id
stringlengths
12
19
title
stringlengths
0
237
description
stringlengths
35
3.87k
patches
listlengths
1
22
cwe
stringlengths
2
440
GHSA-3887-hqfw-78p7
null
[ { "commit_message": "[PATCH] Secunia 81800#1: samsumg_load_raw Secunia 81800#2: find_green Secunia 81800#3: rollei_load_raw remove_trailing_spaces: isspace() does not works right with signed non-latin chars Secunia 81800#5/6: nikon_coolscan_load_raw Secunia 81800#4: rollei_load_raw dcraw/dcraw.c | 1...
null
PYSEC-2021-843
null
[ { "commit_message": "[PATCH] Add shape checks to GPU TridiagonalMatMul. When given invalid shapes, the GPU TridiagonalMatMul op could read invalid or uninitialized GPU memory. PiperOrigin-RevId: 401775483 Change-Id: Ib5500aeb8225e50d4ce790b06d2c34751f544ad8 .../linalg/tridiagonal_matmul_op_gpu.cu.cc | 39 +++...
null
GHSA-crcq-pw8h-9xwf
Moodle does not provide charset information in HTTP headers
null
[ { "commit_message": "[PATCH] MDL-47966 Add default content type and encoding lib/setup.php | 18 ++++++++++++++++++ 1 file changed, 18 insertions(+)", "patch_text_b64": "RnJvbSAwYTAxNDVjNWU4MDQxYWFkZWZmMzAzYTlmOTk4NGM4NjcwNmI0ZTQyIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBQZXRyIFNrb2RhIDxwZXRyLnNrb2RhQHRvdGF...
null
GHSA-6x52-4rr6-8fw7
null
[ { "commit_message": "[PATCH] set httponly to true when calling setcookie. the ini_set option above doesn't actually seem to do anything... (but not removing it just in case Signed-off-by: Adam Warner <me@adamwarner.co.uk> scripts/pi-hole/php/password.php | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-...
null
CVE-2025-3160
Open Asset Import Library Assimp File SceneCombiner.cpp AddNodeHashes out-of-bounds
A vulnerability has been found in Open Asset Import Library Assimp 5.4.3 and classified as problematic. This vulnerability affects the function Assimp::SceneCombiner::AddNodeHashes of the file code/Common/SceneCombiner.cpp of the component File Handler. The manipulation leads to out-of-bounds read. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The patch is identified as a0993658f40d8e13ff5823990c30b43c82a5daf0. It is recommended to apply a patch to fix this issue.
[ { "commit_message": "[PATCH] Bugfix: Fix possible nullptr dereferencing - closes https://github.com/assimp/assimp/issues/6025 code/Common/SceneCombiner.cpp | 5 +++++ 1 file changed, 5 insertions(+)", "patch_text_b64": "RnJvbSBhMDk5MzY1OGY0MGQ4ZTEzZmY1ODIzOTkwYzMwYjQzYzgyYTVkYWYwIE1vbiBTZXAgMTcgMDA6MDA6MDAgM...
Out-of-Bounds Read
GHSA-3r5p-qhf8-8xc9
null
[ { "commit_message": "[PATCH 1/2] Fix https://github.com/unicorn-engine/unicorn/issues/1586 uc.c | 1 + 1 file changed, 1 insertion(+)", "patch_text_b64": "RnJvbSBhMjhkMWRmYmVkNDE4YWEwNzY1MzY5NGUyNGU5ZjczMWJhYThlZjNiIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBsaXlhbnNvbmcyMDE4IDwxMzIxOTkzMzgzQHFxLmNvbT4KRGF0ZT...
null
GHSA-m63j-wh5w-c252
Denial of Service Vulnerability in Action View
null
[ { "commit_message": "[PATCH] Only accept formats from registered mime types [CVE-2019-5418] [CVE-2019-5419] .../lib/action_dispatch/http/mime_negotiation.rb | 5 +++++ actionpack/test/controller/mime/respond_to_test.rb | 10 ++++++---- .../new_base/content_negotiation_test.rb | 14 ++++++++++++-- 3 fi...
null
CVE-2012-3508
Cross-site scripting (XSS) vulnerability in program/lib/washtml.php in Roundcube Webmail 0.8.0 allows remote attackers to inject arbitrary web script or HTML by using "javascript:" in an href attribute in the body of an HTML-formatted email.
[ { "commit_message": "[PATCH] Fix XSS issue with href=\"javascript:\" not being removed (#1488613) CHANGELOG | 1 + program/lib/washtml.php | 8 ++++++-- 2 files changed, 7 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSA1ZWY4ZTRhZDlkM2VlODY4OWQyYjgzNzUwYWE2NTM5NWI3Y2Q1OWVlIE1vbiBTZXAgM...
n/a
CVE-2021-21402
Unauthenticated Arbitrary File Access in Jellyfin
Jellyfin is a Free Software Media System. In Jellyfin before version 10.7.1, with certain endpoints, well crafted requests will allow arbitrary file read from a Jellyfin server's file system. This issue is more prevalent when Windows is used as the host OS. Servers that are exposed to the public Internet are potentially at risk. This is fixed in version 10.7.1. As a workaround, users may be able to restrict some access by enforcing strict security permissions on their filesystem, however, it is recommended to update as soon as possible.
[ { "commit_message": "[PATCH] Merge pull request from GHSA-wg4c-c9g9-rxhx Fix issues 1 through 5 from GHSL-2021-050 (cherry picked from commit fe8cf29cad2ca1b5d3a78c86cacf3ba96608034f) Signed-off-by: Joshua M. Boniface <joshua@boniface.me> .../Controllers/HlsSegmentController.cs | 23 +++++++++++++++--- ......
CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2022-1947
Use of Incorrect Operator in polonel/trudesk
Use of Incorrect Operator in GitHub repository polonel/trudesk prior to 1.2.3.
[ { "commit_message": "[PATCH] fix(messages): invalid permissions src/controllers/messages.js | 12 +++++++++++- 1 file changed, 11 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBhOWUzOGYyNWMyYWYyNzIyZGVlNGZkYWZiMmZiNzBkMzBkNTEwNmM1IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBDaHJpcyBCcmFtZSA8cG9sb25lb...
CWE-480 Use of Incorrect Operator
GHSA-3rw2-wfc8-wmj5
Fides Webserver Vulnerable to SVG Bomb File Uploads
null
[ { "commit_message": "[PATCH] Merge pull request from GHSA-3rw2-wfc8-wmj5 * Adding checks for malicious SVGs * Fixing merge conflicts Co-authored-by: Dave Quinlan <83430497+daveqnet@users.noreply.github.com> requirements.txt | 1 + .../saas/connector_registry_service.py | 3 +...
null
CVE-2018-11319
Syntastic (aka vim-syntastic) through 3.9.0 does not properly handle searches for configuration files (it searches the current directory up to potentially the root). This improper handling might be exploited for arbitrary code execution via a malicious gcc plugin, if an attacker has write access to a directory that is a parent of the base directory of the project being checked. NOTE: exploitation is more difficult after 3.8.0 because filename prediction may be needed.
[ { "commit_message": "[PATCH] Security: clear defaults for config file names (cf. #2170). autoload/syntastic/c.vim | 2 +- doc/syntastic-checkers.txt | 56 +++++++++++++++---------------- plugin/syntastic.vim | 2 +- syntax_checkers/c/avrgcc.vim | 8 ++--- syntax_checkers/c/clang...
n/a
GHSA-jf66-3q76-h5p5
Tenant and Verifier might not use the same registrar data
null
[ { "commit_message": "[PATCH] tenant, verifier: let the tenant provide the AK and mTLS certificate This eliminates the need for the verifier to connect to the registrar. Signed-off-by: Thore Sommer <mail@thson.de> keylime/cloud_verifier_tornado.py | 21 ++++----------------- keylime/tenant.py | 2...
null
GHSA-78q2-cv3p-x9fm
Pimcore Cross-site Scripting vulnerability
null
[ { "commit_message": "[PATCH] Fix Xss in the Search Documents .../public/js/pimcore/element/selector/document.js | 11 ++++++++++- 1 file changed, 10 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA5MjgxMWYwN2QzOWU0YWQ5NWM5MjAwMzg2OGY1ZjczMDk0ODlkNzljIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBhcnl...
null
GHSA-q9xx-4689-gvv5
Magento Unauthorized access to restricted resources
null
[ { "commit_message": "[PATCH] Magento Release 2.4.2-p1 app/code/Magento/AdminAnalytics/composer.json | 24 +- .../Magento/AdminNotification/composer.json | 24 +- .../AdvancedPricingImportExport/composer.json | 28 +- app/code/Magento/AdvancedSearch/composer.json | 28 +- app/code/Magento/Amqp/composer.json ...
null
CVE-2020-35136
Dolibarr 12.0.3 is vulnerable to authenticated Remote Code Execution. An attacker who has the access the admin dashboard can manipulate the backup function by inserting a payload into the filename for the zipfilename_template parameter to admin/tools/dolibarr_export.php.
[ { "commit_message": "[PATCH] =?UTF-8?q?Fix=20disallow=20--=20string=20into=20filename?= =?UTF-8?q?=20for=20security=20purpose.=20Vulnerability=20reported=20by=20?= =?UTF-8?q?Y=C4=B1lmaz=20De=C4=9Firmenci?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit htdocs/admin/too...
n/a
CVE-2020-35523
An integer overflow flaw was found in libtiff that exists in the tif_getimage.c file. This flaw allows an attacker to inject and execute arbitrary code when a user opens a crafted TIFF file. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
[ { "commit_message": "[PATCH] gtTileContig(): check Tile width for overflow fixes #211 libtiff/tif_getimage.c | 17 +++++++++++++---- 1 file changed, 13 insertions(+), 4 deletions(-)", "patch_text_b64": "RnJvbSBjOGQ2MTNlZjQ5NzA1OGZlNjUzYzQ2N2ZjODRjNzBhNjJhNGE3MWIyIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBUaG...
CWE-190
CVE-2024-31226
Sunshine's unquoted executable path could lead to hijacked execution flow
Sunshine is a self-hosted game stream host for Moonlight. Users who ran Sunshine versions 0.17.0 through 0.22.2 as a service on Windows may be impacted when terminating the service if an attacked placed a file named `C:\Program.exe`, `C:\Program.bat`, or `C:\Program.cmd` on the user's computer. This attack vector isn't exploitable unless the user has manually loosened ACLs on the system drive. If the user's system locale is not English, then the name of the executable will likely vary. Version 0.23.0 contains a patch for the issue. Some workarounds are available. One may identify and block potentially malicious software executed path interception by using application control tools, like Windows Defender Application Control, AppLocker, or Software Restriction Policies where appropriate. Alternatively, ensure that proper permissions and directory access control are set to deny users the ability to write files to the top-level directory `C:`. Require that all executables be placed in write-protected directories.
[ { "commit_message": "[PATCH] Quote the path to sunshinesvc.exe when launching the termination helper (#2379) tools/sunshinesvc.cpp | 7 +++++-- 1 file changed, 5 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSA5M2U2MjIzNDJjNGYzZTliMzRmNWYyNjUwMzliNjc3NWI4ZTMzYTdhIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpG...
CWE-428: Unquoted Search Path or Element
GHSA-6m9m-6qjp-9mm8
null
[ { "commit_message": "[PATCH] KEYS: Fix handling of stored error in a negatively instantiated user key If a user key gets negatively instantiated, an error code is cached in the payload area. A negatively instantiated key may be then be positively instantiated by updating it with valid data. However, the ->upd...
null
CVE-2010-2761
The multipart_init function in (1) CGI.pm before 3.50 and (2) Simple.pm in CGI::Simple 1.112 and earlier uses a hardcoded value of the MIME boundary string in multipart/x-mixed-replace content, which allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via crafted input that contains this value, a different vulnerability than CVE-2010-3172.
[ { "commit_message": "[PATCH] Randomise multipart boundary. Thanks to Yamada Masahiro. lib/CGI/Simple.pm | 9 ++++++++- t/050.simple.t | 5 +++-- t/070.standard.t | 6 ++++-- 3 files changed, 15 insertions(+), 5 deletions(-)", "patch_text_b64": "RnJvbSBlNDk0MmI4NzFhMjZjMTMxN2ExNzVhOTFlYmI3MjYyZWVhNTliMzgwIE...
n/a
CVE-2015-6961
Open redirect vulnerability in gluon/tools.py in Web2py 2.9.11 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the _next parameter to user/logout.
[ { "commit_message": "[PATCH 1/2] Ignore the contents of the site-packages directory .gitignore | 1 + 1 file changed, 1 insertion(+)", "patch_text_b64": "RnJvbSBjNWE5ZDJjNDU2MjM0NGQyMzgxNDIyOGIxNzk2NTM1MTRmOTliN2EyIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBwYWxsYXZfZmRzaSA8dGVjaGlfMDAwQHBhbGxhdi1mZHNpLmZkc2k...
n/a
PYSEC-2024-236
null
[ { "commit_message": "[PATCH 1/4] Escape invalid host when displayed in html jupyter_server_proxy/handlers.py | 3 ++- tests/test_proxies.py | 8 ++++++++ 2 files changed, 10 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAwOTUwMjUyODhlMzkxMzIwZjc3M2VlYTQ2MjkwOTNlMGY5N2E2ZWMyIE1vbiBTZXAgMTc...
null
CVE-2020-1888
Insufficient boundary checks when decoding JSON in handleBackslash reads out of bounds memory, potentially leading to DOS. This issue affects HHVM 4.45.0, 4.44.0, 4.43.0, 4.42.0, 4.41.0, 4.40.0, 4.39.0, versions between 4.33.0 and 4.38.0 (inclusive), versions between 4.9.0 and 4.32.0 (inclusive), and versions prior to 4.8.7.
[ { "commit_message": "[PATCH] Fix buffer overrun in SimpleParser::handleBackslash Summary: It read 4 chars, then checked for validity, but any of them could have been the end of the string, so check after each one instead. Reviewed By: oulgen Differential Revision: D19611163 fbshipit-source-id: 3da0a39555cb85a93...
Out-of-bounds Read (CWE-125)
GHSA-93x7-vvj8-98xr
null
[ { "commit_message": "[PATCH] rpmsg: virtio: Fix possible double free in rpmsg_virtio_add_ctrl_dev() vch will be free in virtio_rpmsg_release_device() when rpmsg_ctrldev_register_device() fails. There is no need to call kfree() again. Fixes: c486682ae1e2 (\"rpmsg: virtio: Register the rpmsg_char device\") Signed...
null
GHSA-25mq-v84q-4j7r
CURLOPT_HTTPAUTH option not cleared on change of origin
null
[ { "commit_message": "[PATCH] Release 7.4.5 (#3043) CHANGELOG.md | 5 ++ README.md | 10 +-- composer.json | 2 +- src/RedirectMiddleware.php | 33 +------ tests/RedirectMiddlewareTest.php | 149 +++++++++++++++++++++++++------ 5 files changed,...
null
GHSA-vcmm-ppqx-95ch
Logstash Logs Sensitive Information
null
[ { "commit_message": "[PATCH] Release 2.3.4 (#5599) CHANGELOG.md | 5 ++++ Gemfile | 6 ++-- Gemfile.jruby-1.9.lock | 30 +++++++++---------- .../lib/logstash-core-event/version.rb | 2 +- .../lib/logstash-core-pl...
null
GHSA-27mf-ghqm-j3j8
aiohttp has a memory leak when middleware is enabled when requesting a resource with a non-allowed method
null
[ { "commit_message": "[PATCH] [PR #9852/249855a backport][3.10] Fix system routes polluting the middleware cache (#9855) CHANGES/9852.bugfix.rst | 1 + aiohttp/web_app.py | 14 +++++++++++--- tests/test_web_middleware.py | 29 +++++++++++++++++++++++++++-- 3 files changed, 39 insertions(+), 5 deleti...
null
GHSA-6q87-84jw-cjhp
@sveltejs/kit vulnerable to Cross-site Scripting via tracked search_params
null
[ { "commit_message": "[PATCH] Merge commit from fork * fix: escape names of tracked search parameters * oops .changeset/rotten-colts-arrive.md | 5 +++++ packages/kit/src/runtime/server/data/index.js | 6 +++--- packages/kit/src/runtime/server/page/render.js | 10 ++++++---- packages/kit/src/runtime...
null
GHSA-87hj-px7p-jhf4
null
[ { "commit_message": "[PATCH] Handle close_notify as standard writeErr in AsyncSSLSocket. Summary: Fixes CVE-2019-11934 Reviewed By: mingtaoy Differential Revision: D18020613 fbshipit-source-id: db82bb250e53f0d225f1280bd67bc74abd417836 folly/io/async/AsyncSSLSocket.cpp | 8 +- folly/io/async/test/Async...
null
GHSA-rfq3-w54c-f9q5
OAuth2 Redirect URL validity does not respect query parameters and character casing for loopback addresses
null
[ { "commit_message": "[PATCH] fix: make redirect URL checking more strict The OAuth 2.0 Client's Redirect URL and the Redirect URL used in the OAuth 2.0 flow do not check if the query string is equal: 1. Registering a client with allowed redirect URL `https://example.com/callback` 2. Performing OAuth2 flow and r...
null
GHSA-69ch-w2m2-3vjp
golang.org/x/text/language Denial of service via crafted Accept-Language header
null
[ { "commit_message": "[PATCH] language: reject excessively large Accept-Language strings The BCP 47 tag parser has quadratic time complexity due to inherent aspects of its design. Since the parser is, by design, exposed to untrusted user input, this can be leveraged to force a program to consume significant time...
null
GHSA-wmff-grcw-jcfm
Tauri vulnerable to Regression on Filesystem Scope Checks for Dotfiles
null
[ { "commit_message": "[PATCH] fix(core): fix `require_literal_leading_dot` flipped behavior (#7227) .changes/config.json | 1 + .changes/core-leading-dot.md | 5 +++++ core/tauri-config-schema/schema.json | 2 +- core/tauri-utils/src/config.rs | 2 +- core/tauri/src/scope/fs.rs ...
null
GHSA-36w6-3wpq-3xq2
null
[ { "commit_message": "[PATCH] libvncserver: fix pointer aliasing/alignment issue Accessing byte-aligned data through uint16_t pointers can cause crashes on some platforms or reduce the performance. Therefore ensure a proper stack alignment. libvncserver/translate.c | 11 +++++++---- 1 file changed, 7 insertions(+...
null
GHSA-77hg-g8cc-5r37
Puppet Privilege Escallation
null
[ { "commit_message": "[PATCH] (#12459) drop supplementary groups when permanently dropping UID On certain platforms, Process::UID.change_privilege doesn't handle changing supplementary groups. In that case, we need to always explicitly initgroups, regardless of whether we're using change_privilege, or change_gro...
null
GHSA-9vw5-h5q2-qpc9
null
[ { "commit_message": "[PATCH] Validation to prevent SQL injection. git-svn-id: https://plugins.svn.wordpress.org/cp-appointment-calendar/trunk@1088427 b8457f37-d9ea-0310-8a92-e5e31aec5664 dex_appointments.php | 2 ++ 1 file changed, 2 insertions(+)", "patch_text_b64": "RnJvbSBlMjlhOWNkYmNiMGYzN2Q4ODdkZDMwMmEw...
null
CVE-2022-0370
Cross-site Scripting (XSS) - Stored in livehelperchat/livehelperchat
Cross-site Scripting (XSS) - Stored in Packagist remdex/livehelperchat prior to 3.93v.
[ { "commit_message": "[PATCH] CSRF For personal theme .../defaulttheme/js/admintheme.form.angular.js | 12 ++++++++++++ .../tpl/lhkernel/validation_error.tpl.php | 2 +- .../tpl/lhtheme/admin/form.tpl.php | 18 +++++++++++++++++- .../tpl/lhtheme/personaltheme.tpl.php | 2 +- 4 files chang...
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
GHSA-74r6-grj9-8rq6
Remote Code Execution in AjaxNetProfessional
null
[ { "commit_message": "[PATCH] added allowed customized types .gitignore | 1 + AjaxPro/AjaxPro.csproj | 13 +- AjaxPro/AjaxPro.sln | 4 +- .../AjaxSettingsSectionHandler.cs | 19 + AjaxPro/Handler/AjaxProcHelper...
null
CVE-2018-11652
CSV Injection vulnerability in Nikto 2.1.6 and earlier allows remote attackers to inject arbitrary OS commands via the Server field in an HTTP response header, which is directly injected into a CSV report.
[ { "commit_message": "[PATCH] Fix CSV injection issue if server responds with a malicious Server string & CSV output is opened in Excel or other spreadsheet app. Potentially malicious cell start characters are now prefaced with a ' mark. Thanks to Adam (@bytesoverbombs) for letting me know! Also fixed a crash in...
n/a
GHSA-6r8q-pfpv-7cgj
Vyper vulnerable to integer overflow in loop
null
[ { "commit_message": "[PATCH] Merge pull request from GHSA-6r8q-pfpv-7cgj for loops of the form `for i in range(x, x+N)`, the range of the iterator is not checked, leading to potential overflow. the following example demonstrates the potential for overflow: ``` @external def test() -> uint16: x:uint8 = 255 a:uin...
null
CVE-2023-48311
Any image allowed by default
dockerspawner is a tool to spawn JupyterHub single user servers in Docker containers. Users of JupyterHub deployments running DockerSpawner starting with 0.11.0 without specifying `DockerSpawner.allowed_images` configuration allow users to launch _any_ pullable docker image, instead of restricting to only the single configured image, as intended. This issue has been addressed in commit `3ba4b665b` which has been included in dockerspawner release version 13. Users are advised to upgrade. Users unable to upgrade should explicitly set `DockerSpawner.allowed_images` to a non-empty list containing only the default image will result in the intended default behavior.
[ { "commit_message": "[PATCH 1/2] allow only configured image by default avoids allowing all images when no allowed_images are configured The default of an empty collection prohibits specifying the image (even if it is the allowed image). A new value `allowed_images = \"*\"` can be used to explicitly allow any i...
CWE-20: Improper Input Validation
GHSA-jrhf-5876-rh85
null
[ { "commit_message": "[PATCH] UMTS_FP: fix handling reserved C/T value The spec puts the reserved value at 0xf but our internal table has 'unknown' at 0; since all the other values seem to be offset-by-one, just take the modulus 0xf to avoid running off the end of the table. Bug: 12191 Change-Id: I83c8fb66797bbd...
null
GHSA-qw3j-j5h8-x72h
null
[ { "commit_message": "[PATCH] fix goback url to avoid security issues lib/cfields/cfieldsExport.php | 21 +++++++++++---------- lib/cfields/cfieldsImport.php | 22 +++++++++------------- 2 files changed, 20 insertions(+), 23 deletions(-)", "patch_text_b64": "RnJvbSAyZDE3Y2QwMGY5ODFmOGU4Yzk3ZGUzNGExMmUzNjhiYTJh...
null
GHSA-5jqp-wmhj-g33f
usememos/memos Cross-Site Request Forgery vulnerability
null
[ { "commit_message": "[PATCH] chore: fix CSRF (#876) server/acl.go | 1 + server/server.go | 4 ++++ 2 files changed, 5 insertions(+)", "patch_text_b64": "RnJvbSBjOWJiMmI3ODVkYzU4NTI2NTU0MDVkNWM5YWIxMjdhMmQ1YWEzOTQ4IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBib29qYWNrIDxzdGV2ZW5sZ3RtQGdtYWlsLmNvbT4KRGF0ZTogR...
null
CVE-2019-19962
wolfSSL before 4.3.0 mishandles calls to wc_SignatureGenerateHash, leading to fault injection in RSA cryptography.
[ { "commit_message": "[PATCH] Change signature generation to verify by default wolfcrypt/src/signature.c | 30 ++++++++++++++++++++++++++++++ wolfssl/wolfcrypt/signature.h | 11 +++++++++++ 2 files changed, 41 insertions(+)", "patch_text_b64": "RnJvbSAyMzg3ODUxMmM2NTgzNGQxMjgxMWIxMTA3ZDE5YTAwMTQ3OGVjYTVkIE...
n/a
GHSA-932v-x9x2-vq29
Hive Metastore Server is vulnerable to SQL Injection
null
[ { "commit_message": "[PATCH] Enable using column identifiers with special characters when deleting table column statistics. (#6149) .../hive/metastore/MetaStoreDirectSql.java | 44 +++++++++++++------ .../hive/metastore/TestObjectStore.java | 34 +++++++++++--- 2 files changed, 57 insertions(+), 21 delet...
null
GHSA-pwv6-872c-gcg6
Cross-Site Request Forgery in Jenkins
null
[ { "commit_message": "[PATCH 1/2] [SECURITY-406] Prevent user creation via GET /user/whatever core/src/main/java/hudson/model/User.java | 16 ++++++++++ core/src/main/java/jenkins/model/Jenkins.java | 2 +- .../test/java/jenkins/model/JenkinsTest.java | 30 +++++++++++++++++++ 3 files changed, 47 insertions(+...
null
GHSA-3wph-8799-87r7
null
[ { "commit_message": "[PATCH] ui/vnc-clipboard: fix integer underflow in vnc_client_cut_text_ext Extended ClientCutText messages start with a 4-byte header. If len < 4, an integer underflow occurs in vnc_client_cut_text_ext. The result is used to decompress data in a while loop in inflate_buffer, leading to CPU ...
null
GHSA-ggmv-j932-q89q
Chall-Manager's HTTP Gateway is vulnerable to DoS due to missing header timeout
null
[ { "commit_message": "[PATCH] fix: potential slowloris attack on http server header reading server/server.go | 2 ++ 1 file changed, 2 insertions(+)", "patch_text_b64": "RnJvbSAxMzg1YmQ4NjkxNDI2NTExNDZjZDBiMTIzMDg1ZjkxY2VjNjk4NjM2IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBMdWNhcyBURVNTT04gPGx1Y2FzdGVzc29uQHBy...
null
GHSA-gm8g-fh49-qq6v
Jenkins global-build-stats Plugin missing permission check can result in graph IDs being enumerated
null
[ { "commit_message": "[PATCH] [SECURITY-3535] .../GlobalBuildStatsPlugin.java | 19 ++++++++++++++++++- 1 file changed, 18 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAzMmFlYjA0OTNjNGZmNTQyMzQ0ODU3NmY0NzdhYzYxMmY3YTI1MTM4IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBWaWN0b3IgQmFsYWtpbmU...
null
GHSA-jj6p-3m75-g2p3
matrix-sdk-base denial of service via custom m.room.join_rules event values
null
[ { "commit_message": "[PATCH] fix: Don't attempt to serialize custom join rules (#5924) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit This is not supported by Ruma. The join_rule field, despite being defined as a pure string, can have associated data to it based on the...
null
PYSEC-2023-33
null
[ { "commit_message": "[PATCH] Fixed XSS vulnerability modoboa/static/js/listing.js | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSAwNWI0YTRmODY1YzgyMWI0ZDE3ODBhYzRhMWYwMDQzMjUzNGFiYWZhIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBBbnRvaW5lIE5ndXllbiA8dG9uaW9Abmd5bi5vcmc+CkRh...
null
GHSA-qjx3-2g35-6hv8
Mautic Sensitive Data Exposure due to inadequate user permission settings
null
[ { "commit_message": "[PATCH] Merge pull request from GHSA-qjx3-2g35-6hv8 * - included new permission to denied unauthorized access - included functional tests * - take out import permission * - change permission parameters from lead to user data * - change permission parameters from lead to user data Co-authore...
null
CVE-2024-56329
Account Takeover Vulnerability in Social Account Linking in joelbutcher/socialstream
Socialstream is a third-party package for Laravel Jetstream. It replaces the published authentication and profile scaffolding provided by Laravel Jetstream, with scaffolding that has support for Laravel Socialite. When linking a social account to an already authenticated user, the lack of a confirmation step introduces a security risk. This is exacerbated if ->stateless() is used in the Socialite configuration, bypassing state verification and making the exploit easier. Developers should ensure that users explicitly confirm account linking and avoid configurations that skip critical security checks. Socialstream v6.2 introduces a new custom route that requires a user to "Confirm" or "Deny" a request to link a social account. Users are advised to upgrade. There are no known workarounds for this vulnerability.
[ { "commit_message": "[PATCH] Merge commit from fork resources/views/oauth/prompt.blade.php | 47 +++++++++++++++++ routes/web.php | 12 +++++ src/Actions/AuthenticateOAuthCallback.php | 14 +++-- src/Http/Controllers/OAuthController.php | 62 +++++++++++++++++++++++ src/SocialstreamSe...
CWE-287: Improper Authentication
GHSA-rr24-p653-wjc3
null
[ { "commit_message": "[PATCH] SOAP API: proper access checks when deleting bugs Affects #13656 : Reporters have read/write access to existing data of other users api/soap/mc_issue_api.php | 4 ++++ 1 file changed, 4 insertions(+)", "patch_text_b64": "RnJvbSBkZjc3ODJhNjVlOTZhYTFjOTYzOWE3NjI1YTY1ODEwMjEzNGM3ZmU...
null
CVE-2025-62406
Piwigo is vulnerable to one-click account takeover by modifying the password-reset link
Piwigo is a full featured open source photo gallery application for the web. In Piwigo 15.6.0, using the password reset function allows sending a password-reset URL by entering an existing username or email address. However, the hostname used to construct this URL is taken from the HTTP request's Host header and is not validated at all. Therefore, an attacker can send a password-reset URL with a modified hostname to an existing user whose username or email the attacker knows or guesses. This issue has been patched in version 15.7.0.
[ { "commit_message": "[PATCH] (cp 9ac99be1d) fixes GHSA-9986-w7jf-33f6 and fixes GHSA-9986-w7jf-33f6 not include password.tpl from standard pages identification.php | 2 + include/base32.class.php | 85 + include/config_default.inc.php | 5 + include/functions_mail.inc.ph...
CWE-640: Weak Password Recovery Mechanism for Forgotten Password
GHSA-fqq6-7vqf-w3fg
Picklescan is missing detection when calling built-in python doctest.debug_script
null
[ { "commit_message": "[PATCH] Missing detection when calling Python functions (#49) Address: - Missing detection when calling pytorch function torch.utils.bottleneck.__main__.run_autograd_prof https://github.com/mmaitre314/picklescan/security/advisories/GHSA-4whj-rm5r-c2v8 - Missing detection when calling built-...
null
GHSA-f637-vh3r-vfh2
TensorFlow has Floating Point Exception in AudioSpectrogram
null
[ { "commit_message": "[PATCH] Fix audio spectrogram FPE. Do input validation in shape function. PiperOrigin-RevId: 503481241 tensorflow/core/kernels/BUILD | 1 + .../core/kernels/spectrogram_op_test.cc | 41 +++++++++++++++++++ tensorflow/core/ops/audio_ops.cc | 10 +++++ 3 files...
null
GHSA-pjc4-3w99-j7v4
Open redirect in Flask-Unchained
null
[ { "commit_message": "[PATCH] security fixes flask_unchained/bundles/controller/utils.py | 35 ++++++++++++++++----- 1 file changed, 27 insertions(+), 8 deletions(-)", "patch_text_b64": "RnJvbSAyYmZlZWRmMWJjMzFkZjg1MWNhYjhjNjZkZjBjNDMyYjEwNDA2YWFkIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBCcmlhbiBDYXBwZWxsbyA...
null
GHSA-6757-jp84-gxfx
Improper Input Validation in PyYAML
null
[ { "commit_message": "[PATCH] Deprecate/warn usage of yaml.load(input) The `load` and `load_all` methods will issue a warning when they are called without the 'Loader=' parameter. The warning will point to a URL that is always up to date with the latest information on the usage of `load`. There are several ways ...
null
GHSA-3cjh-p6pw-jhv9
Pow Mnesia cache doesn't invalidate all expired keys on startup
null
[ { "commit_message": "[PATCH] Fix bug with expired cached keys not invalidated on startup CHANGELOG.md | 8 +++ lib/pow/store/backend/mnesia_cache.ex | 7 +-- test/pow/store/backend/mnesia_cache_test.exs | 61 ++++++++++---------- 3 files changed, 42 insertions(+), 34 deleti...
null
CVE-2016-6156
Race condition in the ec_device_ioctl_xcmd function in drivers/platform/chrome/cros_ec_dev.c in the Linux kernel before 4.7 allows local users to cause a denial of service (out-of-bounds array access) by changing a certain size value, aka a "double fetch" vulnerability.
[ { "commit_message": "[PATCH] platform/chrome: cros_ec_dev - double fetch bug in ioctl We verify \"u_cmd.outsize\" and \"u_cmd.insize\" but we need to make sure that those values have not changed between the two copy_from_user() calls. Otherwise it could lead to a buffer overflow. Additionally, cros_ec_cmd_xfer...
n/a
CVE-2023-5688
Cross-site Scripting (XSS) - DOM in modoboa/modoboa
Cross-site Scripting (XSS) - DOM in GitHub repository modoboa/modoboa prior to 2.2.2.
[ { "commit_message": "[PATCH 1/2] Fixed XSS vulnerability when displaying form error messages. modoboa/templates/common/generic_field.html | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSA2ZmRiMDc3Y2E1MTQwNzE2MjEwOWM5ZWQwZDk3ODgyZDdjNzEzOGViIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAw...
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-22404
Permissions bypass in Nextcloud with the files zip app
Nextcloud files Zip app is a tool to create zip archives from one or multiple files from within Nextcloud. In affected versions users can download "view-only" files by zipping the complete folder. It is recommended that the Files ZIP app is upgraded to 1.2.1, 1.4.1, or 1.5.0. Users unable to upgrade should disable the file zip app.
[ { "commit_message": "[PATCH] fix: Add share attribute check MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Signed-off-by: Julius Härtl <jus@bitgrid.net> lib/Service/ZipService.php | 16 ++++++++++++++++ 1 file changed, 16 insertions(+)", "patch_text_b64": "RnJvbSBjN...
CWE-281: Improper Preservation of Permissions
GHSA-4953-8rw3-w7m5
null
[ { "commit_message": "[PATCH] [security] Fixed local path disclosure vulnerability, see PMASA-2012-2 ChangeLog | 3 +++ show_config_errors.php | 4 +++- 2 files changed, 6 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBjNTE4MTdkM2I4Y2IwNWZmNTRkY2E5MzczYzA2NjdlMjliODQ5OGQ0IE1vbiBTZXAgMTcg...
null
CVE-2023-50658
The jose2go component before 1.6.0 for Go allows attackers to cause a denial of service (CPU consumption) via a large p2c (aka PBES2 Count) value.
[ { "commit_message": "[PATCH] Adding min/max iteration count guards to pbes2-hmac-aeskw algorithm jose_test.go | 34 ++++++++++++++++++++++++++++++ pbse2_hmac_aeskw.go | 51 +++++++++++++++++++++++++++++++++++++++------ 2 files changed, 79 insertions(+), 6 deletions(-)", "patch_text_b64": "RnJvbSBhNDU4N...
n/a
CVE-2021-3646
Cross-site Scripting (XSS) - Reflected in btcpayserver/btcpayserver
btcpayserver is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
[ { "commit_message": "[PATCH] Add CSP at the website level (#2863) BTCPayServer.Tests/BTCPayServerTester.cs | 4 +- BTCPayServer.Tests/SeleniumTester.cs | 1 + .../NotificationsDropdown/Default.cshtml | 2 +- .../Configuration/DefaultConfiguration.cs | 1 + .../Filters/ContentSecurityP...
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
GHSA-f256-j965-7f32
Possible request smuggling in HTTP/2 due missing validation of content-length
null
[ { "commit_message": "[PATCH] Merge pull request from GHSA-f256-j965-7f32 Motivation: We also need to ensure that all the header validation is done when a single header with the endStream flag is received Modifications: - Adjust code to always enforce the validation - Add more unit tests Result: Always correctly...
null
CVE-2017-15207
In Kanboard before 1.0.47, by altering form data, an authenticated user can edit tasks of a private project of another user.
[ { "commit_message": "[PATCH] Avoid people to alter other projects by changing form data ChangeLog | 4 + app/Controller/ActionController.php | 5 +- app/Controller/ActionCreationController.php | 7 +- app/Controller/BaseController.php | 90 ++++++++++++++++++++...
n/a
CVE-2025-46549
Yeswiki Vulnerable to Unauthenticated Reflected Cross-site Scripting
YesWiki is a wiki system written in PHP. Prior to version 4.5.4, an attacker can use a reflected cross-site scripting attack to steal cookies from an authenticated user by having them click on a malicious link. Stolen cookies allow the attacker to take over the user’s session. This vulnerability may also allow attackers to deface the website or embed malicious content. This issue has been patched in version 4.5.4.
[ { "commit_message": "[PATCH] fix(bazar): no html in template parameter tools/bazar/actions/BazarListeAction.php | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAxMDdkNDMwNTZhZGViYWEwYzczMTIzMGY5ZmQwMTA4OThlODhmM2Y1IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBGbG9yaWFuIFNjaG1...
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
GHSA-x53g-q9xm-rf4m
null
[ { "commit_message": "[PATCH] fix metadata filter not affect in keyword-search and fulltext-search (#16644) api/core/rag/datasource/retrieval_service.py | 6 +++++- api/core/rag/retrieval/dataset_retrieval.py | 6 +++++- 2 files changed, 10 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSAxYmUwZDI2Yz...
null
GHSA-2q3p-cfj5-9f8c
null
[ { "commit_message": "[PATCH] fix for #524 usually, ip addresses with multiple failed login attempts should be blocked. An attacker could bypass this by sending an X-forwarded-for header and change that IP with each attempt. Since REMMOTE_ADDR is harder to fake we should first check that one and only if that one...
null
GHSA-mwg2-3xpv-5v28
CSRF vulnerability in Jenkins Micro Focus Application Automation Tools Plugin
null
[ { "commit_message": "[PATCH] [SECURITY-2132] .../automation/tools/octane/actions/PluginActions.java | 5 +++++ .../tools/settings/AlmServerSettingsGlobalConfiguration.java | 4 ++++ .../settings/OctaneServerSettingsGlobalConfiguration.java | 4 ++++ .../tools/settings/SvServerSettingsGlobalConfiguration.j...
null
CVE-2024-42486
Cilium vulnerable to information leakage via incorrect ReferenceGrant update logic in Gateway API
Cilium is a networking, observability, and security solution with an eBPF-based dataplane. In versions on the 1.15.x branch prior to 1.15.8 and the 1.16.x branch prior to 1.16.1, ReferenceGrant changes are not correctly propagated in Cilium's GatewayAPI controller, which could lead to Gateway resources being able to access secrets for longer than intended, or to Routes having the ability to forward traffic to backends in other namespaces for longer than intended. This issue has been patched in Cilium v1.15.8 and v1.16.1. As a workaround, any modification of a related Gateway/HTTPRoute/GRPCRoute/TCPRoute CRD (for example, adding any label to any of these resources) will trigger a reconciliation of ReferenceGrants on an affected cluster.
[ { "commit_message": "[PATCH] gateway-api: Enqueue gateway for Reference Grant changes This commit is to make sure that the reconciliation loop is kicked off for Gateway object if there is any change in ReferenceGrant (mainly for SecretObjectReference). Signed-off-by: Tam Mach <tam.mach@cilium.io> operator/pkg/g...
CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CVE-2022-23564
Reachable Assertion in Tensorflow
Tensorflow is an Open Source Machine Learning Framework. When decoding a resource handle tensor from protobuf, a TensorFlow process can encounter cases where a `CHECK` assertion is invalidated based on user controlled arguments. This allows attackers to cause denial of services in TensorFlow processes. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
[ { "commit_message": "[PATCH] Prevent `CHECK`-fail when decoding resource handles from proto In certain scenarios, the proto might contain tensors that have too many elements (overflow). This is a `CHECK`-fail in general, but we should prevent this, given how many CVEs caused by that we have received this year (...
CWE-617: Reachable Assertion
GHSA-4vhj-98r6-424h
In Bouncy Castle JCE Provider it is possible to inject extra elements in the sequence making up the signature and still have it validate
null
[ { "commit_message": "[PATCH] added length check for sequence in DSA signatures .../provider/asymmetric/dsa/DSASigner.java | 8 +- .../jce/provider/test/DSATest.java | 105 ++++++++++++++++++ 2 files changed, 110 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSBiMGMzY2U5OWQ0M2Q3M2EwOTY...
null
GHSA-pgpj-v85q-h5fm
Cross-Site Request Forgery on any API call in pyLoad may lead to admin privilege escalation
null
[ { "commit_message": "[PATCH] fix GHSA-pgpj-v85q-h5fm security advisory (2) src/pyload/webui/app/__init__.py | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAxMzc0YzgyNDI3MWNiN2U5Mjc3NDA2NjRkMDZkMmU1Nzc2MjRjYTNlIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBHYW1tYUMwZGUgPGdhbW1hYz...
null
GHSA-h5wm-hc9w-hp9m
null
[ { "commit_message": "[PATCH] mqueue: fix a use-after-free in sys_mq_notify() The retry logic for netlink_attachskb() inside sys_mq_notify() is nasty and vulnerable: 1) The sock refcnt is already released when retry is needed 2) The fd is controllable by user-space because we already release the file refcnt so w...
null
GHSA-5j3w-5pcr-f8hg
Symfony UX allows unsanitized HTML attribute injection via ComponentAttributes
null
[ { "commit_message": "[PATCH] Remove ComponentAttributeFactory and inject EscaperRuntime directly composer.json | 2 +- .../LiveComponentExtension.php | 7 +++--- .../AddLiveAttributesSubscriber.php | 7 +++--- src/LiveComponentHydrator.php ...
null
GHSA-jq35-85cj-fj4p
/sys/devices/virtual/powercap accessible by default to containers
null
[ { "commit_message": "[PATCH 1/2] oci/defaults: deny /sys/devices/virtual/powercap The ability to read these files may offer a power-based sidechannel attack against any workloads running on the same kernel. This was originally [CVE-2020-8694][1], which was fixed in [949dd0104c496fa7c14991a23c03c62e44637e71][2] ...
null
CVE-2020-11085
Out-of-bounds Read in FreeRDP
In FreeRDP before 2.1.0, there is an out-of-bounds read in cliprdr_read_format_list. Clipboard format data read (by client or server) might read data out-of-bounds. This has been fixed in 2.1.0.
[ { "commit_message": "[PATCH] Fixed oob read in cliprdr_read_format_list channels/cliprdr/cliprdr_common.c | 85 ++++++++++++++----------------- 1 file changed, 39 insertions(+), 46 deletions(-)", "patch_text_b64": "RnJvbSBiNzMxNDNjZjdlZTVmZTRjZGFiY2JmNTY5MDhhYTE1ZDhhODgzODIxIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQ...
CWE-125: Out-of-bounds Read
CVE-2025-53095
Sunshine application-wide CSRF in the UI leads to command injection as Administrator
Sunshine is a self-hosted game stream host for Moonlight. Prior to version 2025.628.4510, the web UI of Sunshine lacks protection against Cross-Site Request Forgery (CSRF) attacks. This vulnerability allows an attacker to craft a malicious web page that, when visited by an authenticated user, can trigger unintended actions within the Sunshine application on behalf of that user. Specifically, since the application does OS command execution by design, this issue can be exploited to abuse the "Command Preparations" feature, enabling an attacker to inject arbitrary commands that will be executed with Administrator privileges when an application is launched. This issue has been patched in version 2025.628.4510.
[ { "commit_message": "[PATCH] Merge commit from fork * (security) Mandate content-type on POST calls * (security) Add JSON content-type in POST requests with a body * Added Content Type on missing endpoints * (review) docs and newlines * (docs) add JSON content type header * style(clang-format): fix lint errors ...
CWE-352: Cross-Site Request Forgery (CSRF)
CVE-2021-32820
File disclosure in Express Handlebars
Express-handlebars is a Handlebars view engine for Express. Express-handlebars mixes pure template data with engine configuration options through the Express render API. More specifically, the layout parameter may trigger file disclosure vulnerabilities in downstream applications. This potential vulnerability is somewhat restricted in that only files with existing extentions (i.e. file.extension) can be included, files that lack an extension will have .handlebars appended to them. For complete details refer to the referenced GHSL-2021-018 report. Notes in documentation have been added to help users avoid this potential information exposure vulnerability.
[ { "commit_message": "[PATCH] fix: add note about security README.md | 3 +++ 1 file changed, 3 insertions(+)", "patch_text_b64": "RnJvbSA3OGM0N2EyMzVjNGFkN2JjMjY3NGJkZGQ4ZWMyNzIxNTY3ZWQ4YzcyIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBUb255IEJyaXggPHRvbnlAYnJpeC5uaW5qYT4KRGF0ZTogVHVlLCA0IE1heSAyMDIxIDA5OjA0OjA...
CWE-200 Information Exposure
CVE-2023-31285
An XSS issue was discovered in Serenity Serene (and StartSharp) before 6.7.0. When users upload temporary files, some specific file endings are not allowed, but it is possible to upload .html or .htm files containing an XSS payload. The resulting link can be sent to an administrator user.
[ { "commit_message": "[PATCH] :up: 6.7.0 CHANGELOG.md | 16 ++++++++++++++++ build/Package.Build.props | 2 +- 2 files changed, 17 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAxMWI5ZDI2N2Y4NDA1MTNkMDRiNGY0ZDQ4NzZkZTc4MjNhNmU0OGQyIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiB2b2xrYW5jZXls...
n/a
GHSA-vmf5-924f-25f2
Out-of-bounds write
null
[ { "commit_message": "[PATCH 1/6] [CVE-2019-1103] Chakra JIT Type Confusion lib/Backend/BackwardPass.cpp | 12 ++++++++---- lib/Backend/BailOut.h | 3 ++- lib/Backend/GlobOpt.cpp | 6 ++++++ lib/Backend/Opnd.h | 3 ++- 4 files changed, 18 insertions(+), 6 deletions(-)", "patch_text_b64":...
null
CVE-2020-15224
Socket syscalls can leak enclave memory contents in Open Enclave
In Open Enclave before version 0.12.0, an information disclosure vulnerability exists when an enclave application using the syscalls provided by the sockets.edl is loaded by a malicious host application. An attacker who successfully exploited the vulnerability could read privileged data from the enclave heap across trust boundaries. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to elevate user rights directly, but it could be used to obtain information otherwise considered confidential in an enclave, which could be used in further compromises. The issue has been addressed in version 0.12.0 and the current master branch. Users will need to to recompile their applications against the patched libraries to be protected from this vulnerability.
[ { "commit_message": "[PATCH] Merge pull request from GHSA-525h-wxcc-f66m Signed-off-by: Ming-Wei Shih <mishih@microsoft.com> include/openenclave/edl/socket.edl | 12 +- include/openenclave/internal/syscall/fd.h | 2 +- include/openenclave/internal/syscall/iov.h | 3 +- .../openenclave/intern...
CWE-552 Files or Directories Accessible to External Parties
PYSEC-2020-217
null
[ { "commit_message": "[PATCH] tree: Check for `.git` with case insensitivy src/tree.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA5Mjg0MjljNWM5NmE3MDFiY2JjYWZhY2IyNDIxYTgyNjAyYjM2OTE1IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBWaWNlbnQgTWFydGkgPHRhbm9rdUBnbWFpbC5jb20+CkRhd...
null
CVE-2019-19048
A memory leak in the crypto_reportstat() function in drivers/virt/vboxguest/vboxguest_utils.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering copy_form_user() failures, aka CID-e0b0cb938864.
[ { "commit_message": "[PATCH] virt: vbox: fix memory leak in hgcm_call_preprocess_linaddr In hgcm_call_preprocess_linaddr memory is allocated for bounce_buf but is not released if copy_form_user fails. In order to prevent memory leak in case of failure, the assignment to bounce_buf_ret is moved before the error ...
n/a
CVE-2023-39355
FreeRDP Use-After-Free in RDPGFX_CMDID_RESETGRAPHICS
FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Versions of FreeRDP on the 3.x release branch before beta3 are subject to a Use-After-Free in processing `RDPGFX_CMDID_RESETGRAPHICS` packets. If `context->maxPlaneSize` is 0, `context->planesBuffer` will be freed. However, without updating `context->planesBuffer`, this leads to a Use-After-Free exploit vector. In most environments this should only result in a crash. This issue has been addressed in version 3.0.0-beta3 and users of the beta 3.x releases are advised to upgrade. There are no known workarounds for this vulnerability.
[ { "commit_message": "[PATCH] [codec,planar] fix reset libfreerdp/codec/planar.c | 62 ++++++++++++++++++++++----------------- 1 file changed, 35 insertions(+), 27 deletions(-)", "patch_text_b64": "RnJvbSBkNmY5ZDMzYTdkYjBiMzQ2MTk1YjZhMTViNWI5OTk0NGJhNDFiZWVlIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBBcm1pbiBO...
CWE-416: Use After Free
CVE-2016-3156
The IPv4 implementation in the Linux kernel before 4.5.2 mishandles destruction of device objects, which allows guest OS users to cause a denial of service (host OS networking outage) by arranging for a large number of IP addresses.
[ { "commit_message": "[PATCH] ipv4: Don't do expensive useless work during inetdev destroy. When an inetdev is destroyed, every address assigned to the interface is removed. And in this scenerio we do two pointless things which can be very expensive if the number of assigned interfaces is large: 1) Address prom...
n/a
GHSA-hf5p-f83x-5q2g
OpenNMS privilege escalation vulnerability
null
[ { "commit_message": "[PATCH] NMS-15702: Only members of ROLE_ADMIN can view/edit users.xml .../web/rest/v1/FilesystemRestService.java | 32 ++++++++++++++----- 1 file changed, 24 insertions(+), 8 deletions(-)", "patch_text_b64": "RnJvbSBmMmNhZjdkMGI5ZGI1OGI1OWU5ODUwNjQ5MGFhY2EzN2ZiZjI0M2I2IE1vbiBTZXAgMTcg...
null
CVE-2011-5098
chef-server-api/app/controllers/clients.rb in Chef Server in Chef before 0.9.20, and 0.10.x before 0.10.6, does not require administrative privileges for creating admin clients, which allows remote authenticated users to bypass intended access restrictions by leveraging read permission for the validation key and executing a knife client create command with the --admin option.
[ { "commit_message": "[PATCH] CHEF-2649: Only allow admin clients to create admins (not validators) chef-server-api/app/controllers/clients.rb | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-)", "patch_text_b64": "RnJvbSAzM2YwZTljNThiYmYwNDdlMWI0MDFhODM0ZjNhYmZlNzJkOWE4OTQ3IE1vbiBTZXAgMTcgM...
n/a
CVE-2024-5138
The snapctl component within snapd allows a confined snap to interact with the snapd daemon to take certain privileged actions on behalf of the snap. It was found that snapctl did not properly parse command-line arguments, allowing an unprivileged user to trigger an authorised action on behalf of the snap that would normally require administrator privileges to perform. This could possibly allow an unprivileged user to perform a denial of service or similar.
[ { "commit_message": "[PATCH] Merge pull request from GHSA-p9v8-q5m4-pf46 * o/hookstate: recognize \"--\" in snapctl argument parser When parsing snapctl argument vector recognize the \"--\" as an option terminator, so that dash-options are not recognized afterwards. Fixes: https://bugs.launchpad.net/snapd/+bug/...
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-56112
CyberPanel (aka Cyber Panel) before f0cf648 allows XSS via token or username to plogical/phpmyadminsignin.php.
[ { "commit_message": "[PATCH] bug fix: phpmyadmin login plogical/phpmyadminsignin.php | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSBmMGNmNjQ4Yzc4NTFjOTZjMzZiYjBjMzkwZDEzZTYwOTMxZjQ1OTAwIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiB1c21hbm5hc2lyIDx1c21hbkBjeWJlcnBlcnNvbnM...
n/a
CVE-2024-3110
Stored XSS leading to admin account takeover in mintplex-labs/anything-llm
A stored Cross-Site Scripting (XSS) vulnerability exists in the mintplex-labs/anything-llm application, affecting versions up to and including the latest before 1.0.0. The vulnerability arises from the application's failure to properly sanitize and validate user-supplied URLs before embedding them into the application UI as external links with custom icons. Specifically, the application does not prevent the inclusion of 'javascript:' protocol payloads in URLs, which can be exploited by a user with manager role to execute arbitrary JavaScript code in the context of another user's session. This flaw can be leveraged to steal the admin's authorization token by crafting malicious URLs that, when clicked by the admin, send the token to an attacker-controlled server. The attacker can then use this token to perform unauthorized actions, escalate privileges to admin, or directly take over the admin account. The vulnerability is triggered when the malicious link is opened in a new tab using either the CTRL + left mouse button click or the mouse scroll wheel click, or in some non-updated versions of modern browsers, by directly clicking on the link.
[ { "commit_message": "[PATCH] security: patch footer icon self-xss from privledged user server/models/systemSettings.js | 7 +++++-- server/utils/http/index.js | 10 ++++++++++ 2 files changed, 15 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSA0OWYzMGUwNTFjOWY2ZTI4OTc3ZDU3ZDBlNWY0OWMxMjk0MDk0Z...
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
GHSA-pjrj-v874-q2mx
null
[ { "commit_message": "[PATCH] check if admin apps/files_encryption/settings.php | 4 +++- apps/files_external/settings.php | 2 ++ apps/user_ldap/settings.php | 3 +++ apps/user_webdavauth/settings.php | 2 ++ 4 files changed, 10 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBjNGVjYmFkMDA5OWM...
null
GHSA-wvjv-p5rr-mmqm
Symfony allows direct access of ESI URLs behind a trusted proxy
null
[ { "commit_message": "[PATCH] Forced all fragment uris to be signed, even for ESI .../FrameworkBundle/Resources/config/esi.xml | 1 + .../EventListener/FragmentListener.php | 13 ++--- .../Fragment/EsiFragmentRenderer.php | 22 +++++++-- .../EventListener/FragmentListenerTest.php | 13 ----- ......
null
CVE-2024-1892
ReDoS Vulnerability in scrapy/scrapy's XMLFeedSpider
A Regular Expression Denial of Service (ReDoS) vulnerability exists in the XMLFeedSpider class of the scrapy/scrapy project, specifically in the parsing of XML content. By crafting malicious XML content that exploits inefficient regular expression complexity used in the parsing process, an attacker can cause a denial-of-service (DoS) condition. This vulnerability allows for the system to hang and consume significant resources, potentially rendering services that utilize Scrapy for XML processing unresponsive.
[ { "commit_message": "[PATCH 01/18] Set an arbitrary upper limit on ReDoS-vulnerable regexps docs/news.rst | 28 ++++++++++++++++++++++++++++ scrapy/utils/iterators.py | 12 +++++++----- scrapy/utils/response.py | 4 ++-- 3 files changed, 37 insertions(+), 7 deletions(-)", "patch_text_b64": "RnJvb...
CWE-1333 Inefficient Regular Expression Complexity
GHSA-mh7x-8j8h-xvj8
null
[ { "commit_message": "[PATCH] fix: [security] new audit logs lack of ACL controls - added proper ACL handling to the new audit logs - as reported by fukusuket(Fukusuke Takahashi) app/Controller/AuditLogsController.php | 24 ++++++++++++++++++++---- 1 file changed, 20 insertions(+), 4 deletions(-)", "patch_tex...
null
CVE-2022-29173
No protection against rollback attacks in go-tuf
go-tuf is a Go implementation of The Update Framework (TUF). go-tuf does not correctly implement the client workflow for updating the metadata files for roles other than the root role. Specifically, checks for rollback attacks are not implemented correctly meaning an attacker can cause clients to install software that is older than the software which the client previously knew to be available, and may include software with known vulnerabilities. In more detail, the client code of go-tuf has several issues in regards to preventing rollback attacks: 1. It does not take into account the content of any previously trusted metadata, if available, before proceeding with updating roles other than the root role (i.e., steps 5.4.3.1 and 5.5.5 of the detailed client workflow). This means that any form of version verification done on the newly-downloaded metadata is made using the default value of zero, which always passes. 2. For both timestamp and snapshot roles, go-tuf saves these metadata files as trusted before verifying if the version of the metafiles they refer to is correct (i.e., steps 5.5.4 and 5.6.4 of the detailed client workflow). A fix is available in version 0.3.0 or newer. No workarounds are known for this issue apart from upgrading.
[ { "commit_message": "[PATCH] Merge pull request from GHSA-66x3-6cw3-v5gj * Remove obsolete snapshot error check Signed-off-by: Radoslav Dimitrov <dimitrovr@vmware.com> * Add a dedicated error for missing target metadata file Signed-off-by: Radoslav Dimitrov <dimitrovr@vmware.com> * Fix protection against metada...
CWE-354: Improper Validation of Integrity Check Value
GHSA-p379-cxqh-q822
SQL filter bypass leading to arbitrary write requests using "SQL Manager"
null
[ { "commit_message": "[PATCH] fix wrong condition and wrong call to execute ethod classes/db/Db.php | 6 +----- 1 file changed, 1 insertion(+), 5 deletions(-)", "patch_text_b64": "RnJvbSAyMzcyMDg4NjcxNGI1YzI2OWM4ZWM4ZGQxMGZmMjU3ZTYxZTUwZGU2IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiAibWF0dGhpZXUucm9sbGFuZCIgPG...
null