id
stringlengths
12
19
title
stringlengths
0
237
description
stringlengths
35
3.87k
patches
listlengths
1
22
cwe
stringlengths
2
440
GHSA-jj94-j4r3-5gr4
Subrion Cross-Site Scripting (XSS) vulnerability
null
[ { "commit_message": "[PATCH] Resolves #850 admin/templates/default/blocks.tpl | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSAwNjk1MGMyZjljNGFhNjllMzIzY2JkZDE0MWJlYWJiNmE5MjczY2E0IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBEYWl5cmJlayBBcnRlbG92IDw0dW5rdXJAZ21haWwuY29tPg...
null
CVE-2025-2884
Out-of-Bounds read vulnerability in TCG TPM2.0 reference implementation
TCG TPM2.0 Reference implementation's CryptHmacSign helper function is vulnerable to Out-of-Bounds read due to the lack of validation the signature scheme with the signature key's algorithm. See Errata Revision 1.83 and advisory TCGVRT0009 for TCG standard TPM2.0
[ { "commit_message": "[PATCH] tpm2: Fix potential out-of-bound access & abort due to HMAC signing issue Fix an HMAC signing issue that may causes an out-of-bounds access in a TPM2B that in turn was running into an assert() in libtpms causing an abort. The signing issue was due to an inconsistent pairing of the s...
CWE-125 Out-of-bounds Read
GHSA-9r8w-6x8c-6jr9
Django vulnerable to XSS on 500 pages
null
[ { "commit_message": "[PATCH] [1.10.x] Fixed CVE-2017-12794 -- Fixed XSS possibility in traceback section of technical 500 debug page. This is a security fix. django/views/debug.py | 20 +++++++++----------- docs/releases/1.10.8.txt | 9 +++++++++ tests/view_tests/tests/py3_test...
null
PYSEC-2023-132
null
[ { "commit_message": "[PATCH] fix GHSA-f54q-j679-p9hh: reflected-XSS in cookie-setters; it was possible to set cookie values which contained newlines, thus terminating the http header and bleeding into the body. We now disallow control-characters in queries, but still allow them in paths, as copyparty supports f...
null
GHSA-m9mq-p2f9-cfqv
Bleach URI Scheme Restriction Bypass
null
[ { "commit_message": "[PATCH 1/2] Fix url sanitizing Fixes a security issue where url sanitizing wouldn't work if there were character entities breaking up the scheme. This allowed javascript urls even when they were not explicitly allowed. bleach/sanitizer.py | 134 ++++++++++++++++++++++++++++++++++++++------ t...
null
GHSA-cvp9-xf77-46mc
null
[ { "commit_message": "[PATCH] netfilter: add back stackpointer size checks The rationale for removing the check is only correct for rulesets generated by ip(6)tables. In iptables, a jump can only occur to a user-defined chain, i.e. because we size the stack based on number of user-defined chains we cannot exceed...
null
PYSEC-2021-155
null
[ { "commit_message": "[PATCH] Fix `tf.raw_ops.GetSessionTensor` and `tf.raw_ops.DeleteSessionTensor` null pointer dereferences. PiperOrigin-RevId: 368294154 Change-Id: Ie10f07a0a9a1c2b685e08153d48a0ca4b93f9fc9 tensorflow/core/kernels/session_ops.cc | 14 ++++++++++---- 1 file changed, 10 insertions(+), 4 deletion...
null
CVE-2016-5356
wiretap/cosine.c in the CoSine file parser in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles sscanf unsigned-integer processing, which allows remote attackers to cause a denial of service (application crash) via a crafted file.
[ { "commit_message": "[PATCH] Fix packet length handling. Treat the packet length as unsigned - it shouldn't be negative in the file. If it is, that'll probably cause the sscanf to fail, so we'll report the file as bad. Check it against WTAP_MAX_PACKET_SIZE to make sure we don't try to allocate a huge amount of...
n/a
GHSA-mjrp-x8v8-f2mx
null
[ { "commit_message": "[PATCH] Added extra HTML filtering of dangerous content In particular, That around the casing of dangerous values within attributes. This uses some xpath translation to handle different casing in contains searching. app/Util/HtmlContentFilter.php | 19 +++++++++++++++---- tests/Entity/Page...
null
GHSA-v959-qxv6-6f8p
ZITADEL Vulnerable to Account Takeover via DOM-Based XSS in Zitadel V2 Login
null
[ { "commit_message": "[PATCH] fix(login): Centralize host header resolution and forward headers to APIs MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit This PR refactors the host resolution logic to establish a single source of truth for determining the instance and publ...
null
PYSEC-2020-134
null
[ { "commit_message": "[PATCH] [tflite]: Insert `nullptr` checks when obtaining tensors. As part of ongoing refactoring, `tflite::GetInput`, `tflite::GetOutput`, `tflite::GetTemporary` and `tflite::GetIntermediates` will return `nullptr` in some cases. Hence, we insert the `nullptr` checks on all usages. We also ...
null
GHSA-jq6g-4v5m-wm9r
Information Disclosure due to Out-of-scope Site Resolution
null
[ { "commit_message": "[PATCH] [SECURITY] Avoid out-of-scope page access for non-matching site This change disallows calling an URI with page-id query parameters that are not part of a particular site - for instance the following URL `https://example.org/?id=3000&L=0` has two aspects: * the site `example.org` has...
null
GHSA-v82v-rq72-phq9
Server side request forgery in @isomorphic-git/cors-proxy
null
[ { "commit_message": "[PATCH] fix(security): don't follow redirects (#10) azure-pipelines.yml | 2 +- bin.js | 0 middleware.js | 7 +++++++ 3 files changed, 8 insertions(+), 1 deletion(-) mode change 100644 => 100755 bin.js", "patch_text_b64": "RnJvbSAxYjFjOTFlNzFkOTQ2NTQ0ZDk3Y2NjN2NmMGFjNjJ...
null
PYSEC-2021-192
null
[ { "commit_message": "[PATCH] Fix FPE issue with `tf.raw_ops.FusedBatchNorm`. PiperOrigin-RevId: 370948185 Change-Id: If0c8e0320062ed6363e94ff5fe38e6a301f69ac2 tensorflow/core/kernels/fused_batch_norm_op.cc | 3 +++ 1 file changed, 3 insertions(+)", "patch_text_b64": "RnJvbSAxYTJhODcyMjlkMWQ2MWUyM2EzOTM3Mzc3N...
null
CVE-2025-49135
CVAT missing validation for in-progress backup upload names
CVAT is an open source interactive video and image annotation tool for computer vision. Versions 2.2.0 through 2.39.0 have no validation during the import process of a project or task backup to check that the filename specified in the query parameter refers to a TUS-uploaded file belonging to the same user. As a result, if an attacker with a CVAT account and a `user` role knows the filenames of other users' uploads, they could potentially access and steal data by creating projects or tasks using those files. This issue does not affect annotation or dataset TUS uploads, since in this case object-specific temporary directories are used. Users should upgrade to CVAT 2.40.0 or a later version to receive a patch. No known workarounds are available.
[ { "commit_message": "[PATCH] Merge commit from fork There was no validation during the import process of a project or task backup to check that the filename specified in the query parameter refers to a TUS-uploaded file belonging to the same user. As a result, if an attacker with a CVAT account and a user role ...
CWE-639: Authorization Bypass Through User-Controlled Key
GHSA-qc22-qwm9-j8rx
Remote Code Execution in npm-groovy-lint
null
[ { "commit_message": "[PATCH] Upgrade log4j (#195) * Upgrade log4j * [Mega-Linter] Apply linters fixes * Update CHANGELOG.md Co-authored-by: nvuillam <nvuillam@users.noreply.github.com> CHANGELOG.md | 4 + MANIFEST.txt | 2 +- lib/.groovylintrc-all.json ...
null
CVE-2021-3990
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) in star7th/showdoc
showdoc is vulnerable to Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
[ { "commit_message": "[PATCH] =?UTF-8?q?Enhanced=20LDAP=20user=20password=20/=20?= =?UTF-8?q?=E5=A2=9E=E5=BC=BAldap=E7=94=A8=E6=88=B7=E5=AF=86=E7=A0=81?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit .../Controller/AdminSettingController.class.php | 4 ++-- .../Applica...
CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
CVE-2021-31260
The MergeTrack function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command.
[ { "commit_message": "[PATCH] fixed #1736 src/isomedia/track.c | 10 +++++++--- 1 file changed, 7 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSBkZjhmZmZkODM5ZmU1YWU5YWNkODJkMjZmZDQ4MjgwYTM5NzQxMWQ5IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBqZWFubGYgPGplYW5sZkBncGFjLmlvPgpEYXRlOiBUaHUsIDggQXByIDIwM...
n/a
GHSA-hrpp-h998-j3pp
qs vulnerable to Prototype Pollution
null
[ { "commit_message": "[PATCH] [Fix] `parse`: ignore `__proto__` keys (#428) lib/parse.js | 2 +- test/parse.js | 60 +++++++++++++++++++++++++++++++++++++++++++++++++++ 2 files changed, 61 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA0MzEwNzQyZWZiZDhjMDNmNjQ5NWYwNzkwNmI0NTIxM2RhMGEzMmVjIE1vbiBTZX...
null
PYSEC-2023-14
null
[ { "commit_message": "[PATCH] Fix lack of escaping (and so XSS vuln.) in select2 calls The invocation of Jquery select2 to provide searchable dropdowns didn't sanitise data coming fom lookup, with the result that any HTML markup it contained, including <script>...</script>, was interpreted. The documentation is ...
null
GHSA-mq4w-5hp5-6g52
null
[ { "commit_message": "[PATCH] fix: add filename sanitization utility and integrate it into multer storage configuration api/server/routes/files/multer.js | 3 +- api/server/utils/handleText.js | 35 ++++++++++++++++++++ api/server/utils/handleText.spec.js | 50 ++++++++++++++++++++++++++++- 3 files changed,...
null
CVE-2022-0274
Cross-site Scripting (XSS) - Stored in orchardcms/orchardcore
Cross-site Scripting (XSS) - Stored in NuGet OrchardCore.Application.Cms.Targets prior to 1.2.2.
[ { "commit_message": "[PATCH] Fix localization and sanitization usages (#11034) .../Drivers/LinkFieldDisplayDriver.cs | 22 +++++-- .../AuditTrailContentController.cs | 5 +- .../Drivers/HtmlMenuItemPartDisplayDriver.cs | 50 +++++++++++++++- .../Drivers/LinkMenuItemPartDisplayDriver.cs | 57 +...
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
GHSA-2886-fxgx-g9vm
null
[ { "commit_message": "[PATCH] Improve array bounds checks in CipherState implementations Thanks to Pietro Oliva for identifying these issues. .gitignore | 1 + .../protocol/AESGCMFallbackCipherState.java | 20 +++++++++---------- .../protocol/AESGCMOnCtrCipherState.java |...
null
CVE-2020-27507
The Kamailio SIP before 5.5.0 server mishandles INVITE requests with duplicated fields and overlength tag, leading to a buffer overflow that crashes the server or possibly have unspecified other impact.
[ { "commit_message": "[PATCH] tm: do not add duplicate headers in local requests src/modules/tm/t_msgbuilder.c | 31 +++++++++++++++++++++++++++++++ 1 file changed, 31 insertions(+)", "patch_text_b64": "RnJvbSBhZGEzNzAxZDIyYjFmZDU3OWYwNmI0ZjU0ZmE2OTVmYTk4OGU2ODVmIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBEYW5...
n/a
CVE-2023-1789
Improper Input Validation in firefly-iii/firefly-iii
Improper Input Validation in GitHub repository firefly-iii/firefly-iii prior to 6.0.0.
[ { "commit_message": "[PATCH] Catch escape in currencies app/Factory/TransactionCurrencyFactory.php | 7 ++++++- app/Services/Internal/Update/CurrencyUpdateService.php | 10 +++++----- 2 files changed, 11 insertions(+), 6 deletions(-)", "patch_text_b64": "RnJvbSAwNjY3Y2NmYzk4OWM0NDI2YTlhMzdjODlkNG...
CWE-20 Improper Input Validation
GHSA-p3pf-mff8-3h47
Gorush uses deprecated TLS versions
null
[ { "commit_message": "[PATCH] chore(httpd): enhance security and testing protocols (#793) - Remove nolint comment - Update minimum TLS version from 1.0 to 1.2 fix #792 Signed-off-by: Bo-Yi Wu <appleboy.tw@gmail.com> router/server_normal.go | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-)", "patch_text_...
null
GHSA-97gv-3p2c-xw7j
Denial of Service and Content Injection in i18n-node-angular
null
[ { "commit_message": "[PATCH] [FIX] Only register translate route during development i18n-node-routes.js | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA4Nzc3MjBkMmQ5YmI5MGRjODIzMzcwNmU4MWZmYTAzZjk5ZmM5ZGM4IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBPbGl2ZXIgU2FsemJ1cmcgPG...
null
GHSA-mxvc-vmg9-j3pv
null
[ { "commit_message": "[PATCH] Input: powermate - fix oops with malicious USB descriptors The powermate driver expects at least one valid USB endpoint in its probe function. If given malicious descriptors that specify 0 for the number of endpoints, it will crash. Validate the number of endpoints on the interfac...
null
GHSA-26qj-cr27-r5c4
Octopoller gem published with world-writable files
null
[ { "commit_message": "[PATCH 1/7] Adds details on how to run a manual file integrity check RELEASE.md | 45 ++++++++++++++++++++++++++++++++++++++------- 1 file changed, 38 insertions(+), 7 deletions(-)", "patch_text_b64": "RnJvbSBkZjI2YjhhMDk1NzUzZDQxNmQxZGM4M2I0NzM3OWVjMGZjZTMzODZlIE1vbiBTZXAgMTcgMDA6MDA6MD...
null
GHSA-9p47-w5xp-f4xr
windows-build-tools downloads Resources over HTTP
null
[ { "commit_message": "[PATCH] :wrench: Use HTTPS - Thanks to @grander src/constants.js | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA5ODM1ZDMzZTY4ZjJjYjVlNGQxNDhlOTU0YmIzZWQwMjIxZDk4ZTkwIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBGZWxpeCBSaWVzZWJlcmcgPGZlbGl4QGZlbGl4cmllc2Vi...
null
CVE-2020-24710
Gophish before 0.11.0 allows SSRF attacks.
[ { "commit_message": "[PATCH] Implement SSRF Mitigations (#1940) Initial commit of SSRF mitigations. This fixes #1908 by creating a *net.Dialer which restricts outbound connections to only allowed IP ranges. This implementation is based on the blog post at https://www.agwa.name/blog/post/preventing_server_side_r...
n/a
CVE-2021-4005
Cross-Site Request Forgery (CSRF) in firefly-iii/firefly-iii
firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF)
[ { "commit_message": "[PATCH] Fix. resources/views/v1/profile/index.twig | 9 +++++---- 1 file changed, 5 insertions(+), 4 deletions(-)", "patch_text_b64": "RnJvbSAwM2ExNjAxYmYzNDMxODFkZjlmNDA1ZGQyMTA5YWVjNDgzY2I3MDUzIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBKYW1lcyBDb2xlIDxqYW1lc0BmaXJlZmx5LWlpaS5vcmc+CkRhd...
CWE-352 Cross-Site Request Forgery (CSRF)
GHSA-qr8f-cjw7-838m
Mattermost Jira Plugin does not properly check security levels
null
[ { "commit_message": "[PATCH] [MM-44185] Add conditions for subscription validation (#858) * ensure user has access to selected sec level. disallow \"exclude\" clauses for sec level * if a subscription has no configured sec level, assume the issue should have a blank sec level * add test data file * fix ci withL...
null
GHSA-6623-c6mr-6737
Apache Zeppelin: Denial of service with invalid notebook name
null
[ { "commit_message": "[PATCH] [HOTFIX] Validate note name (#4632) * [HOTFIX] Validate note name * [HOTFIX] Validate note name * [HOTFIX] Validate note name * Update zeppelin-server/src/test/java/org/apache/zeppelin/service/NotebookServiceTest.java Co-authored-by: Philipp Dallig <philipp.dallig@gmail.com> * Updat...
null
GHSA-9wxm-f297-p8w3
null
[ { "commit_message": "[PATCH] fix: bug fix (#6296) admin.php | 22 +++++++++++----------- 1 file changed, 11 insertions(+), 11 deletions(-)", "patch_text_b64": "RnJvbSA4ZDJkNjAxYWM0MGFjYTc1YmNkMmMzY2YxOTNmNTljOGU1NmQ4NDI1IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBCcmFkeSBNaWxsZXIgPGJyYWR5LmcubWlsbGVyQGdtYWlsL...
null
GHSA-75mx-chcf-2q32
TYPO3 Cross-Site Scripting vulnerability in typolinks
null
[ { "commit_message": "[PATCH] [SECURITY] Link fields accept inline javascript code JavaScript can be submitted for every link field and will be rendered in the frontend passed through typolink. To circumvent that, the URI scheme and prefix \"javascript:\" will be disallowed. The extension \"javascript_handler\" ...
null
GHSA-52g2-334m-q3qr
null
[ { "commit_message": "[PATCH] Fix #10464 - oobread crash in mdmp (#10683) libr/bin/format/mdmp/mdmp.c | 15 ++++++++------- 1 file changed, 8 insertions(+), 7 deletions(-)", "patch_text_b64": "RnJvbSBlYjdkZWIyODFkZjU0NzcxZmI4ZWNmNTg5MGRjMzI1YTdkMjJkM2UyIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiByYWRhcmUgPHBhb...
null
CVE-2021-21308
Improper session management for soft logout
PrestaShop is a fully scalable open source e-commerce solution. In PrestaShop before version 1.7.2 the soft logout system is not complete and an attacker is able to foreign request and executes customer commands. The problem is fixed in 1.7.7.2
[ { "commit_message": "[PATCH] Make sure session is cleared using soft logout classes/Cookie.php | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA3NTk2NDRjZjljOWQ4NDZiODI0NjgzYTA1ZjM0NTJmN2JmYWNiODk0IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBQaWVycmUgUkFNQkFVRCA8cGllcnJlLnJhb...
CWE-287: Improper Authentication
PYSEC-2021-160
null
[ { "commit_message": "[PATCH] Fix overflow CHECK issue with `tf.raw_ops.AddManySparseToTensorsMap`. PiperOrigin-RevId: 369492969 Change-Id: I1d70d6c0c92e3d7a25bc3b3aa2a0c0ac9688bf81 .../core/kernels/sparse_tensors_map_ops.cc | 26 ++++++++++++++----- 1 file changed, 19 insertions(+), 7 deletions(-)", "patc...
null
GHSA-h8h6-7752-g28c
Manifest Uses a One-Way Hash without a Salt
null
[ { "commit_message": "[PATCH 1/4] fix(login): error flash message not showing Somehow the flash message is not appearing in the login page. I replaced it with an alert() for the moment. Let's see that later .../auth/views/login/login.component.html | 16 ++++++++-------- .../modules/auth/views/login/login....
null
GHSA-4x4m-3c2p-qppc
Kubernetes Nodes can delete themselves by adding an OwnerReference
null
[ { "commit_message": "[PATCH] do not allow the node to update it's owner reference .../admission/noderestriction/admission.go | 5 +++ .../noderestriction/admission_test.go | 36 +++++++++++++++---- 2 files changed, 35 insertions(+), 6 deletions(-)", "patch_text_b64": "RnJvbSAyZTZlYWExZmJlZGQ3NzZlY...
null
GHSA-6cpj-3r2r-v2m4
null
[ { "commit_message": "[PATCH] codegen.c: stack position may be wrong on assignments. When `[]=` access includes keyword arguments. mrbgems/mruby-compiler/core/codegen.c | 10 ++++++++-- 1 file changed, 8 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSAwODQ5YTI4ODVmODFjZmQ4MjEzNDk5MmMwNmRmM2NjZDU5MDU...
null
PYSEC-2020-311
null
[ { "commit_message": "[PATCH] Fix multiple vulnerabilities in `tf.raw_ops.*CountSparseOutput`. Also add tests for these API points, both for the happy paths and for the vulnerable ones. PiperOrigin-RevId: 332563222 Change-Id: Ib3b52116a83a134c2e742a7c66e5e956db8fba05 tensorflow/core/kernels/count_ops.cc | ...
null
GHSA-q68f-qqmm-qvj9
null
[ { "commit_message": "[PATCH] Canonicalise input in CMS_verify. If content is detached and not binary mode translate the input to CRLF format. Before this change the input was verified verbatim which lead to a discrepancy between sign and verify. crypto/cms/cms_smime.c | 94 ++++++++++++++++++++++++++++++++------...
null
CVE-2021-21288
Server-side request forgery in CarrierWave
CarrierWave is an open-source RubyGem which provides a simple and flexible way to upload files from Ruby applications. In CarrierWave before versions 1.3.2 and 2.1.1 the download feature has an SSRF vulnerability, allowing attacks to provide DNS entries or IP addresses that are intended for internal use and gather information about the Intranet infrastructure of the platform. This is fixed in versions 1.3.2 and 2.1.1.
[ { "commit_message": "[PATCH] Fix SSRF vulnerability in the remote file download feature Closes #2509, Refs. https://github.com/carrierwaveuploader/carrierwave/security/advisories/GHSA-fwcm-636p-68r5 carrierwave.gemspec | 1 + features/step_definitions/download_steps.rb | 2 +- lib/carrie...
CWE-918: Server-Side Request Forgery (SSRF)
GHSA-jhh2-vhmg-x3cq
null
[ { "commit_message": "[PATCH] Release 3.17.14+190902 application/config/version.php | 4 ++-- docs/release_notes.txt | 40 ++++++++++++++++++++++++++++++++++ 2 files changed, 42 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSA1ODcwZmQxMDM3MDU4YmM0ZTQzY2NjZjg5M2I1NzZjNzIyOTMzNzFlIE1vbiBTZXAgM...
null
CVE-2021-43838
Regular Expression Denial of Service (ReDoS) in jsx-slack
jsx-slack is a library for building JSON objects for Slack Block Kit surfaces from JSX. In versions prior to 4.5.1 users are vulnerable to a regular expression denial-of-service (ReDoS) attack. If attacker can put a lot of JSX elements into `<blockquote>` tag, an internal regular expression for escaping characters may consume an excessive amount of computing resources. jsx-slack v4.5.1 has patched to a regex for escaping blockquote characters. Users are advised to upgrade as soon as possible.
[ { "commit_message": "[PATCH 1/3] Add performance test for blockquote tag rendering test/mrkdwn.tsx | 15 +++++++++++++++ 1 file changed, 15 insertions(+)", "patch_text_b64": "RnJvbSA5ZWIzYWE3ZGJjZTFlNGFkODU4MWUzM2U2MTM5ZmU1ZjkxMjU1OTBmIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBZdWtpIEhhdHRvcmkgPHl1a2loYXR0b3...
CWE-400: Uncontrolled Resource Consumption
CVE-2022-4397
morontt zend-blog-number-2 Comment Comment.php cross-site request forgery
A vulnerability was found in morontt zend-blog-number-2. It has been classified as problematic. Affected is an unknown function of the file application/forms/Comment.php of the component Comment Handler. The manipulation leads to cross-site request forgery. It is possible to launch the attack remotely. The name of the patch is 36b2d4abe20a6245e4f8df7a4b14e130b24d429d. It is recommended to apply a patch to fix this issue. VDB-215250 is the identifier assigned to this vulnerability.
[ { "commit_message": "[PATCH] Add CSRF-token for comments application/controllers/IndexController.php | 31 ++++++++++++++++++- application/forms/Comment.php | 4 +++ .../views/scripts/index/formcomment.phtml | 1 + 3 files changed, 35 insertions(+), 1 deletion(-)", "patch_text_b64": "Rn...
CWE-863 Incorrect Authorization -> CWE-862 Missing Authorization -> CWE-352 Cross-Site Request Forgery
CVE-2025-27417
WeGIA Contains a Stored Cross-Site Scripting (XSS) in 'adicionar_status_atendido.php' via the 'status' parameter
WeGIA is an open source Web Manager for Institutions with a focus on Portuguese language users. A Stored Cross-Site Scripting (XSS) vulnerability was identified in the adicionar_status_atendido.php endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the status parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk. This vulnerability is fixed in 3.2.16.
[ { "commit_message": "[PATCH] =?UTF-8?q?Resolu=C3=A7=C3=A3o=20XSS=20[Security=20https:/?= =?UTF-8?q?/github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-j3p8?= =?UTF-8?q?-xww6-wvqh]?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit dao/adicionar_status_atendido.php...
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
GHSA-wj44-9vcg-wjq7
Gogs allows deletion of internal files which leads to remote command execution
null
[ { "commit_message": "[PATCH] repo: prevent preview and delete files in `.git` directories (#7870) ## Describe the pull request Fixes https://github.com/gogs/gogs/security/advisories/GHSA-ccqv-43vm-4f3w internal/database/repo_editor.go | 10 ++++++++++ 1 file changed, 10 insertions(+)", "patch_text_b64": "RnJ...
null
GHSA-r773-pmw3-f4mr
Open Redirect in koa-remove-trailing-slashes
null
[ { "commit_message": "[PATCH] fix: only redirect for current origin index.js | 8 ++++++-- test/index.js | 31 +++++++++++++++++++++++++++++++ 2 files changed, 37 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSBlN2NlNDAwMGU5ZmU0ZDk1NzMzMmRmMTA1NjY0MGEyMmViZWEyOGVlIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjA...
null
CVE-2022-0602
Cross-site Scripting (XSS) - DOM in tastyigniter/tastyigniter
Cross-site Scripting (XSS) - DOM in GitHub repository tastyigniter/tastyigniter prior to 3.3.0.
[ { "commit_message": "[PATCH] Minor fixes Signed-off-by: Sam Poyigi <6567634+sampoyigi@users.noreply.github.com> app/admin/formwidgets/ScheduleEditor.php | 17 ++++++++++++----- .../scheduleeditor/schedules.blade.php | 10 +++++----- .../formwidgets/components/component.blade.php | 2 +- .../model...
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
GHSA-6wv3-7rx8-2362
null
[ { "commit_message": "[PATCH] security: SQL Injection This mitigates a possible SQL injection vulnerability reported by Bittylicious. include/class.staff.php | 8 ++++---- include/class.user.php | 8 ++++---- include/class.validator.php | 9 ++++++++- pwreset.php | 4 +++- scp/pwreset.php ...
null
GHSA-9qfj-r558-84rj
null
[ { "commit_message": "[PATCH] tiffcrop: Amend rotateImage() not to toggle the input (main) image width and length parameters when only cropped image sections are rotated. Remove buffptr from region structure because never used. Closes #492 #493 #494 #495 #499 #518 #519 tools/tiffcrop.c | 59 +++++++++++++++++++++...
null
GHSA-5pg2-qg87-vmj7
Cross-site Scripting in microweber
null
[ { "commit_message": "[PATCH] update src/MicroweberPackages/App/functions/plupload.php | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA5ZWJiYjRkZDM1ZGE3NDAyNWFiNjk2NWY3MjI4MjlhN2Y4Zjg2NTY2IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBQZXRlciBJdmFub3YgPHBldGVyQG1pY3Jvd2ViZXIu...
null
CVE-2017-14337
When MISP before 2.4.80 is configured with X.509 certificate authentication (CertAuth) in conjunction with a non-MISP external user management ReST API, if an external user provides X.509 certificate authentication and this API returns an empty value, the unauthenticated user can be granted access as an arbitrary user.
[ { "commit_message": "[PATCH] fix: Fix to certauth pains .../Component/Auth/CertificateAuthenticate.php | 12 +++++++----- 1 file changed, 7 insertions(+), 5 deletions(-)", "patch_text_b64": "RnJvbSBiZTExMWE0NzAyMDRhOTc0YzUwNjgyMDU0YzljN2Q0Yjk0Mzk2ZWQ5IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBpZ2xvY3Nr...
n/a
GHSA-6hwh-rqwf-cxxr
Improperly Controlled Modification of Dynamically-Determined Object Attributes in vega-util
null
[ { "commit_message": "[PATCH] Fix prototype pollution in mergeConfig. packages/vega-util/src/mergeConfig.js | 8 ++++++-- packages/vega-util/test/mergeConfig-test.js | 12 ++++++++++++ 2 files changed, 18 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSA4ZjMzYTBiNTE3MGQ3ZGU0ZjEyZmMyNDhlYzA5MDEy...
null
CVE-2016-5114
sapi/fpm/fpm/fpm_log.c in PHP before 5.5.31, 5.6.x before 5.6.17, and 7.x before 7.0.2 misinterprets the semantics of the snprintf return value, which allows attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read and buffer overflow) via a long string, as demonstrated by a long URI in a configuration with custom REQUEST_URI logging.
[ { "commit_message": "[PATCH] Fixed bug #70755: fpm_log.c memory leak and buffer overflow sapi/fpm/fpm/fpm_log.c | 5 +++++ 1 file changed, 5 insertions(+)", "patch_text_b64": "RnJvbSAyNzIxYTAxNDg2NDllMDdlZDc0NDY4ZjA5N2EyODg5OTc0MWViNThmIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBTdGFuaXNsYXYgTWFseXNoZXYgPHN0Y...
n/a
CVE-2015-10088
ayttm proxy.c http_connect format string
A vulnerability, which was classified as critical, was found in ayttm up to 0.5.0.89. This affects the function http_connect in the library libproxy/proxy.c. The manipulation leads to format string. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The patch is named 40e04680018614a7d2b68566b261b061a0597046. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-222267.
[ { "commit_message": "[PATCH] Fix format string vulnerability Reported by Kapil Anand on ayttm-users: https://sourceforge.net/p/ayttm/mailman/message/34397158/ This patch does the following two things: 1. Makes sure debug_print is only used in DEBUG mode and not in non-DEBUG mode 2. Since debug_print is basicall...
CWE-134 Format String
GHSA-353m-jh2m-72v4
Code injection in stanford-parser
null
[ { "commit_message": "[PATCH] Remove the shell usage of bz2, which could be a security problem if someone else hijacks the system's bz2 installation. Addresses https://nvd.nist.gov/vuln/detail/CVE-2023-39020 .../nlp/ie/crf/CRFFeatureExporter.java | 3 +- .../nlp/io/BZip2PipedOutputStream.java | 68...
null
CVE-2018-20174
rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in the function ui_clip_handle_data() that results in an information leak.
[ { "commit_message": "[PATCH] Malicious RDP server security fixes This commit includes fixes for a set of 21 vulnerabilities in rdesktop when a malicious RDP server is used. All vulnerabilities was identified and reported by Eyal Itkin. * Add rdp_protocol_error function that is used in several fixes * Refactor o...
n/a
GHSA-r367-m5qq-xxfg
null
[ { "commit_message": "[PATCH] caif: Fix missing msg_namelen update in caif_seqpkt_recvmsg() The current code does not fill the msg_name member in case it is set. It also does not set the msg_namelen member to 0 and therefore makes net/socket.c leak the local, uninitialized sockaddr_storage variable to userland -...
null
CVE-2021-23431
Cross-site Request Forgery (CSRF)
The package joplin before 2.3.2 are vulnerable to Cross-site Request Forgery (CSRF) due to missing CSRF checks in various forms.
[ { "commit_message": "[PATCH] Server: Added form tokens to prevent CSRF attacks packages/server/src/app.ts | 14 ++++++- packages/server/src/routes/index/upgrade.ts | 4 +- packages/server/src/routes/index/users.ts | 2 + packages/server/src/utils/csrf.ts | 37 ++++++++++++++++...
Cross-site Request Forgery (CSRF)
GHSA-v7wg-cpwc-24m4
pgjdbc Does Not Check Class Instantiation when providing Plugin Classes
null
[ { "commit_message": "[PATCH] Merge pull request from GHSA-v7wg-cpwc-24m4 This ensures arbitrary classes can't be passed instead of AuthenticationPlugin, SocketFactory, SSLSocketFactory, CallbackHandler, HostnameVerifier .../postgresql/core/SocketFactoryFactory.java | 4 +- .../core/v3/AuthenticationPluginManag...
null
CVE-2020-8944
Unchecked buffer overrun in ecall_restore
An arbitrary memory write vulnerability in Asylo versions up to 0.6.0 allows an untrusted attacker to make a call to ecall_restore using the attribute output which fails to check the range of a pointer. An attacker can use this pointer to write to arbitrary memory addresses including those within the secure enclave We recommend upgrading past commit 382da2b8b09cbf928668a2445efb778f76bd9c8a
[ { "commit_message": "[PATCH] Check output of ecall_restore is outside enclave PiperOrigin-RevId: 334265380 Change-Id: Ifbaead6bce56f01b2a4d69f53ca508d0138f6f61 asylo/platform/primitives/sgx/ecalls.cc | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAzODJkYTJiOGIwOWNiZjkyODY...
CWE-120 Buffer Overflow
CVE-2014-125097
BestWebSoft Facebook Like Button facebook-button-plugin.php fcbkbttn_settings_page cross site scripting
A vulnerability, which was classified as problematic, was found in BestWebSoft Facebook Like Button up to 2.33. Affected is the function fcbkbttn_settings_page of the file facebook-button-plugin.php. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 2.34 is able to address this issue. The patch is identified as b766da8fa100779409a953f0e46c2a2448cbe99c. It is recommended to upgrade the affected component. VDB-225354 is the identifier assigned to this vulnerability.
[ { "commit_message": "[PATCH] V2.34 - Security Exploit was fixed. git-svn-id: https://plugins.svn.wordpress.org/facebook-button-plugin/trunk@965089 b8457f37-d9ea-0310-8a92-e5e31aec5664 bws_menu/bws_menu.php | 47 ++++++++++-------- facebook-button-plugin.php | 34 +++++...
CWE-79 Cross Site Scripting
GHSA-6qq4-4xr4-mpp6
null
[ { "commit_message": "[PATCH] Update Modules/Lightbox/Render/Effects1.php | 2 +- Modules/Lightbox/Render/Effects2.php | 24 ++--- Page/Public_Render.php | 139 ++++++++++----------------- 3 files changed, 62 insertions(+), 103 deletions(-)", "patch_text_b64": "RnJvbSA0YmE3ODRlMWEyYTBjZjAyZThiO...
null
GHSA-3w69-j4hp-rvh4
null
[ { "commit_message": "[PATCH] Fix infinite loop in AP crawl server/core/lib/activitypub/crawl.ts | 11 ++++------- 1 file changed, 4 insertions(+), 7 deletions(-)", "patch_text_b64": "RnJvbSA3NjIyNmQ4NTY4NTIyMGRiMTQ5NTAyNTMwMGVjYTc4NGQwMzM2ZjdkIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBDaG9jb2Jvenp6IDxtZUBmbG...
null
CVE-2014-125033
rails-cv-app uploaded_files_controller.rb path traversal
A vulnerability was found in rails-cv-app. It has been rated as problematic. Affected by this issue is some unknown functionality of the file app/controllers/uploaded_files_controller.rb. The manipulation with the input ../../../etc/passwd leads to path traversal: '../filedir'. The exploit has been disclosed to the public and may be used. The patch is identified as 0d20362af0a5f8a126f67c77833868908484a863. It is recommended to apply a patch to fix this issue. VDB-217178 is the identifier assigned to this vulnerability.
[ { "commit_message": "[PATCH] HOTFIX : Another vulnerability picked up by Brakeman - Potential Path Traversal attack (tested working !) I could potentially explore the whole filesystem with root access (Ex: filename: '../../../etc/passwd') - Added (empty) specs to detect it app/controllers/uploaded_files_control...
CWE-24 Path Traversal: '../filedir'
GHSA-2fr7-cc7p-p45q
Data leak of password hash through change requests
null
[ { "commit_message": "[PATCH] CRAPP-302: Edit button is not displayed for guest user * Change the way to deal with change request edition right .../ChangeRequestRightsManager.java | 29 +++++ .../checkstyle/checkstyle-suppressions.xml | 1 + .../DefaultChangeRequestRightsManager.java | 73 +++++...
null
CVE-2013-2128
The tcp_read_sock function in net/ipv4/tcp.c in the Linux kernel before 2.6.34 does not properly manage skb consumption, which allows local users to cause a denial of service (system crash) via a crafted splice system call for a TCP socket.
[ { "commit_message": "[PATCH] net: Fix oops from tcp_collapse() when using splice() tcp_read_sock() can have a eat skbs without immediately advancing copied_seq. This can cause a panic in tcp_collapse() if it is called as a result of the recv_actor dropping the socket lock. A userspace program that splices data ...
n/a
GHSA-wjqw-p6cv-p8gj
null
[ { "commit_message": "[PATCH] missed one (yes yes this can all be squashed) Signed-off-by: Adam Warner <me@adamwarner.co.uk> scripts/pi-hole/js/groups-clients.js | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA4ZjZlMTM2NWI2ZGVjMGFlMWFhMGIwYjE1YjEwMmM5MTMzZjM0N2U1IE1vbiBTZXAgM...
null
CVE-2025-55303
Unauthorized third-party images in Astro’s _image endpoint
Astro is a web framework for content-driven websites. In versions of astro before 5.13.2 and 4.16.18, the image optimization endpoint in projects deployed with on-demand rendering allows images from unauthorized third-party domains to be served. On-demand rendered sites built with Astro include an /_image endpoint which returns optimized versions of images. A bug in impacted versions of astro allows an attacker to bypass the third-party domain restrictions by using a protocol-relative URL as the image source, e.g. /_image?href=//example.com/image.png. This vulnerability is fixed in 5.13.2 and 4.16.18.
[ { "commit_message": "[PATCH] Merge commit from fork * fix(assets): remote paths improvement * fix test * Update .changeset/fresh-gifts-take.md Co-authored-by: Chris Swithinbank <swithinbank@gmail.com> * added more tests * use assert.equal instead Co-authored-by: Chris Swithinbank <swithinbank@gmail.com> .change...
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2018-14679
An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. There is an off-by-one error in the CHM PMGI/PMGL chunk number validity checks, which could lead to denial of service (uninitialized data dereference and application crash).
[ { "commit_message": "[PATCH] =?UTF-8?q?Fix=20off-by-one=20bounds=20check=20on=20CHM=20?= =?UTF-8?q?PMGI/PMGL=20chunk=20numbers=20and=20reject=20empty=20filenames.?= =?UTF-8?q?=20Thanks=20to=20Hanno=20B=C3=B6ck=20for=20reporting?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encodin...
n/a
CVE-2023-28098
OpenSIPS has vulnerability in the Digest Authentication Parser
OpenSIPS is a Session Initiation Protocol (SIP) server implementation. Prior to versions 3.1.7 and 3.2.4, a specially crafted Authorization header causes OpenSIPS to crash or behave in an unexpected way due to a bug in the function `parse_param_name()` . This issue was discovered while performing coverage guided fuzzing of the function parse_msg. The AddressSanitizer identified that the issue occurred in the function `q_memchr()` which is being called by the function `parse_param_name()`. This issue may cause erratic program behaviour or a server crash. It affects configurations containing functions that make use of the affected code, such as the function `www_authorize()` . Versions 3.1.7 and 3.2.4 contain a fix.
[ { "commit_message": "[PATCH] parse_param_name(): Improve param parsing macros Issue discovered during OpenSIPS Security Audit 2021, by Alfred Farrugia & Sandro Gauci (Enable Security) https://github.com/OpenSIPS/opensips/security/advisories/GHSA-jrqg-vppj-hr2h parser/digest/param_parser.c | 21 ++++++++++++-----...
CWE-20: Improper Input Validation
CVE-2018-10307
error.php in ILIAS 5.2.x through 5.3.x before 5.3.4 allows XSS via the text of a PDO exception.
[ { "commit_message": "[PATCH] Error Handling: PDO exception handling (cherry picked from commit 65da344) error.php | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSBjYTk4MmU1OWQwYjc2YzAzNzRjOWE3ZmQxYWNmMjY4NWNhNTdjZjQxIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBtamFuc2VuIDxta...
n/a
CVE-2017-13002
The AODV parser in tcpdump before 4.9.2 has a buffer over-read in print-aodv.c:aodv_extension().
[ { "commit_message": "[PATCH] CVE-2017-13002/AODV: Add some missing bounds checks. In aodv_extension() do a bounds check on the extension header before we look at it. This fixes a buffer over-read discovered by Kamil Frankowicz. Add a test using the capture file supplied by the reporter(s). While we're at it, ad...
n/a
CVE-2017-8825
A null dereference vulnerability has been found in the MIME handling component of LibEtPan before 1.8, as used in MailCore and MailCore 2. A crash can occur in low-level/imf/mailimf.c during a failed parse of a Cc header containing multiple e-mail addresses.
[ { "commit_message": "[PATCH] Fixed crash #274 src/low-level/imf/mailimf.c | 12 ++++++++++++ 1 file changed, 12 insertions(+)", "patch_text_b64": "RnJvbSAxZmU4ZmJjMDMyY2NkYTFkYjlhZjY2ZDkzMDE2YjQ5YzE2YzFmMjJkIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBWaWV0IEhvYSBEaW5oIDxkdmhAZmIuY29tPgpEYXRlOiBTdW4sIDcgTWF5ID...
n/a
CVE-2024-21502
Versions of the package fastecdsa before 2.3.2 are vulnerable to Use of Uninitialized Variable on the stack, via the curvemath_mul function in src/curveMath.c, due to being used and interpreted as user-defined type. Depending on the variable's actual value it could be arbitrary free(), arbitrary realloc(), null pointer dereference and other. Since the stack can be controlled by the attacker, the vulnerability could be used to corrupt allocator structure, leading to possible heap exploitation. The attacker could cause denial of service by exploiting this vulnerability.
[ { "commit_message": "[PATCH] fix memory corruption issue see https://gist.github.com/keltecc/49da037072276f21b005a8337c15db26 for details on the issue verified by running proof of concept against fix - > python poc.py 3.11.0 (main, Nov 24 2022, 13:13:19) [Clang 13.1.6 (clang-1316.0.21.2.5)] X: 0x0 Y: 0x0 (On cu...
Use of Uninitialized Variable
GHSA-92pg-8g57-hqpx
Support bundles can include user session IDs in Jenkins Support Core Plugin
null
[ { "commit_message": "[PATCH] SECURITY-2150 .../java/com/cloudbees/jenkins/support/impl/AboutUser.java | 3 --- 1 file changed, 3 deletions(-)", "patch_text_b64": "RnJvbSA5YWY5ZWZhZTZlOWVkNDA4Y2E4OWZmOWI1ZjFiN2E3NGRhMGExMzFmIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBSYW1vbiBMZW9uIDxtYW51ZWxyYW1vbmxlb25qaW...
null
GHSA-jq2c-m8gg-mqcm
Apache Jena allows users with administrator access to create databases files outside the files area of the Fuseki server
null
[ { "commit_message": "[PATCH] GH-3288: Update jena-fuseki-webapp .../jena/fuseki/mgt/ActionDatasets.java | 510 ++++++++----- .../jena/fuseki/webapp/FusekiWebapp.java | 50 +- .../apache/jena/fuseki/TS_FusekiWebapp.java | 2 + .../apache/jena/fuseki/TestWebappAdmin.java | 381 +--------- .../TestWe...
null
GHSA-vm6r-j788-hjh5
Contao affected by remote command execution through file upload
null
[ { "commit_message": "[PATCH] Merge commit from fork core-bundle/contao/classes/FileUpload.php | 3 ++- core-bundle/contao/dca/tl_files.php | 3 ++- core-bundle/contao/drivers/DC_Folder.php | 10 +++++++++- 3 files changed, 13 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSA5NDQ1ZDUwOWYxMmE3Z...
null
GHSA-5r95-3f2r-9v8g
null
[ { "commit_message": "[PATCH] vfio/pci: Fix integer overflows, bitmask check The VFIO_DEVICE_SET_IRQS ioctl did not sufficiently sanitize user-supplied integers, potentially allowing memory corruption. This patch adds appropriate integer overflow checks, checks the range bounds for VFIO_IRQ_SET_DATA_NONE, and al...
null
CVE-2023-1242
Cross-site Scripting (XSS) - Stored in answerdev/answer
Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.6.
[ { "commit_message": "[PATCH] update GetExcerpt internal/schema/tag_schema.go | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA5MGJmYTBkY2M3YjQ5NDgyZjFkMWUzMWFlZTNhYjA3M2YzYzEzZGQ5IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBhaWNoeTEyNiA8MTY5OTYwOTcrYWljaHkxMjZAdXNlcnMubm9yZXBse...
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
GHSA-995x-vcgv-4rcv
null
[ { "commit_message": "[PATCH] Bug 1101158 - Use shared tagged template library for escaping card content r=aus r=freddyb apps/sharedtest/test/unit/tagged_test.js | 18 +++++++ apps/system/index.html | 1 + apps/system/js/card.js | 56 +++++++++++----------- apps/system/tes...
null
CVE-2022-4687
Incorrect Use of Privileged APIs in usememos/memos
Incorrect Use of Privileged APIs in GitHub repository usememos/memos prior to 0.9.0.
[ { "commit_message": "[PATCH] fix: disable decode patch id (#831) api/memo.go | 2 +- api/resource.go | 2 +- api/shortcut.go | 2 +- api/user.go | 2 +- 4 files changed, 4 insertions(+), 4 deletions(-)", "patch_text_b64": "RnJvbSBkY2EzNWJkZTg3N2FhYjZlNjRlZjUxYjUyZTU5MGI1ZDQ4ZjY5MmY5IE1vbiBTZXAgMTcgMDA6M...
CWE-648 Incorrect Use of Privileged APIs
CVE-2021-43515
CSV Injection (aka Excel Macro Injection or Formula Injection) exists in creating new timesheet in Kimai. By filling the Description field with malicious payload, it will be mistreated while exporting to a CSV file.
[ { "commit_message": "[PATCH] version 1.14.1 (#2532) * no back links in modal pages * remove unused service links to bountysource and gitter * add validation for budget and time-budget fields * display time budget if set * remove console log * sanitize DDE payloads * do not show status and name in version string...
n/a
GHSA-xmvg-335g-x44q
The OpenSearch reporting plugin improperly controls tenancy access to reporting resources
null
[ { "commit_message": "<98922864+opensearch-trigger-bot[bot]@users.noreply.github.com> [PATCH] tenancy access control (#992) (#993) * Check user name for private tenant access control * fix broken link (cherry picked from commit 99f02f3745d7e9a88c144b3f2cba000e153bfd07) Signed-off-by: Sean Kao <seankao@amazon.com...
null
CVE-2025-55745
UnoPim Quick Export feature is vulnerable to CSV injection
UnoPim is an open-source Product Information Management (PIM) system built on the Laravel framework. Versions 0.3.0 and prior are vulnerable to CSV injection, also known as formula injection, in the Quick Export feature. This vulnerability allows attackers to inject malicious content into exported CSV files. When the CSV file is opened in spreadsheet applications such as Microsoft Excel, the malicious input may be interpreted as a formula or command, potentially resulting in the execution of arbitrary code on the victim's device. Successful exploitation can lead to remote code execution, including the establishment of a reverse shell. Users are advised to upgrade to version 0.3.1 or later.
[ { "commit_message": "[PATCH] fix: escape formula operators when exporting to CSV/XLSX files .../Helpers/Exporters/Category/Exporter.php | 3 ++ .../Helpers/Exporters/Product/Exporter.php | 3 +- .../Formatters/EscapeFormulaOperators.php | 50 +++++++++++++++++++ .../Helpers/Importers/Category/Importer.p...
CWE-1236: Improper Neutralization of Formula Elements in a CSV File
GHSA-c27v-jmfg-gqrm
null
[ { "commit_message": "[PATCH] patch 8.2.5162: reading before the start of the line with BS in Replace mode Problem: Reading before the start of the line with BS in Replace mode. Solution: Check the cursor column is more than zero. src/edit.c | 2 +- src/version.c | 2 ++ 2 files changed, 3 insertions(+), 1...
null
CVE-2025-7865
thinkgem JeeSite XSS Filter EncodeUtils.java xssFilter cross site scripting
A vulnerability was found in thinkgem JeeSite up to 5.12.0. It has been declared as problematic. This vulnerability affects the function xssFilter of the file src/main/java/com/jeesite/common/codec/EncodeUtils.java of the component XSS Filter. The manipulation of the argument text leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The patch is identified as 3585737d21fe490ff6948d913fcbd8d99c41fc08. It is recommended to apply a patch to fix this issue.
[ { "commit_message": "[PATCH] =?UTF-8?q?=E5=AE=8C=E5=96=84xss=E6=AD=A3=E5=88=99?= =?UTF-8?q?=E8=A1=A8=E8=BE=BE=E5=BC=8F=EF=BC=8C=E5=A4=84=E7=90=86on?= =?UTF-8?q?=E5=89=8D=E9=9D=A2=E6=98=AF/=E7=9A=84=E9=97=AE=E9=A2=98?= =?UTF-8?q?=EF=BC=9B=E5=AE=8C=E5=96=84beetl=E7=9A=84xss=E6=A0=BC=E5=BC=8F?= =?UTF-8?q?=E5=8C=96...
Cross Site Scripting
GHSA-h23m-w6x5-jwr4
Out-of-bounds write
null
[ { "commit_message": "[PATCH] [CVE-2019-0923] Scripting Engine Memory Corruption - Individual After reparsing the coroutines (generator/async functions) the register which holds yield data has changed. This is due to scoping structure for debugger. In order to fix that allow the same scoping numbering for corout...
null
GHSA-jc7r-v6fg-2gpf
Apache CXF TLS hostname verification does not work correctly with com.sun.net.ssl.*
null
[ { "commit_message": "[PATCH] Fix hostname verification using the deprecated SSL stack .../https/AllowAllHostnameVerifier.java | 4 + .../https/HttpsURLConnectionFactory.java | 2 +- .../httpclient/DefaultHostnameVerifier.java | 12 ++ .../HostnameVerificationDeprecatedServer.java | 47 +++++++ .....
null
GHSA-c558-5gfm-p2r8
JSPUI spellcheck and autocomplete tools vulnerable to Cross Site Scripting
null
[ { "commit_message": "[PATCH] [DS-4453] Fix XSS handling in JSPUI discovery autocomplete dspace-jspui/src/main/webapp/search/discovery.jsp | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAzNTAzMGEyM2U0OGI1OTQ2ZjU4NTMzMzJjNzk3ZTFjNGFkZWE3YmI3IE1vbiBTZXAgMTcgMDA6MDA6MDAgMj...
null
CVE-2024-28199
Cross-site Scripting (XSS) possible with maliciously formed HTML attribute names and values in Phlex
phlex is an open source framework for building object-oriented views in Ruby. There is a potential cross-site scripting (XSS) vulnerability that can be exploited via maliciously crafted user data. This was due to improper case-sensitivity in the code that was meant to prevent these attacks. If you render an `<a>` tag with an `href` attribute set to a user-provided link, that link could potentially execute JavaScript when clicked by another user. If you splat user-provided attributes when rendering any HTML tag, malicious event attributes could be included in the output, executing JavaScript when the events are triggered by another user. Patches are available on RubyGems for all 1.x minor versions. Users are advised to upgrade. Users unable to upgrade should consider configuring a content security policy that does not allow `unsafe-inline`.
[ { "commit_message": "[PATCH] Fix improper case-sensitivity See https://github.com/phlex-ruby/phlex/security/advisories/GHSA-242p-4v39-2v8g lib/phlex/sgml.rb | 13 ++++--------- test/phlex/view/naughty_business.rb | 30 +++++++++++++++++++++++++++++ 2 files changed, 34 insertions(+), 9 deletions(...
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-3749
Inefficient Regular Expression Complexity in axios/axios
axios is vulnerable to Inefficient Regular Expression Complexity
[ { "commit_message": "[PATCH] Security fix for ReDoS (#3980) lib/utils.js | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA1YjQ1NzExNmUzMWRiMGU4OGZlZGU2YzQyOGU5NjllODdmMjkwOTI5IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiByZWFkeS1yZXNlYXJjaCA8NzI5MTYyMDkrcmVhZHktcmVzZWFyY2hAdXNlc...
CWE-1333 Inefficient Regular Expression Complexity
CVE-2022-4415
A vulnerability was found in systemd. This security flaw can cause a local information leak due to systemd-coredump not respecting the fs.suid_dumpable kernel setting.
[ { "commit_message": "[PATCH 1/2] coredump: adjust whitespace src/coredump/coredump.c | 56 ++++++++++++++++++++--------------------- 1 file changed, 28 insertions(+), 28 deletions(-)", "patch_text_b64": "RnJvbSA1MTBhMTQ2NjM0ZjNlMDk1YjM0ZTJhMjYwMjNiMWIxZjk5ZGNiOGMwIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiA9P...
CWE-200
GHSA-h3cq-j957-vhxg
Cross-site Scripting in fullpage.js
null
[ { "commit_message": "[PATCH 1/5] Update fullpage.min.js dist/fullpage.min.js | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA4NGUxYTQyYjBiMTUzMDUzN2Q5MWJhM2JiZWNhZmY5NTBmYmZkZGZlIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiByYW5qaXQtZ2l0IDxwYWhhbi5yYW5qaXQwMjAxQGdtYWlsLmNvbT4KR...
null
CVE-2019-16976
In FusionPBX up to 4.5.7, the file app\destinations\destination_imports.php uses an unsanitized "query_string" variable coming from the URL, which is reflected on 2 occasions in HTML, leading to XSS.
[ { "commit_message": "[PATCH] Update destination_imports.php app/destinations/destination_imports.php | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSBkNmVhMDJkODk2YjJjNTdkZWM0OTFlZTNiMzZlYzEwMjYzOTI3MGJlIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBGdXNpb25QQlggPG1hcmtqY3Jhb...
n/a
GHSA-w62c-99j3-8frh
null
[ { "commit_message": "[PATCH] fixed LFI vulnerability main.c | 8 ++++++++ 1 file changed, 8 insertions(+)", "patch_text_b64": "RnJvbSBjZjcxNWQ5MTFkOGNlMTc5NjlhNzkyNmRlYTY1MWU5MzBjMjdlNzFhIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBsdWthc2VwcGxlIDxnaXRAbHVrYXNlcHBsZS5kZT4KRGF0ZTogRnJpLCAxNSBBdWcgMjAxNCAxMzo1MD...
null