id
stringlengths
12
19
title
stringlengths
0
237
description
stringlengths
35
3.87k
patches
listlengths
1
22
cwe
stringlengths
2
440
GHSA-8gqf-26xw-x3gx
Liferay Portal XSS Vulnerability
null
[ { "commit_message": "<tomas.polesovsky@liferay.com> [PATCH] LPS-73087 Fix other possible places .../resources/com.liferay.login.web/openid_connect.jsp | 2 +- .../main/resources/META-INF/resources/create_account.jsp | 2 +- .../main/resources/META-INF/resources/forgot_password.jsp | 4 ++-- .../src/main/...
null
GHSA-7mr2-r9fx-7j9m
null
[ { "commit_message": "[PATCH] Fix handling of parameter-entity references MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit There were two bugs where parameter-entity references could lead to an unexpected change of the input buffer in xmlParseNameComplex and xmlDictLookup...
null
CVE-2022-36097
XWiki Platform Attachment UI vulnerable to cross-site scripting in the move attachment form
XWiki Platform Attachment UI provides a macro to easily upload and select attachments for XWiki Platform, a generic wiki platform. Starting with version 14.0-rc-1 and prior to 14.4-rc-1, it's possible to store JavaScript in an attachment name, which will be executed by anyone trying to move the corresponding attachment. This issue has been patched in XWiki 14.4-rc-1. As a workaround, one may copy `moveStep1.vm` to `webapp/xwiki/templates/moveStep1.vm` and replace vulnerable code with code from the patch.
[ { "commit_message": "[PATCH] XWIKI-19667: The move attachment form is missing escaping and some translations .../resources/ApplicationResources.properties | 3 + .../resources/templates/attachment/move.vm | 7 +- .../templates/attachment/moveStatus.vm | 12 +- .../templates/attachment/moveStep1.vm ...
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
PYSEC-2020-305
null
[ { "commit_message": "[PATCH] Fix undefined behavior in `tf.raw_ops.Switch` in eager mode. PiperOrigin-RevId: 332578058 Change-Id: I9727571d2f21476b10d8aa27c1b7176564b76ac9 tensorflow/core/common_runtime/eager/kernel_and_device.cc | 7 ++++++- .../python/kernel_tests/control_flow_ops_py_test.py | 8 ++++++++...
null
GHSA-5x29-3hr9-6wpw
TPM 1.2 key authorization values vulnerable to TPM transport eavesdropper in go-tpm
null
[ { "commit_message": "[PATCH] Fix TPM 1.2 migration (#195) * Fix issue with TPM 1.2 migration auth (#1) Fix some TPM 1.2-specific issues related to key migration and testing: - A bug in CreateWrapKey that uses an incorrect key to encrypt a key's `migrationAuth` value - Addition of `AuthorizeMigrationKey` and `Cr...
null
GHSA-8843-m7mw-mxqm
Buffer overflow in Pillow
null
[ { "commit_message": "[PATCH 1/5] Ensure that Tiff's concept of Strip and Tilesize matches Pillow's src/libImaging/TiffDecode.c | 19 ++++++++++++++++++- 1 file changed, 18 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA2Yjg0MmY0ZWMwMDFiMTJhOTM0OGU5NTg1NGUwMmJiZDEwYTg0ZTIwIE1vbiBTZXAgMTcgMDA6MDA6MDA...
null
GHSA-cfv5-3vm4-4jfp
null
[ { "commit_message": "[PATCH] copy: CVE-2022-0485: Fail nbdcopy if NBD read or write fails nbdcopy has a nasty bug when performing multi-threaded copies using asynchronous nbd calls - it was blindly treating the completion of an asynchronous command as successful, rather than checking the *error parameter. This...
null
GHSA-4f2h-f89q-3w95
null
[ { "commit_message": "[PATCH] rcar-gen3: plat: BL2: Fix to check \"rcar_image_number\" variable before use Reviewed-by: Tomer Fichman <Tomer.Fichman@cymotive.com> Signed-off-by: Yoshifumi Hosoya <yoshifumi.hosoya.wj@renesas.com> drivers/renesas/common/io/io_rcar.c | 10 +++++----- 1 file changed, 5 insertions(+),...
null
CVE-2016-2515
Hawk before 3.1.3 and 4.x before 4.1.1 allow remote attackers to cause a denial of service (CPU consumption or partial outage) via a long (1) header or (2) URI that is matched against an improper regular expression.
[ { "commit_message": "[PATCH] Fix minor DoS attack on long headers or uris. Closes #168 lib/server.js | 12 ++++++++++-- lib/utils.js | 23 ++++++++++++++++++++--- package.json | 2 +- test/server.js | 27 +++++++++++++++++++++++++++ test/utils.js | 28 ++++++++++++++++++++++++++++ 5 files changed, 86 insertio...
n/a
GHSA-m5vv-6r4h-3vj9
Azure Identity Libraries and Microsoft Authentication Library Elevation of Privilege Vulnerability
null
[ { "commit_message": "[PATCH] managed identity bug fixes sdk/azidentity/CHANGELOG.md | 3 + sdk/azidentity/managed_identity_client.go | 70 +++++++++++++------ .../managed_identity_credential_test.go | 55 ++++++++++++++- 3 files changed, 106 insertions(+), 22 deletions(-)", "patch_...
null
GHSA-hvh3-xpr5-c2c8
null
[ { "commit_message": "[PATCH] https://github.com/ImageMagick/ImageMagick/issues/715 coders/ps.c | 14 +++++++++++--- 1 file changed, 11 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSBiZGJiYjEzZjFmZTliN2UyNDY1NTAyYzUwMDU2MTcyMGY3NDU2YWFjIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBDcmlzdHkgPHVyYmFuLXd...
null
CVE-2021-32634
Deserialization of Untrusted Data in Emissary
Emissary is a distributed, peer-to-peer, data-driven workflow framework. Emissary 6.4.0 is vulnerable to Unsafe Deserialization of post-authenticated requests to the [`WorkSpaceClientEnqueue.action`](https://github.com/NationalSecurityAgency/emissary/blob/30c54ef16c6eb6ed09604a929939fb9f66868382/src/main/java/emissary/server/mvc/internal/WorkSpaceClientEnqueueAction.java) REST endpoint. This issue may lead to post-auth Remote Code Execution. This issue has been patched in version 6.5.0. As a workaround, one can disable network access to Emissary from untrusted sources.
[ { "commit_message": "[PATCH] Merge pull request from GHSA-m5qf-gfmp-7638 * Remove unsafe serialization from PayloadUtil * This code will likely be removed wholesale, but this change should be used as a departure point for future development if we end up re-implementing moveTo and friends. * Removed vestigial Mo...
CWE-502: Deserialization of Untrusted Data
GHSA-356g-7x36-7m34
Moodle CSRF risks due to misuse of confirm_sesskey
null
[ { "commit_message": "[PATCH] MDL-81890 tool_moodlenet: Fix sesskey checks admin/tool/moodlenet/index.php | 2 +- admin/tool/moodlenet/options.php | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSBmMjgwN2RlZTViYzc3N2Q5YzU4YjdhNzBjYmE2ZTRjMjFlZTAyZWExIE1vbiBTZXAgMTcgMDA6MDA6...
null
CVE-2016-3138
The acm_probe function in drivers/usb/class/cdc-acm.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both a control and a data endpoint descriptor.
[ { "commit_message": "[PATCH] USB: cdc-acm: more sanity checking An attack has become available which pretends to be a quirky device circumventing normal sanity checks and crashes the kernel by an insufficient number of interfaces. This patch adds a check to the code path for quirky devices. Signed-off-by: Olive...
n/a
GHSA-9c6g-qpgj-rvxw
Streamlit publishes previously-patched Cross-site Scripting vulnerability
null
[ { "commit_message": "[PATCH] Remove path from 404 response (#3165) * Remove path from 404 response * Remove exception output lib/streamlit/components/v1/components.py | 5 +++-- lib/streamlit/server/routes.py | 2 +- lib/tests/streamlit/components_test.py | 6 +++--- 3 files changed, 7 insertions(+),...
null
CVE-2023-23003
In the Linux kernel before 5.16, tools/perf/util/expr.c lacks a check for the hashmap__new return value.
[ { "commit_message": "[PATCH] perf expr: Fix missing check for return value of hashmap__new() The hashmap__new() function may return ERR_PTR(-ENOMEM) when malloc() fails, add IS_ERR() checking for ctx->ids. Signed-off-by: Miaoqian Lin <linmq006@gmail.com> Cc: Alexander Shishkin <alexander.shishkin@linux.intel.co...
n/a
CVE-2020-13380
openSIS before 7.4 allows SQL Injection.
[ { "commit_message": "[PATCH] Version 7.4 release update Version 7.4 release update CalendarModal.php | 3 + Modules.php | 8 +- .../SqlForClientSchoolAndSampleDataInc.php | 8 +- install/SqlForClientSchoolInc.php | 8 +- instal...
n/a
GHSA-wpqc-h9wp-chmq
n8n vulnerable to Remote Code Execution via Git Node Custom Pre-Commit Hook
null
[ { "commit_message": "[PATCH] fix(Git Node): Disable git hooks by default (#21797) Co-authored-by: yehorkardash <yehor.kardash@n8n.io> .../config/src/configs/security.config.ts | 6 +++++ packages/@n8n/config/test/config.test.ts | 1 + packages/nodes-base/nodes/Git/Git.node.ts | 5 ++++ .../nodes/Gi...
null
GHSA-mwwc-3jv2-62j3
AdGuardHome vulnerable to Cross-Site Request Forgery
null
[ { "commit_message": "[PATCH] Pull request: HOFTIX-csrf Merge in DNS/adguard-home from HOFTIX-csrf to master Squashed commit of the following: commit 75ab27bf6c52b80ab4e7347d7c254fa659eac244 Author: Ainar Garipov <A.Garipov@AdGuard.COM> all: imp cookie security; rm plain-text apis CHANGELOG.md ...
null
GHSA-q92j-grw3-h492
graphql allows remote code execution when loading a crafted GraphQL schema
null
[ { "commit_message": "[PATCH 1/5] Apply NameValidator to fields and arguments lib/graphql/schema/argument.rb | 1 + lib/graphql/schema/field.rb | 1 + spec/graphql/schema/loader_spec.rb | 149 +++++++++++++++++++++++++++++ 3 files changed, 151 insertions(+)", "patch_text_b64": "RnJvbSBjNmMwYTAwYj...
null
GHSA-55rv-pc53-r9qq
null
[ { "commit_message": "[PATCH] Fixed acct and hs management (#341) * Fixed bugs in some accounting related feature * Fixed hs management ui components acct-date.php | 105 +++++---- acct-maintenance-cleanup.php | 328 +++++++++++++++++------------ acct-maintenance-delete.php | 253 ...
null
GHSA-wrf7-4gw8-7mmq
null
[ { "commit_message": "[PATCH] fix memory leak in ReadYCBCRImage as SetImageExtent failure coders/ycbcr.c | 1 + 1 file changed, 1 insertion(+)", "patch_text_b64": "RnJvbSAyNDE5ODhjYTI4MTM5YWQ5NzBjMWQ5NzE3YzQxOWY0MWUzNjBkZGIwIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiByb290IDwzNTY5ODYzNTFAcXEuY29tPgpEYXRlOiBXZW...
null
CVE-2021-26707
The merge-deep library before 3.0.3 for Node.js can be tricked into overwriting properties of Object.prototype or adding new properties to it. These properties are then inherited by every object in the program, thus facilitating prototype-pollution attacks against applications using this library.
[ { "commit_message": "[PATCH] add isValidKey function to ensure only valid keys are merged .travis.yml | 1 + index.js | 6 +++++- 2 files changed, 6 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAxMWU1ZGQ1NmRlOGE2YWVkMGIxZWQwMjIwODlkYmNlNjk2OGQ4MmE1IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBCcmlh...
n/a
CVE-2025-66559
Taiko Alethia Pacaya inbox verification pointer corruption
Taiko Alethia is an Ethereum-equivalent, permissionless, based rollup designed to scale Ethereum without compromising its fundamental properties. In 2.3.1 and earlier, TaikoInbox._verifyBatches (packages/protocol/contracts/layer1/based/TaikoInbox.sol:627-678) advanced the local tid to whatever transition matched the current blockHash before knowing whether that batch would actually be verified. When the loop later broke (e.g., cooldown window not yet passed or transition invalidated), the function still wrote that newer tid into batches[lastVerifiedBatchId].verifiedTransitionId after decrementing batchId. Result: the last verified batch could end up pointing at a transition index from the next batch (often zeroed), corrupting the verified chain pointer.
[ { "commit_message": "[PATCH] Merge commit from fork Co-authored-by: Gustavo Gonzalez <ggonzalez94@users.noreply.github.com> .../contracts/layer1/based/TaikoInbox.sol | 21 +- .../layer1/based/InboxTest_LinkedProof.t.sol | 231 ++++++++++++++++++ 2 files changed, 240 insertions(+), 12 deletions(-) create mod...
CWE-129: Improper Validation of Array Index
GHSA-c6rq-rjc2-86v2
Time-of-check Time-of-use (TOCTOU) Race Condition in chownr
null
[ { "commit_message": "[PATCH] use lchown to address part 1 of TOCTOU issue chownr.js | 15 ++++++++++----- 1 file changed, 10 insertions(+), 5 deletions(-)", "patch_text_b64": "RnJvbSAzNmE5M2UzZjBhMjIwMDYyYzQ3YjIzN2NmNmFiNmQ1ZjU1Y2Q3OWM5IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBpc2FhY3MgPGlAaXpzLm1lPgpEYXRlO...
null
GHSA-j46q-5pxx-8vmw
Local File Inclusion in mlflow
null
[ { "commit_message": "[PATCH] init Signed-off-by: Weichen Xu <weichen.xu@databricks.com> mlflow/server/handlers.py | 13 +++++++++---- 1 file changed, 9 insertions(+), 4 deletions(-)", "patch_text_b64": "RnJvbSA5NmYwYjU3M2E3M2Q4ZWVkZDY3MzVhMmNlMjZlMDg4NTk1MjdiZTA3IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBXZW...
null
CVE-2015-9235
In jsonwebtoken node module before 4.2.2 it is possible for an attacker to bypass verification when a token digitally signed with an asymmetric key (RS/ES family) of algorithms but instead the attacker send a token digitally signed with a symmetric algorithm (HS* family).
[ { "commit_message": "[PATCH] Verification with an asymmetric key of a token signed with a symmetric key There is a vulnerability in this module when the verification part is expecting a token digitally signed with an asymetric key (RS/ES family) of algorithms but instead the attacker send a token digitally sign...
Improper Input Validation (CWE-20)
CVE-2013-2092
Cross-site Scripting (XSS) in Dolibarr ERP/CRM 3.3.1 allows remote attackers to inject arbitrary web script or HTML in functions.lib.php.
[ { "commit_message": "[PATCH] Fix: Escape entities htdocs/core/lib/functions.lib.php | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSA4YTkwNTk4YjIzZTFiMjY4OTg0ODE4Nzk0MWY3YTk2YjA0OTA3MDA1IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBMYXVyZW50IERlc3RhaWxsZXVyIDxlbGR5QGRlc3Rh...
Cross-Site Scripting
PYSEC-2023-250
null
[ { "commit_message": "[PATCH] Disallow arbitrary sequence types in version (#7835) Co-authored-by: pre-commit-ci[bot] <66853113+pre-commit-ci[bot]@users.noreply.github.com> CHANGES/7835.bugfix | 1 + aiohttp/client_reqrep.py | 4 ++-- tests/test_client_request.py | 20 +++++++++++++++++--- 3 files ch...
null
CVE-2025-61604
WeGIA: Cross-Site Request Forgery (CSRF) Vulnerability in `control.php` Endpoint
WeGIA is an open source web manager with a focus on charitable institutions. Versions 3.4.12 and below contain a Cross-Site Request Forgery (CSRF) vulnerability. The delete operation for the Almoxarifado entity is exposed via HTTP GET without CSRF protection, allowing a third-party site to trigger the action using the victim’s authenticated session. This issue is fixed in version 3.5.0.
[ { "commit_message": "[PATCH] =?UTF-8?q?Resolu=C3=A7=C3=A3o=20de=20CSRF=20no=20m=C3=A9t?= =?UTF-8?q?odo=20excluir=20de=20AlmoxarifadoControle=20[Security=20https:/?= =?UTF-8?q?/github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-59hm?= =?UTF-8?q?-4m9h-ch3m]?= MIME-Version: 1.0 Content-Type: text/plain; cha...
CWE-352: Cross-Site Request Forgery (CSRF)
CVE-2018-7753
An issue was discovered in Bleach 2.1.x before 2.1.3. Attributes that have URI values weren't properly sanitized if the values contained character entities. Using character entities, it was possible to construct a URI value with a scheme that was not allowed that would slide through unsanitized.
[ { "commit_message": "[PATCH 1/2] Fix url sanitizing Fixes a security issue where url sanitizing wouldn't work if there were character entities breaking up the scheme. This allowed javascript urls even when they were not explicitly allowed. bleach/sanitizer.py | 134 ++++++++++++++++++++++++++++++++++++++------ t...
n/a
GHSA-cfw9-4m3h-gp62
null
[ { "commit_message": "[PATCH] patch 9.0.0530: using freed memory when autocmd changes mark Problem: Using freed memory when autocmd changes mark. Solution: Copy the mark before editing another buffer. src/mark.c | 12 +++++++----- src/testdir/test_marks.vim | 13 +++++++++++++ src/version.c ...
null
GHSA-92x6-h2gr-8gxq
Symfony CSRF Vulnerability
null
[ { "commit_message": "[PATCH] [Security] Namespace generated CSRF tokens depending of the current scheme .../Resources/config/security_csrf.xml | 1 + .../Security/Csrf/CsrfTokenManager.php | 55 ++++- .../Csrf/Tests/CsrfTokenManagerTest.php | 193 ++++++++++++------ 3 files changed, 174 inse...
null
GHSA-pg89-46xq-98vv
null
[ { "commit_message": "[PATCH] qemu: Add missing lock in qemuProcessHandleMonitorEOF qemuMonitorUnregister will be called in multiple threads (e.g. threads in rpc worker pool and the vm event thread). In some cases, it isn't protected by the monitor lock, which may lead to call g_source_unref more than one time ...
null
GHSA-gvgc-3ch5-px8p
null
[ { "commit_message": "[PATCH 1/3] Don't skip the first line of the input image. Addresses issue #703 tools/tiffdither.c | 4 ++-- tools/tiffmedian.c | 4 ++-- 2 files changed, 4 insertions(+), 4 deletions(-)", "patch_text_b64": "RnJvbSAzOTk0Y2YzYjNiYzZiNTRjMzJmMjQwY2E1YTQxMmNmZmExMTYzM2ZhIE1vbiBTZXAgMTcgMDA6M...
null
GHSA-gjg7-qfvp-9hm4
SQL injection in Dolibarr
null
[ { "commit_message": "[PATCH] Fix sqli ->escape after ->escapeforlike htdocs/contact/list.php | 7 +- htdocs/core/lib/website.lib.php | 13 +- .../modules/import/import_csv.modules.php | 4 +- .../modules/import/import_xlsx.modules.php | 4 +- test/phpunit/Website.cl...
null
GHSA-q76v-8f8c-4c2j
null
[ { "commit_message": "[PATCH] hw/scsi/scsi-disk: Disallow block sizes smaller than 512 [CVE-2023-42467] We are doing things like nb_sectors /= (s->qdev.blocksize / BDRV_SECTOR_SIZE); in the code here (e.g. in scsi_disk_emulate_mode_sense()), so if the blocksize is smaller than BDRV_SECTOR_SIZE (=512), this crash...
null
CVE-2024-40427
Stack Buffer Overflow in PX4-Autopilot v1.14.3, which allows attackers to execute commands to exploit this vulnerability and cause the program to refuse to execute
[ { "commit_message": "[PATCH] Fix buffer overflow in mavlink_receive.cpp src/modules/mavlink/mavlink_receiver.cpp | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBlMDNlMDI2MWExYTBjODJmNTQ1ZTY2YTFlMzc5NTk1NmM4ODZkYjcxIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiB6aGFuZ3RlbmcwNTI2I...
n/a
PYSEC-2022-22
null
[ { "commit_message": "[PATCH] Prevent creating a public shelf without permission cps/shelf.py | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAwYzAzMTNmMzc1YmVkN2IwMzVjOGMwNDgyYmJiMDk1OTllMTZiZmNmIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBPenppZSBJc2FhY3MgPG96emllLmZlcm5hbmRle...
null
GHSA-qvf8-p83w-v58j
Podman's default inheritable capabilities for linux container not empty
null
[ { "commit_message": "[PATCH] do not set the inheritable capabilities The kernel never sets the inheritable capabilities for a process, they are only set by userspace. Emulate the same behavior. Closes: CVE-2022-27649 Signed-off-by: Giuseppe Scrivano <gscrivan@redhat.com> libpod/oci_conmon_exec_linux.go | 7 ++...
null
GHSA-p43w-g3c5-g5mq
Out of bounds read in Pillow
null
[ { "commit_message": "[PATCH] Fix OOB read in SgiRleDecode.c * From Pillow 4.3.0->8.1.0 * CVE-2021-25293 ...5703f71a0f0094873a3e0e82c9f798161171b8.sgi | Bin 0 -> 13703 bytes ...834657ee604b8797bf99eac6a194c124a9a8ba.sgi | Bin 0 -> 12789 bytes ...4d9c7ec485ffb76a90eeaab191ef69a2a3a3cd.sgi | Bin 0 -> 549 bytes ......
null
PYSEC-2020-272
null
[ { "commit_message": "[PATCH] Fix multiple vulnerabilities in `tf.experimental.dlpack.to_dlpack`. We have a use after free caused by memory coruption, a segmentation fault caused by memory corruption, several memory leaks and an undefined behavior when taking the reference of a nullptr. PiperOrigin-RevId: 332568...
null
CVE-2020-15217
User data exposure in GLPI
In GLPI before version 9.5.2, there is a leakage of user information through the public FAQ. The issue was introduced in version 9.5.0 and patched in 9.5.2. As a workaround, disable public access to the FAQ.
[ { "commit_message": "[PATCH] Merge pull request from GHSA-x9hg-j29f-wvvv inc/knowbaseitem.class.php | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAzOWUyNTU5MWVmZGRjNTYwZTM2NzlhYjA3ZTQ0M2VlNjE5ODcwNWUyIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiA9P1VURi04P3E/Qz1DMz1BOWRyaWM...
CWE-79 Cross-site Scripting (XSS)
GHSA-5xm4-jmpw-p6j3
Ansible discloses credential information
null
[ { "commit_message": "[PATCH] Backporting apt_repository module from devel library/packaging/apt_repository | 91 +++++++++++++++++--------------- 1 file changed, 48 insertions(+), 43 deletions(-)", "patch_text_b64": "RnJvbSBjNGI1ZTQ2MDU0Yzc0MTc2YjI0NDZjODJkNGRmMWEyNjEwZWRkYzA4IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAw...
null
GHSA-vqmv-47xg-9wpr
Picklescan missing detection when calling pty.spawn
null
[ { "commit_message": "[PATCH] Fix various vulnerabilities (#53) Fix: - https://github.com/mmaitre314/picklescan/security/advisories/GHSA-m273-6v24-x4m4 - https://github.com/mmaitre314/picklescan/security/advisories/GHSA-4675-36f9-wf6r - https://github.com/mmaitre314/picklescan/security/advisories/GHSA-84r2-jw7c-...
null
GHSA-m35w-xx8c-6xc7
Apache Doris-MCP-Server: Improper Access Control results in bypassing a "read-only" mode
null
[ { "commit_message": "[PATCH] [BUG]Fix security bug (#50) * 0.5.1 Version * fix 0.5.1 schema async bug * fix security bug doris_mcp_server/utils/query_executor.py | 83 ++++++++++++++++++++---- 1 file changed, 69 insertions(+), 14 deletions(-)", "patch_text_b64": "RnJvbSA1OTIzY2MxYzg5NzMwNjlhNmQ1NGVjYTE5NDhhM...
null
CVE-2022-4719
Business Logic Errors in ikus060/rdiffweb
Business Logic Errors in GitHub repository ikus060/rdiffweb prior to 2.5.5.
[ { "commit_message": "[PATCH] Send notification on new SSH Key README.md | 8 +++- rdiffweb/core/model/_user.py | 1 + rdiffweb/core/notification.py | 17 ++++++++ rdiffweb/core/tests/test_notification.py | 39 +++++++++++++++++++ .../templa...
CWE-840 Business Logic Errors
GHSA-84m6-5m72-45fp
Apollo Router Operation Limits Vulnerable to Bypass via Integer Overflow
null
[ { "commit_message": "[PATCH] Certain query patterns may cause resource exhaustion MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Corrects a set of denial-of-service (DOS) vulnerabilities that made it possible for an attacker to render router inoperable with certain sim...
null
CVE-2019-9734
Aquarius CMS through 4.3.5 writes POST and GET parameters (including passwords) to a log file due to an overwriting of configuration parameters under certain circumstances.
[ { "commit_message": "[PATCH] Fix CVE-2019-9734 lib/log.php | 2 -- 1 file changed, 2 deletions(-)", "patch_text_b64": "RnJvbSBkMWRmYTViODI4MDM4OGEwYjZmMmYzNDFmMDY4MTUyMmRiZWEwM2IwIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBUcnlwdGlvbiA8NDUyMTQwNDErVHJ5cHRpb25AdXNlcnMubm9yZXBseS5naXRodWIuY29tPgpEYXRlOiBGcmksID...
n/a
PYSEC-2021-16
null
[ { "commit_message": "[PATCH] parse auth headers using pyparsing instead of regexp Fixes CPU burn DoS by cubic complexity of whitespace matching in WWW_AUTH_RELAXED (default) regexp. python2/httplib2/__init__.py | 493 +++++++------------------------ python2/httplib2/auth.py | 61 ++++ python2/httplib2/error....
null
GHSA-v346-f4pj-p3j2
null
[ { "commit_message": "[PATCH] Verify UpdateTempDir isn't maliciously modified Don't just delete the stored updates temporary directory on launch, but validate the registry key to ensure it is in an expected location and follows WinSparkle's naming convention. This is to prevent malicious users from modifying thi...
null
CVE-2017-9141
In ImageMagick 7.0.5-7 Q16, a crafted file could trigger an assertion failure in the ResetImageProfileIterator function in MagickCore/profile.c because of missing checks in the ReadDDSImage function in coders/dds.c.
[ { "commit_message": "[PATCH] Added check to prevent image being 0x0 (reported in #489). coders/dds.c | 14 ++++++++------ 1 file changed, 8 insertions(+), 6 deletions(-)", "patch_text_b64": "RnJvbSAwYzViMWU0MzBhODNlZjc5M2E3MzM0YmJiZWU0MDhjZjNjNjI4Njk5IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBEaXJrIExlbXN0cm...
n/a
GHSA-x25w-vrh8-84v4
null
[ { "commit_message": "[PATCH] CR3 decoder: use mempool for memory libraw/libraw_const.h | 5 +++++ src/decoders/crx.cpp | 48 +++++++++++++++++++++++++++++++++++-------- 2 files changed, 45 insertions(+), 8 deletions(-)", "patch_text_b64": "RnJvbSBlNDFmMzMxZTkwYjM4M2UzMjA4Y2VmYjc0ZTAwNmRmNDRiZjNhNGI4IE1vbiBT...
null
GHSA-3rw9-wmc8-8948
Coder accepts an APIKey beyond the linked OIDC expiry if there is no refresh token
null
[ { "commit_message": "[PATCH] fix: stop extending API key access if OIDC refresh is available (#17878) fixes #17070 Cleans up our handling of APIKey expiration and OIDC to keep them separate concepts. For an OIDC-login APIKey, both the APIKey and OIDC link must be valid to login. If the OIDC link is expired and ...
null
GHSA-xfrc-7mj2-5xh9
Undefined Behavior in zencashjs
null
[ { "commit_message": "[PATCH] Fixed bug with multisig addresses Fixed bug with multisig addresses updated package.json README.md | 4 +- lib/config.js | 4 +- lib/transaction.js | 29 +- package-lock.json | 7722 +++++++++++++++++++++++++++++++++++-------- package.json | 66 +- src...
null
GHSA-r7c9-c69m-rph8
Code Injection in PHPUnit
null
[ { "commit_message": "[PATCH] Correct fix for #1956 src/Util/PHP/Template/TestCaseMethod.tpl.dist | 2 +- src/Util/PHP/eval-stdin.php | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSAyODRhNjlmYjg4YTJkMDg0NWQyM2Y0Mjk3NGE1ODNkOGY1OWJmNWE1IE1vbiBTZXAgMTcgMDA6M...
null
GHSA-mpwx-3mqv-fm27
null
[ { "commit_message": "[PATCH] Fix use-after-free in iobank rbtree usage ##io * See havoc4 bin for reproducer * Reported via huntr.dev by 'Cen Zhang' libr/io/io_bank.c | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAzNzg5NzIyNmExYTMxZjk4MmJmZWZkYzRhZWVmYzJlNTAzNTVjNzNjIE1v...
null
GHSA-77hh-43cm-v8j6
tuf's Metadata API: Targets.get_delegated_role() is missing input validation
null
[ { "commit_message": "[PATCH] Metadata API: Fix role lookup for succinct delegation get_delegated_role() should not return a Role if the rolename is not a delegated role. This is already true for \"normal\" DelegatedRole but was not actually verified for SuccinctRoles. Signed-off-by: Jussi Kukkonen <jkukkonen@go...
null
GHSA-8h77-3xwr-hqhh
Cross-site scripting in Jenkins Kiuwan Plugin
null
[ { "commit_message": "[PATCH] Fixed uncovered security issues according to SECURITY-2367 issue. - Require POST for check credentials endpoint. - Check for authentication. - Escape strings in return status. .../KiuwanConnectionProfileDescriptor.java | 43 +++++++++++++------ 1 file changed, 31 insertions(+), 12...
null
GHSA-58cq-8wm2-6m87
Liferay Portal Stored Cross-Site Scripting Vulnerability via GroupPagesPortlet_type Parameter
null
[ { "commit_message": "[PATCH] LPD-54782 Escape layout type when shown in messages .../resources/layout/screen/navigation/entries/general.jsp | 6 +++--- .../resources/META-INF/resources/layout_type_resources.jsp | 2 +- 2 files changed, 4 insertions(+), 4 deletions(-)", "patch_text_b64": "RnJvbSA1ZGIxYWIwMTh...
null
GHSA-rxp5-qwrf-pfv3
Pimcore SQL Injection vulnerability
null
[ { "commit_message": "[PATCH] [Task]: Improve Admin translation and application logger sorting (#15303) * task: improve valid key for translation listing * task: force the direction to be ASC/DESC since these are the only valid options * task: quote application logger sorting setting * task: add backend search g...
null
GHSA-fmqw-fhqm-wp2p
null
[ { "commit_message": "[PATCH] net: nfc: Fix NULL dereference on nfc_llcp_build_tlv fails KASAN report this: BUG: KASAN: null-ptr-deref in nfc_llcp_build_gb+0x37f/0x540 [nfc] Read of size 3 at addr 0000000000000000 by task syz-executor.0/5401 CPU: 0 PID: 5401 Comm: syz-executor.0 Not tainted 5.0.0-rc7+ #45 Hardwa...
null
GHSA-c83f-xx3x-f49w
null
[ { "commit_message": "[PATCH] Fixed low risk XSS issue with user account address edit. Thanks to @robert81 for the find. Close #3721 upload/catalog/controller/account/address.php | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-)", "patch_text_b64": "RnJvbSAzMDNmYTg4ZmU2NjRkZWQ0YmY4NzUzYjk5N2FiZDkx...
null
GHSA-wp6c-29r3-jqw9
SQL injection in jeecg-boot
null
[ { "commit_message": "[PATCH] =?UTF-8?q?SQL=E6=B3=A8=E5=85=A5=20#5173?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit .../jeecg/modules/system/controller/SysDictController.java | 5 +++++ 1 file changed, 5 insertions(+)", "patch_text_b64": "RnJvbSA2NDhlNjZkNWVmMTU...
null
GHSA-q6jm-gv84-4cp6
null
[ { "commit_message": "[PATCH] scsi-disk: commonize iovec creation between reads and writes Also, consistently use qiov.size instead of iov.iov_len. Signed-off-by: Paolo Bonzini <pbonzini@redhat.com> Signed-off-by: Kevin Wolf <kwolf@redhat.com> hw/scsi-disk.c | 42 ++++++++++++++++++------------------------ 1 file...
null
CVE-2016-8860
Tor before 0.2.8.9 and 0.2.9.x before 0.2.9.4-alpha had internal functions that were entitled to expect that buf_t data had NUL termination, but the implementation of or/buffers.c did not ensure that NUL termination was present, which allows remote attackers to cause a denial of service (client, hidden service, relay, or authority crash) via crafted data.
[ { "commit_message": "[PATCH] Add a one-word sentinel value of 0x0 at the end of each buf_t chunk This helps protect against bugs where any part of a buf_t's memory is passed to a function that expects a NUL-terminated input. It also closes TROVE-2016-10-001 (aka bug 20384). changes/buf-sentinel | 11 +++++++++++...
n/a
CVE-2019-14549
An issue was discovered in EspoCRM before 5.6.9. Stored XSS was executed inside the title and breadcrumb of a newly formed entity available to all the users. A malicious user can inject JavaScript in these values of an entity, thus stealing user cookies when someone visits the publicly accessible link.
[ { "commit_message": "[PATCH] xss fixes .../attachment/fields/name/detail.tpl | 2 +- client/src/view-helper.js | 71 +++++++++++++++++++ client/src/views/attachment/fields/name.js | 2 +- client/src/views/fields/wysiwyg.js | 25 +------ .../preferences/fields/dashboard-ta...
n/a
GHSA-h972-cwjv-2v39
Exposure of Sensitive Information to an Unauthorized Actor in Jenkins
null
[ { "commit_message": "[PATCH] [SECURITY-611] Do not export hidden projects via Executor.currentExecutable. core/src/main/java/hudson/model/Executor.java | 14 +++++++-- .../java/hudson/model/queue/WorkUnit.java | 2 -- .../test/java/hudson/model/ExecutorTest.java | 31 +++++++++++++++++-- 3 files changed, 41 ...
null
CVE-2025-64184
Dosage vulnerable to Directory Traversal through crafted HTTP responses
Dosage is a comic strip downloader and archiver. When downloading comic images in versions 3.1 and below, Dosage constructs target file names from different aspects of the remote comic (page URL, image URL, page content, etc.). While the basename is properly stripped of directory-traversing characters, the file extension is taken from the HTTP Content-Type header. This allows a remote attacker (or a Man-in-the-Middle, if the comic is served over HTTP) to write arbitrary files outside the target directory (if additional conditions are met). This issue is fixed in version 3.2.
[ { "commit_message": "[PATCH] Make file extension guessing more robust dosagelib/comic.py | 16 ++++++++-------- 1 file changed, 8 insertions(+), 8 deletions(-)", "patch_text_b64": "RnJvbSAzMzZhOTY4NDE5MTYwNGJjNDllZWQ3Mjk2Yjc0YmQ1ODIxNTExODFlIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBUb2JpYXMgR3J1ZXR6bWFjaGVy...
CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
GHSA-644j-jcc4-crx7
Jenkins AWS CodeDeploy Plugin has Insufficiently Protected Credentials
null
[ { "commit_message": "[PATCH] Convert AWS Secret Key to use Secret rather than String primitive type. https://issues.jenkins-ci.org/browse/SECURITY-833 .../codedeploy/AWSCodeDeployPublisher.java | 19 ++++++++++--------- 1 file changed, 10 insertions(+), 9 deletions(-)", "patch_text_b64": "RnJvbSA0YmVmNzA2...
null
CVE-2022-23626
Insufficient file checks in m1k1o/blog
m1k1o/blog is a lightweight self-hosted facebook-styled PHP blog. Errors from functions `imagecreatefrom*` and `image*` have not been checked properly. Although PHP issued warnings and the upload function returned `false`, the original file (that could contain a malicious payload) was kept on the disk. Users are advised to upgrade as soon as possible. There are no known workarounds for this issue.
[ { "commit_message": "[PATCH] check image create errors. app/image.class.php | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSA2ZjVlNTlmMTQwMWM0YTNjZjJlNTE4YWE4NWIyMzFlYTE0ZThhMmVmIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiA9P1VURi04P3E/TWlyb3NsYXY9MjA9QzU9QTBlZGl2PUMzPUJ...
CWE-20: Improper Input Validation
CVE-2012-2383
Integer overflow in the i915_gem_execbuffer2 function in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.3.5 on 32-bit platforms allows local users to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a crafted ioctl call.
[ { "commit_message": "[PATCH] drm/i915: fix integer overflow in i915_gem_execbuffer2() On 32-bit systems, a large args->buffer_count from userspace via ioctl may overflow the allocation size, leading to out-of-bounds access. This vulnerability was introduced in commit 8408c282 (\"drm/i915: First try a normal lar...
n/a
GHSA-2w5v-x29g-jw7j
Hashicorp Nomad Incorrect Authorization vulnerability
null
[ { "commit_message": "[PATCH] CSI: fix namespace ACL bypass on create/register APIs (#24396) When creating or registering a CSI volume, the RPC handler uses the volume specification's namespace instead of the request namespace. This works as intended, but the ACL check is only on the request namespace. This allo...
null
GHSA-c9gp-64c4-2rrh
Server-Side Template Injection (SSTI) with Grav CMS security sandbox bypass
null
[ { "commit_message": "[PATCH] fix for safe_functions attack #GHSA-c9gp-64c4-2rrh CHANGELOG.md | 2 +- system/src/Grav/Common/Security.php | 1 + 2 files changed, 2 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA0MTQ5YzgxMzM5Mjc0MTMwNzQyODMxNDIyZGUyNjg1ZjI5OGYzYTZlIE1vbiBTZXAgMT...
null
PYSEC-2021-232
null
[ { "commit_message": "[PATCH] Prevent division by 0 in TFLite PiperOrigin-RevId: 370800311 Change-Id: I21ccdbd31c30118acc67df8751807ee2e0b12f91 tensorflow/lite/kernels/depth_to_space.cc | 1 + tensorflow/lite/kernels/depth_to_space_test.cc | 5 +++++ tensorflow/lite/micro/kernels/depth_to_space.cc | 1 + 3 f...
null
PYSEC-2023-43
null
[ { "commit_message": "[PATCH] Fix SSTI vulnerability in ad and consent pages (#517) * Fix SSTI vulnerability in ad and consent pages Fixed an issue where users could pass arbitrary Python code to be executed on the server to the mode HTTP arg More information about this type of vulnerability: https://secure-cook...
null
CVE-2019-11222
gf_bin128_parse in utils/os_divers.c in GPAC 0.7.1 has a buffer overflow issue for the crypt feature when encountering a crafted_drm_file.xml file.
[ { "commit_message": "[PATCH] fix buffer overrun in gf_bin128_parse closes #1204 closes #1205 src/utils/os_divers.c | 6 ++++++ 1 file changed, 6 insertions(+)", "patch_text_b64": "RnJvbSBmMzY5OGJiMWJjZTYyNDAyODA1YzNmZGE5NjU1MWEyMzEwMWEzMmY5IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBBdXJlbGllbiBEYXZpZCA8YXVyZ...
n/a
GHSA-fxmx-pfm2-85m2
Cross-site Scripting in Ericsson CodeChecker
null
[ { "commit_message": "[PATCH] [server][gui] Escape values for v-html attributes We are using `v-html` attribute on the UI side to dinamically rendering comments and analyzer commands. This can be very dangerous because it can easily lead to XSS vulnerabilities. To solve this problem the server will always return...
null
CVE-2023-47121
Discourse SSRF vulnerability in Embedding
Discourse is an open source platform for community discussion. Prior to version 3.1.3 of the `stable` branch and version 3.2.0.beta3 of the `beta` and `tests-passed` branches, the embedding feature is susceptible to server side request forgery. The issue is patched in version 3.1.3 of the `stable` branch and version 3.2.0.beta3 of the `beta` and `tests-passed` branches. As a workaround, disable the Embedding feature.
[ { "commit_message": "[PATCH] SECURITY: SSRF vulnerability in TopicEmbed Block redirects when making the final request in TopicEmbed to prevent Server Side Request Forgery (SSRF) app/models/topic_embed.rb | 4 ++-- spec/models/topic_embed_spec.rb | 13 +++++++++++++ 2 files changed, 15 insertions(+), 2 dele...
CWE-918: Server-Side Request Forgery (SSRF)
PYSEC-2022-84
null
[ { "commit_message": "[PATCH] Prevent integer overflow in `OpLevelCostEstimator::CalculateTensorSize`. In order to not change the API, we return a negative value in case of overflow. A better fix is to change the API to return a status instead. PiperOrigin-RevId: 408713061 Change-Id: I3771475b0c72a2844a385408696...
null
GHSA-wj5c-j656-h5fw
Exposure of Sensitive Information to an Unauthorized Actor in Jenkins
null
[ { "commit_message": "[PATCH 1/3] [SECURITY-343] Restrict API access to NodeMonitor data Switch to requiring EXTENDED_READ permission for access to NodeMonitor data. It might theoretically be better if we had more granular permissions on each NodeMonitor, but that's a bigger change, and since EXTENDED_READ is al...
null
GHSA-gwwq-gpw7-qfjr
null
[ { "commit_message": "[PATCH] Apply patches from file-CVE-2012-1571.patch From Francisco Alonso Espejo: file < 5.18/git version can be made to crash when checking some corrupt CDF files (Using an invalid cdf_read_short_sector size) The problem I found here, is that in most situations (if h_short_sec_size...
null
CVE-2023-3819
Exposure of Sensitive Information to an Unauthorized Actor in pimcore/pimcore
Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository pimcore/pimcore prior to 10.6.4.
[ { "commit_message": "[PATCH] Confidential information provided to user with no permissions (#15530) * Fix: check user permissions * some optimizations * Restrict access to /admin/index/statics * remove unused Co-authored-by: dvesh3 <divesh.pahuja@pimcore.com> .../Controller/Admin/DataObject/ClassController.php ...
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
CVE-2017-15212
In Kanboard before 1.0.47, by altering form data, an authenticated user can at least see the names of tags of a private project of another user.
[ { "commit_message": "[PATCH] Avoid people to alter other projects by changing form data ChangeLog | 4 + app/Controller/ActionController.php | 5 +- app/Controller/ActionCreationController.php | 7 +- app/Controller/BaseController.php | 90 ++++++++++++++++++++...
n/a
CVE-2020-8942
Unchecked buffer overrun in enc_untrusted_read
An arbitrary memory read vulnerability in Asylo versions up to 0.6.0 allows an untrusted attacker to make a call to enc_untrusted_read whose return size was not validated against the requrested size. The parameter size is unchecked allowing the attacker to read memory locations outside of the intended buffer size including memory addresses within the secure enclave. We recommend upgrading past commit b1d120a2c7d7446d2cc58d517e20a1b184b82200
[ { "commit_message": "[PATCH] Check for return size in enc_untrusted_read Check return size does not exceed requested. The returned result and content still cannot be trusted, but it's expected behavior when not using a secure file system. PiperOrigin-RevId: 333827386 Change-Id: I0bdec0aec9356ea333dc8c647eba5d27...
CWE-120 Buffer Overflow
GHSA-7r83-w6r8-fh6w
Reflected Cross-site Scripting (XSS) in ACS Commons
null
[ { "commit_message": "[PATCH] fixes to page compare and version compare tools .../components/utilities/page-compare/page-compare.jsp | 3 ++- .../components/utilities/version-compare/version-compare.jsp | 3 ++- 2 files changed, 4 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSAxNGQ3NjljODY...
null
GHSA-gm22-vmf2-hwxg
null
[ { "commit_message": "[PATCH] pam: don't leak TACACS+ secret to journald If journald for syslog is used, the journal is going to store everything, even DEBUG loglevel messages. Pre-journald logging of system-wide DEBUG loglevel could be avoided and is not affected in all cases. With journald presence it's probab...
null
CVE-2013-0730
Multiple cross-site scripting (XSS) vulnerabilities in Newscoop 4.x through 4.1.0 allow remote attackers to inject arbitrary web script or HTML via vectors involving the (1) language parameter to application/modules/admin/controllers/LanguagesController.php or (2) user parameter to application/modules/admin/controllers/UserController.php.
[ { "commit_message": "[PATCH] CS-4563: User editing in back-end allows for cross-site scripting Cast user id parameter to int. Cast language id parameter to int and fixes error on not found language. .../modules/admin/controllers/LanguagesController.php | 11 ++++++++--- .../modules/admin/controllers/UserControll...
n/a
GHSA-95mg-jgfx-54v9
Apache Superset uncontrolled resource consumption
null
[ { "commit_message": "[PATCH] fix: improve upload ZIP file validation (#25658) superset/commands/importers/v1/utils.py | 2 + superset/config.py | 5 + superset/utils/core.py | 19 +++ tests/unit_tests/utils/test_core.py | 179 +++++++++++++++++++++++- 4 files changed, ...
null
GHSA-fj59-ccrm-8h5w
null
[ { "commit_message": "[PATCH] [libpng16] Fix the calculation of row_factor in png_check_chunk_length (Bug report by Thuan Pham, SourceForge issue #278) pngrutil.c | 9 ++++++--- 1 file changed, 6 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSA4YTA1NzY2Y2I3NGFmMDVjMDRjNTNlNmM5ZDYwYzEzZmM0ZDU5YmYyIE1...
null
CVE-2020-19499
An issue was discovered in heif::Box_iref::get_references in libheif 1.4.0, allows attackers to cause a Denial of Service or possibly other unspecified impact due to an invalid memory read.
[ { "commit_message": "[PATCH] Handle case where referenced \"iref\" box doesn't exist (fixes #138). fuzzing/corpus/github_138.heic | Bin 0 -> 4914 bytes libheif/heif_context.cc | 6 ++++++ 2 files changed, 6 insertions(+) create mode 100644 fuzzing/corpus/github_138.heic", "patch_text_b64": "RnJvbSBm...
n/a
GHSA-hw2p-xqhq-3mjf
Cross site scripting in mobiledoc-kit
null
[ { "commit_message": "[PATCH] Update dependencies 8/18/22 (#771) * Update devDependencies * Update mobiledoc-dom-renderer * pin package-lock.json | 1820 +++++++++++++++++++++++++++------------------ package.json | 24 +- rollup.config.js | 14 +- yarn.lock | 760 ++++++++++--------- 4 files chang...
null
CVE-2025-54803
js-toml is vulnerable to Prototype Pollution
js-toml is a TOML parser for JavaScript, fully compliant with the TOML 1.0.0 Spec. In versions below 1.0.2, a prototype pollution vulnerability in js-toml allows a remote attacker to add or modify properties of the global Object.prototype by parsing a maliciously crafted TOML input. This is fixed in version 1.0.2.
[ { "commit_message": "[PATCH] fix: address prototype pollution vulnerability (CWE-1321) package.json | 2 +- src/load/interpreter.ts | 15 +++-- test/security.ts | 137 ++++++++++++++++++++++++++++++++++++++++ 3 files changed, 148 insertions(+), 6 deletions(-) create mode 100644 test/security.t...
CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
GHSA-5m22-cfq9-86x6
Pickle serialization vulnerable to Deserialization of Untrusted Data
null
[ { "commit_message": "[PATCH] Removing pickle serialization/deserialization docs/algorithms/classic_tutorial.rst | 26 ---- docs/use/client.rst | 8 +- vantage6-client/tests/test_client.py | 48 ++---- vantage6-client/tests/test_deserialization.py | 17 +-- vantage6-c...
null
GHSA-p8r3-83r8-jwj5
Pterodactyl Wings contains UNIX Symbolic Link (Symlink) Following
null
[ { "commit_message": "[PATCH] server(filesystem): SafePath tweaks server/filesystem/filesystem.go | 14 ++++++---- server/filesystem/path.go | 48 +++++++++------------------------ server/filesystem/path_test.go | 24 +++++++++++++++++ 3 files changed, 45 insertions(+), 41 deletions(-)", "patch_text_b64"...
null
GHSA-wwgf-3xp7-cxj4
Potentially sensitive data exposure in Symfony Web Socket Bundle
null
[ { "commit_message": "[PATCH] Add gos/web-socket-bundle advisory gos/web-socket-bundle/2020-07-06-1.yaml | 13 +++++++++++++ 1 file changed, 13 insertions(+) create mode 100644 gos/web-socket-bundle/2020-07-06-1.yaml", "patch_text_b64": "RnJvbSA5NDJmZDM3MjQ1Y2I3MjRiYThjYzhkNmYxMWYwNzVhMWJkNTNiMzM4IE1vbiBTZXAg...
null
CVE-2022-43995
Sudo 1.8.0 through 1.9.12, with the crypt() password backend, contains a plugins/sudoers/auth/passwd.c array-out-of-bounds error that can result in a heap-based buffer over-read. This can be triggered by arbitrary local users with access to Sudo by entering a password of seven characters or fewer. The impact could vary depending on the system libraries, compiler, and processor architecture.
[ { "commit_message": "[PATCH] Fix CVE-2022-43995, potential heap overflow for passwords < 8 characters. Starting with sudo 1.8.0 the plaintext password buffer is dynamically sized so it is not safe to assume that it is at least 9 bytes in size. Found by Hugo Lefeuvre (University of Manchester) with ConfFuzz. plu...
n/a
CVE-2019-11929
Insufficient boundary checks when formatting numbers in number_format allows read/write access to out-of-bounds memory, potentially leading to remote code execution. This issue affects HHVM versions prior to 3.30.10, all versions between 4.0.0 and 4.8.5, all versions between 4.9.0 and 4.18.2, and versions 4.19.0, 4.19.1, 4.20.0, 4.20.1, 4.20.2, 4.21.0, 4.22.0, 4.23.0.
[ { "commit_message": "[PATCH] string_number_format: Correctly handles return value of snprintf Summary: `snprintf` can return a value greater than the number of bytes copied. In case the first byte of the string is not a digit (could be '-'), size of `tmpstr` was being updated without checking `tmplen`. This res...
CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2014-7217
Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin 4.0.x before 4.0.10.4, 4.1.x before 4.1.14.5, and 4.2.x before 4.2.9.1 allow remote authenticated users to inject arbitrary web script or HTML via a crafted ENUM value that is improperly handled during rendering of the (1) table search or (2) table structure page, related to libraries/TableSearch.class.php and libraries/Util.class.php.
[ { "commit_message": "[PATCH] [security] XSS with malicious ENUM values Signed-off-by: Marc Delisle <marc@infomarc.info> Conflicts: libraries/Util.class.php libraries/TableSearch.class.php | 11 ++++++++--- libraries/Util.class.php | 9 ++++++--- 2 files changed, 14 insertions(+), 6 deletions(-)", "pat...
n/a
GHSA-hwq7-5vv9-c6cf
Smarty Cross-site Scripting vulnerability in pages that use smarty_function_mailto
null
[ { "commit_message": "[PATCH] Applied appropriate javascript and html escaping in mailto plugin to counter injection attacks Fixes #454 CHANGELOG.md | 3 ++ libs/plugins/function.mailto.php | 28 ++++++++++++------- .../PluginFunctionMailtoTest.php | 21 +...
null