNTRiYWRiYzRkZDcxZTdhMzY2YjdjMzkxODE3IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiB...
null
GHSA-xxgm-qpj5-4886
OpenStack Nova Scheduler denial of service through scheduler_hints
null
[ { "commit_message": "[PATCH] Use compute_api.get_all in affinity filters. Updates the affinity filters so they make a single compute API call to lookup instance host information rather than single lookups for each UUID. This resolves a potential performance issue which can cause a scheduler to hang while proces...
null
GHSA-689c-xq7x-xjwf
Mattermost Playbooks fails to validate the uniqueness and quantity of task actions
null
[ { "commit_message": "[PATCH] Limit task actions to 10 (#1964) server/api/graphql_root_playbook.go | 4 ++++ server/api/playbooks.go | 5 +++++ 2 files changed, 9 insertions(+)", "patch_text_b64": "RnJvbSBiZjI2MzNkYWQwOWY1NzY4Y2UyYmVhNGI3YzVmZmI3NDA1MDA1MmE4IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tO...
null
GHSA-h3px-rcqp-mvf3
null
[ { "commit_message": "[PATCH] some cleanup and SSL pinning fix Source/WebSocket.swift | 32 ++++++++++-------- .../UserInterfaceState.xcuserstate | Bin 49398 -> 49027 bytes 2 files changed, 18 insertions(+), 14 deletions(-)", "patch_text_b64": "RnJvbSBkYmViMTE5MGI4ZGNiZmY0Zj...
null
CVE-2022-1191
SSRF on index.php/cobrowse/proxycss/ in livehelperchat/livehelperchat
SSRF on index.php/cobrowse/proxycss/ in GitHub repository livehelperchat/livehelperchat prior to 3.96.
[ { "commit_message": "[PATCH] Harden to avoid SSRF lhc_web/modules/lhcobrowse/proxycss.php | 38 +++++++++++++++++++++---- 1 file changed, 32 insertions(+), 6 deletions(-)", "patch_text_b64": "RnJvbSBjNDFmMjgzYTJjMWI0NmM0MmRkMmFmMTZlY2JlYWVkZDJmZTFmNWRmIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBSZW1pZ2lqdXMgS...
CWE-918 Server-Side Request Forgery (SSRF)
CVE-2020-15208
Data corruption in tensorflow-lite
In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, when determining the common dimension size of two tensors, TFLite uses a `DCHECK` which is no-op outside of debug compilation modes. Since the function always returns the dimension of the first tensor, malicious attackers can craft cases where this is larger than that of the second tensor. In turn, this would result in reads/writes outside of bounds since the interpreter will wrongly assume that there is enough data in both tensors. The issue is patched in commit 8ee24e7949a203d234489f9da2c5bf45a7d5157d, and is released in TensorFlow versions 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.
[ { "commit_message": "[PATCH] [tflite] Ensure `MatchingDim` does not allow buffer overflow. We check in `MatchingDim` that both arguments have the same dimensionality, however that is a `DCHECK` only enabled if building in debug mode. Hence, it could be possible to cause buffer overflows by passing in a tensor w...
{"CWE-125":"Out-of-bounds Read"}
PYSEC-2021-573
null
[ { "commit_message": "[PATCH] Fix FPE in inpace update ops. PiperOrigin-RevId: 388303197 Change-Id: Ib48309b6213ffe53eba81004b00e889d653e4b83 tensorflow/core/kernels/inplace_ops.cc | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBlODY2MDVjMGEzMzZjMDg4YjYzOGRhMDIxMzVlYTZmOWY2Nz...
null
CVE-2015-2694
The kdcpreauth modules in MIT Kerberos 5 (aka krb5) 1.12.x and 1.13.x before 1.13.2 do not properly track whether a client's request has been validated, which allows remote attackers to bypass an intended preauthentication requirement by providing (1) zero bytes of data or (2) an arbitrary realm name, related to plugins/preauth/otp/main.c and plugins/preauth/pkinit/pkinit_srv.c.
[ { "commit_message": "[PATCH] Prevent requires_preauth bypass [CVE-2015-2694] In the OTP kdcpreauth module, don't set the TKT_FLG_PRE_AUTH bit until the request is successfully verified. In the PKINIT kdcpreauth module, don't respond with code 0 on empty input or an unconfigured realm. Together these bugs coul...
n/a
CVE-2025-27400
Magento vulnerable to stored XSS in theme config fields
Magento Long Term Support (LTS) is an unofficial, community-driven project provides an alternative to the Magento Community Edition e-commerce platform with a high level of backward compatibility. Versions prior to 20.12.3 and 20.13.0 contain a vulnerability that allows script execution in the admin panel which could lead to cross-site scripting against authenticated admin users. The attack requires an admin user with configuration access, so in practicality it is not very likely to be useful given that a user with this level of access is probably already a full admin. Versions 20.12.3 and 20.13.0 contain a patch for the issue.
[ { "commit_message": "[PATCH] Sanitize skin urls that could be used for XSS (#4654) Co-authored-by: kiatng <kiatsiong.ng@gmail.com> app/code/core/Mage/Core/Model/Design/Package.php | 9 ++++++--- app/code/core/Mage/Core/etc/system.xml | 1 + .../default/template/oauth/authorize/head-simpl...
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
GHSA-mr22-3rrp-47cx
null
[ { "commit_message": "[PATCH] ZipUtil.java - check for path traversal attack modules/common/app/utils/common/ZipUtil.java | 1 + 1 file changed, 1 insertion(+)", "patch_text_b64": "RnJvbSAyYjQyNTE5ZjMwOWQ4MTY0ZTg4MTEzOTI3NzBjZTYwNGNkYWJiNWRhIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBLcmlzdGlhbiBMYW5nZSA8bGFuZ...
null
GHSA-w5p4-634r-j4xr
null
[ { "commit_message": "[PATCH] Disables Git access in Restricted Mode (untrusted) src/env/node/git/git.ts | 8 +++- src/env/node/git/localGitProvider.ts | 2 +- src/git/errors.ts | 9 ++++ src/git/gitProviderService.ts | 13 ++++++ src/webviews/apps/home/home.html | 11 ++...
null
CVE-2017-12678
In TagLib 1.11.1, the rebuildAggregateFrames function in id3v2framefactory.cpp has a pointer to cast vulnerability, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted audio file.
[ { "commit_message": "[PATCH] Don't assume TDRC is an instance of TextIdentificationFrame (#831) If TDRC is encrypted, FrameFactory::createFrame() returns UnknownFrame which causes problems in rebuildAggregateFrames() when it is assumed that TDRC is a TextIdentificationFrame taglib/mpeg/id3v2/id3v2framefactory.c...
n/a
CVE-2021-4241
phpservermon User.php setUserLoggedIn predictable algorithm in random number generator
A vulnerability, which was classified as problematic, was found in phpservermon. Affected is the function setUserLoggedIn of the file src/psm/Service/User.php. The manipulation leads to use of predictable algorithm in random number generator. The exploit has been disclosed to the public and may be used. The name of the patch is bb10a5f3c68527c58073258cb12446782d223bc3. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-213744.
[ { "commit_message": "[PATCH] SECURITY: Replaced mt_rand with random_bytes https://huntr.dev/bounties/1-phpservermon/phpservermon/ CWE-1241: Use of Predictable Algorithm in Random Number Generator src/psm/Service/User.php | 16 +++++++--------- 1 file changed, 7 insertions(+), 9 deletions(-)", "patch_text_b64...
CWE-331 Insufficient Entropy -> CWE-338 Cryptographically Weak PRNG -> CWE-1241 Use of Predictable Algorithm in Random Number Generator
GHSA-r8w9-5wcg-vfj7
Mio's tokens for named pipes may be delivered after deregistration
null
[ { "commit_message": "[PATCH] named-pipes: fix receiving IOCP events after deregister Backport of the following commits * 04c3bb6ef23d217ee7f8f68e3e6d0d9fcddd1520 * dc3b3f63ba34e2189d9e57fd83b1d4ce5a52385e * 6fd5dd0d615a66a30a449d3f8eb1266dad96af62 src/sys/windows/event.rs | 8 ++++ src/sys/windows/named_pi...
null
CVE-2024-52295
DataEase has a forged JWT token vulnerability
DataEase is an open source data visualization analysis tool. Prior to 2.10.2, DataEase allows attackers to forge jwt and take over services. The JWT secret is hardcoded in the code, and the UID and OID are hardcoded. The vulnerability has been fixed in v2.10.2.
[ { "commit_message": "[PATCH] =?UTF-8?q?perf:=20=E7=A4=BE=E5=8C=BA=E7=89=88token?= =?UTF-8?q?=E6=9C=BA=E5=88=B6?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit .../login/SubstituleLoginServer.java | 30 ++++++-- de-xpack | ...
CWE-798: Use of Hard-coded Credentials
CVE-2025-64431
IDOR Vulnerabilities in ZITADEL's Organization API allows Cross-Tenant Data Tempering
Zitadel is an open source identity management platform. Versions 4.0.0-rc.1 through 4.6.2 are vulnerable to secure Direct Object Reference (IDOR) attacks through its V2Beta API, allowing authenticated users with specific administrator roles within one organization to access and modify data belonging to other organizations. Note that this vulnerability is limited to organization-level data (name, domains, metadata). No other related data (such as users, projects, applications, etc.) is affected. This issue is fixed in version 4.6.3.
[ { "commit_message": "[PATCH] fix(api): correct permission check in organization v2beta service # Which Problems Are Solved The organozation v2beta service wrongly checked the permissions on the user's organization instead of the organization the user tried to access. # How the Problems Are Solved - Check permis...
CWE-639: Authorization Bypass Through User-Controlled Key
GHSA-4rcq-jv2f-898j
Incorrect Provision of Specified Functionality in qutebrowser
null
[ { "commit_message": "[PATCH] Security: Remember hosts with ignored cert errors for load status Without this change, we only set a flag when a certificate error occurred. However, when the same certificate error then happens a second time (e.g. because of a reload or opening the same URL again), we then colored ...
null
GHSA-wh92-hmx9-3mf2
null
[ { "commit_message": "[PATCH] upnp_event_prepare(): check the return value of snprintf() miniupnpd/upnpevents.c | 37 ++++++++++++++++++++++++++----------- 1 file changed, 26 insertions(+), 11 deletions(-)", "patch_text_b64": "RnJvbSBiZWM2Y2NlYzYzY2FkYzk1NjU1NzIxYmMwZTFkZDQ5ZGFjNzU5ZDk0IE1vbiBTZXAgMTcgMDA6MDA...
null
GHSA-mcwf-f64m-6vhh
null
[ { "commit_message": "[PATCH] [media] media: info leak in __media_device_enum_links() These structs have holes and reserved struct members which aren't cleared. I've added a memset() so we don't leak stack information. Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com> Signed-off-by: Laurent Pinchart <laur...
null
CVE-2024-43415
Decidim-Awesome: SQL injection in AdminAccountability
An improper neutralization of special elements used in an SQL command in the papertrail/version- model of the decidim_awesome-module <= v0.11.1 (> 0.9.0) allows an authenticated admin user to manipulate sql queries to disclose information, read and write files or execute commands.
[ { "commit_message": "[PATCH] Security fix (#327) * prevent sql injection * ruboxcop * simplify orderable override * escape collation search * fix location detection * use filter-map CHANGELOG.md | 10 ++++++ Gemfile.lock | 2 +- .../admin/filterab...
CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2020-36429
Variant_encodeJson in open62541 1.x before 1.0.4 has an out-of-bounds write for a large recursion depth.
[ { "commit_message": "[PATCH] fix(json): Check max recursion depth in more places src/ua_types_encoding_json.c | 13 +++++++++---- 1 file changed, 9 insertions(+), 4 deletions(-)", "patch_text_b64": "RnJvbSBjODAwZTI5ODdiMTBiYjNhZjZlZjY0NGI1MTViNWQ2MzkyZjg4NjFkIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBKdWxpdX...
n/a
GHSA-g2jg-2qcv-q3h9
null
[ { "commit_message": "[PATCH] Prevent replicas from sending commands that interact with keyspace (#8868) This solves an issue reported in #8712 in which a replica would bypass the client write pause check and cause an assertion due to executing a write command during failover. The fact is that we don't expect re...
null
GHSA-wjw2-4j7j-6gc3
Winter CMS stored XSS through privileged upload of SVG file
null
[ { "commit_message": "[PATCH] Add support for uploading SVGs src/Database/Attach/File.php | 22 ++++++++++++++++------ src/Filesystem/Definitions.php | 13 ++++++++----- 2 files changed, 24 insertions(+), 11 deletions(-)", "patch_text_b64": "RnJvbSAxODZkODVkOGZlYTJjYWU0M2FmYzgwN2QzOWY2ODU1M2MyNGU1NmJlIE1vbiB...
null
GHSA-wwj3-573j-rvvm
Magento Open Source Improper Authorization vulnerability
null
[ { "commit_message": "[PATCH] Magento Release 2.4.4-p9 .../AdminAnalytics/ViewModel/Metadata.php | 30 +- app/code/Magento/AdminAnalytics/composer.json | 25 +- .../view/adminhtml/templates/tracking.phtml | 26 +- .../Magento/AdminNotification/composer.json | 24 +- .../AdvancedPricingImportExpor...
null
CVE-2025-46011
Listmonk v4.1.0 (fixed in v5.0.0) is vulnerable to SQL Injection in the QuerySubscribers function which allows attackers to escalate privileges.
[ { "commit_message": "[PATCH] Fix broken `subscribers:sql_query` permission. This permission was never checked for and had an unintended consequence of allowing a non-superadmin user to execute arbitrary queries (expected), but getting a superadmin session by joining the `sessions` table. This patch: - Introduce...
n/a
GHSA-x2fm-93ww-ggvx
Nokogiri gem, via libxml, is affected by DoS vulnerabilities
null
[ { "commit_message": "[PATCH] Detect infinite recursion in parameter entities When expanding a parameter entity in a DTD, infinite recursion could lead to an infinite loop or memory exhaustion. Thanks to Wei Lei for the first of many reports. Fixes bug 759579. parser.c | 11 ++++++++++- result...
null
GHSA-2xp3-57p7-qf4v
xml-crypto vulnerable to XML signature verification bypass due improper verification of signature/signature spoofing
null
[ { "commit_message": "[PATCH] Set `getCertFromKeyInfo` to `noop` (#445) `getKeyInfoContent` was incorrectly set to `noop` instead of `getCertFromKeyInfo` src/signed-xml.ts | 4 ++-- test/document-tests.spec.ts | 3 +++ test/key-info-tests.spec.ts | 1 - test/signature-unit-tests.spec.ts ...
null
CVE-2022-24913
Versions of the package com.fasterxml.util:java-merge-sort before 1.1.0 are vulnerable to Insecure Temporary File in the StdTempFileProvider() function in StdTempFileProvider.java, which uses the permissive File.createTempFile() function, exposing temporary file contents.
[ { "commit_message": "[PATCH] vuln-fix: Temporary File Information Disclosure This fixes temporary file information disclosure vulnerability due to the use of the vulnerable `File.createTempFile()` method. The vulnerability is fixed by using the `Files.createTempFile()` method which sets the correct posix permis...
Insecure Temporary File
CVE-2022-31031
Potential stack buffer overflow when parsing message as a STUN client
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In versions prior to and including 2.12.1 a stack buffer overflow vulnerability affects PJSIP users that use STUN in their applications, either by: setting a STUN server in their account/media config in PJSUA/PJSUA2 level, or directly using `pjlib-util/stun_simple` API. A patch is available in commit 450baca which should be included in the next release. There are no known workarounds for this issue.
[ { "commit_message": "[PATCH] Merge pull request from GHSA-26j7-ww69-c4qj pjlib-util/src/pjlib-util/stun_simple.c | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA0NTBiYWNhOTRmNDc1MzQ1NTQyYzY5NTM4MzI2NTBjMzkwODg5MjAyIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBzYXV3bWluZyA...
CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2020-35517
A flaw was found in qemu. A host privilege escalation issue was found in the virtio-fs shared file system daemon where a privileged guest user is able to create a device special file in the shared directory and use it to r/w access host devices.
[ { "commit_message": "[PATCH] virtiofsd: avoid /proc/self/fd tempdir In order to prevent /proc/self/fd escapes a temporary directory is created where /proc/self/fd is bind-mounted. This doesn't work on read-only file systems. Avoid the temporary directory by bind-mounting /proc/self/fd over /proc. This does not ...
CWE-269
GHSA-8jvc-xjwm-ww9g
null
[ { "commit_message": "[PATCH] CVE-2017-12992/RIPng: Clean up bounds checking. Do bounds checking as we access items. Scan the list of netinfo6 entries based on the supplied packet length, without taking the captured length into account; let the aforementioned bounds checking handle that. This fixes a buffer over...
null
GHSA-xpq9-m45f-g29q
null
[ { "commit_message": "[PATCH] Fix `use after free in File#initilialize_copy`; fix #4001 The bug and the fix were reported by https://hackerone.com/pnoltof mrbgems/mruby-io/src/io.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBiNTFiMjFmYzYzYzk4MDU4NjIzMjI1NTEzODdkOTAzNmYyYj...
null
GHSA-vxq2-p937-3px3
Pinned entity creation form shows wrong data
null
[ { "commit_message": "[PATCH] BB-22832: Multifile attribute is shown on product visibility page in back-office - 5.1 (#36428) .../EventListener/MultiFileBlockListener.php | 52 +++++++++++++++---- .../Resources/config/services.yml | 2 + .../MultiFileBlockListenerTest.php | 11 +++- .../UIB...
null
CVE-2021-38205
drivers/net/ethernet/xilinx/xilinx_emaclite.c in the Linux kernel before 5.13.3 makes it easier for attackers to defeat an ASLR protection mechanism because it prints a kernel pointer (i.e., the real IOMEM pointer).
[ { "commit_message": "[PATCH] net: xilinx_emaclite: Do not print real IOMEM pointer Printing kernel pointers is discouraged because they might leak kernel memory layout. This fixes smatch warning: drivers/net/ethernet/xilinx/xilinx_emaclite.c:1191 xemaclite_of_probe() warn: argument 4 to %08lX specifier is cast...
n/a
GHSA-v6jv-p6r8-j78w
NiceGUI On Air authentication issue
null
[ { "commit_message": "[PATCH] clear client cookies after reach response to prevent httpx internal cookie persistence to leak from one On Air request into another nicegui/air.py | 1 + 1 file changed, 1 insertion(+)", "patch_text_b64": "RnJvbSAzNDNkYzBkYThkZTBjZjJmNjQ1Y2Y4YjVkNzZmNWI0MzljYjgxN2YzIE1vbiBTZXAgMT...
null
CVE-2021-37700
Clipboard-based DOM-XSS
@github/paste-markdown is an npm package for pasting markdown objects. A self Cross-Site Scripting vulnerability exists in the @github/paste-markdown before version 0.3.4. If the clipboard data contains the string `<table>`, a **div** is dynamically created, and the clipboard content is copied into its **innerHTML** property without any sanitization, resulting in improper execution of JavaScript in the browser of the victim (the user who pasted the code). Users directed to copy text from a malicious website and paste it into pages that utilize this library are affected. This is fixed in version 0.3.4. Refer the to the referenced GitHub Advisory for more details including an example exploit.
[ { "commit_message": "[PATCH 1/3] Add a wait function in tests test/test.js | 4 ++++ 1 file changed, 4 insertions(+)", "patch_text_b64": "RnJvbSA4M2EwNDRiNjhiMjYyMWRjNjZkNGQ3OGEwZDhhMmYwNmE5OWNkNjU4IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiA9P1VURi04P3E/S3Jpc3RqPUMzPUExbj0yME9kZHNzb24/PSA8a29kZHNzb25AZ21haWw...
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
GHSA-xhqq-554j-p4x8
phpMyAdmin Directory Traversal Vulnerability
null
[ { "commit_message": "[PATCH] [security] Fixed local file inclusion vulnerability and code execution, see PMASA-2011-11 ChangeLog | 13 +++++++------ libraries/schema/User_Schema.class.php | 7 +++++-- schema_export.php | 4 +++- 3 files changed, 15 insertions(+),...
null
GHSA-5hfj-r725-wpc4
october/system arbitrary code execution
null
[ { "commit_message": "[PATCH] Backport fixes from 2.0 modules/cms/controllers/Themes.php | 8 ++++++++ modules/system/twig/SecurityPolicy.php | 8 ++++++-- 2 files changed, 14 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSAxNjdiNTkyZWVkMjkxYWUxNTYzYzhmY2M1YjliMzRhMDNhMzAwZjI2IE1vbiBTZXAgMTcgMDA6...
null
GHSA-967g-cjx4-h7j6
go-codec-dagpb vulnerable to panic when decoding invalid blocks
null
[ { "commit_message": "[PATCH] fix: use protowire for Links bytes decoding compat_test.go | 48 ++++++++++++++++++++++++++++++++---------------- unmarshal.go | 5 ++--- 2 files changed, 34 insertions(+), 19 deletions(-)", "patch_text_b64": "RnJvbSBhMTdhY2UzNWNjNzYwYTI2OTg2NDVjMDk4NjhmOTA1MGZhMjE5ZjU3IE1vbiBT...
null
CVE-2019-16216
Zulip server before 2.0.5 incompletely validated the MIME types of uploaded files. A user who is logged into the server could upload files of certain types to mount a stored cross-site scripting attack on other logged-in users. On a Zulip server using the default local uploads backend, the attack is only effective against browsers lacking support for Content-Security-Policy such as Internet Explorer 11. On a Zulip server using the S3 uploads backend, the attack is confined to the origin of the configured S3 uploads hostname and cannot reach the Zulip server itself.
[ { "commit_message": "[PATCH] CVE-2019-16216: Fix MIME type validation. * Whitelist a small number of image/ types to be served as non-attachments. * Serve the file using the type that we validated rather than relying on an independent guess to match. This issue can lead to a stored XSS security vulnerability fo...
n/a
GHSA-24jr-8pxp-69pm
null
[ { "commit_message": "[PATCH] Fixed RCE in git grep. A specific option in git grep could be added inside the pattern to be searched for, resulting in possible RCE. Thanks to Kacper Szurek (https://security.szurek.pl) for catching this one! src/Git/Repository.php | 4 +++- tests/RepositoryTest.php | 28 ++++++++...
null
CVE-2019-19060
A memory leak in the adis_update_scan_mode() function in drivers/iio/imu/adis_buffer.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-ab612b1daf41.
[ { "commit_message": "[PATCH] iio: imu: adis16400: release allocated memory on failure In adis_update_scan_mode, if allocation for adis->buffer fails, previously allocated adis->xfer needs to be released. Signed-off-by: Navid Emamdoost <navid.emamdoost@gmail.com> Reviewed-by: Alexandru Ardelean <alexandru.ardele...
n/a
CVE-2015-2666
Stack-based buffer overflow in the get_matching_model_microcode function in arch/x86/kernel/cpu/microcode/intel_early.c in the Linux kernel before 4.0 allows context-dependent attackers to gain privileges by constructing a crafted microcode header and leveraging root privileges for write access to the initrd.
[ { "commit_message": "[PATCH] x86/microcode/intel: Guard against stack overflow in the loader mc_saved_tmp is a static array allocated on the stack, we need to make sure mc_saved_count stays within its bounds, otherwise we're overflowing the stack in _save_mc(). A specially crafted microcode header could lead to...
n/a
CVE-2023-0301
Cross-site Scripting (XSS) - Stored in alfio-event/alf.io
Cross-site Scripting (XSS) - Stored in GitHub repository alfio-event/alf.io prior to Alf.io 2.0-M4-2301.
[ { "commit_message": "[PATCH] restrict protocols (#1150) src/main/java/alfio/util/MustacheCustomTag.java | 16 ++++++++++++++++ .../java/alfio/util/MustacheCustomTagTest.java | 9 +++++++++ 2 files changed, 25 insertions(+)", "patch_text_b64": "RnJvbSAyMWNiMjg2NmU1ZjU4YjRhMmI0YTJjYjAwNjY0NzliYmIyNmY3YjM5IE...
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
GHSA-3f3p-qhfv-7p8h
Jenkins openid Plugin missing permission check
null
[ { "commit_message": "[PATCH] require post and admin - SECURITY-1084 / CVE-2019-1003098 (CSRF) and CVE-2019-1003099 (permission check) .../hudson/plugins/openid/OpenIdSsoSecurityRealm.java | 8 +++++++- 1 file changed, 7 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA1YTkxYTc0YTk0ZTQ0ZDg3Y2Q2MWF...
null
CVE-2022-39388
Istio may allow identity impersonation if user has localhost access
Istio is an open platform to connect, manage, and secure microservices. In versions on the 1.15.x branch prior to 1.15.3, a user can impersonate any workload identity within the service mesh if they have localhost access to the Istiod control plane. Version 1.15.3 contains a patch for this issue. There are no known workarounds.
[ { "commit_message": "[PATCH] add xfcc authenticator (#39405) * add xfcc authenticator Signed-off-by: Rama Chavali <rama.rao@salesforce.com> * comments Signed-off-by: Rama Chavali <rama.rao@salesforce.com> * go mod Signed-off-by: Rama Chavali <rama.rao@salesforce.com> * lint Signed-off-by: Rama Chavali <rama.rao...
CWE-863: Incorrect Authorization
PYSEC-2025-56
null
[ { "commit_message": "[PATCH] fix: remove preemptive-recording header Instead of using a custom header (that can be manipulated into requests) we now use a flag on the request context to mark our preemptive caching requests. Fixes https://github.com/OctoPrint/OctoPrint/security/advisories/GHSA-qw93-h6pf-226x Thi...
null
GHSA-7wr8-6fw9-mw29
null
[ { "commit_message": "[PATCH] fix: Do not use the \"/tmp\" directory https://github.com/linuxdeepin/deepin-clone/issues/16 https://bugzilla.opensuse.org/show_bug.cgi?id=1130388 app/src/corelib/ddevicediskinfo.cpp | 4 ++-- app/src/corelib/helper.cpp | 8 +++++--- app/src/corelib/helper.h | 2...
null
GHSA-h97r-fchm-m23x
Cross-site Scripting in Jenkins Email Extension Plugin
null
[ { "commit_message": "[PATCH] SECURITY-2931 .../plugins/emailext/templates/groovy-html-larry.template | 2 +- .../plugins/emailext/templates/groovy-html.template | 8 ++++---- 2 files changed, 5 insertions(+), 5 deletions(-)", "patch_text_b64": "RnJvbSBlYmZiOTc0NzVlYzY0OTFmMjhiODhhOGI1YWNiYjk5ZmYzNmY0ZDd...
null
GHSA-mcqj-7p29-9528
MantisBT Host Header Injection vulnerability
null
[ { "commit_message": "[PATCH] Merge pull request from GHSA-mcqj-7p29-9528 * Address host header injection vulnerability $g_path is empty by default, and should be defined in config_inc.php. Not doing so is a security risk, as the path will then be set based on headers from the HTTP request, exposing the system t...
null
GHSA-34fj-r5gq-7395
XWiki Platform: Remote code execution from account via SearchSuggestSourceSheet
null
[ { "commit_message": "[PATCH] XWIKI-21474: Improve escaping in XWiki.SearchSuggestSourceSheet (cherry picked from commit 6a7f19f6424036fce3d703413137adde950ae809) .../XWiki/SearchSuggestSourceSheet.xml | 2 +- .../ui/SearchSuggestSourceSheetPageTest.java | 90 +++++++++++++++++++ 2 files changed, 91 inser...
null
GHSA-prrm-fv2r-3vwp
null
[ { "commit_message": "[PATCH] fix: Leaking of hashed passwords in the audit logs fixed - Scope was limited due to the audit log access restrictions to site/org admins app/Controller/UsersController.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA3ZDU4OTBiMmZjNjMyODVmMDEwZ...
null
GHSA-whxr-3p84-rf3c
Apache ActiveMQ: Unchecked buffer length can cause excessive memory allocation
null
[ { "commit_message": "[PATCH] AMQ-6596 - Validate size of buffers during unmarshalling Verify that size buffers for arrays and bytesequences will not exceed the overall frame size activemq-client/pom.xml | 5 + .../activemq/openwire/OpenWireFormat.java | 118 +++++--- .../activemq/openw...
null
PYSEC-2024-35
null
[ { "commit_message": "[PATCH 01/14] Sanitize html props with xss vulnerability. .../dash-core-components/package-lock.json | 11 +++ components/dash-core-components/package.json | 1 + .../src/components/Link.react.js | 98 ++++++++++--------- .../dash-html-components/package-lock.json | 15 ++-...
null
GHSA-x7xf-253v-x3w8
Improper Restriction of XML External Entity Reference in Apache CXF JAX-RS
null
[ { "commit_message": "[PATCH] Letting CXF StaxUtils prepare XMLStreamReader for Atom reads .../provider/atom/AbstractAtomProvider.java | 6 ++- .../provider/atom/AtomPojoProviderTest.java | 37 +++++++++++++++++++ 2 files changed, 41 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSA4ZTQ5NzBkOTMxY...
null
GHSA-p278-2qh9-6mwj
Jenkins Nomad Plugin missing permission check
null
[ { "commit_message": "[PATCH] Fixing Issue with Orphaned Agents and configurable startup timeout (#1) (#37) * Fixing Issue with Orphaned Agents and configurable startup timeout (#1) Adding Configurable Agent Startup Timeout and Fixing bug the resulted in Agents being orphaned on the Jenkins UI * refactor to enab...
null
CVE-2026-21856
Tarkov Data Manager has Authenticated SQL Injection
The Tarkov Data Manager is a tool to manage the Tarkov item data. Prior to commit 9bdb3a75a98a7047b6d70144eb1da1655d6992a8, a time based blind SQL injection vulnerability in the webhook edit and scanner api endpoints that allow an authenticated attacker to execute arbitrary SQL queries against the MySQL database. Commit 9bdb3a75a98a7047b6d70144eb1da1655d6992a8 contains a patch.
[ { "commit_message": "[PATCH] fix webhook src/tarkov-data-manager/index.mjs | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA5YmRiM2E3NWE5OGE3MDQ3YjZkNzAxNDRlYjFkYTE2NTVkNjk5MmE4IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBSYXp6bWF0YXp6IDxyYXp6QGJhZGthcm1hLnh5ej4KRGF0ZTogRnJpL...
CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
GHSA-697v-pxg3-j262
Togglz console missing cross-site request forgery (CSRF) protection
null
[ { "commit_message": "[PATCH] Added CSRF protection to the togglz console via a CSRF token passed between the server and the clinet. This remediates the vulnerabilty CVE-2020-28191 by blocking CSRF attacks as the attcker will not be able to guess the CSRF token value. (#495) This has been implemented with either...
null
GHSA-8vmv-gvr3-636v
null
[ { "commit_message": "[PATCH] Format install params install/_functions_install.php | 15 +++++++++++++-- 1 file changed, 13 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSAwMDk2YTNlYmM4NWY2YWFkYmRhMmM0NDI3Y2QwOTJhNTM4YjE2MWQyIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiB5dXJhYmFraHRpbiA8eXVyeWJha2hAZ21...
null
GHSA-c6mx-gwgr-mfm2
ChakraCore RCE Vulnerability
null
[ { "commit_message": "[PATCH] [CVE-2018-0995] Edge - JavascriptNativeIntArray::ConvertToVarArray could lead to UAF - Individual lib/Runtime/Library/JavascriptArray.cpp | 70 ++++++++++++++----------- 1 file changed, 39 insertions(+), 31 deletions(-)", "patch_text_b64": "RnJvbSAzOTZkNzhmNjBhM2Q4NDQ0MjE4MjUzNTI...
null
CVE-2025-1793
SQL Injection in run-llama/llama_index
Multiple vector store integrations in run-llama/llama_index version v0.12.21 have SQL injection vulnerabilities. These vulnerabilities allow an attacker to read and write data using SQL, potentially leading to unauthorized access to data of other users depending on the usage of the llama-index library in a web application.
[ { "commit_message": "[PATCH] v0.12.28 (#18340) CHANGELOG.md | 88 +++ docs/docs/CHANGELOG.md | 88 +++ docs/docs/api_reference/agent/index.md | 5 +- docs/docs/api_reference/llms/asi.md | 4 + docs/docs/api_reference/readers/myscale.md ...
CWE-89 Improper Neutralization of Special Elements used in an SQL Command
GHSA-rcvx-rmvf-mxch
Cross-site Scripting in Eclipse Hawkbit
null
[ { "commit_message": "[PATCH] Fixes #1067 JSON body response for HTTP 404 error may contain unsafe URL path characters. Thus removing path from the response Signed-off-by: Dominic Schabel <dominic.schabel@bosch.io> ...orController.java => ErrorController.java} | 26 ++++++++++++++++--- 1 file changed, 22 insertio...
null
CVE-2023-23913
There is a potential DOM based cross-site scripting issue in rails-ujs which leverages the Clipboard API to target HTML elements that are assigned the contenteditable attribute. This has the potential to occur when pasting malicious HTML content from the clipboard that includes a data-method, data-remote or data-disable-with attribute.
[ { "commit_message": "[PATCH] Ignore certain data-* attributes in rails-ujs when element is contenteditable There is a potential DOM based cross-site scripting issue in rails-ujs which leverages the Clipboard API to target HTML elements that are assigned the contenteditable attribute. This has the potential to o...
CWE-476 NULL Pointer Dereference
CVE-2025-54789
Files is Vulnerable to Reflected Self-XSS through its File Move Functionality
Files is a module for managing files inside spaces and user profiles. In versions 0.16.9 and below, the File Move functionality does not contain logic that prevents injection of arbitrary JavaScript, which can lead to Browser JS code execution in the context of the user’s session. This is fixed in version 0.16.10.
[ { "commit_message": "[PATCH] Refactor files sort ordering Module.php | 16 +--- controllers/BaseController.php | 65 +-------------- controllers/BrowseController.php | 11 +-- controllers/ZipController.php | 18 ++++- docs/CHANGELOG.md ...
CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
GHSA-qhmp-h54x-38qr
Apprise vulnerable to regex injection with IFTTT Plugin
null
[ { "commit_message": "[PATCH] Slight bulletproofing to IFTTT regex handling (#436) apprise/plugins/NotifyIFTTT.py | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBlMjBmY2U2MzBkNTVlNGNhOWIwYTFlMzI1YTVmZWE2OTk3NDg5ODMxIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBDaHJpcyBDYXJvbiA8b...
null
CVE-2020-15130
False-positive validity for NFT1 genesis transactions in SLPJS
In SLPJS (npm package slpjs) before version 0.27.4, there is a vulnerability to false-positive validation outcomes for the NFT1 Child Genesis transaction type. A poorly implemented SLP wallet or opportunistic attacker could create a seemingly valid NFT1 child token without burning any of the NFT1 Group token type as is required by the NFT1 specification. This is fixed in version 0.27.4.
[ { "commit_message": "[PATCH] critical update for NFT child genesis validation lib/localvalidator.ts | 50 +++++++++++++++++++++++++++---------------- package-lock.json | 4 ++-- package.json | 2 +- 3 files changed, 35 insertions(+), 21 deletions(-)", "patch_text_b64": "RnJvbSAyOTBjMjBlOGJmZjEzY...
CWE-697: Incorrect Comparison
GHSA-r549-wwpp-pwm2
null
[ { "commit_message": "[PATCH] Fix CVE-2015-7368 Information Exposure Through Browser Caching N B Sri Harsha has discovered that the cached copies of pages visited in Revive Adserver's Admin UI were still reachable via the browser history after succesfully logging out. That could potentially expose sensitive info...
null
PYSEC-2021-425
null
[ { "commit_message": "[PATCH] Merge pull request from GHSA-jj53-8fmw-f2w2 synapse/groups/groups_server.py | 18 ++++++++-- tests/rest/client/v2_alpha/test_groups.py | 43 +++++++++++++++++++++++ 2 files changed, 59 insertions(+), 2 deletions(-) create mode 100644 tests/rest/client/v2_alpha/test_groups.py...
null
GHSA-5g2c-j6v9-vf94
Jenkins Custom Build Properties Plugin vulnerable to Cross-site Scripting
null
[ { "commit_message": "[PATCH] [SECURITY-2810] pom.xml | 11 ++ .../CustomBuildPropertiesAction.java | 9 +- .../custombuildproperties/HtmlSanitizer.java | 70 +++++++ .../custombuildproperties/table/CbpTable.java | 40 ++-- .../CustomBuildPropertiesAction/index.je...
null
GHSA-7f7x-29w2-852x
null
[ { "commit_message": "[PATCH] MIPS: asm: thread_info: Add _TIF_SECCOMP flag Add _TIF_SECCOMP flag to _TIF_WORK_SYSCALL_ENTRY to indicate that the system call needs to be checked against a seccomp filter. Signed-off-by: Markos Chandras <markos.chandras@imgtec.com> Reviewed-by: Paul Burton <paul.burton@imgtec.com>...
null
CVE-2024-10724
Stored XSS in IPV6 Section in phpipam/phpipam
A stored cross-site scripting (XSS) vulnerability exists in phpipam/phpipam version 1.5.2, specifically in the Subnet NAT translations section when editing the Destination address. This vulnerability allows an attacker to execute malicious code. The issue is fixed in version 1.7.0.
[ { "commit_message": "[PATCH] Refactor: Safe by default strategy of database string data v2 Call htmlentities() on all string data returned from the database to ensure it is safe to pass to print(). Areas of code that require unsafe HTML symbols will be updated to explicitly call html_entity_decode(). db/SCHEMA....
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2020-15717
RosarioSIS 6.7.2 is vulnerable to XSS, caused by improper validation of user-supplied input by the Search.inc.php script. A remote attacker could exploit this vulnerability using the advanced parameter in a crafted URL.
[ { "commit_message": "<francoisjacquet@users.noreply.github.com> [PATCH] Fix #291 XSS Use URLEscape() for forms action CHANGES.md | 1 + modules/Accounting/DailyTotals.php | 2 +- modules/Accounting/DailyTransactions.php | 2 +- modules/Accounting...
n/a
GHSA-m86v-h9fv-58v9
null
[ { "commit_message": "[PATCH] xss fixes .../views/advanced_settings/adminUsers.php | 8 +++--- .../views/advanced_settings/languages.php | 2 +- .../modules/admin/views/blog/blogpublish.php | 2 +- .../admin/views/ecommerce/discounts.php | 20 ++++++------- .../modules/admin/views/ecommerce/publish....
null
PYSEC-2021-674
null
[ { "commit_message": "[PATCH] Add missing validation in `QuantizedBatchNormWithGlobalNormalization` PiperOrigin-RevId: 370123451 Change-Id: Id234d6dab1ec21230bb8e503dba30f899af87f33 .../core/kernels/quantized_batch_norm_op.cc | 77 ++++++++++++++++--- 1 file changed, 67 insertions(+), 10 deletions(-)", "pat...
null
CVE-2023-30547
Sandbox Escape in vm2
vm2 is a sandbox that can run untrusted code with whitelisted Node's built-in modules. There exists a vulnerability in exception sanitization of vm2 for versions up to 3.9.16, allowing attackers to raise an unsanitized host exception inside `handleException()` which can be used to escape the sandbox and run arbitrary code in host context. This vulnerability was patched in the release of version `3.9.17` of `vm2`. There are no known workarounds for this vulnerability. Users are advised to upgrade.
[ { "commit_message": "[PATCH] Ensure every catch block is protected lib/transformer.js | 26 +++++++++++++------------- 1 file changed, 13 insertions(+), 13 deletions(-)", "patch_text_b64": "RnJvbSA0YjIyZTg3YjEwMmQ5N2Q0NWQxMTJhMDkzMWRiYTFhZWY3ZWVhMDQ5IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBYbWlsaWFIIDx4bWl...
CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
GHSA-4cf4-hqwp-cpp8
null
[ { "commit_message": "[PATCH] tiffcrop subroutines require a larger buffer (fixes #271, #381, #386, #388, #389, #435) tools/tiffcrop.c | 209 ++++++++++++++++++++++++++--------------------- 1 file changed, 118 insertions(+), 91 deletions(-)", "patch_text_b64": "RnJvbSBhZmQ3MDg2MDkwZGFmZDM5NDlhZmQxNzI4MjJjYmNl...
null
CVE-2016-7539
Memory leak in AcquireVirtualMemory in ImageMagick before 7 allows remote attackers to cause a denial of service (memory consumption) via unspecified vectors.
[ { "commit_message": "[PATCH] http://www.imagemagick.org/discourse-server/viewtopic.php?f=2&t=28946 magick/cache.c | 17 +++-------------- 1 file changed, 3 insertions(+), 14 deletions(-)", "patch_text_b64": "RnJvbSA0ZTgxY2U4YjA3MjE5YzY5YTlhZWNjYjBmN2Y3YjkyN2NhNmRiNzRjIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tO...
n/a
CVE-2024-8612
Qemu-kvm: information leak in virtio devices
A flaw was found in QEMU, in the virtio-scsi, virtio-blk, and virtio-crypto devices. The size for virtqueue_push as set in virtio_scsi_complete_req / virtio_blk_req_complete / virito_crypto_req_complete could be larger than the true size of the data which has been sent to guest. Once virtqueue_push() finally calls dma_memory_unmap to ummap the in_iov, it may call the address_space_write function to write back the data. Some uninitialized data may exist in the bounce.buffer, leading to an information leak.
[ { "commit_message": "[PATCH] softmmu: Support concurrent bounce buffers MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit When DMA memory can't be directly accessed, as is the case when running the device model in a separate process without shareable DMA file descriptors,...
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2026-21876
OWASP CRS has multipart bypass using multiple content-type parts
The OWASP core rule set (CRS) is a set of generic attack detection rules for use with compatible web application firewalls. Prior to versions 4.22.0 and 3.3.8, the current rule 922110 has a bug when processing multipart requests with multiple parts. When the first rule in a chain iterates over a collection (like `MULTIPART_PART_HEADERS`), the capture variables (`TX:0`, `TX:1`) get overwritten with each iteration. Only the last captured value is available to the chained rule, which means malicious charsets in earlier parts can be missed if a later part has a legitimate charset. Versions 4.22.0 and 3.3.8 patch the issue.
[ { "commit_message": "[PATCH 1/7] Fix multipart content type and charset bypass rules/REQUEST-922-MULTIPART-ATTACK.conf | 34 ++++++++++++++++++++----- 1 file changed, 28 insertions(+), 6 deletions(-)", "patch_text_b64": "RnJvbSA0YjllNjIxNzRkZWQ4OTQ3M2JhZDRkOGJlZGQwN2NhMjVkYzBkYmZiIE1vbiBTZXAgMTcgMDA6MDA6MDAg...
CWE-794: Incomplete Filtering of Multiple Instances of Special Elements
GHSA-6v57-gq9p-2vjv
null
[ { "commit_message": "[PATCH] mm/hotplug: correctly add new zone to all other nodes' zone lists When online_pages() is called to add new memory to an empty zone, it rebuilds all zone lists by calling build_all_zonelists(). But there's a bug which prevents the new zone to be added to other nodes' zone lists. onl...
null
CVE-2024-47530
Scout contains an Open Redirect on Login via `next`
Scout is a web-based visualizer for VCF-files. Open redirect vulnerability allows performing phishing attacks on users by redirecting them to malicious page. /login API endpoint is vulnerable to open redirect attack via next parameter due to absence of sanitization logic. Additionally, due to lack of scheme validation, HTTPS Downgrade Attack can be performed on the users. This vulnerability is fixed in 4.89.
[ { "commit_message": "[PATCH] Avoid open login redirect attacks via next (#4841) * Avoid open login redirect attacks via next * Remove next also where it comes from * typo Co-authored-by: Chiara Rasi <rasi.chiara@gmacil.com> CHANGELOG.md | 1 + scout/server/app.py | 5 ...
CWE-601: URL Redirection to Untrusted Site ('Open Redirect')
GHSA-6xcv-h2c9-qr78
null
[ { "commit_message": "[PATCH] Fix handling of wide datetime input/output. MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Many server functions use the MAXDATELEN constant to size a buffer for parsing or displaying a datetime value. It was much too small for the longest...
null
GHSA-3jfq-g458-7qm9
Arbitrary File Creation/Overwrite due to insufficient absolute path sanitization
null
[ { "commit_message": "[PATCH] fix: strip absolute paths more comprehensively lib/strip-absolute-path.js | 14 ++++++++++++++ lib/unpack.js | 10 +++++----- lib/write-entry.js | 23 +++++++++++++---------- test/strip-absolute-path.js | 14 ++++++++++++++ test/unpack.js | 7 +++++-...
null
GHSA-c827-hfw6-qwvm
rustix's `rustix::fs::Dir` iterator with the `linux_raw` backend can cause memory explosion
null
[ { "commit_message": "[PATCH] Merge pull request from GHSA-c827-hfw6-qwvm * Fix `rustix::fs::Dir` to avoid unbounded buffer growth. Fix `Dir`'s buffer size computation to avoid resizing past a fixed upper limit. This prevents it from growing without bound, such as in the case of `Dir::rewind` for repeated iterat...
null
CVE-2017-15809
In phpMyFaq before 2.9.9, there is XSS in admin/tags.main.php via a crafted tag.
[ { "commit_message": "[PATCH] Added XSS and CSRF protection phpmyfaq/admin/ajax.tags.php | 6 ++++++ phpmyfaq/admin/assets/js/tags.js | 11 ++++++----- phpmyfaq/admin/tags.main.php | 4 ++-- 3 files changed, 14 insertions(+), 7 deletions(-)", "patch_text_b64": "RnJvbSBjYjY0OGYwZDU2OTBiODE2NDdkZDVjOWVm...
n/a
CVE-2025-58358
Markdownify is vulnerable to command injection through pptx-to-markdown tool
Markdownify is a Model Context Protocol server for converting almost anything to Markdown. Versions below 0.0.2 contain a command injection vulnerability, caused by the unsanitized use of input parameters within a call to child_process.exec, enabling an attacker to inject arbitrary system commands. Successful exploitation can lead to remote code execution under the server process's privileges. The server constructs and executes shell commands using unvalidated user input directly within command-line strings. This introduces the possibility of shell metacharacter injection (|, >, &&, etc.). This issue is fixed in version 0.0.2.
[ { "commit_message": "[PATCH 1/2] feat: patch potential vulnerability in use of subprocess src/Markdownify.ts | 24 ++++++++++++------------ src/UVX.ts | 12 +++++++++--- src/utils.ts | 9 +++++++++ 3 files changed, 30 insertions(+), 15 deletions(-) create mode 100644 src/utils.ts", "patch_text_b...
CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')
GHSA-9r9m-ffp6-9x4v
vue-i18n has cross-site scripting vulnerability with prototype pollution
null
[ { "commit_message": "[PATCH] Merge commit from fork * fix: XSS vulnerability with prototype pollution on AST * test: add e2e test for scurity fix * fix: update e2e * fix: filename * fix: change type name e2e/hotfix.spec.ts | 11 + e2e/hotfix/CVE-2024-52809.html | 69 +++ pack...
null
GHSA-7m7q-q53v-j47v
Regular Expression Denial of Service
null
[ { "commit_message": "[PATCH] Allow only ONE level of nested parenthesis in link uris (as previously intended in 9f20c4682). Reverts 9c976cda1. Fixes #1405. Disable cm test 468. lib/marked.js | 2 +- test/new/link_redos.html | 5 +++++ test/new/link_redos.md ...
null
CVE-2021-21261
Flatpak sandbox escape via spawn portal
Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. A bug was discovered in the `flatpak-portal` service that can allow sandboxed applications to execute arbitrary code on the host system (a sandbox escape). This sandbox-escape bug is present in versions from 0.11.4 and before fixed versions 1.8.5 and 1.10.0. The Flatpak portal D-Bus service (`flatpak-portal`, also known by its D-Bus service name `org.freedesktop.portal.Flatpak`) allows apps in a Flatpak sandbox to launch their own subprocesses in a new sandbox instance, either with the same security settings as the caller or with more restrictive security settings. For example, this is used in Flatpak-packaged web browsers such as Chromium to launch subprocesses that will process untrusted web content, and give those subprocesses a more restrictive sandbox than the browser itself. In vulnerable versions, the Flatpak portal service passes caller-specified environment variables to non-sandboxed processes on the host system, and in particular to the `flatpak run` command that is used to launch the new sandbox instance. A malicious or compromised Flatpak app could set environment variables that are trusted by the `flatpak run` command, and use them to execute arbitrary code that is not in a sandbox. As a workaround, this vulnerability can be mitigated by preventing the `flatpak-portal` service from starting, but that mitigation will prevent many Flatpak apps from working correctly. This is fixed in versions 1.8.5 and 1.10.0.
[ { "commit_message": "[PATCH] run: Convert all environment variables into bwrap arguments This avoids some of them being filtered out by a setuid bwrap. It also means that if they came from an untrusted source, they cannot be used to inject arbitrary code into a non-setuid bwrap via mechanisms like LD_PRELOAD. B...
CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
CVE-2025-64434
KubeVirt Improper TLS Certificate Management Handling Allows API Identity Spoofing
KubeVirt is a virtual machine management add-on for Kubernetes. Prior to 1.5.3 and 1.6.1, due to the peer verification logic in virt-handler (via verifyPeerCert), an attacker who compromises a virt-handler instance, could exploit these shared credentials to impersonate virt-api and execute privileged operations against other virt-handler instances potentially compromising the integrity and availability of the VM managed by it. This vulnerability is fixed in 1.5.3 and 1.6.1.
[ { "commit_message": "[PATCH] SetupTLSWithCertManager now enforces CN The CNs will be provided by Kubernetes. If empty, any client certificate validated by the authority is allowed. Signed-off-by: Luboslav Pivarc <lpivarc@redhat.com> pkg/util/tls/tls.go | 30 +++++++++++++++++++++++++++++- pkg/util/tls/tls_t...
CWE-287: Improper Authentication
GHSA-3xxm-3g3c-w579
Moodle Code Injection vulnerability
null
[ { "commit_message": "[PATCH] MDL-79408 mod_lesson: safer unserializing/comparison of properties. mod/lesson/locallib.php | 10 +++++----- mod/lesson/mod_form.php | 8 ++++---- mod/lesson/pagetypes/essay.php | 6 +++--- 3 files changed, 12 insertions(+), 12 deletions(-)", "patch_text_b64": "RnJv...
null
GHSA-8fcm-p7hg-mf4h
null
[ { "commit_message": "[PATCH] minor: Fix overflow in Clipsal-CMR113 and Somfy-IOHC reported by aug5t7 src/devices/cmr113.c | 4 ++-- src/devices/somfy_iohc.c | 9 +++++---- 2 files changed, 7 insertions(+), 6 deletions(-)", "patch_text_b64": "RnJvbSAyZGFkN2I5ZmM2N2ExZDBiZmJlNTIwZmJkODIxNjc4YjhmOGNjN2E4IE1v...
null
GHSA-937f-qh3w-6g87
OctoPrint vulnerable to Insufficient Session Expiration.
null
[ { "commit_message": "[PATCH] =?UTF-8?q?=F0=9F=94=92=20Make=20session=20handling=20more?= =?UTF-8?q?=20secure?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit * 🔒️ Tie remember_me cookie to password hash That way when the password gets changed, existing cookies automat...
null
GHSA-35jh-r3h4-6jhm
Command Injection in lodash
null
[ { "commit_message": "[PATCH] Prevent command injection through `_.template`'s `variable` option Closes #5085. lodash.js | 21 ++++++++++++++++++++- test/test.js | 8 ++++++++ 2 files changed, 28 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAzNDY5MzU3Y2ZmMzk2YTI2YzM2M2Y4YzFiNWE5MWRkZTI4YmE0YjFjI...
null
GHSA-g7q5-pjjr-gqvp
Regular Expression Denial of Service in tough-cookie
null
[ { "commit_message": "[PATCH] Constrain spaces before = to 256 Side-steps ReDoS in Issue #92 lib/cookie.js | 4 +- test/parsing_test.js | 113 ++++++++++++++++++++++++++++++++++++++++++- 2 files changed, 114 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSBmMWVkNDIwYTZhOTJlYTdhNTQxOGRmNmUzOWU...
null