id
stringlengths
12
19
title
stringlengths
0
237
description
stringlengths
35
3.87k
patches
listlengths
1
22
cwe
stringlengths
2
440
CVE-2019-17547
In ImageMagick before 7.0.8-62, TraceBezier in MagickCore/draw.c has a use-after-free.
[ { "commit_message": "[PATCH] ... MagickCore/draw.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBlY2Y3YzZiMjg4ZTExZTdlN2Y3NTM4N2M1ZTllOTNlNDIzYjk4Mzk3IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBDcmlzdHkgPHVyYmFuLXdhcnJpb3JAaW1hZ2VtYWdpY2sub3JnPgpEYXRlOiBTdW4sIDE4IEF1ZyAyM...
n/a
GHSA-vm6p-35rw-3fxc
Cockpit before 2.2.0 vulnerable to Insufficient Session Expiration
null
[ { "commit_message": "[PATCH] Stop execution of code after redirecting CHANGELOG.md | 1 + lib/Lime/App.php | 18 ++++++++++++++++++ 2 files changed, 19 insertions(+)", "patch_text_b64": "RnJvbSBkZDhkMDMxNDkxMmZhNjUxN2ViZDJjYzk5MzlkOWZhZmJlNjg3MzFiIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBBcnR1ciBIZWluem...
null
CVE-2012-3473
The (1) reports API and (2) administration feature in the comments API in the Ushahidi Platform before 2.5 do not require authentication, which allows remote attackers to generate reports and organize comments via API functions.
[ { "commit_message": "[PATCH] Don't allow reports via API when disabled via web #661 * Check allow_reports setting in Report API * Also fix PHP errors when missing person params from API request application/helpers/reports.php | 17 +++++++++++++++-- application/libraries/Api_Service.php ...
n/a
CVE-2016-3735
Piwigo is image gallery software written in PHP. When a criteria is not met on a host, piwigo defaults to usingmt_rand in order to generate password reset tokens. mt_rand output can be predicted after recovering the seed used to generate it. This low an unauthenticated attacker to take over an account providing they know an administrators email address in order to be able to request password reset.
[ { "commit_message": "[PATCH] bug #470, use a dedicated lib to generate random bytes include/functions_session.inc.php | 37 +--- include/random_compat/byte_safe_strings.php | 181 ++++++++++++++++ include/random_compat/cast_to_int.php | 71 +++++++ include/random_compat/error_polyfill.php ...
CWE-335
CVE-2021-3852
Authorization Bypass Through User-Controlled Key in weseek/growi
growi is vulnerable to Authorization Bypass Through User-Controlled Key
[ { "commit_message": "[PATCH] imprv: Permissions to operate comment (#4466) * check author when updating and removing * restrict to show controls when the user is not the author .../src/client/services/CommentContainer.js | 4 +- .../src/components/PageComment/Comment.jsx | 6 +-- packages/app/src/server/mo...
CWE-639 Authorization Bypass Through User-Controlled Key
GHSA-9c4h-3f7h-322r
SES's dynamic import and spread operator provides possible path to arbitrary exfiltration and execution
null
[ { "commit_message": "[PATCH] fix(fix): Censor spread import packages/ses/NEWS.md | 8 ++++++++ packages/ses/src/transforms.js | 2 +- packages/ses/test/test-transforms.js | 28 +++++++++++++++++++++++++++- 3 files changed, 36 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSBmYz...
null
GHSA-w9r2-6h22-p3p7
null
[ { "commit_message": "[PATCH] pbap: Fix not checking Primary/Secundary Counter length Primary/Secundary Counters are supposed to be 16 bytes values, if the server has implemented them incorrectly it may lead to the following crash: ================================================================= ==31860==ERROR:...
null
CVE-2023-0606
Cross-site Scripting (XSS) - Reflected in ampache/ampache
Cross-site Scripting (XSS) - Reflected in GitHub repository ampache/ampache prior to 5.5.7.
[ { "commit_message": "[PATCH] sanitize special characters in action gets public/templates/show_alphabet_form.inc.php | 2 +- public/templates/show_form_browse.inc.php | 2 +- public/templates/show_form_highest.inc.php | 2 +- public/templates/show_form_mashup.inc.php | 2 +- public/templates/show_fo...
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
GHSA-pr4r-675r-xh72
null
[ { "commit_message": "[PATCH] Bluetooth: Fix incorrect strncpy() in hidp_setup_hid() The length parameter should be sizeof(req->name) - 1 because there is no guarantee that string provided by userspace will contain the trailing '\\0'. Can be easily reproduced by manually setting req->name to 128 non-zero bytes p...
null
GHSA-jf52-3f2h-h9j5
n8n's Missing Stripe-Signature Verification Allows Unauthenticated Forged Webhooks
null
[ { "commit_message": "[PATCH] fix(Stripe Trigger Node): Add Stripe signature verification (#22764) .../credentials/StripeApi.credentials.ts | 21 ++ .../nodes/Stripe/StripeTrigger.node.ts | 10 +- .../nodes/Stripe/StripeTriggerHelpers.ts | 74 ++++++ .../__tests__/StripeTrigger.node.test.ts ...
null
CVE-2023-28772
An issue was discovered in the Linux kernel before 5.13.3. lib/seq_buf.c has a seq_buf_putmem_hex buffer overflow.
[ { "commit_message": "[PATCH] seq_buf: Fix overflow in seq_buf_putmem_hex() There's two variables being increased in that loop (i and j), and i follows the raw data, and j follows what is being written into the buffer. We should compare 'i' to MAX_MEMHEX_BYTES or compare 'j' to HEX_CHARS. Otherwise, if 'j' goes ...
n/a
GHSA-25fx-mxc2-76g7
Sylius PayPal Plugin allows unauthorized access to Credit card form, exposing payer name and not requiring 3DS
null
[ { "commit_message": "[PATCH] Require 3D Secure and process its response correctly src/Resources/views/payWithPaypal.html.twig | 46 +++++++++++++++------ 1 file changed, 33 insertions(+), 13 deletions(-)", "patch_text_b64": "RnJvbSAyYWRjNDZiZTI3NjRjY2VlMjJiNDI0NzEzOWI4MDU2ZmI4ZDFhZmZmIE1vbiBTZXAgMTcgMDA6MDA6...
null
GHSA-g5cj-5h58-j93w
Jeecg-boot vulnerable to SQL Injection
null
[ { "commit_message": "[PATCH] =?UTF-8?q?sql=E6=B3=A8=E5=85=A5=E6=A3=80=E6=9F=A5?= =?UTF-8?q?=E6=9B=B4=E5=8A=A0=E4=B8=A5=E6=A0=BC=EF=BC=8C=E4=BF=AE=E5=A4=8D?= =?UTF-8?q?/sys/duplicate/check=E5=AD=98=E5=9C=A8sql=E6=B3=A8=E5=85=A5?= =?UTF-8?q?=E6=BC=8F=E6=B4=9E=20#4129?= MIME-Version: 1.0 Content-Type: text/plain; ...
null
GHSA-87pw-2ggr-vr38
null
[ { "commit_message": "[PATCH] Add CSRF-token for comments application/controllers/IndexController.php | 31 ++++++++++++++++++- application/forms/Comment.php | 4 +++ .../views/scripts/index/formcomment.phtml | 1 + 3 files changed, 35 insertions(+), 1 deletion(-)", "patch_text_b64": "Rn...
null
GHSA-r3fq-cmmw-cpmm
Containous Traefik Exposes Password Hashes
null
[ { "commit_message": "[PATCH] fix: api and auth users. types/types.go | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSBhMTY5ZmVjMmUwOGUzOTFkMjRiNTA5YzAwZmNmMDExNjU2YzEzOTVjIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBGZXJuYW5kZXogTHVkb3ZpYyA8bHVkb3ZpY0Bjb250YWluby51cz4KRGF...
null
CVE-2021-33909
fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.
[ { "commit_message": "[PATCH] seq_file: disallow extremely large seq buffer allocations There is no reasonable need for a buffer larger than this, and it avoids int overflow pitfalls. Fixes: 058504edd026 (\"fs/seq_file: fallback to vmalloc allocation\") Suggested-by: Al Viro <viro@zeniv.linux.org.uk> Reported-by...
n/a
GHSA-m8qc-mf6p-pfq9
Link Following in rply
null
[ { "commit_message": "[PATCH] Fixed #42 -- use a user cache directory rply/parsergenerator.py | 46 ++++++++++++++--------------------------- setup.py | 1 + 2 files changed, 17 insertions(+), 30 deletions(-)", "patch_text_b64": "RnJvbSA3NmQyNjhhMzhjNjI3YmY0YWViZWJjZDA2NGY1YjZkMzgwZWI4YjIwIE1vb...
null
CVE-2024-22859
Cross-Site Request Forgery (CSRF) vulnerability in livewire before v3.0.4, allows remote attackers to execute arbitrary code getCsrfToken function. NOTE: the vendor disputes this because the 5d88731 commit fixes a usability problem (HTTP 419 status codes for legitimate client activity), not a security problem.
[ { "commit_message": "[PATCH] Stop caching csrf token in case of using wire:navigate across different sessions dist/livewire.esm.js | 9 ++------- dist/livewire.js | 9 ++------- dist/livewire.min.js | 10 +++++----- dist/manifest.json | 2 +- js/commit.js | 2 +- js/utils.js | 14 ++++-----...
n/a
CVE-2011-4329
Multiple cross-site scripting (XSS) vulnerabilities in Dolibarr 3.1.0 allow remote attackers to inject arbitrary web script or HTML via (1) the username parameter in a setup action to admin/company.php, or the PATH_INFO to (2) admin/security_other.php, (3) admin/events.php, or (4) admin/user.php.
[ { "commit_message": "[PATCH] Fix: [Bug #232] Multiple Cross-Site-Scripting vulnerabilities htdocs/lib/security.lib.php | 2 +- htdocs/main.inc.php | 13 ++++++++----- 2 files changed, 9 insertions(+), 6 deletions(-)", "patch_text_b64": "RnJvbSA3NjJmOThhYjQxMzc3NDlkMDk5MzYxMmI0ZTM1NDRhNDIwN2U3OGExIE1v...
n/a
GHSA-gw94-wggg-3ggh
null
[ { "commit_message": "[PATCH] =?UTF-8?q?=E5=88=A0=E9=99=A4AppCentre?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit .gitignore | 1 - zb_users/plugin/AppCentre/app_del.php | 38 -- zb_users/plugin/AppCentre/app_pack.php ...
null
CVE-2020-15129
Open redirect in Traefik
In Traefik before versions 1.7.26, 2.2.8, and 2.3.0-rc3, there exists a potential open redirect vulnerability in Traefik's handling of the "X-Forwarded-Prefix" header. The Traefik API dashboard component doesn't validate that the value of the header "X-Forwarded-Prefix" is a site relative path and will redirect to any header provided URI. Successful exploitation of an open redirect can be used to entice victims to disclose sensitive information. Active Exploitation of this issue is unlikely as it would require active header injection, however the Traefik team addressed this issue nonetheless to prevent abuse in e.g. cache poisoning scenarios.
[ { "commit_message": "[PATCH] fix: clean X-Forwarded-Prefix header for the dashboard. pkg/api/dashboard.go | 23 +++++++++++++++-- pkg/api/dashboard_test.go | 54 +++++++++++++++++++++++++++++++++++++++ 2 files changed, 75 insertions(+), 2 deletions(-) create mode 100644 pkg/api/dashboard_test.go", "patch...
CWE-601: URL Redirection to Untrusted Site ('Open Redirect')
GHSA-68w7-72jg-6qpp
NuGet Client Security Feature Bypass Vulnerability
null
[ { "commit_message": "[PATCH] Merged PR 502035: Handle no error status in chain .../PublicAPI/net472/PublicAPI.Shipped.txt | 3 +- .../netcoreapp5.0/PublicAPI.Shipped.txt | 3 +- .../netstandard2.0/PublicAPI.Shipped.txt | 3 +- .../Signing/Signatures/Signature.cs | 157 +++++++++-------...
null
GHSA-92xg-gmrq-5c3w
Apache Airflow vulnerable to Execution with Unnecessary Privileges
null
[ { "commit_message": "[PATCH] Splitting syspath preparation into stages (#41672) (#41694) Co-authored-by: Amogh Desai <amoghrajesh1999@gmail.com> airflow/settings.py | 17 ++++++++++------- tests/core/test_settings.py | 33 +++++++++++++++++++++++++++------ 2 files changed, 37 insertions(+), 13 deletions(-...
null
CVE-2024-24752
Bref Uploaded Files Not Deleted in Event-Driven Functions
Bref enable serverless PHP on AWS Lambda. When Bref is used with the Event-Driven Function runtime and the handler is a `RequestHandlerInterface`, then the Lambda event is converted to a PSR7 object. During the conversion process, if the request is a MultiPart, each part is parsed and for each which contains a file, it is extracted and saved in `/tmp` with a random filename starting with `bref_upload_`. The flow mimics what plain PHP does but it does not delete the temporary files when the request has been processed. An attacker could fill the Lambda instance disk by performing multiple MultiPart requests containing files. This vulnerability is patched in 2.1.13.
[ { "commit_message": "[PATCH] Support malformed multipart body For example body containing broken array keys like `key0[key1][key2][` src/Event/Http/Psr7Bridge.php | 59 ++++++++++++++--------- tests/Event/Http/CommonHttpTest.php | 4 +- tests/Event/Http/HttpRequestEventTest.php | 2 +- tests/Ev...
CWE-400: Uncontrolled Resource Consumption
CVE-2023-4226
Chamilo LMS File Upload Functionality Remote Code Execution
Unrestricted file upload in `/main/inc/ajax/work.ajax.php` in Chamilo LMS <= v1.11.24 allows authenticated attackers with learner role to obtain remote code execution via uploading of PHP files.
[ { "commit_message": "[PATCH] System: Security: Add header rule to avoid MIME-sniffing .htaccess | 4 ++++ 1 file changed, 4 insertions(+)", "patch_text_b64": "RnJvbSA2ZjMyNjI1YTAxMmQ1ZGUyZGZlOGVkYmNjYjRlZDE0YTg1ZTMxMGQ0IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBBbmdlbCBGZXJuYW5kbyBRdWlyb3ogQ2FtcG9zIDxhbmdlbG...
CWE-434 Unrestricted Upload of File with Dangerous Type
CVE-2025-59148
Suricata's improper use of entropy keyword can lead to a NULL-ptr deref
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Versions 8.0.0 and below incorrectly handle the entropy keyword when not anchored to a "sticky" buffer, which can lead to a segmentation fault. This issue is fixed in version 8.0.1. To workaround this issue, users can disable rules using the entropy keyword, or validate they are anchored to a sticky buffer.
[ { "commit_message": "[PATCH] detect/entropy: Ensure entropy matcher has flow Make sure that the flow is available to the entropy matcher so it can handle content that's not anchored to a sticky buffer. Issue: 7838 src/detect-engine-content-inspection.c | 2 +- src/detect-entropy.c | 9 ++++++---...
CWE-476: NULL Pointer Dereference
CVE-2020-14156
user_channel/passwd_mgr.cpp in OpenBMC phosphor-host-ipmid before 2020-04-03 does not ensure that /etc/ipmi-pass has strong file permissions.
[ { "commit_message": "[PATCH] Use more restrictive permissions on /etc/ipmi-pass This forces the permissions on /etc/ipmi-pass to be 0600 or RW only by owner. This is to prevent non-owners from reading the file, even though it is obfuscated to make it harder for ipmi passwords to leak. Tested: change ipmi passwo...
n/a
CVE-2005-10002
almosteffortless secure-files Plugin secure-files.php sf_downloads path traversal
A vulnerability, which was classified as critical, was found in almosteffortless secure-files Plugin up to 1.1 on WordPress. Affected is the function sf_downloads of the file secure-files.php. The manipulation of the argument downloadfile leads to path traversal. Upgrading to version 1.2 is able to address this issue. The name of the patch is cab025e5fc2bcdad8032d833ebc38e6bd2a13c92. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-243804.
[ { "commit_message": "[PATCH] Fixed potential security exploit. git-svn-id: https://plugins.svn.wordpress.org/secure-files/trunk@3641 b8457f37-d9ea-0310-8a92-e5e31aec5664 secure-files.php | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSBjYWIwMjVlNWZjMmJjZGFkODAzMmQ4MzNlYmM...
CWE-22 Path Traversal
GHSA-hvcf-6324-cjh7
Persistent Cross-site Scripting in Ibexa RichText Field Type
null
[ { "commit_message": "[PATCH] Fixed failing test for relative links .../eZ/RichText/Resources/schemas/docbook/docbook.iso.sch | 3 ++- .../RichText/Resources/schemas/docbook/docbook.iso.sch.xsl | 2 +- tests/lib/eZ/FieldType/RichTextTest.php | 6 +++--- 3 files changed, 6 insertions(+), 5 del...
null
GHSA-wh5w-82f3-wrxh
CKEditor cross-site scripting vulnerability in AJAX sample
null
[ { "commit_message": "[PATCH 1/2] Fix CDATA parsing logic core/htmlparser.js | 35 ++++++++++++++++++++--------------- 1 file changed, 20 insertions(+), 15 deletions(-)", "patch_text_b64": "RnJvbSA4ODkzMTVhYTg5ZGUxZDA4ZjMyMDk5MDM2N2VmNDU1OTU1MWZkZjlmIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiA9P1VURi04P3E/SmFj...
null
CVE-2018-18678
GNUBOARD5 before 5.3.2.0 has XSS that allows remote attackers to inject arbitrary web script or HTML via the "board group extra contents" parameter, aka the adm/boardgroup_form_update.php gr_1~10 parameter.
[ { "commit_message": "[PATCH] =?UTF-8?q?XSS=20=EC=B7=A8=EC=95=BD=EC=A0=90=20=EC=88=98?= =?UTF-8?q?=EC=A0=95?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit adm/board_form_update.php | 3 +++ adm/boardgroup_form.php | 2 +- adm/config_form.php | 2 +- adm/con...
n/a
GHSA-66rh-8fw6-59q6
assign-deep Vulnerable to Prototype Pollution
null
[ { "commit_message": "[PATCH] ensure keys are valid index.js | 10 +++++++++- 1 file changed, 9 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA4ZTNjYzRhMzQyNDY3MzM2NzJjNzFlOTY1MzIxMDUzODQ5MzdlNTZjIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBkb293YiA8YnJpYW4ud29vZHdhcmRAZ21haWwuY29tPgpEYXRlOiBUdWUsIDI1...
null
GHSA-p6p2-qq95-vq5h
Remote Code Execution in Custom Integration Upload
null
[ { "commit_message": "[PATCH] Merge pull request from GHSA-p6p2-qq95-vq5h * Removing custom connector template functions * Updating connector template modal description * Adding function upload tests .../ConnectorTemplateUploadModal.tsx | 3 +- docker-compose.yml | 1 - requ...
null
GHSA-v3fm-xf6f-c2vv
null
[ { "commit_message": "[PATCH] plugin/Audit/Objects/AuditTable.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) mode change 100644 => 100755 plugin/Audit/Objects/AuditTable.php", "patch_text_b64": "RnJvbSA4OTE4NDNkNTQ3ZjdkYjU2Mzk5MjVhNjdiN2YyZmQ2NjcyMWY3MDNhIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBk...
null
PYSEC-2019-156
null
[ { "commit_message": "[PATCH] BUG: weave: fix issues with temporary directory usage scipy/weave/catalog.py | 259 +++++++++++++++++++++++++----- scipy/weave/tests/test_catalog.py | 226 +++++++++++++++++++++++++- 2 files changed, 436 insertions(+), 49 deletions(-)", "patch_text_b64": "RnJvbSBiZDI5Nm...
null
CVE-2024-27094
OpenZeppelin Contracts base64 encoding may read from potentially dirty memory
OpenZeppelin Contracts is a library for secure smart contract development. The `Base64.encode` function encodes a `bytes` input by iterating over it in chunks of 3 bytes. When this input is not a multiple of 3, the last iteration may read parts of the memory that are beyond the input buffer. The vulnerability is fixed in 5.0.2 and 4.9.6.
[ { "commit_message": "[PATCH] Transpile dc44c9f1 .changeset/warm-geese-dance.md | 5 ----- CHANGELOG.md | 4 ++++ contracts/package.json | 2 +- contracts/utils/Base64Upgradeable.sol | 2 +- package.json | 2 +- 5 files changed, 7 insertions(+), ...
CWE-125: Out-of-bounds Read
CVE-2025-49809
mtr through 0.95, in certain privileged contexts, mishandles execution of a program specified by the MTR_PACKET environment variable. NOTE: mtr on macOS may often have Sudo rules, as an indirect consequence of Homebrew not installing setuid binaries.
[ { "commit_message": "[PATCH] Added protection against use of MTR_PACKET under special circumstances ui/cmdpipe.c | 13 ++++++++++--- 1 file changed, 10 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSA1MjI2ZjEwNWYwODdjMjlkM2NmYWQ5ZjI4MDAwZTc1MzZhZjkxYWM2IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiAiUi...
CWE-829 Inclusion of Functionality from Untrusted Control Sphere
CVE-2023-30840
On a compromised node, the fluid-csi service account can be used to modify node specs
Fluid is an open source Kubernetes-native distributed dataset orchestrator and accelerator for data-intensive applications. Starting in version 0.7.0 and prior to version 0.8.6, if a malicious user gains control of a Kubernetes node running fluid csi pod (controlled by the `csi-nodeplugin-fluid` node-daemonset), they can leverage the fluid-csi service account to modify specs of all the nodes in the cluster. However, since this service account lacks `list node` permissions, the attacker may need to use other techniques to identify vulnerable nodes. Once the attacker identifies and modifies the node specs, they can manipulate system-level-privileged components to access all secrets in the cluster or execute pods on other nodes. This allows them to elevate privileges beyond the compromised node and potentially gain full privileged access to the whole cluster. To exploit this vulnerability, the attacker can make all other nodes unschedulable (for example, patch node with taints) and wait for system-critical components with high privilege to appear on the compromised node. However, this attack requires two prerequisites: a compromised node and identifying all vulnerable nodes through other means. Version 0.8.6 contains a patch for this issue. As a workaround, delete the `csi-nodeplugin-fluid` daemonset in `fluid-system` namespace and avoid using CSI mode to mount FUSE file systems. Alternatively, using sidecar mode to mount FUSE file systems is recommended.
[ { "commit_message": "[PATCH] Merge pull request from GHSA-93xx-cvmc-9w3v * Fix rbacs and limit CSI Plugin's node related access Signed-off-by: trafalgarzzz <trafalgarz@outlook.com> * Update change log Signed-off-by: trafalgarzzz <trafalgarz@outlook.com> Signed-off-by: trafalgarzzz <trafalgarz@outlook.com> chart...
CWE-863: Incorrect Authorization
PYSEC-2020-255
null
[ { "commit_message": "[PATCH] Mark `MemmappedTensorAllocator` as returning opaque handle. This allocator is used for `ImmutableConstantOp` and it returns a handle to the contents of a memory mapped file which is supposed to represent a tensor. For tensors of complex types (resources, variables and strings), allo...
null
GHSA-h6m6-jj8v-94jj
SQL injection in litellm
null
[ { "commit_message": "[PATCH] fix(proxy_server.py): security fix - fix sql injection attack on global spend logs litellm/proxy/proxy_server.py | 12 ++++-------- 1 file changed, 4 insertions(+), 8 deletions(-)", "patch_text_b64": "RnJvbSBmNzVjMTVkNmNkNTM1YWE3ODAxNDM3OGFkNTMyZGUxZGY2YmUyZjU2IE1vbiBTZXAgMTcgMDA...
null
GHSA-wrxc-mr2w-cjpv
Open Redirect in Grav
null
[ { "commit_message": "[PATCH] Fix for user reported CVE path-based open redirect CHANGELOG.md | 1 + system/src/Grav/Common/Grav.php | 5 ++++- 2 files changed, 5 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAyZWFlMTA0YzdhNGJmMzJiYzI2Y2I4MDczZDVjNDA0NjRiZmRhM2Y3IE1vbiBTZXAgMTcgMDA...
null
GHSA-69q2-p9xp-739v
Duplicate Advisory: XML Injection in petl
null
[ { "commit_message": "[PATCH] allow using a custom/restricted xml parser petl/io/xml.py | 22 ++++++++++++++++++++-- 1 file changed, 20 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSAwNzQyMGVmODQ2M2NjMzg3YWVhODRlMmQ2MjQxY2Y1NTY1NzRlMmE1IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBKdWFyZXogUnVkc2F0eiA...
null
CVE-2024-47249
Apache NimBLE: Lack of input sanitization leading to out-of-bound reads in multiple advertisement handler
Improper Validation of Array Index vulnerability in Apache NimBLE. Lack of input validation for HCI events from controller could result in out-of-bound memory corruption and crash. This issue requires broken or bogus Bluetooth controller and thus severity is considered low. This issue affects Apache NimBLE: through 1.7.0. Users are recommended to upgrade to version 1.8.0, which fixes the issue.
[ { "commit_message": "[PATCH] nimble/host: Validate advertising instance before parsing event Advertising instance is used for indexing slave state array. Since instance is provided by host invalid handle in event means there is bug in controller. nimble/host/src/ble_hs_hci_evt.c | 14 ++++++++++++++ 1 file chang...
CWE-129 Improper Validation of Array Index
CVE-2025-6775
xiaoyunjie openvpn-cms-flask User Creation Endpoint openvpn.py create_user command injection
A vulnerability classified as critical has been found in xiaoyunjie openvpn-cms-flask up to 1.2.7. This affects the function create_user of the file /app/api/v1/openvpn.py of the component User Creation Endpoint. The manipulation of the argument Username leads to command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.2.8 is able to address this issue. The patch is named e23559b98c8ea2957f09978c29f4e512ba789eb6. It is recommended to upgrade the affected component.
[ { "commit_message": "[PATCH] Fix the vulnerability Dockerfile | 1 + Makefile | 4 ++-- app/api/v1/openvpn.py | 14 ++++++-------- app/config/secure.py | 1 + app/libs/shell.py | 10 +++++++++- app/plugins/oss/app/controller....
Command Injection
GHSA-rpmj-rpgj-qmpm
rust-openssl ssl::select_next_proto use after free
null
[ { "commit_message": "[PATCH] Fix lifetimes in ssl::select_next_proto openssl/src/ssl/mod.rs | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA4ZTZlMzBiYmY3ZTc2Mjc4NDViODAxZjgzYTM4MTBkNmZmYzFmMTU3IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBTdGV2ZW4gRmFja2xlciA8c2ZhY2tsZXJAZ21haW...
null
CVE-2022-0318
Heap-based Buffer Overflow in vim/vim
Heap-based Buffer Overflow in vim/vim prior to 8.2.
[ { "commit_message": "[PATCH] patch 8.2.4151: reading beyond the end of a line Problem: Reading beyond the end of a line. Solution: For block insert only use the offset for correcting the length. src/ops.c | 19 ++----------------- src/testdir/test_visual.vim | 9 +++++++++ src/version.c ...
CWE-122 Heap-based Buffer Overflow
CVE-2018-17057
An issue was discovered in TCPDF before 6.2.22. Attackers can trigger deserialization of arbitrary data via the phar:// wrapper.
[ { "commit_message": "[PATCH] Fix for security vulnerability: Using the phar:// wrapper it was possible to trigger the unserialization of user provided data. CHANGELOG.TXT | 3 +++ composer.json | 2 +- include/tcpdf_fonts.php | 10 +++++----- include/tcpdf_images.php | 4 ++-- include/tcpd...
n/a
CVE-2019-18992
OpenWrt 18.06.4 allows XSS via these Name fields to the cgi-bin/luci/admin/network/firewall/rules URI: "Open ports on router" and "New forward rule" and "New Source NAT" (this can occur, for example, on a TP-Link Archer C7 device).
[ { "commit_message": "[PATCH] luci-app-firewall: fix stored XSS in rule-details.lua A previous fix to this file failed to address a second instance of the same issue. Fixes: c048f23ba (\"luci-app-firewall: fix stored XSS in rule- and forward detail pages\") Signed-off-by: Jo-Philipp Wich <jo@mein.io> .../luasrc/...
n/a
PYSEC-2021-261
null
[ { "commit_message": "[PATCH] Fix NPE in restoring code. PiperOrigin-RevId: 388303253 Change-Id: Ia8c68568cb854bca538909a182b31a618d68ce55 tensorflow/core/kernels/save_restore_tensor.cc | 9 ++++++++- 1 file changed, 8 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA5ZTgyZGNlNmU2YmQxZjM2YTU3ZTA4ZmE4N...
null
GHSA-hxv7-f4qv-7rm4
null
[ { "commit_message": "[PATCH] Fix checking of parent directories Taken from the justification in the launchpad bug: To a task in freezer cgroup /a/b/c/d, it should appear that there are no cgroups other than its descendents. Since this is a filesystem, we must have the parent directories, but each parent cgroup ...
null
PYSEC-2023-252
null
[ { "commit_message": "[PATCH] Prevent path traversal with encoded URL (#10650) Signed-off-by: B-Step62 <yuki.watanabe@databricks.com> mlflow/utils/uri.py | 5 +- tests/server/test_handlers.py | 27 +++- .../store/artifact/test_http_artifact_repo.py | 4 +- tests/tracki...
null
CVE-2013-3235
net/tipc/socket.c in the Linux kernel before 3.9-rc7 does not initialize a certain data structure and a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.
[ { "commit_message": "[PATCH] tipc: fix info leaks via msg_name in recv_msg/recv_stream The code in set_orig_addr() does not initialize all of the members of struct sockaddr_tipc when filling the sockaddr info -- namely the union is only partly filled. This will make recv_msg() and recv_stream() -- the only user...
n/a
GHSA-4rch-2fh8-94vw
MySQL2 for Node Arbitrary Code Injection
null
[ { "commit_message": "[PATCH] fix(security): sanitize timezone parameter value to prevent code injection (#2608) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit * fix(security): sanitize timezone parameter value to prevent code injection. Discovered by zhaoyudi (Nebulala...
null
GHSA-x989-q2pq-4q5x
TensorFlow vulnerable to Int overflow in `RaggedRangeOp`
null
[ { "commit_message": "[PATCH] [security] Fix int overflow in RaggedRangeOp. PiperOrigin-RevId: 461749624 tensorflow/core/kernels/ragged_range_op.cc | 35 +++++++++++-------- .../core/kernels/ragged_range_op_test.cc | 12 +++++++ .../python/ops/ragged/ragged_range_op_test.py | 7 ++-- 3 files changed, 37 in...
null
CVE-2017-13027
The LLDP parser in tcpdump before 4.9.2 has a buffer over-read in print-lldp.c:lldp_mgmt_addr_tlv_print().
[ { "commit_message": "[PATCH] CVE-2017-13027/LLDP: Fix a bounds check. The total length of the OID is the OID length plus the length of the OID length itself. This fixes a buffer over-read discovered by Bhargava Shastry, SecT/TU Berlin. Add a test using the capture file supplied by the reporter(s), modified so t...
n/a
GHSA-4hvc-qwr2-f8rv
Redisson vulnerable to Deserialization of Untrusted Data
null
[ { "commit_message": "[PATCH] Feature - allowedClasses setting added to SerializationCodec https://github.com/redisson/redisson/security/code-scanning/4 .../codec/CustomObjectInputStream.java | 20 +++++++++----- .../redisson/codec/SerializationCodec.java | 27 ++++++++++++------- 2 files changed, 31 ins...
null
GHSA-9fhr-9xv4-8gjv
null
[ { "commit_message": "[PATCH] fixed an 'Authenticated Cross-Site Scripting' bug on the command help page reported by 'Mohamed A. Baset' of 'Seekurity SA de C.V.' at 'Seekurity.com' on April 17,2020 apfell-docker/app/routes/api_routes.py | 9 +++++++-- 1 file changed, 7 insertions(+), 2 deletions(-)", "patch_t...
null
CVE-2021-32055
Mutt 1.11.0 through 2.0.x before 2.0.7 (and NeoMutt 2019-10-25 through 2021-05-04) has a $imap_qresync issue in which imap/util.c has an out-of-bounds read in situations where an IMAP sequence set ends with a comma. NOTE: the $imap_qresync setting for QRESYNC is not enabled by default.
[ { "commit_message": "[PATCH] Fix seqset iterator when it ends in a comma. If the seqset ended with a comma, the substr_end marker would be just before the trailing nul. In the next call, the loop to skip the marker would iterate right past the end of string too. The fix is simple: place the substr_end marker a...
n/a
CVE-2025-15346
wolfSSL Python library `CERT_REQUIRED` mode fails to enforce client certificate requirement
A vulnerability in the handling of verify_mode = CERT_REQUIRED in the wolfssl Python package (wolfssl-py) causes client certificate requirements to not be fully enforced.  Because the WOLFSSL_VERIFY_FAIL_IF_NO_PEER_CERT flag was not included, the behavior effectively matched CERT_OPTIONAL: a peer certificate was verified if presented, but connections were incorrectly authenticated when no client certificate was provided.  This results in improper authentication, allowing attackers to bypass mutual TLS (mTLS) client authentication by omitting a client certificate during the TLS handshake.  The issue affects versions up to and including 5.8.2.
[ { "commit_message": "[PATCH] Fix CERT_REQUIRED verify mode not setting SSL_VERIFY_FAIL_IF_NO_PEER_CERT and therefore failing to verify the client cert. Thanks to Matan Radomski for the report. tests/test_context.py | 3 +++ wolfssl/__init__.py | 11 ++++++++--- 2 files changed, 11 insertions(+), 3 deletions(-)...
CWE-306 Missing Authentication for Critical Function
CVE-2023-32308
SQL Injection Vulnerability in anuko timetracker
anuko timetracker is an open source time tracking system. Boolean-based blind SQL injection vulnerability existed in Time Tracker invoices.php in versions prior to 1.22.11.5781. This was happening because of a coding error after validating parameters in POST requests. There was no check for errors before adjusting invoice sorting order. Because of this, it was possible to craft a POST request with malicious SQL for Time Tracker database. This issue has been fixed in version 1.22.11.5781. Users are advised to upgrade. Users unable to upgrade may insert an additional check for errors in a condition before calling `ttGroupHelper::getActiveInvoices()` in invoices.php.
[ { "commit_message": "[PATCH] Addressed an sql vulnerability in invoices.php for bogus post parameters for sorting. initialize.php | 2 +- invoices.php | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSA4YTczNjdkN2Y3N2VhNjk3YzA5MGY1Y2E0ZTE5NjY5MTgxY2M3YmNmIE1vbiBTZXAgMTcgMDA...
CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2017-20165
debug-js debug node.js useColors redos
A vulnerability classified as problematic has been found in debug-js debug up to 3.0.x. This affects the function useColors of the file src/node.js. The manipulation of the argument str leads to inefficient regular expression complexity. Upgrading to version 3.1.0 is able to address this issue. The identifier of the patch is c38a0166c266a679c8de012d4eaccec3f944e685. It is recommended to upgrade the affected component. The identifier VDB-217665 was assigned to this vulnerability.
[ { "commit_message": "[PATCH] remove ReDoS regexp in %o formatter (#504) src/node.js | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBjMzhhMDE2NmMyNjZhNjc5YzhkZTAxMmQ0ZWFjY2VjM2Y5NDRlNjg1IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBZYSBaaHVhbmcgPHpodWFuZ3lhQHVzZXJzLm5vcmVwbHk...
CWE-1333 Inefficient Regular Expression Complexity
GHSA-8h83-chh2-fchp
eZ Platform users with the Company admin role can assign any role to any user
null
[ { "commit_message": "[PATCH] Merge pull request from GHSA-8h83-chh2-fchp eZ/Publish/Core/settings/policies.yml | 2 +- eZ/Publish/Core/settings/roles.yml | 12 + phpunit.xml | 3 + .../User/Limitation/MemberOfLimitation.php | 21 + .../Values/User/Limita...
null
GHSA-9vj3-f442-h49r
null
[ { "commit_message": "[PATCH] or1200: add carry, overflow bits, and range exception rtl/verilog/or1200_alu.v | 103 +++++++++++++++++++++------------- rtl/verilog/or1200_cpu.v | 21 ++++++- rtl/verilog/or1200_defines.v | 27 +++++++-- rtl/verilog/or1200_except.v | 14 ++++- rtl/verilog/or1200_mult_ma...
null
CVE-2024-2397
infinite loop in the PPP printer of tcpdump
Due to a bug in packet data buffers management, the PPP printer in tcpdump can enter an infinite loop when reading a crafted DLT_PPP_SERIAL .pcap savefile. This problem does not affect any tcpdump release, but it affected the git master branch from 2023-06-05 to 2024-03-21.
[ { "commit_message": "[PATCH] ppp: use the buffer stack for the de-escaping buffer. This both saves the buffer for freeing later and saves the packet pointer and snapend to be restored when packet processing is complete, even if an exception is thrown with longjmp. This means that the hex/ASCII printing in prett...
CWE-835 Loop with Unreachable Exit Condition ('Infinite Loop')
GHSA-gh46-3q3w-rg7h
null
[ { "commit_message": "[PATCH] Fix seven bugs discovered and fixed by ForAllSecure: CVE-2019-13217: heap buffer overflow in start_decoder() CVE-2019-13218: stack buffer overflow in compute_codewords() CVE-2019-13219: uninitialized memory in vorbis_decode_packet_rest() CVE-2019-13220: out-of-range read in draw_lin...
null
GHSA-vvfj-2jqx-52jm
JupyterLab LaTeX typesetter links did not enforce `noopener` attribute
null
[ { "commit_message": "<5832902+krassowski@users.noreply.github.com> [PATCH] Merge commit from fork * Add tests for hardening of URLs * Harden anchor links for latex rendering, add more tests * Run `mathjax-extension` tests on CI .github/workflows/linuxjs-tests.yml | 1 + packages/mathjax-extension/babe...
null
PYSEC-2021-769
null
[ { "commit_message": "[PATCH] Add one missing valdiation to `matrix_set_diag_op.cc` PiperOrigin-RevId: 387923408 Change-Id: If6a97b9098c13879400f56c22f91555cdf0ce5d7 tensorflow/core/kernels/linalg/matrix_set_diag_op.cc | 3 +++ 1 file changed, 3 insertions(+)", "patch_text_b64": "RnJvbSBmZjg4OTQwNDRkZmFlNTU2O...
null
GHSA-5gjr-fxv3-4mwv
null
[ { "commit_message": "[PATCH] fix(json): Check max recursion depth in more places src/ua_types_encoding_json.c | 13 +++++++++---- 1 file changed, 9 insertions(+), 4 deletions(-)", "patch_text_b64": "RnJvbSBjODAwZTI5ODdiMTBiYjNhZjZlZjY0NGI1MTViNWQ2MzkyZjg4NjFkIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBKdWxpdX...
null
GHSA-w4px-9pgm-p2f3
pyrad uses sequential packet IDs
null
[ { "commit_message": "[PATCH] Use a better random generator. CHANGES.txt | 7 +++++++ pyrad/packet.py | 9 ++++++--- 2 files changed, 13 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSAzOGY3NGIzNjgxNGNhNWIxYTI3ZDk4OTgxNDExMjZhZjQ5NTNiZWU1IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBXaWNoZXJ0IEFra2V...
null
CVE-2016-10251
Integer overflow in the jpc_pi_nextcprl function in jpc_t2cod.c in JasPer before 1.900.20 allows remote attackers to have unspecified impact via a crafted file, which triggers use of an uninitialized value.
[ { "commit_message": "[PATCH] Fixed an integer overflow problem in the JPC codec that later resulted in the use of uninitialized data. src/libjasper/jpc/jpc_t2cod.c | 20 ++++++++++---------- src/libjasper/jpc/jpc_t2cod.h | 20 ++++++++++---------- 2 files changed, 20 insertions(+), 20 deletions(-)", "patch_te...
n/a
GHSA-4w59-c3gc-rrhp
vantage6 refresh tokens do not expire
null
[ { "commit_message": "[PATCH 1/2] Introduce maximum length of refresh tokens - configuration options to set expiration time of tokens and refresh tokens - Automatically refreshing tokens on the node - Ensuring refresh tokens are longer than access tokens - otherwise they are useless - Changes so that refresh tok...
null
GHSA-4cpg-3vgw-4877
Prototype pollution in Plist before 3.0.5 can cause denial of service
null
[ { "commit_message": "[PATCH 1/2] Fix prototype pollution lib/parse.js | 6 ++++++ test/parse.js | 7 +++++++ 2 files changed, 13 insertions(+)", "patch_text_b64": "RnJvbSBjNTcxZDgwMGY1ODY1OTY5MmNkZGM1MTM1MWIzZDM0NDM5NmRkNTI4IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBNYXJpbyBBcmVpYXMgPG1hcmlvQGNhbnZhLmNvbT4KR...
null
CVE-2025-53108
HomeBox Missing User Authorization
HomeBox is a home inventory and organization system. Prior to 0.20.1, HomeBox contains a missing authorization check in the API endpoints responsible for updating and deleting inventory item attachments. This flaw allows authenticated users to perform unauthorized actions on inventory item attachments that they do not own. This issue could lead to unauthorized data manipulation or loss of critical inventory data. This issue has been patched in version 0.20.1. There are no workarounds, users must upgrade.
[ { "commit_message": "[PATCH] Merge commit from fork .../handlers/v1/v1_ctrl_items_attachments.go | 6 +-- .../services/service_items_attachments.go | 12 ++--- .../data/repo/repo_item_attachments.go | 49 +++++++++++++++---- 3 files changed, 49 insertions(+), 18 deletions(-)", "patch_text_b64": "R...
CWE-862: Missing Authorization
GHSA-2gg8-85m5-8r2p
Chaos Mesh's Chaos Controller Manager is Missing Authentication for Critical Function
null
[ { "commit_message": "[PATCH] chore!: disable chaosctl by default (#4702) * chore!: disable chaosctl by default Signed-off-by: Yue Yang <g1enyy0ung@gmail.com> * chore: update Signed-off-by: Yue Yang <g1enyy0ung@gmail.com> * Update install.sh Signed-off-by: Yue Yang <g1enyy0ung@gmail.com> Signed-off-by: Yue Yang ...
null
CVE-2024-3408
Authentication Bypass and RCE in man-group/dtale
man-group/dtale version 3.10.0 is vulnerable to an authentication bypass and remote code execution (RCE) due to improper input validation. The vulnerability arises from a hardcoded `SECRET_KEY` in the flask configuration, allowing attackers to forge a session cookie if authentication is enabled. Additionally, the application fails to properly restrict custom filter queries, enabling attackers to execute arbitrary code on the server by bypassing the restriction on the `/update-settings` endpoint, even when `enable_custom_filters` is not enabled. This vulnerability allows attackers to bypass authentication mechanisms and execute remote code on the server.
[ { "commit_message": "[PATCH] https://github.com/man-group/dtale/issues/870: update Flask's SECRET_KEY to be a random string dtale/app.py | 12 +++++++++++- 1 file changed, 11 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAzMmJkNmZiNGE2M2RlNzc5ZmYxZTUxODIzYTQ1Njg2NWVhM2NiZDEzIE1vbiBTZXAgMTcgMDA6MDA6...
CWE-798 Use of Hard-coded Credentials
PYSEC-2023-173
null
[ { "commit_message": "[PATCH] Merge pull request from GHSA-h7cm-mrvq-wcfr Co-authored-by: skelmis <ethan@koldfusion.xyz> piccolo/apps/user/tables.py | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBlZGNmZTM1NjgzODI5MjJiYTNlM2I2NTg5NmU2ZTcyNzJmOTcyMjYxIE1vbiBTZXAgMTcgMDA6MD...
null
GHSA-325j-24f4-qv5x
Regular Expression Denial of Service in ssri
null
[ { "commit_message": "[PATCH] fix(security): tweak strict SRI regex (#10) The previous form was vulnerable to ReDoS attacks, by crafting exceptionally long base64 hash strings. This issue only affected consumers using the opts.strict option. index.js | 2 +- test/integrity.js | 15 +++++++++------ test/s...
null
GHSA-2q7q-p2pj-49m2
null
[ { "commit_message": "[PATCH] f2fs: fix a dead loop in f2fs_fiemap() A dead loop can be triggered in f2fs_fiemap() using the test case as below: ... fd = open(); fallocate(fd, 0, 0, 4294967296); ioctl(fd, FS_IOC_FIEMAP, fiemap_buf); ... It's caused by an overflow in __get_data_block(): ... bh->b_size = map.m_len...
null
GHSA-hhvc-g5hv-48c6
Write to immutable memory region in TensorFlow
null
[ { "commit_message": "[PATCH] Mark `MemmappedTensorAllocator` as returning opaque handle. This allocator is used for `ImmutableConstantOp` and it returns a handle to the contents of a memory mapped file which is supposed to represent a tensor. For tensors of complex types (resources, variables and strings), allo...
null
CVE-2017-17857
The check_stack_boundary function in kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging mishandling of invalid variable stack read operations.
[ { "commit_message": "[PATCH] bpf: fix missing error return in check_stack_boundary() Prevent indirect stack accesses at non-constant addresses, which would permit reading and corrupting spilled pointers. Fixes: f1174f77b50c (\"bpf/verifier: rework value tracking\") Signed-off-by: Jann Horn <jannh@google.com> Si...
n/a
GHSA-r2ff-m48r-qqhj
null
[ { "commit_message": "[PATCH] xss fixes .../attachment/fields/name/detail.tpl | 2 +- client/src/view-helper.js | 71 +++++++++++++++++++ client/src/views/attachment/fields/name.js | 2 +- client/src/views/fields/wysiwyg.js | 25 +------ .../preferences/fields/dashboard-ta...
null
CVE-2025-31130
gitoxide does not detect SHA-1 collision attacks
gitoxide is an implementation of git written in Rust. Before 0.42.0, gitoxide uses SHA-1 hash implementations without any collision detection, leaving it vulnerable to hash collision attacks. gitoxide uses the sha1_smol or sha1 crate, both of which implement standard SHA-1 without any mitigations for collision attacks. This means that two distinct Git objects with colliding SHA-1 hashes would break the Git object model and integrity checks when used with gitoxide. This vulnerability is fixed in 0.42.0.
[ { "commit_message": "[PATCH 01/22] =?UTF-8?q?add=20more=20tests=20for=20SHA=E2=80=901?= =?UTF-8?q?=20vectors?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit gix-hash/tests/fixtures/shambles/messageA | Bin 0 -> 640 bytes gix-hash/tests/fixtures/shambles/messageB | Bin ...
CWE-328: Use of Weak Hash
CVE-2021-33571
In Django 2.2 before 2.2.24, 3.x before 3.1.12, and 3.2 before 3.2.4, URLValidator, validate_ipv4_address, and validate_ipv46_address do not prohibit leading zero characters in octal literals. This may allow a bypass of access control that is based on IP addresses. (validate_ipv4_address and validate_ipv46_address are unaffected with Python 3.9.5+..) .
[ { "commit_message": "[PATCH] [2.2.x] Fixed CVE-2021-33571 -- Prevented leading zeros in IPv4 addresses. validate_ipv4_address() was affected only on Python < 3.9.5, see [1]. URLValidator() uses a regular expressions and it was affected on all Python versions. [1] https://bugs.python.org/issue36384 django/core/v...
n/a
CVE-2023-0410
Cross-site Scripting (XSS) - Generic in builderio/qwik
Cross-site Scripting (XSS) - Generic in GitHub repository builderio/qwik prior to 0.1.0-beta5.
[ { "commit_message": "[PATCH] fix: cleanse ssr attribute name and class value (#2475) Co-Authored-By: OhB00 <43827372+ohb00@users.noreply.github.com> .../qwik/src/core/render/ssr/render-ssr.ts | 12 ++++++- .../src/core/render/ssr/render-ssr.unit.tsx | 31 +++++++++++++++++++ 2 files changed, 42 insertions(+)...
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-62797
CSRF in FluxCP account endpoints allows account takeover / state-changing actions
FluxCP is a web-based Control Panel for rAthena servers written in PHP. A critical Cross-Site Request Forgery (CSRF) vulnerability exists in the FluxCP-based website template used by multiple rAthena/Ragnarok servers. State-changing POST endpoints accept browser-initiated requests that are authorized solely by the session cookie without per-request anti-CSRF tokens or robust Origin/Referer validation. An attacker who can lure a logged-in user to an attacker-controlled page can cause that user to perform sensitive actions without their intent. This vulnerability is fixed with commit e3f130c.
[ { "commit_message": "[PATCH] Added cookie restrictions (#408) Bumped PHP minimum version to 7.3.0 This was required to have the new function signature available, which allows setting the samesite attribute natively PHP 7.3.0 was introduced in 2018 - 7 years ago - it is already out of support since 2021 - 4 year...
CWE-352: Cross-Site Request Forgery (CSRF)
GHSA-9jqr-5x45-pgw8
Powermail TYPO3 extension Broken Access Control in the OutputController
null
[ { "commit_message": "[PATCH] [SECURITY] Prevent information disclosure in OutputController Classes/Controller/OutputController.php | 69 ++++++------ Classes/Utility/FrontendUtility.php | 15 +++ Documentation/Changelog/Readme.md | 7 +- .../Changelog/UpgradeInstructions.md ...
null
GHSA-mv89-3mqj-vq9h
null
[ { "commit_message": "[PATCH] ITC-2318 V3 Remove web based terminal to get rid of unnecessary security vulnerabilities app/Config/auth_actions.php | 0 app/Config/menu.php | 0 app/Controller/CommandsController.php | 2 - app/Lib/SudoMessageInterface.php ...
null
GHSA-xpm8-98mx-h4c5
Unsafe deserialization in MLAlchemy
null
[ { "commit_message": "[PATCH] attempting to fix security flaw (issue #1) mlalchemy/parser.py | 2 +- tests/test_yaml_security.py | 21 +++++++++++++++++++++ 2 files changed, 22 insertions(+), 1 deletion(-) create mode 100644 tests/test_yaml_security.py", "patch_text_b64": "RnJvbSBiYzc5NTc1N2ZlYmRjY2U0...
null
GHSA-phm2-c5jj-q34c
null
[ { "commit_message": "[PATCH] Revert \"Revert \"os/linux/elf: avoid using ldd for listing dynamic dependencies\"\" Library/Homebrew/os/linux/elf.rb | 62 +++++++++++++++---- Library/Homebrew/os/linux/ld.rb | 74 +++++++++++++++++++++++ Library/Homebrew/test/os/linux/ld_spec.rb | 47 +++++++++++++...
null
GHSA-q2cv-94xm-qvg4
firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF)
null
[ { "commit_message": "[PATCH] Fix huntr.dev logout issue. resources/views/v1/auth/login.twig | 6 +++--- resources/views/v1/auth/passwords/email.twig | 4 ++-- resources/views/v1/auth/passwords/reset.twig | 2 +- resources/views/v1/auth/register.twig | 6 +++--- resources/views/v1/partials/m...
null
CVE-2018-25055
FarCry Solr Pro Plugin Search solrProSearch.cfc cross site scripting
A vulnerability was found in FarCry Solr Pro Plugin up to 1.5.x. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file packages/forms/solrProSearch.cfc of the component Search Handler. The manipulation of the argument suggestion leads to cross site scripting. The attack can be launched remotely. Upgrading to version 1.6.0 is able to address this issue. The name of the patch is b8f3d61511c9b02b781ec442bfb803cbff8e08d5. It is recommended to upgrade the affected component. The identifier VDB-216961 was assigned to this vulnerability.
[ { "commit_message": "[PATCH] fixes #78 escape suggestion to avoid xss packages/forms/solrProSearch.cfc | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBiOGYzZDYxNTExYzliMDJiNzgxZWM0NDJiZmI4MDNjYmZmOGUwOGQ1IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBTZWFuIENveW5lIDxzZWFuQG40MmR...
CWE-79 Cross Site Scripting
GHSA-h7qf-qmf3-85qg
Allure Report allows Improper XXE Restriction via DocumentBuilderFactory
null
[ { "commit_message": "[PATCH] fix xee (via #3029) .../parser/ClasspathEntityResolver.java | 100 ++++++++++++++++++ gradle/quality-configs/pmd/pmd.xml | 1 + .../allure/junitxml/JunitXmlPlugin.java | 3 + .../allure/junitxml/JunitXmlPluginTest.java | 37 +++++++ .../java/io/qameta/allur...
null
CVE-2022-26354
A flaw was found in the vhost-vsock device of QEMU. In case of error, an invalid element was not detached from the virtqueue before freeing its memory, leading to memory leakage and other unexpected results. Affected QEMU versions <= 6.2.0.
[ { "commit_message": "[PATCH] vhost-vsock: detach the virqueue element in case of error In vhost_vsock_common_send_transport_reset(), if an element popped from the virtqueue is invalid, we should call virtqueue_detach_element() to detach it from the virtqueue before freeing its memory. Fixes: fc0b9b0e1c (\"vhost...
CWE-772
CVE-2019-12984
A NULL pointer dereference vulnerability in the function nfc_genl_deactivate_target() in net/nfc/netlink.c in the Linux kernel before 5.1.13 can be triggered by a malicious user-mode program that omits certain NFC attributes, leading to denial of service.
[ { "commit_message": "[PATCH] nfc: Ensure presence of required attributes in the deactivate_target handler Check that the NFC_ATTR_TARGET_INDEX attributes (in addition to NFC_ATTR_DEVICE_INDEX) are provided by the netlink client prior to accessing them. This prevents potential unhandled NULL pointer dereference ...
n/a
PYSEC-2017-37
null
[ { "commit_message": "[PATCH] Do not allow IDs with null bytes in decoded payloads salt/crypt.py | 3 +++ salt/transport/tcp.py | 11 +++++++++++ salt/transport/zeromq.py | 11 +++++++++++ 3 files changed, 25 insertions(+)", "patch_text_b64": "RnJvbSA1ZjhiNWUxYTBmMjNmZTBmMmJlNWIzYzNlMDQxOTliNTdhN...
null
CVE-2014-5269
Plack::App::File in Plack before 1.0031 removes trailing slash characters from paths, which allows remote attackers to bypass the whitelist of generated files and obtain sensitive information via a crafted path, related to Plack::Middleware::Static.
[ { "commit_message": "<avarab@gmail.com> [PATCH] Plack::App::File: Fix a security issue by not pruning trailing slashes Before this Plack::App::File would prune trailing slashes via its split invocation. I.e. it would think this: $ perl -MData::Dumper -wle 'print Dumper [split /[\\\\\\/]/, shift]' a/file.txt $VA...
n/a
GHSA-ffwf-47x2-jpr8
Matrix-appservice-irc vulnerable to sql injection via roomIds argument
null
[ { "commit_message": "[PATCH] Prevent low-risk SQL injection from roomId values when entered into the config (#1619) * Prevent SQL injection from roomId values when checking room visibility * Add newsfile * Update newsfile * Update 1619.bugfix Co-authored-by: Will Hunt <will@half-shot.uk> changelog.d/1619.bugfix...
null
CVE-2018-17180
An issue was discovered in OpenEMR before 5.0.1 Patch 7. Directory Traversal exists via docid=../ to /portal/lib/download_template.php.
[ { "commit_message": "[PATCH] portal fixes (#1795) portal/index.php | 2 +- portal/lib/appsql.class.php | 2 +- portal/lib/download_template.php | 11 +++++++---- 3 files changed, 9 insertions(+), 6 deletions(-)", "patch_text_b64": "RnJvbSA0OTYzZmU0OTMyYTBhNGUxZTk4MjY0MjIyNjE3NGU5OTMxZDA5...
n/a
CVE-2025-47948
Cocotais Bot has builtin .echo command injection
Cocotais Bot is a QQ official robot framework based on qq-bot-sdk. Starting in version 1.5.0-test2-hotfix and prior to version 1.6.2, command echoing feature in the framework allows users to indirectly trigger privileged behavior by injecting special platform tags. Specifically, an unauthorized user can use the `/echo <qqbot-at-everyone />` command to cause the bot to send a message that mentions all members in the chat, bypassing any permission controls. This can lead to spam, disruption, or abuse of notification systems. Version 1.6.2 contains a patch for the issue.
[ { "commit_message": "[PATCH] =?UTF-8?q?=F0=9F=94=92=EF=B8=8F=20=E5=88=A0=E9=99=A4.echo?= =?UTF-8?q?=E5=86=85=E7=BD=AE=E5=91=BD=E4=BB=A4?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit src/builtins.ts | 11 ----------- 1 file changed, 11 deletions(-)", "patch_text_b...
CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
GHSA-r3v7-pc4g-7xp9
Oak Server has ReDoS in x-forwarded-proto and x-forwarded-for headers
null
[ { "commit_message": "[PATCH] fix: address ReDoS vulnerability in headers (#700) Co-authored-by: Cursor Agent <cursoragent@cursor.com> request.test.ts | 79 +++++++++++++++++++++++++++++++++++++++++++++++++ request.ts | 24 +++++++++++---- 2 files changed, 98 insertions(+), 5 deletions(-)", "patch_text_b6...
null