id stringlengths 12 19 | title stringlengths 0 237 | description stringlengths 35 3.87k ⌀ | patches listlengths 1 22 | cwe stringlengths 2 440 ⌀ |
|---|---|---|---|---|
GHSA-3887-hqfw-78p7 | null | [
{
"commit_message": "[PATCH] Secunia 81800#1: samsumg_load_raw Secunia 81800#2: find_green Secunia 81800#3: rollei_load_raw remove_trailing_spaces: isspace() does not works right with signed non-latin chars Secunia 81800#5/6: nikon_coolscan_load_raw Secunia 81800#4: rollei_load_raw dcraw/dcraw.c | 1... | null | |
PYSEC-2021-843 | null | [
{
"commit_message": "[PATCH] Add shape checks to GPU TridiagonalMatMul. When given invalid shapes, the GPU TridiagonalMatMul op could read invalid or uninitialized GPU memory. PiperOrigin-RevId: 401775483 Change-Id: Ib5500aeb8225e50d4ce790b06d2c34751f544ad8 .../linalg/tridiagonal_matmul_op_gpu.cu.cc | 39 +++... | null | |
GHSA-crcq-pw8h-9xwf | Moodle does not provide charset information in HTTP headers | null | [
{
"commit_message": "[PATCH] MDL-47966 Add default content type and encoding lib/setup.php | 18 ++++++++++++++++++ 1 file changed, 18 insertions(+)",
"patch_text_b64": "RnJvbSAwYTAxNDVjNWU4MDQxYWFkZWZmMzAzYTlmOTk4NGM4NjcwNmI0ZTQyIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBQZXRyIFNrb2RhIDxwZXRyLnNrb2RhQHRvdGF... | null |
GHSA-6x52-4rr6-8fw7 | null | [
{
"commit_message": "[PATCH] set httponly to true when calling setcookie. the ini_set option above doesn't actually seem to do anything... (but not removing it just in case Signed-off-by: Adam Warner <me@adamwarner.co.uk> scripts/pi-hole/php/password.php | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-... | null | |
CVE-2025-3160 | Open Asset Import Library Assimp File SceneCombiner.cpp AddNodeHashes out-of-bounds | A vulnerability has been found in Open Asset Import Library Assimp 5.4.3 and classified as problematic. This vulnerability affects the function Assimp::SceneCombiner::AddNodeHashes of the file code/Common/SceneCombiner.cpp of the component File Handler. The manipulation leads to out-of-bounds read. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The patch is identified as a0993658f40d8e13ff5823990c30b43c82a5daf0. It is recommended to apply a patch to fix this issue. | [
{
"commit_message": "[PATCH] Bugfix: Fix possible nullptr dereferencing - closes https://github.com/assimp/assimp/issues/6025 code/Common/SceneCombiner.cpp | 5 +++++ 1 file changed, 5 insertions(+)",
"patch_text_b64": "RnJvbSBhMDk5MzY1OGY0MGQ4ZTEzZmY1ODIzOTkwYzMwYjQzYzgyYTVkYWYwIE1vbiBTZXAgMTcgMDA6MDA6MDAgM... | Out-of-Bounds Read |
GHSA-3r5p-qhf8-8xc9 | null | [
{
"commit_message": "[PATCH 1/2] Fix https://github.com/unicorn-engine/unicorn/issues/1586 uc.c | 1 + 1 file changed, 1 insertion(+)",
"patch_text_b64": "RnJvbSBhMjhkMWRmYmVkNDE4YWEwNzY1MzY5NGUyNGU5ZjczMWJhYThlZjNiIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBsaXlhbnNvbmcyMDE4IDwxMzIxOTkzMzgzQHFxLmNvbT4KRGF0ZT... | null | |
GHSA-m63j-wh5w-c252 | Denial of Service Vulnerability in Action View | null | [
{
"commit_message": "[PATCH] Only accept formats from registered mime types [CVE-2019-5418] [CVE-2019-5419] .../lib/action_dispatch/http/mime_negotiation.rb | 5 +++++ actionpack/test/controller/mime/respond_to_test.rb | 10 ++++++---- .../new_base/content_negotiation_test.rb | 14 ++++++++++++-- 3 fi... | null |
CVE-2012-3508 | Cross-site scripting (XSS) vulnerability in program/lib/washtml.php in Roundcube Webmail 0.8.0 allows remote attackers to inject arbitrary web script or HTML by using "javascript:" in an href attribute in the body of an HTML-formatted email. | [
{
"commit_message": "[PATCH] Fix XSS issue with href=\"javascript:\" not being removed (#1488613) CHANGELOG | 1 + program/lib/washtml.php | 8 ++++++-- 2 files changed, 7 insertions(+), 2 deletions(-)",
"patch_text_b64": "RnJvbSA1ZWY4ZTRhZDlkM2VlODY4OWQyYjgzNzUwYWE2NTM5NWI3Y2Q1OWVlIE1vbiBTZXAgM... | n/a | |
CVE-2021-21402 | Unauthenticated Arbitrary File Access in Jellyfin | Jellyfin is a Free Software Media System. In Jellyfin before version 10.7.1, with certain endpoints, well crafted requests will allow arbitrary file read from a Jellyfin server's file system. This issue is more prevalent when Windows is used as the host OS. Servers that are exposed to the public Internet are potentially at risk. This is fixed in version 10.7.1. As a workaround, users may be able to restrict some access by enforcing strict security permissions on their filesystem, however, it is recommended to update as soon as possible. | [
{
"commit_message": "[PATCH] Merge pull request from GHSA-wg4c-c9g9-rxhx Fix issues 1 through 5 from GHSL-2021-050 (cherry picked from commit fe8cf29cad2ca1b5d3a78c86cacf3ba96608034f) Signed-off-by: Joshua M. Boniface <joshua@boniface.me> .../Controllers/HlsSegmentController.cs | 23 +++++++++++++++--- ...... | CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') |
CVE-2022-1947 | Use of Incorrect Operator in polonel/trudesk | Use of Incorrect Operator in GitHub repository polonel/trudesk prior to 1.2.3. | [
{
"commit_message": "[PATCH] fix(messages): invalid permissions src/controllers/messages.js | 12 +++++++++++- 1 file changed, 11 insertions(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSBhOWUzOGYyNWMyYWYyNzIyZGVlNGZkYWZiMmZiNzBkMzBkNTEwNmM1IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBDaHJpcyBCcmFtZSA8cG9sb25lb... | CWE-480 Use of Incorrect Operator |
GHSA-3rw2-wfc8-wmj5 | Fides Webserver Vulnerable to SVG Bomb File Uploads | null | [
{
"commit_message": "[PATCH] Merge pull request from GHSA-3rw2-wfc8-wmj5 * Adding checks for malicious SVGs * Fixing merge conflicts Co-authored-by: Dave Quinlan <83430497+daveqnet@users.noreply.github.com> requirements.txt | 1 + .../saas/connector_registry_service.py | 3 +... | null |
CVE-2018-11319 | Syntastic (aka vim-syntastic) through 3.9.0 does not properly handle searches for configuration files (it searches the current directory up to potentially the root). This improper handling might be exploited for arbitrary code execution via a malicious gcc plugin, if an attacker has write access to a directory that is a parent of the base directory of the project being checked. NOTE: exploitation is more difficult after 3.8.0 because filename prediction may be needed. | [
{
"commit_message": "[PATCH] Security: clear defaults for config file names (cf. #2170). autoload/syntastic/c.vim | 2 +- doc/syntastic-checkers.txt | 56 +++++++++++++++---------------- plugin/syntastic.vim | 2 +- syntax_checkers/c/avrgcc.vim | 8 ++--- syntax_checkers/c/clang... | n/a | |
GHSA-jf66-3q76-h5p5 | Tenant and Verifier might not use the same registrar data | null | [
{
"commit_message": "[PATCH] tenant, verifier: let the tenant provide the AK and mTLS certificate This eliminates the need for the verifier to connect to the registrar. Signed-off-by: Thore Sommer <mail@thson.de> keylime/cloud_verifier_tornado.py | 21 ++++----------------- keylime/tenant.py | 2... | null |
GHSA-78q2-cv3p-x9fm | Pimcore Cross-site Scripting vulnerability | null | [
{
"commit_message": "[PATCH] Fix Xss in the Search Documents .../public/js/pimcore/element/selector/document.js | 11 ++++++++++- 1 file changed, 10 insertions(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSA5MjgxMWYwN2QzOWU0YWQ5NWM5MjAwMzg2OGY1ZjczMDk0ODlkNzljIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBhcnl... | null |
GHSA-q9xx-4689-gvv5 | Magento Unauthorized access to restricted resources | null | [
{
"commit_message": "[PATCH] Magento Release 2.4.2-p1 app/code/Magento/AdminAnalytics/composer.json | 24 +- .../Magento/AdminNotification/composer.json | 24 +- .../AdvancedPricingImportExport/composer.json | 28 +- app/code/Magento/AdvancedSearch/composer.json | 28 +- app/code/Magento/Amqp/composer.json ... | null |
CVE-2020-35136 | Dolibarr 12.0.3 is vulnerable to authenticated Remote Code Execution. An attacker who has the access the admin dashboard can manipulate the backup function by inserting a payload into the filename for the zipfilename_template parameter to admin/tools/dolibarr_export.php. | [
{
"commit_message": "[PATCH] =?UTF-8?q?Fix=20disallow=20--=20string=20into=20filename?= =?UTF-8?q?=20for=20security=20purpose.=20Vulnerability=20reported=20by=20?= =?UTF-8?q?Y=C4=B1lmaz=20De=C4=9Firmenci?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit htdocs/admin/too... | n/a | |
CVE-2020-35523 | An integer overflow flaw was found in libtiff that exists in the tif_getimage.c file. This flaw allows an attacker to inject and execute arbitrary code when a user opens a crafted TIFF file. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. | [
{
"commit_message": "[PATCH] gtTileContig(): check Tile width for overflow fixes #211 libtiff/tif_getimage.c | 17 +++++++++++++---- 1 file changed, 13 insertions(+), 4 deletions(-)",
"patch_text_b64": "RnJvbSBjOGQ2MTNlZjQ5NzA1OGZlNjUzYzQ2N2ZjODRjNzBhNjJhNGE3MWIyIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBUaG... | CWE-190 | |
CVE-2024-31226 | Sunshine's unquoted executable path could lead to hijacked execution flow | Sunshine is a self-hosted game stream host for Moonlight. Users who ran Sunshine versions 0.17.0 through 0.22.2 as a service on Windows may be impacted when terminating the service if an attacked placed a file named `C:\Program.exe`, `C:\Program.bat`, or `C:\Program.cmd` on the user's computer. This attack vector isn't exploitable unless the user has manually loosened ACLs on the system drive. If the user's system locale is not English, then the name of the executable will likely vary. Version 0.23.0 contains a patch for the issue. Some workarounds are available. One may identify and block potentially malicious software executed path interception by using application control tools, like Windows Defender Application Control, AppLocker, or Software Restriction Policies where appropriate. Alternatively, ensure that proper permissions and directory access control are set to deny users the ability to write files to the top-level directory `C:`. Require that all executables be placed in write-protected directories. | [
{
"commit_message": "[PATCH] Quote the path to sunshinesvc.exe when launching the termination helper (#2379) tools/sunshinesvc.cpp | 7 +++++-- 1 file changed, 5 insertions(+), 2 deletions(-)",
"patch_text_b64": "RnJvbSA5M2U2MjIzNDJjNGYzZTliMzRmNWYyNjUwMzliNjc3NWI4ZTMzYTdhIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpG... | CWE-428: Unquoted Search Path or Element |
GHSA-6m9m-6qjp-9mm8 | null | [
{
"commit_message": "[PATCH] KEYS: Fix handling of stored error in a negatively instantiated user key If a user key gets negatively instantiated, an error code is cached in the payload area. A negatively instantiated key may be then be positively instantiated by updating it with valid data. However, the ->upd... | null | |
CVE-2010-2761 | The multipart_init function in (1) CGI.pm before 3.50 and (2) Simple.pm in CGI::Simple 1.112 and earlier uses a hardcoded value of the MIME boundary string in multipart/x-mixed-replace content, which allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via crafted input that contains this value, a different vulnerability than CVE-2010-3172. | [
{
"commit_message": "[PATCH] Randomise multipart boundary. Thanks to Yamada Masahiro. lib/CGI/Simple.pm | 9 ++++++++- t/050.simple.t | 5 +++-- t/070.standard.t | 6 ++++-- 3 files changed, 15 insertions(+), 5 deletions(-)",
"patch_text_b64": "RnJvbSBlNDk0MmI4NzFhMjZjMTMxN2ExNzVhOTFlYmI3MjYyZWVhNTliMzgwIE... | n/a | |
CVE-2015-6961 | Open redirect vulnerability in gluon/tools.py in Web2py 2.9.11 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the _next parameter to user/logout. | [
{
"commit_message": "[PATCH 1/2] Ignore the contents of the site-packages directory .gitignore | 1 + 1 file changed, 1 insertion(+)",
"patch_text_b64": "RnJvbSBjNWE5ZDJjNDU2MjM0NGQyMzgxNDIyOGIxNzk2NTM1MTRmOTliN2EyIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBwYWxsYXZfZmRzaSA8dGVjaGlfMDAwQHBhbGxhdi1mZHNpLmZkc2k... | n/a | |
PYSEC-2024-236 | null | [
{
"commit_message": "[PATCH 1/4] Escape invalid host when displayed in html jupyter_server_proxy/handlers.py | 3 ++- tests/test_proxies.py | 8 ++++++++ 2 files changed, 10 insertions(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSAwOTUwMjUyODhlMzkxMzIwZjc3M2VlYTQ2MjkwOTNlMGY5N2E2ZWMyIE1vbiBTZXAgMTc... | null | |
CVE-2020-1888 | Insufficient boundary checks when decoding JSON in handleBackslash reads out of bounds memory, potentially leading to DOS. This issue affects HHVM 4.45.0, 4.44.0, 4.43.0, 4.42.0, 4.41.0, 4.40.0, 4.39.0, versions between 4.33.0 and 4.38.0 (inclusive), versions between 4.9.0 and 4.32.0 (inclusive), and versions prior to 4.8.7. | [
{
"commit_message": "[PATCH] Fix buffer overrun in SimpleParser::handleBackslash Summary: It read 4 chars, then checked for validity, but any of them could have been the end of the string, so check after each one instead. Reviewed By: oulgen Differential Revision: D19611163 fbshipit-source-id: 3da0a39555cb85a93... | Out-of-bounds Read (CWE-125) | |
GHSA-93x7-vvj8-98xr | null | [
{
"commit_message": "[PATCH] rpmsg: virtio: Fix possible double free in rpmsg_virtio_add_ctrl_dev() vch will be free in virtio_rpmsg_release_device() when rpmsg_ctrldev_register_device() fails. There is no need to call kfree() again. Fixes: c486682ae1e2 (\"rpmsg: virtio: Register the rpmsg_char device\") Signed... | null | |
GHSA-25mq-v84q-4j7r | CURLOPT_HTTPAUTH option not cleared on change of origin | null | [
{
"commit_message": "[PATCH] Release 7.4.5 (#3043) CHANGELOG.md | 5 ++ README.md | 10 +-- composer.json | 2 +- src/RedirectMiddleware.php | 33 +------ tests/RedirectMiddlewareTest.php | 149 +++++++++++++++++++++++++------ 5 files changed,... | null |
GHSA-vcmm-ppqx-95ch | Logstash Logs Sensitive Information | null | [
{
"commit_message": "[PATCH] Release 2.3.4 (#5599) CHANGELOG.md | 5 ++++ Gemfile | 6 ++-- Gemfile.jruby-1.9.lock | 30 +++++++++---------- .../lib/logstash-core-event/version.rb | 2 +- .../lib/logstash-core-pl... | null |
GHSA-27mf-ghqm-j3j8 | aiohttp has a memory leak when middleware is enabled when requesting a resource with a non-allowed method | null | [
{
"commit_message": "[PATCH] [PR #9852/249855a backport][3.10] Fix system routes polluting the middleware cache (#9855) CHANGES/9852.bugfix.rst | 1 + aiohttp/web_app.py | 14 +++++++++++--- tests/test_web_middleware.py | 29 +++++++++++++++++++++++++++-- 3 files changed, 39 insertions(+), 5 deleti... | null |
GHSA-6q87-84jw-cjhp | @sveltejs/kit vulnerable to Cross-site Scripting via tracked search_params | null | [
{
"commit_message": "[PATCH] Merge commit from fork * fix: escape names of tracked search parameters * oops .changeset/rotten-colts-arrive.md | 5 +++++ packages/kit/src/runtime/server/data/index.js | 6 +++--- packages/kit/src/runtime/server/page/render.js | 10 ++++++---- packages/kit/src/runtime... | null |
GHSA-87hj-px7p-jhf4 | null | [
{
"commit_message": "[PATCH] Handle close_notify as standard writeErr in AsyncSSLSocket. Summary: Fixes CVE-2019-11934 Reviewed By: mingtaoy Differential Revision: D18020613 fbshipit-source-id: db82bb250e53f0d225f1280bd67bc74abd417836 folly/io/async/AsyncSSLSocket.cpp | 8 +- folly/io/async/test/Async... | null | |
GHSA-rfq3-w54c-f9q5 | OAuth2 Redirect URL validity does not respect query parameters and character casing for loopback addresses | null | [
{
"commit_message": "[PATCH] fix: make redirect URL checking more strict The OAuth 2.0 Client's Redirect URL and the Redirect URL used in the OAuth 2.0 flow do not check if the query string is equal: 1. Registering a client with allowed redirect URL `https://example.com/callback` 2. Performing OAuth2 flow and r... | null |
GHSA-69ch-w2m2-3vjp | golang.org/x/text/language Denial of service via crafted Accept-Language header | null | [
{
"commit_message": "[PATCH] language: reject excessively large Accept-Language strings The BCP 47 tag parser has quadratic time complexity due to inherent aspects of its design. Since the parser is, by design, exposed to untrusted user input, this can be leveraged to force a program to consume significant time... | null |
GHSA-wmff-grcw-jcfm | Tauri vulnerable to Regression on Filesystem Scope Checks for Dotfiles | null | [
{
"commit_message": "[PATCH] fix(core): fix `require_literal_leading_dot` flipped behavior (#7227) .changes/config.json | 1 + .changes/core-leading-dot.md | 5 +++++ core/tauri-config-schema/schema.json | 2 +- core/tauri-utils/src/config.rs | 2 +- core/tauri/src/scope/fs.rs ... | null |
GHSA-36w6-3wpq-3xq2 | null | [
{
"commit_message": "[PATCH] libvncserver: fix pointer aliasing/alignment issue Accessing byte-aligned data through uint16_t pointers can cause crashes on some platforms or reduce the performance. Therefore ensure a proper stack alignment. libvncserver/translate.c | 11 +++++++---- 1 file changed, 7 insertions(+... | null | |
GHSA-77hg-g8cc-5r37 | Puppet Privilege Escallation | null | [
{
"commit_message": "[PATCH] (#12459) drop supplementary groups when permanently dropping UID On certain platforms, Process::UID.change_privilege doesn't handle changing supplementary groups. In that case, we need to always explicitly initgroups, regardless of whether we're using change_privilege, or change_gro... | null |
GHSA-9vw5-h5q2-qpc9 | null | [
{
"commit_message": "[PATCH] Validation to prevent SQL injection. git-svn-id: https://plugins.svn.wordpress.org/cp-appointment-calendar/trunk@1088427 b8457f37-d9ea-0310-8a92-e5e31aec5664 dex_appointments.php | 2 ++ 1 file changed, 2 insertions(+)",
"patch_text_b64": "RnJvbSBlMjlhOWNkYmNiMGYzN2Q4ODdkZDMwMmEw... | null | |
CVE-2022-0370 | Cross-site Scripting (XSS) - Stored in livehelperchat/livehelperchat | Cross-site Scripting (XSS) - Stored in Packagist remdex/livehelperchat prior to 3.93v. | [
{
"commit_message": "[PATCH] CSRF For personal theme .../defaulttheme/js/admintheme.form.angular.js | 12 ++++++++++++ .../tpl/lhkernel/validation_error.tpl.php | 2 +- .../tpl/lhtheme/admin/form.tpl.php | 18 +++++++++++++++++- .../tpl/lhtheme/personaltheme.tpl.php | 2 +- 4 files chang... | CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') |
GHSA-74r6-grj9-8rq6 | Remote Code Execution in AjaxNetProfessional | null | [
{
"commit_message": "[PATCH] added allowed customized types .gitignore | 1 + AjaxPro/AjaxPro.csproj | 13 +- AjaxPro/AjaxPro.sln | 4 +- .../AjaxSettingsSectionHandler.cs | 19 + AjaxPro/Handler/AjaxProcHelper... | null |
CVE-2018-11652 | CSV Injection vulnerability in Nikto 2.1.6 and earlier allows remote attackers to inject arbitrary OS commands via the Server field in an HTTP response header, which is directly injected into a CSV report. | [
{
"commit_message": "[PATCH] Fix CSV injection issue if server responds with a malicious Server string & CSV output is opened in Excel or other spreadsheet app. Potentially malicious cell start characters are now prefaced with a ' mark. Thanks to Adam (@bytesoverbombs) for letting me know! Also fixed a crash in... | n/a | |
GHSA-6r8q-pfpv-7cgj | Vyper vulnerable to integer overflow in loop | null | [
{
"commit_message": "[PATCH] Merge pull request from GHSA-6r8q-pfpv-7cgj for loops of the form `for i in range(x, x+N)`, the range of the iterator is not checked, leading to potential overflow. the following example demonstrates the potential for overflow: ``` @external def test() -> uint16: x:uint8 = 255 a:uin... | null |
CVE-2023-48311 | Any image allowed by default | dockerspawner is a tool to spawn JupyterHub single user servers in Docker containers. Users of JupyterHub deployments running DockerSpawner starting with 0.11.0 without specifying `DockerSpawner.allowed_images` configuration allow users to launch _any_ pullable docker image, instead of restricting to only the single configured image, as intended. This issue has been addressed in commit `3ba4b665b` which has been included in dockerspawner release version 13. Users are advised to upgrade. Users unable to upgrade should explicitly set `DockerSpawner.allowed_images` to a non-empty list containing only the default image will result in the intended default behavior. | [
{
"commit_message": "[PATCH 1/2] allow only configured image by default avoids allowing all images when no allowed_images are configured The default of an empty collection prohibits specifying the image (even if it is the allowed image). A new value `allowed_images = \"*\"` can be used to explicitly allow any i... | CWE-20: Improper Input Validation |
GHSA-jrhf-5876-rh85 | null | [
{
"commit_message": "[PATCH] UMTS_FP: fix handling reserved C/T value The spec puts the reserved value at 0xf but our internal table has 'unknown' at 0; since all the other values seem to be offset-by-one, just take the modulus 0xf to avoid running off the end of the table. Bug: 12191 Change-Id: I83c8fb66797bbd... | null | |
GHSA-qw3j-j5h8-x72h | null | [
{
"commit_message": "[PATCH] fix goback url to avoid security issues lib/cfields/cfieldsExport.php | 21 +++++++++++---------- lib/cfields/cfieldsImport.php | 22 +++++++++------------- 2 files changed, 20 insertions(+), 23 deletions(-)",
"patch_text_b64": "RnJvbSAyZDE3Y2QwMGY5ODFmOGU4Yzk3ZGUzNGExMmUzNjhiYTJh... | null | |
GHSA-5jqp-wmhj-g33f | usememos/memos Cross-Site Request Forgery vulnerability | null | [
{
"commit_message": "[PATCH] chore: fix CSRF (#876) server/acl.go | 1 + server/server.go | 4 ++++ 2 files changed, 5 insertions(+)",
"patch_text_b64": "RnJvbSBjOWJiMmI3ODVkYzU4NTI2NTU0MDVkNWM5YWIxMjdhMmQ1YWEzOTQ4IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBib29qYWNrIDxzdGV2ZW5sZ3RtQGdtYWlsLmNvbT4KRGF0ZTogR... | null |
CVE-2019-19962 | wolfSSL before 4.3.0 mishandles calls to wc_SignatureGenerateHash, leading to fault injection in RSA cryptography. | [
{
"commit_message": "[PATCH] Change signature generation to verify by default wolfcrypt/src/signature.c | 30 ++++++++++++++++++++++++++++++ wolfssl/wolfcrypt/signature.h | 11 +++++++++++ 2 files changed, 41 insertions(+)",
"patch_text_b64": "RnJvbSAyMzg3ODUxMmM2NTgzNGQxMjgxMWIxMTA3ZDE5YTAwMTQ3OGVjYTVkIE... | n/a | |
GHSA-932v-x9x2-vq29 | Hive Metastore Server is vulnerable to SQL Injection | null | [
{
"commit_message": "[PATCH] Enable using column identifiers with special characters when deleting table column statistics. (#6149) .../hive/metastore/MetaStoreDirectSql.java | 44 +++++++++++++------ .../hive/metastore/TestObjectStore.java | 34 +++++++++++--- 2 files changed, 57 insertions(+), 21 delet... | null |
GHSA-pwv6-872c-gcg6 | Cross-Site Request Forgery in Jenkins | null | [
{
"commit_message": "[PATCH 1/2] [SECURITY-406] Prevent user creation via GET /user/whatever core/src/main/java/hudson/model/User.java | 16 ++++++++++ core/src/main/java/jenkins/model/Jenkins.java | 2 +- .../test/java/jenkins/model/JenkinsTest.java | 30 +++++++++++++++++++ 3 files changed, 47 insertions(+... | null |
GHSA-3wph-8799-87r7 | null | [
{
"commit_message": "[PATCH] ui/vnc-clipboard: fix integer underflow in vnc_client_cut_text_ext Extended ClientCutText messages start with a 4-byte header. If len < 4, an integer underflow occurs in vnc_client_cut_text_ext. The result is used to decompress data in a while loop in inflate_buffer, leading to CPU ... | null | |
GHSA-ggmv-j932-q89q | Chall-Manager's HTTP Gateway is vulnerable to DoS due to missing header timeout | null | [
{
"commit_message": "[PATCH] fix: potential slowloris attack on http server header reading server/server.go | 2 ++ 1 file changed, 2 insertions(+)",
"patch_text_b64": "RnJvbSAxMzg1YmQ4NjkxNDI2NTExNDZjZDBiMTIzMDg1ZjkxY2VjNjk4NjM2IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBMdWNhcyBURVNTT04gPGx1Y2FzdGVzc29uQHBy... | null |
GHSA-gm8g-fh49-qq6v | Jenkins global-build-stats Plugin missing permission check can result in graph IDs being enumerated | null | [
{
"commit_message": "[PATCH] [SECURITY-3535] .../GlobalBuildStatsPlugin.java | 19 ++++++++++++++++++- 1 file changed, 18 insertions(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSAzMmFlYjA0OTNjNGZmNTQyMzQ0ODU3NmY0NzdhYzYxMmY3YTI1MTM4IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBWaWN0b3IgQmFsYWtpbmU... | null |
GHSA-jj6p-3m75-g2p3 | matrix-sdk-base denial of service via custom m.room.join_rules event values | null | [
{
"commit_message": "[PATCH] fix: Don't attempt to serialize custom join rules (#5924) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit This is not supported by Ruma. The join_rule field, despite being defined as a pure string, can have associated data to it based on the... | null |
PYSEC-2023-33 | null | [
{
"commit_message": "[PATCH] Fixed XSS vulnerability modoboa/static/js/listing.js | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)",
"patch_text_b64": "RnJvbSAwNWI0YTRmODY1YzgyMWI0ZDE3ODBhYzRhMWYwMDQzMjUzNGFiYWZhIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBBbnRvaW5lIE5ndXllbiA8dG9uaW9Abmd5bi5vcmc+CkRh... | null | |
GHSA-qjx3-2g35-6hv8 | Mautic Sensitive Data Exposure due to inadequate user permission settings | null | [
{
"commit_message": "[PATCH] Merge pull request from GHSA-qjx3-2g35-6hv8 * - included new permission to denied unauthorized access - included functional tests * - take out import permission * - change permission parameters from lead to user data * - change permission parameters from lead to user data Co-authore... | null |
CVE-2024-56329 | Account Takeover Vulnerability in Social Account Linking in joelbutcher/socialstream | Socialstream is a third-party package for Laravel Jetstream. It replaces the published authentication and profile scaffolding provided by Laravel Jetstream, with scaffolding that has support for Laravel Socialite. When linking a social account to an already authenticated user, the lack of a confirmation step introduces a security risk. This is exacerbated if ->stateless() is used in the Socialite configuration, bypassing state verification and making the exploit easier. Developers should ensure that users explicitly confirm account linking and avoid configurations that skip critical security checks. Socialstream v6.2 introduces a new custom route that requires a user to "Confirm" or "Deny" a request to link a social account. Users are advised to upgrade. There are no known workarounds for this vulnerability. | [
{
"commit_message": "[PATCH] Merge commit from fork resources/views/oauth/prompt.blade.php | 47 +++++++++++++++++ routes/web.php | 12 +++++ src/Actions/AuthenticateOAuthCallback.php | 14 +++-- src/Http/Controllers/OAuthController.php | 62 +++++++++++++++++++++++ src/SocialstreamSe... | CWE-287: Improper Authentication |
GHSA-rr24-p653-wjc3 | null | [
{
"commit_message": "[PATCH] SOAP API: proper access checks when deleting bugs Affects #13656 : Reporters have read/write access to existing data of other users api/soap/mc_issue_api.php | 4 ++++ 1 file changed, 4 insertions(+)",
"patch_text_b64": "RnJvbSBkZjc3ODJhNjVlOTZhYTFjOTYzOWE3NjI1YTY1ODEwMjEzNGM3ZmU... | null | |
CVE-2025-62406 | Piwigo is vulnerable to one-click account takeover by modifying the password-reset link | Piwigo is a full featured open source photo gallery application for the web. In Piwigo 15.6.0, using the password reset function allows sending a password-reset URL by entering an existing username or email address. However, the hostname used to construct this URL is taken from the HTTP request's Host header and is not validated at all. Therefore, an attacker can send a password-reset URL with a modified hostname to an existing user whose username or email the attacker knows or guesses. This issue has been patched in version 15.7.0. | [
{
"commit_message": "[PATCH] (cp 9ac99be1d) fixes GHSA-9986-w7jf-33f6 and fixes GHSA-9986-w7jf-33f6 not include password.tpl from standard pages identification.php | 2 + include/base32.class.php | 85 + include/config_default.inc.php | 5 + include/functions_mail.inc.ph... | CWE-640: Weak Password Recovery Mechanism for Forgotten Password |
GHSA-fqq6-7vqf-w3fg | Picklescan is missing detection when calling built-in python doctest.debug_script | null | [
{
"commit_message": "[PATCH] Missing detection when calling Python functions (#49) Address: - Missing detection when calling pytorch function torch.utils.bottleneck.__main__.run_autograd_prof https://github.com/mmaitre314/picklescan/security/advisories/GHSA-4whj-rm5r-c2v8 - Missing detection when calling built-... | null |
GHSA-f637-vh3r-vfh2 | TensorFlow has Floating Point Exception in AudioSpectrogram | null | [
{
"commit_message": "[PATCH] Fix audio spectrogram FPE. Do input validation in shape function. PiperOrigin-RevId: 503481241 tensorflow/core/kernels/BUILD | 1 + .../core/kernels/spectrogram_op_test.cc | 41 +++++++++++++++++++ tensorflow/core/ops/audio_ops.cc | 10 +++++ 3 files... | null |
GHSA-pjc4-3w99-j7v4 | Open redirect in Flask-Unchained | null | [
{
"commit_message": "[PATCH] security fixes flask_unchained/bundles/controller/utils.py | 35 ++++++++++++++++----- 1 file changed, 27 insertions(+), 8 deletions(-)",
"patch_text_b64": "RnJvbSAyYmZlZWRmMWJjMzFkZjg1MWNhYjhjNjZkZjBjNDMyYjEwNDA2YWFkIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBCcmlhbiBDYXBwZWxsbyA... | null |
GHSA-6757-jp84-gxfx | Improper Input Validation in PyYAML | null | [
{
"commit_message": "[PATCH] Deprecate/warn usage of yaml.load(input) The `load` and `load_all` methods will issue a warning when they are called without the 'Loader=' parameter. The warning will point to a URL that is always up to date with the latest information on the usage of `load`. There are several ways ... | null |
GHSA-3cjh-p6pw-jhv9 | Pow Mnesia cache doesn't invalidate all expired keys on startup | null | [
{
"commit_message": "[PATCH] Fix bug with expired cached keys not invalidated on startup CHANGELOG.md | 8 +++ lib/pow/store/backend/mnesia_cache.ex | 7 +-- test/pow/store/backend/mnesia_cache_test.exs | 61 ++++++++++---------- 3 files changed, 42 insertions(+), 34 deleti... | null |
CVE-2016-6156 | Race condition in the ec_device_ioctl_xcmd function in drivers/platform/chrome/cros_ec_dev.c in the Linux kernel before 4.7 allows local users to cause a denial of service (out-of-bounds array access) by changing a certain size value, aka a "double fetch" vulnerability. | [
{
"commit_message": "[PATCH] platform/chrome: cros_ec_dev - double fetch bug in ioctl We verify \"u_cmd.outsize\" and \"u_cmd.insize\" but we need to make sure that those values have not changed between the two copy_from_user() calls. Otherwise it could lead to a buffer overflow. Additionally, cros_ec_cmd_xfer... | n/a | |
CVE-2023-5688 | Cross-site Scripting (XSS) - DOM in modoboa/modoboa | Cross-site Scripting (XSS) - DOM in GitHub repository modoboa/modoboa prior to 2.2.2. | [
{
"commit_message": "[PATCH 1/2] Fixed XSS vulnerability when displaying form error messages. modoboa/templates/common/generic_field.html | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)",
"patch_text_b64": "RnJvbSA2ZmRiMDc3Y2E1MTQwNzE2MjEwOWM5ZWQwZDk3ODgyZDdjNzEzOGViIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAw... | CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') |
CVE-2024-22404 | Permissions bypass in Nextcloud with the files zip app | Nextcloud files Zip app is a tool to create zip archives from one or multiple files from within Nextcloud. In affected versions users can download "view-only" files by zipping the complete folder. It is recommended that the Files ZIP app is upgraded to 1.2.1, 1.4.1, or 1.5.0. Users unable to upgrade should disable the file zip app. | [
{
"commit_message": "[PATCH] fix: Add share attribute check MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Signed-off-by: Julius Härtl <jus@bitgrid.net> lib/Service/ZipService.php | 16 ++++++++++++++++ 1 file changed, 16 insertions(+)",
"patch_text_b64": "RnJvbSBjN... | CWE-281: Improper Preservation of Permissions |
GHSA-4953-8rw3-w7m5 | null | [
{
"commit_message": "[PATCH] [security] Fixed local path disclosure vulnerability, see PMASA-2012-2 ChangeLog | 3 +++ show_config_errors.php | 4 +++- 2 files changed, 6 insertions(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSBjNTE4MTdkM2I4Y2IwNWZmNTRkY2E5MzczYzA2NjdlMjliODQ5OGQ0IE1vbiBTZXAgMTcg... | null | |
CVE-2023-50658 | The jose2go component before 1.6.0 for Go allows attackers to cause a denial of service (CPU consumption) via a large p2c (aka PBES2 Count) value. | [
{
"commit_message": "[PATCH] Adding min/max iteration count guards to pbes2-hmac-aeskw algorithm jose_test.go | 34 ++++++++++++++++++++++++++++++ pbse2_hmac_aeskw.go | 51 +++++++++++++++++++++++++++++++++++++++------ 2 files changed, 79 insertions(+), 6 deletions(-)",
"patch_text_b64": "RnJvbSBhNDU4N... | n/a | |
CVE-2021-3646 | Cross-site Scripting (XSS) - Reflected in btcpayserver/btcpayserver | btcpayserver is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | [
{
"commit_message": "[PATCH] Add CSP at the website level (#2863) BTCPayServer.Tests/BTCPayServerTester.cs | 4 +- BTCPayServer.Tests/SeleniumTester.cs | 1 + .../NotificationsDropdown/Default.cshtml | 2 +- .../Configuration/DefaultConfiguration.cs | 1 + .../Filters/ContentSecurityP... | CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') |
GHSA-f256-j965-7f32 | Possible request smuggling in HTTP/2 due missing validation of content-length | null | [
{
"commit_message": "[PATCH] Merge pull request from GHSA-f256-j965-7f32 Motivation: We also need to ensure that all the header validation is done when a single header with the endStream flag is received Modifications: - Adjust code to always enforce the validation - Add more unit tests Result: Always correctly... | null |
CVE-2017-15207 | In Kanboard before 1.0.47, by altering form data, an authenticated user can edit tasks of a private project of another user. | [
{
"commit_message": "[PATCH] Avoid people to alter other projects by changing form data ChangeLog | 4 + app/Controller/ActionController.php | 5 +- app/Controller/ActionCreationController.php | 7 +- app/Controller/BaseController.php | 90 ++++++++++++++++++++... | n/a | |
CVE-2025-46549 | Yeswiki Vulnerable to Unauthenticated Reflected Cross-site Scripting | YesWiki is a wiki system written in PHP. Prior to version 4.5.4, an attacker can use a reflected cross-site scripting attack to steal cookies from an authenticated user by having them click on a malicious link. Stolen cookies allow the attacker to take over the user’s session. This vulnerability may also allow attackers to deface the website or embed malicious content. This issue has been patched in version 4.5.4. | [
{
"commit_message": "[PATCH] fix(bazar): no html in template parameter tools/bazar/actions/BazarListeAction.php | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSAxMDdkNDMwNTZhZGViYWEwYzczMTIzMGY5ZmQwMTA4OThlODhmM2Y1IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBGbG9yaWFuIFNjaG1... | CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') |
GHSA-x53g-q9xm-rf4m | null | [
{
"commit_message": "[PATCH] fix metadata filter not affect in keyword-search and fulltext-search (#16644) api/core/rag/datasource/retrieval_service.py | 6 +++++- api/core/rag/retrieval/dataset_retrieval.py | 6 +++++- 2 files changed, 10 insertions(+), 2 deletions(-)",
"patch_text_b64": "RnJvbSAxYmUwZDI2Yz... | null | |
GHSA-2q3p-cfj5-9f8c | null | [
{
"commit_message": "[PATCH] fix for #524 usually, ip addresses with multiple failed login attempts should be blocked. An attacker could bypass this by sending an X-forwarded-for header and change that IP with each attempt. Since REMMOTE_ADDR is harder to fake we should first check that one and only if that one... | null | |
GHSA-mwg2-3xpv-5v28 | CSRF vulnerability in Jenkins Micro Focus Application Automation Tools Plugin | null | [
{
"commit_message": "[PATCH] [SECURITY-2132] .../automation/tools/octane/actions/PluginActions.java | 5 +++++ .../tools/settings/AlmServerSettingsGlobalConfiguration.java | 4 ++++ .../settings/OctaneServerSettingsGlobalConfiguration.java | 4 ++++ .../tools/settings/SvServerSettingsGlobalConfiguration.j... | null |
CVE-2024-42486 | Cilium vulnerable to information leakage via incorrect ReferenceGrant update logic in Gateway API | Cilium is a networking, observability, and security solution with an eBPF-based dataplane. In versions on the 1.15.x branch prior to 1.15.8 and the 1.16.x branch prior to 1.16.1, ReferenceGrant changes are not correctly propagated in Cilium's GatewayAPI controller, which could lead to Gateway resources being able to access secrets for longer than intended, or to Routes having the ability to forward traffic to backends in other namespaces for longer than intended. This issue has been patched in Cilium v1.15.8 and v1.16.1. As a workaround, any modification of a related Gateway/HTTPRoute/GRPCRoute/TCPRoute CRD (for example, adding any label to any of these resources) will trigger a reconciliation of ReferenceGrants on an affected cluster. | [
{
"commit_message": "[PATCH] gateway-api: Enqueue gateway for Reference Grant changes This commit is to make sure that the reconciliation loop is kicked off for Gateway object if there is any change in ReferenceGrant (mainly for SecretObjectReference). Signed-off-by: Tam Mach <tam.mach@cilium.io> operator/pkg/g... | CWE-200: Exposure of Sensitive Information to an Unauthorized Actor |
CVE-2022-23564 | Reachable Assertion in Tensorflow | Tensorflow is an Open Source Machine Learning Framework. When decoding a resource handle tensor from protobuf, a TensorFlow process can encounter cases where a `CHECK` assertion is invalidated based on user controlled arguments. This allows attackers to cause denial of services in TensorFlow processes. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. | [
{
"commit_message": "[PATCH] Prevent `CHECK`-fail when decoding resource handles from proto In certain scenarios, the proto might contain tensors that have too many elements (overflow). This is a `CHECK`-fail in general, but we should prevent this, given how many CVEs caused by that we have received this year (... | CWE-617: Reachable Assertion |
GHSA-4vhj-98r6-424h | In Bouncy Castle JCE Provider it is possible to inject extra elements in the sequence making up the signature and still have it validate | null | [
{
"commit_message": "[PATCH] added length check for sequence in DSA signatures .../provider/asymmetric/dsa/DSASigner.java | 8 +- .../jce/provider/test/DSATest.java | 105 ++++++++++++++++++ 2 files changed, 110 insertions(+), 3 deletions(-)",
"patch_text_b64": "RnJvbSBiMGMzY2U5OWQ0M2Q3M2EwOTY... | null |
GHSA-pgpj-v85q-h5fm | Cross-Site Request Forgery on any API call in pyLoad may lead to admin privilege escalation | null | [
{
"commit_message": "[PATCH] fix GHSA-pgpj-v85q-h5fm security advisory (2) src/pyload/webui/app/__init__.py | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSAxMzc0YzgyNDI3MWNiN2U5Mjc3NDA2NjRkMDZkMmU1Nzc2MjRjYTNlIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBHYW1tYUMwZGUgPGdhbW1hYz... | null |
GHSA-h5wm-hc9w-hp9m | null | [
{
"commit_message": "[PATCH] mqueue: fix a use-after-free in sys_mq_notify() The retry logic for netlink_attachskb() inside sys_mq_notify() is nasty and vulnerable: 1) The sock refcnt is already released when retry is needed 2) The fd is controllable by user-space because we already release the file refcnt so w... | null | |
GHSA-5j3w-5pcr-f8hg | Symfony UX allows unsanitized HTML attribute injection via ComponentAttributes | null | [
{
"commit_message": "[PATCH] Remove ComponentAttributeFactory and inject EscaperRuntime directly composer.json | 2 +- .../LiveComponentExtension.php | 7 +++--- .../AddLiveAttributesSubscriber.php | 7 +++--- src/LiveComponentHydrator.php ... | null |
GHSA-jq35-85cj-fj4p | /sys/devices/virtual/powercap accessible by default to containers | null | [
{
"commit_message": "[PATCH 1/2] oci/defaults: deny /sys/devices/virtual/powercap The ability to read these files may offer a power-based sidechannel attack against any workloads running on the same kernel. This was originally [CVE-2020-8694][1], which was fixed in [949dd0104c496fa7c14991a23c03c62e44637e71][2] ... | null |
CVE-2020-11085 | Out-of-bounds Read in FreeRDP | In FreeRDP before 2.1.0, there is an out-of-bounds read in cliprdr_read_format_list. Clipboard format data read (by client or server) might read data out-of-bounds. This has been fixed in 2.1.0. | [
{
"commit_message": "[PATCH] Fixed oob read in cliprdr_read_format_list channels/cliprdr/cliprdr_common.c | 85 ++++++++++++++----------------- 1 file changed, 39 insertions(+), 46 deletions(-)",
"patch_text_b64": "RnJvbSBiNzMxNDNjZjdlZTVmZTRjZGFiY2JmNTY5MDhhYTE1ZDhhODgzODIxIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQ... | CWE-125: Out-of-bounds Read |
CVE-2025-53095 | Sunshine application-wide CSRF in the UI leads to command injection as Administrator | Sunshine is a self-hosted game stream host for Moonlight. Prior to version 2025.628.4510, the web UI of Sunshine lacks protection against Cross-Site Request Forgery (CSRF) attacks. This vulnerability allows an attacker to craft a malicious web page that, when visited by an authenticated user, can trigger unintended actions within the Sunshine application on behalf of that user. Specifically, since the application does OS command execution by design, this issue can be exploited to abuse the "Command Preparations" feature, enabling an attacker to inject arbitrary commands that will be executed with Administrator privileges when an application is launched. This issue has been patched in version 2025.628.4510. | [
{
"commit_message": "[PATCH] Merge commit from fork * (security) Mandate content-type on POST calls * (security) Add JSON content-type in POST requests with a body * Added Content Type on missing endpoints * (review) docs and newlines * (docs) add JSON content type header * style(clang-format): fix lint errors ... | CWE-352: Cross-Site Request Forgery (CSRF) |
CVE-2021-32820 | File disclosure in Express Handlebars | Express-handlebars is a Handlebars view engine for Express. Express-handlebars mixes pure template data with engine configuration options through the Express render API. More specifically, the layout parameter may trigger file disclosure vulnerabilities in downstream applications. This potential vulnerability is somewhat restricted in that only files with existing extentions (i.e. file.extension) can be included, files that lack an extension will have .handlebars appended to them. For complete details refer to the referenced GHSL-2021-018 report. Notes in documentation have been added to help users avoid this potential information exposure vulnerability. | [
{
"commit_message": "[PATCH] fix: add note about security README.md | 3 +++ 1 file changed, 3 insertions(+)",
"patch_text_b64": "RnJvbSA3OGM0N2EyMzVjNGFkN2JjMjY3NGJkZGQ4ZWMyNzIxNTY3ZWQ4YzcyIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBUb255IEJyaXggPHRvbnlAYnJpeC5uaW5qYT4KRGF0ZTogVHVlLCA0IE1heSAyMDIxIDA5OjA0OjA... | CWE-200 Information Exposure |
CVE-2023-31285 | An XSS issue was discovered in Serenity Serene (and StartSharp) before 6.7.0. When users upload temporary files, some specific file endings are not allowed, but it is possible to upload .html or .htm files containing an XSS payload. The resulting link can be sent to an administrator user. | [
{
"commit_message": "[PATCH] :up: 6.7.0 CHANGELOG.md | 16 ++++++++++++++++ build/Package.Build.props | 2 +- 2 files changed, 17 insertions(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSAxMWI5ZDI2N2Y4NDA1MTNkMDRiNGY0ZDQ4NzZkZTc4MjNhNmU0OGQyIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiB2b2xrYW5jZXls... | n/a | |
GHSA-vmf5-924f-25f2 | Out-of-bounds write | null | [
{
"commit_message": "[PATCH 1/6] [CVE-2019-1103] Chakra JIT Type Confusion lib/Backend/BackwardPass.cpp | 12 ++++++++---- lib/Backend/BailOut.h | 3 ++- lib/Backend/GlobOpt.cpp | 6 ++++++ lib/Backend/Opnd.h | 3 ++- 4 files changed, 18 insertions(+), 6 deletions(-)",
"patch_text_b64":... | null |
CVE-2020-15224 | Socket syscalls can leak enclave memory contents in Open Enclave | In Open Enclave before version 0.12.0, an information disclosure vulnerability exists when an enclave application using the syscalls provided by the sockets.edl is loaded by a malicious host application. An attacker who successfully exploited the vulnerability could read privileged data from the enclave heap across trust boundaries. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to elevate user rights directly, but it could be used to obtain information otherwise considered confidential in an enclave, which could be used in further compromises. The issue has been addressed in version 0.12.0 and the current master branch. Users will need to to recompile their applications against the patched libraries to be protected from this vulnerability. | [
{
"commit_message": "[PATCH] Merge pull request from GHSA-525h-wxcc-f66m Signed-off-by: Ming-Wei Shih <mishih@microsoft.com> include/openenclave/edl/socket.edl | 12 +- include/openenclave/internal/syscall/fd.h | 2 +- include/openenclave/internal/syscall/iov.h | 3 +- .../openenclave/intern... | CWE-552 Files or Directories Accessible to External Parties |
PYSEC-2020-217 | null | [
{
"commit_message": "[PATCH] tree: Check for `.git` with case insensitivy src/tree.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSA5Mjg0MjljNWM5NmE3MDFiY2JjYWZhY2IyNDIxYTgyNjAyYjM2OTE1IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBWaWNlbnQgTWFydGkgPHRhbm9rdUBnbWFpbC5jb20+CkRhd... | null | |
CVE-2019-19048 | A memory leak in the crypto_reportstat() function in drivers/virt/vboxguest/vboxguest_utils.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering copy_form_user() failures, aka CID-e0b0cb938864. | [
{
"commit_message": "[PATCH] virt: vbox: fix memory leak in hgcm_call_preprocess_linaddr In hgcm_call_preprocess_linaddr memory is allocated for bounce_buf but is not released if copy_form_user fails. In order to prevent memory leak in case of failure, the assignment to bounce_buf_ret is moved before the error ... | n/a | |
CVE-2023-39355 | FreeRDP Use-After-Free in RDPGFX_CMDID_RESETGRAPHICS | FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Versions of FreeRDP on the 3.x release branch before beta3 are subject to a Use-After-Free in processing `RDPGFX_CMDID_RESETGRAPHICS` packets. If `context->maxPlaneSize` is 0, `context->planesBuffer` will be freed. However, without updating `context->planesBuffer`, this leads to a Use-After-Free exploit vector. In most environments this should only result in a crash. This issue has been addressed in version 3.0.0-beta3 and users of the beta 3.x releases are advised to upgrade. There are no known workarounds for this vulnerability. | [
{
"commit_message": "[PATCH] [codec,planar] fix reset libfreerdp/codec/planar.c | 62 ++++++++++++++++++++++----------------- 1 file changed, 35 insertions(+), 27 deletions(-)",
"patch_text_b64": "RnJvbSBkNmY5ZDMzYTdkYjBiMzQ2MTk1YjZhMTViNWI5OTk0NGJhNDFiZWVlIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBBcm1pbiBO... | CWE-416: Use After Free |
CVE-2016-3156 | The IPv4 implementation in the Linux kernel before 4.5.2 mishandles destruction of device objects, which allows guest OS users to cause a denial of service (host OS networking outage) by arranging for a large number of IP addresses. | [
{
"commit_message": "[PATCH] ipv4: Don't do expensive useless work during inetdev destroy. When an inetdev is destroyed, every address assigned to the interface is removed. And in this scenerio we do two pointless things which can be very expensive if the number of assigned interfaces is large: 1) Address prom... | n/a | |
GHSA-hf5p-f83x-5q2g | OpenNMS privilege escalation vulnerability | null | [
{
"commit_message": "[PATCH] NMS-15702: Only members of ROLE_ADMIN can view/edit users.xml .../web/rest/v1/FilesystemRestService.java | 32 ++++++++++++++----- 1 file changed, 24 insertions(+), 8 deletions(-)",
"patch_text_b64": "RnJvbSBmMmNhZjdkMGI5ZGI1OGI1OWU5ODUwNjQ5MGFhY2EzN2ZiZjI0M2I2IE1vbiBTZXAgMTcg... | null |
CVE-2011-5098 | chef-server-api/app/controllers/clients.rb in Chef Server in Chef before 0.9.20, and 0.10.x before 0.10.6, does not require administrative privileges for creating admin clients, which allows remote authenticated users to bypass intended access restrictions by leveraging read permission for the validation key and executing a knife client create command with the --admin option. | [
{
"commit_message": "[PATCH] CHEF-2649: Only allow admin clients to create admins (not validators) chef-server-api/app/controllers/clients.rb | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-)",
"patch_text_b64": "RnJvbSAzM2YwZTljNThiYmYwNDdlMWI0MDFhODM0ZjNhYmZlNzJkOWE4OTQ3IE1vbiBTZXAgMTcgM... | n/a | |
CVE-2024-5138 | The snapctl component within snapd allows a confined snap to interact with the snapd daemon to take certain privileged actions on behalf of the snap. It was found that snapctl did not properly parse command-line arguments, allowing an unprivileged user to trigger an authorised action on behalf of the snap that would normally require administrator privileges to perform. This could possibly allow an unprivileged user to perform a denial of service or similar. | [
{
"commit_message": "[PATCH] Merge pull request from GHSA-p9v8-q5m4-pf46 * o/hookstate: recognize \"--\" in snapctl argument parser When parsing snapctl argument vector recognize the \"--\" as an option terminator, so that dash-options are not recognized afterwards. Fixes: https://bugs.launchpad.net/snapd/+bug/... | CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | |
CVE-2024-56112 | CyberPanel (aka Cyber Panel) before f0cf648 allows XSS via token or username to plogical/phpmyadminsignin.php. | [
{
"commit_message": "[PATCH] bug fix: phpmyadmin login plogical/phpmyadminsignin.php | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-)",
"patch_text_b64": "RnJvbSBmMGNmNjQ4Yzc4NTFjOTZjMzZiYjBjMzkwZDEzZTYwOTMxZjQ1OTAwIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiB1c21hbm5hc2lyIDx1c21hbkBjeWJlcnBlcnNvbnM... | n/a | |
CVE-2024-3110 | Stored XSS leading to admin account takeover in mintplex-labs/anything-llm | A stored Cross-Site Scripting (XSS) vulnerability exists in the mintplex-labs/anything-llm application, affecting versions up to and including the latest before 1.0.0. The vulnerability arises from the application's failure to properly sanitize and validate user-supplied URLs before embedding them into the application UI as external links with custom icons. Specifically, the application does not prevent the inclusion of 'javascript:' protocol payloads in URLs, which can be exploited by a user with manager role to execute arbitrary JavaScript code in the context of another user's session. This flaw can be leveraged to steal the admin's authorization token by crafting malicious URLs that, when clicked by the admin, send the token to an attacker-controlled server. The attacker can then use this token to perform unauthorized actions, escalate privileges to admin, or directly take over the admin account. The vulnerability is triggered when the malicious link is opened in a new tab using either the CTRL + left mouse button click or the mouse scroll wheel click, or in some non-updated versions of modern browsers, by directly clicking on the link. | [
{
"commit_message": "[PATCH] security: patch footer icon self-xss from privledged user server/models/systemSettings.js | 7 +++++-- server/utils/http/index.js | 10 ++++++++++ 2 files changed, 15 insertions(+), 2 deletions(-)",
"patch_text_b64": "RnJvbSA0OWYzMGUwNTFjOWY2ZTI4OTc3ZDU3ZDBlNWY0OWMxMjk0MDk0Z... | CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') |
GHSA-pjrj-v874-q2mx | null | [
{
"commit_message": "[PATCH] check if admin apps/files_encryption/settings.php | 4 +++- apps/files_external/settings.php | 2 ++ apps/user_ldap/settings.php | 3 +++ apps/user_webdavauth/settings.php | 2 ++ 4 files changed, 10 insertions(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSBjNGVjYmFkMDA5OWM... | null | |
GHSA-wvjv-p5rr-mmqm | Symfony allows direct access of ESI URLs behind a trusted proxy | null | [
{
"commit_message": "[PATCH] Forced all fragment uris to be signed, even for ESI .../FrameworkBundle/Resources/config/esi.xml | 1 + .../EventListener/FragmentListener.php | 13 ++--- .../Fragment/EsiFragmentRenderer.php | 22 +++++++-- .../EventListener/FragmentListenerTest.php | 13 ----- ...... | null |
CVE-2024-1892 | ReDoS Vulnerability in scrapy/scrapy's XMLFeedSpider | A Regular Expression Denial of Service (ReDoS) vulnerability exists in the XMLFeedSpider class of the scrapy/scrapy project, specifically in the parsing of XML content. By crafting malicious XML content that exploits inefficient regular expression complexity used in the parsing process, an attacker can cause a denial-of-service (DoS) condition. This vulnerability allows for the system to hang and consume significant resources, potentially rendering services that utilize Scrapy for XML processing unresponsive. | [
{
"commit_message": "[PATCH 01/18] Set an arbitrary upper limit on ReDoS-vulnerable regexps docs/news.rst | 28 ++++++++++++++++++++++++++++ scrapy/utils/iterators.py | 12 +++++++----- scrapy/utils/response.py | 4 ++-- 3 files changed, 37 insertions(+), 7 deletions(-)",
"patch_text_b64": "RnJvb... | CWE-1333 Inefficient Regular Expression Complexity |
GHSA-mh7x-8j8h-xvj8 | null | [
{
"commit_message": "[PATCH] fix: [security] new audit logs lack of ACL controls - added proper ACL handling to the new audit logs - as reported by fukusuket(Fukusuke Takahashi) app/Controller/AuditLogsController.php | 24 ++++++++++++++++++++---- 1 file changed, 20 insertions(+), 4 deletions(-)",
"patch_tex... | null | |
CVE-2022-29173 | No protection against rollback attacks in go-tuf | go-tuf is a Go implementation of The Update Framework (TUF). go-tuf does not correctly implement the client workflow for updating the metadata files for roles other than the root role. Specifically, checks for rollback attacks are not implemented correctly meaning an attacker can cause clients to install software that is older than the software which the client previously knew to be available, and may include software with known vulnerabilities. In more detail, the client code of go-tuf has several issues in regards to preventing rollback attacks: 1. It does not take into account the content of any previously trusted metadata, if available, before proceeding with updating roles other than the root role (i.e., steps 5.4.3.1 and 5.5.5 of the detailed client workflow). This means that any form of version verification done on the newly-downloaded metadata is made using the default value of zero, which always passes. 2. For both timestamp and snapshot roles, go-tuf saves these metadata files as trusted before verifying if the version of the metafiles they refer to is correct (i.e., steps 5.5.4 and 5.6.4 of the detailed client workflow). A fix is available in version 0.3.0 or newer. No workarounds are known for this issue apart from upgrading. | [
{
"commit_message": "[PATCH] Merge pull request from GHSA-66x3-6cw3-v5gj * Remove obsolete snapshot error check Signed-off-by: Radoslav Dimitrov <dimitrovr@vmware.com> * Add a dedicated error for missing target metadata file Signed-off-by: Radoslav Dimitrov <dimitrovr@vmware.com> * Fix protection against metada... | CWE-354: Improper Validation of Integrity Check Value |
GHSA-p379-cxqh-q822 | SQL filter bypass leading to arbitrary write requests using "SQL Manager" | null | [
{
"commit_message": "[PATCH] fix wrong condition and wrong call to execute ethod classes/db/Db.php | 6 +----- 1 file changed, 1 insertion(+), 5 deletions(-)",
"patch_text_b64": "RnJvbSAyMzcyMDg4NjcxNGI1YzI2OWM4ZWM4ZGQxMGZmMjU3ZTYxZTUwZGU2IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiAibWF0dGhpZXUucm9sbGFuZCIgPG... | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.