id stringlengths 12 19 | title stringlengths 0 237 | description stringlengths 35 3.87k ⌀ | patches listlengths 1 22 | cwe stringlengths 2 440 ⌀ |
|---|---|---|---|---|
CVE-2022-31113 | Cross-Site Scripting in Canarytoken history | Canarytokens is an open source tool which helps track activity and actions on your network. A Cross-Site Scripting vulnerability was identified in the history page of triggered Canarytokens. This permits an attacker who recognised an HTTP-based Canarytoken (a URL) to execute Javascript in the Canarytoken's history page (domain: canarytokens.org) when the history page is later visited by the Canarytoken's creator. This vulnerability could be used to disable or delete the affected Canarytoken, or view its activation history. It might also be used as a stepping stone towards revealing more information about the Canarytoken's creator to the attacker. For example, an attacker could recover the email address tied to the Canarytoken, or place Javascript on the history page that redirect the creator towards an attacker-controlled Canarytoken to show the creator's network location. An attacker could only act on the discovered Canarytoken. This issue did not expose other Canarytokens or other Canarytoken creators. The issue has been patched on Canarytokens.org and in the latest release. No signs of successful exploitation of this vulnerability have been found. Users are advised to upgrade. There are no known workarounds for this issue. | [
{
"commit_message": "[PATCH] Fix XSS reported by Yohann / @2xyo templates/history.html | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)",
"patch_text_b64": "RnJvbSBkYzM3ODk1N2JjMjhhNmYzYjVhOGQ3MjE3YjA2MDVkODExMTFmMDkwIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBNYXJjbyBTbGF2aWVybyA8bWFyY29AdGhpbmtzdC5... | CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') |
CVE-2024-27454 | orjson.loads in orjson before 3.9.15 does not limit recursion for deeply nested JSON documents. | [
{
"commit_message": "[PATCH] yyjson 0eca326, recursion limit README.md | 3 + include/yyjson-recursion-limit.patch | 161 ++++++++++++ include/yyjson/yyjson.c | 349 ++++++++++++++++++++++----- include/yyjson/yyjson.h | 152 +++++++++--- script/vendor-yyjson ... | n/a | |
CVE-2025-5647 | Radare2 radiff2 cons.c r_cons_context_break_pop memory corruption | A vulnerability was found in Radare2 5.9.9 and classified as problematic. This issue affects the function r_cons_context_break_pop in the library /libr/cons/cons.c of the component radiff2. The manipulation of the argument -T leads to memory corruption. The attack needs to be approached locally. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The patch is named 5705d99cc1f23f36f9a84aab26d1724010b97798. It is recommended to apply a patch to fix this issue. The documentation explains that the parameter -T is experimental and "crashy". Further analysis has shown "the race is not a real problem unless you use asan". A new warning has been added. | [
{
"commit_message": "[PATCH] Add warning when using radiff2 -T libr/main/radiff2.c | 1 + 1 file changed, 1 insertion(+)",
"patch_text_b64": "RnJvbSA1NzA1ZDk5Y2MxZjIzZjM2ZjlhODRhYWIyNmQxNzI0MDEwYjk3Nzk4IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBwYW5jYWtlIDxwYW5jYWtlQG5vcGNvZGUub3JnPgpEYXRlOiBGcmksIDMwIE1heSA... | Memory Corruption |
GHSA-wj2v-cw66-5qcg | null | [
{
"commit_message": "[PATCH] -fixed an issue where the stack could crash if a TCP based sender sends a Content-Length that is less that the actual SIP body transmitted in order to trigger this condition the SIP message body must arrive in a separate read request, either from the start or part way through the b... | null | |
GHSA-h66h-vhxh-6fr4 | null | [
{
"commit_message": "[PATCH] Fixed #2612 src/filters/isoffin_read_ch.c | 12 ++++++++++++ 1 file changed, 12 insertions(+)",
"patch_text_b64": "RnJvbSBjZDhhOTVjMWVmYjhmNWJmYzk1MGI4NmMyZWY3N2I0Yzc2ZjZiODkzIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBqZWFubGYgPGplYW5sZkBncGFjLmlvPgpEYXRlOiBUaHUsIDEyIE9jdCAyMDIzI... | null | |
GHSA-f4j9-hqhf-qp7c | null | [
{
"commit_message": "[PATCH] avcodec/jpeg2000dec: non zero image offsets are not supported Fixes out of array accesses Fixes Ticket3080 Found-by: ami_stuff Signed-off-by: Michael Niedermayer <michaelni@gmx.at> libavcodec/jpeg2000dec.c | 5 +++++ 1 file changed, 5 insertions(+)",
"patch_text_b64": "RnJvbSA3OD... | null | |
GHSA-xv75-c298-2v8f | null | [
{
"commit_message": "[PATCH] Fix return value check for openssl API used during pubkey validation. Found thanks to bug report by Michael Scheibel <m.Scheibel (at) tuvit (dot) de> ok patrick@, markus@, tb@ sbin/iked/ca.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)",
"patch_text_b64": "RnJvbSA3YW... | null | |
GHSA-q76h-h683-9cc8 | null | [
{
"commit_message": "[PATCH] Query: Remove the static query property. Prevent unauthenticated views of publicly queryables content types. Props aaroncampbell, whyisjake, nickdaugherty, xknown. Built from https://develop.svn.wordpress.org/branches/5.2@46479 git-svn-id: http://core.svn.wordpress.org/branches/5.2@... | null | |
GHSA-jp5g-8qgr-gfpx | null | [
{
"commit_message": "[PATCH] Fixed issue #3360 (#3361) include/spdlog/pattern_formatter-inl.h | 8 +++++--- 1 file changed, 5 insertions(+), 3 deletions(-)",
"patch_text_b64": "RnJvbSAxMDMyMDE4NGRmMWViNDYzOGUyNTNhMzRiMWViNDRjZTc4OTU0MDk0IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBHYWJpIE1lbG1hbiA8Z21lbG1hbjFA... | null | |
GHSA-vv56-ggr3-rc5q | null | [
{
"commit_message": "[PATCH] Fix stack overflow if void void void... is repeated many times (fix #1434) ChangeLog | 1 + src/jsparse.c | 1 + 2 files changed, 2 insertions(+)",
"patch_text_b64": "RnJvbSBjMzZkMzA1MjkxMThhYTA0OTc5N2RiNDNmMTExZGRhZDQ2OGFhZDI5IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBHb3Jkb2... | null | |
GHSA-42f2-xvqw-p5x2 | null | [
{
"commit_message": "[PATCH] ACPI: Split out custom_method functionality into an own driver With /sys/kernel/debug/acpi/custom_method root can write to arbitrary memory and increase his priveleges, even if these are restricted. -> Make this an own debug .config option and warn about the security issue in the co... | null | |
PYSEC-2020-119 | null | [
{
"commit_message": "[PATCH] Fix multiple vulnerabilities in `tf.raw_ops.*CountSparseOutput`. Also add tests for these API points, both for the happy paths and for the vulnerable ones. PiperOrigin-RevId: 332563222 Change-Id: Ib3b52116a83a134c2e742a7c66e5e956db8fba05 tensorflow/core/kernels/count_ops.cc | ... | null | |
CVE-2026-22703 | Cosign verification accepts any valid Rekor entry under certain conditions | Cosign provides code signing and transparency for containers and binaries. Prior to versions 2.6.2 and 3.0.4, Cosign bundle can be crafted to successfully verify an artifact even if the embedded Rekor entry does not reference the artifact's digest, signature or public key. When verifying a Rekor entry, Cosign verifies the Rekor entry signature, and also compares the artifact's digest, the user's public key from either a Fulcio certificate or provided by the user, and the artifact signature to the Rekor entry contents. Without these comparisons, Cosign would accept any response from Rekor as valid. A malicious actor that has compromised a user's identity or signing key could construct a valid Cosign bundle by including any arbitrary Rekor entry, thus preventing the user from being able to audit the signing event. This issue has been patched in versions 2.6.2 and 3.0.4. | [
{
"commit_message": "[PATCH] Fix bundle verify path for old bundle/trusted root (#4623) Ensure the bundle signature and key are compared to the rekor entry every time, not just when trusted root is used. Sigstore-go's VerifySET does not do this full comparison, we'd need to go through one of the more comprehens... | CWE-345: Insufficient Verification of Data Authenticity |
CVE-2021-4238 | Insufficient randomness in github.com/Masterminds/goutils | Randomly-generated alphanumeric strings contain significantly less entropy than expected. The RandomAlphaNumeric and CryptoRandomAlphaNumeric functions always return strings containing at least one digit from 0 to 9. This significantly reduces the amount of entropy in short strings generated by these functions. | [
{
"commit_message": "[PATCH] Remove unnecessary checks on a value that is already definitely an alphanum Signed-off-by: Matt Butcher <matt.butcher@microsoft.com> cryptorandomstringutils.go | 21 ++----------------- cryptorandomstringutils_test.go | 37 +++++++++++++++++++++++++++++++++ randomstringutils.go ... | CWE 330: Use of Insufficiently Random Values |
GHSA-25xr-qj8w-c4vf | Apache Tomcat Coyote vulnerable to Denial of Service via excessive HTTP/2 streams | null | [
{
"commit_message": "[PATCH] Apply the initial HTTP/2 connection limits earlier. .../coyote/http2/ConnectionSettingsBase.java | 19 +++++++++++++++++-- .../coyote/http2/ConnectionSettingsLocal.java | 5 ++++- .../coyote/http2/Http2UpgradeHandler.java | 8 ++++++-- webapps/docs/changelog.xml ... | null |
CVE-2015-7579 | Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem 1.0.2 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via an HTML entity that is mishandled by the Rails::Html::FullSanitizer class. | [
{
"commit_message": "<rafaelmfranca@gmail.com> [PATCH] Do not unescape already escaped HTML entities The full sanitizer was using Loofah's #text method that automatically escapes HTML entities. That behavior caused some problems where strings that were not escaped in the older sanitizer started to be escaped. T... | n/a | |
GHSA-j64m-2mhq-h7h9 | null | [
{
"commit_message": "[PATCH] Use PYONDecoder instead of eval() fah/Connection.py | 4 +- fah/util/PYONDecoder.py | 216 ++++++++++++++++++++++++++++++++++++++++ fah/util/__init__.py | 1 + 3 files changed, 220 insertions(+), 1 deletion(-) create mode 100644 fah/util/PYONDecoder.py",
"patch_text_b6... | null | |
CVE-2022-0196 | Cross-Site Request Forgery (CSRF) in phoronix-test-suite/phoronix-test-suite | phoronix-test-suite is vulnerable to Cross-Site Request Forgery (CSRF) | [
{
"commit_message": "[PATCH] phoromatic: Some additional input sanitization and starting on some CSRF token handling pts-core/objects/pts_strings.php | 2 +- .../phoromatic/pages/phoromatic_local_suites.php | 4 ++-- pts-core/phoromatic/pages/phoromatic_schedules.php | 8 ++++---- pts-... | CWE-352 Cross-Site Request Forgery (CSRF) |
CVE-2024-25678 | In LiteSpeed QUIC (LSQUIC) Library before 4.0.4, DCID validation is mishandled. | [
{
"commit_message": "[PATCH] Release 4.0.4 src/liblsquic/lsquic_full_conn_ietf.c | 7 +++++-- 1 file changed, 5 insertions(+), 2 deletions(-)",
"patch_text_b64": "RnJvbSA1MTVmNDUzNTU2Yzk5ZDI3YzRkZGRiNTQyNDg5OGRjMWE1NTM3NzA4IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBHZW9yZ2UgV2FuZyA8Z3dhbmdAbGl0ZXNwZWVkdGVjaC... | n/a | |
GHSA-g4q2-gc49-8q5w | null | [
{
"commit_message": "[PATCH] Upgrade/Install: Sanitize file name in `File_Upload_Upgrader`. Built from https://develop.svn.wordpress.org/trunk@38524 git-svn-id: http://core.svn.wordpress.org/trunk@38465 1a063a9b-81f0-0310-95a4-ce76da25c4cd wp-admin/includes/class-file-upload-upgrader.php | 6 +++++- wp-includes/... | null | |
GHSA-r6pg-pjwc-j585 | Null pointer dereference in `SparseFillEmptyRows` | null | [
{
"commit_message": "[PATCH] Fix heap-buffer-overflow issue with `tf.raw_ops.SparseFillEmptyRows`. PiperOrigin-RevId: 372009178 Change-Id: Ia1a9e9691ecaa072f32fb39a0887b2aabd399210 tensorflow/core/kernels/sparse_fill_empty_rows_op.cc | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-)",
"patch_text_b64... | null |
GHSA-v7cq-pq7v-mh5v | Apache Derby SQL Injection | null | [
{
"commit_message": "[PATCH] DERBY-1858 contributed by Yip Ng patch: derby1858-trunk-diff02.txt Fixes problem that DropSchemaNode's bind phase did not add the required schema privilege for it to check at runtime. git-svn-id: https://svn.apache.org/repos/asf/db/derby/code/trunk@449869 13f79535-47bb-0310-9956-ffa... | null |
CVE-2016-1222 | Cross-site scripting (XSS) vulnerability in Kobe Beauty php-contact-form before 2016-05-18 allows remote attackers to inject arbitrary web script or HTML via a crafted URI. | [
{
"commit_message": "[PATCH] =?UTF-8?q?=E3=82=AF=E3=83=AD=E3=82=B9=E3=82=B5=E3=82=A4?= =?UTF-8?q?=E3=83=88=E3=82=B9=E3=82=AF=E3=83=AA=E3=83=97=E3=83=86=E3=82=A3?= =?UTF-8?q?=E3=83=B3=E3=82=B0=E3=81=AE=E8=84=86=E5=BC=B1=E6=80=A7=E7=99=BA?= =?UTF-8?q?=E8=A6=9A=E3=81=AB=E4=BC=B4=E3=81=86=E3=82=B3=E3=83=BC=E3=83=89... | n/a | |
GHSA-2xvj-j3qh-x8c3 | private_address_check contains race condition | null | [
{
"commit_message": "[PATCH] Fix TOCTOU bug This fixes the time of check to time of use (TOCTOU) bug reported by Sajjad Hashemian. README.md | 12 +++++++++++- lib/private_address_check/tcpsocket_ext.rb | 7 +++---- test/private_address_check/tcpsocket_ext_test.rb | ... | null |
CVE-2019-25219 | Asio C++ Library before 1.13.0 lacks a fallback error code in the case of SSL_ERROR_SYSCALL with no associated error information from the SSL library being used. | [
{
"commit_message": "[PATCH] Add a fallback error code for when we get SSL_ERROR_SYSCALL without an associated error. asio/include/asio/ssl/detail/impl/engine.ipp | 20 ++++++++++++---- asio/include/asio/ssl/error.hpp | 24 +++++++++++++++----- asio/include/asio/ssl/impl/error.ipp | 2 ++ 3 f... | n/a | |
GHSA-4fg4-p75j-w5xj | Heap out of bounds in `QuantizedBatchNormWithGlobalNormalization` | null | [
{
"commit_message": "[PATCH] Add missing validation in `QuantizedBatchNormWithGlobalNormalization` PiperOrigin-RevId: 370123451 Change-Id: Id234d6dab1ec21230bb8e503dba30f899af87f33 .../core/kernels/quantized_batch_norm_op.cc | 77 ++++++++++++++++--- 1 file changed, 67 insertions(+), 10 deletions(-)",
"pat... | null |
CVE-2019-18218 | cdf_read_property_info in cdf.c in file through 5.37 does not restrict the number of CDF_VECTOR elements, which allows a heap-based buffer overflow (4-byte out-of-bounds write). | [
{
"commit_message": "[PATCH] Limit the number of elements in a vector (found by oss-fuzz) src/cdf.c | 9 ++++----- src/cdf.h | 1 + 2 files changed, 5 insertions(+), 5 deletions(-)",
"patch_text_b64": "RnJvbSA0NmE4NDQzZjc2Y2VjNGI0MWVjNzM2ZWNhMzk2OTg0Yzc0NjY0Zjg0IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBDaHJp... | n/a | |
CVE-2025-46725 | Langroid has a Code Injection vulnerability in LanceDocChatAgent through vector_store | Langroid is a Python framework to build large language model (LLM)-powered applications. Prior to version 0.53.15, `LanceDocChatAgent` uses pandas eval() through `compute_from_docs()`. As a result, an attacker may be able to make the agent run malicious commands through `QueryPlan.dataframe_calc]`) compromising the host system. Langroid 0.53.15 sanitizes input to the affected function by default to tackle the most common attack vectors, and added several warnings about the risky behavior in the project documentation. | [
{
"commit_message": "[PATCH] fixes to code-injection mitigation PR #841 (#850) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit * Update SECURITY.md Security notice * Add eval commands sanitizer Mitigation to avoid most common code injection attack vectors * Sanitizer te... | CWE-94: Improper Control of Generation of Code ('Code Injection') |
GHSA-7958-493x-jj7h | null | [
{
"commit_message": "[PATCH] Bug: Lua can generate wrong code when _ENV is <const> (#756) src/lua/src/lparser.c | 1 + 1 file changed, 1 insertion(+)",
"patch_text_b64": "RnJvbSA2NmI4YTk3ZDlmZGZkMjI1Nzk5Njg3NTcxNmYzOWMxOGQ4NGUwMDRmIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBQaHVjLVRoYW5oIE5ndXllbiA8ODM4MDY2Mz... | null | |
CVE-2024-41809 | OpenObserve Cross-site Scripting (XSS) vulnerability in `openobserve/web/src/views/MemberSubscription.vue` | OpenObserve is an open-source observability platform. Starting in version 0.4.4 and prior to version 0.10.0, OpenObserve contains a cross-site scripting vulnerability in line 32 of `openobserve/web/src/views/MemberSubscription.vue`. Version 0.10.0 sanitizes incoming html. | [
{
"commit_message": "[PATCH] fix: Multi tenancy (#727) web/src/aws-exports.ts | 2 + .../components/PendingSubscriptionWarning.vue | 53 ++++++++ web/src/composables/shared/router.ts | 43 +++++++ .../enterprise/components/billings/plans.vue | 58 +++++++-- .../organizations/Ad... | CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') |
CVE-2023-28106 | Pimcore vulnerable to Cross-site Scripting in UrlSlug Data type | Pimcore is an open source data and experience management platform. Prior to version 10.5.19, an attacker can use cross-site scripting to send a malicious script to an unsuspecting user. Users may upgrade to version 10.5.19 to receive a patch or, as a workaround, apply the patch manually. | [
{
"commit_message": "[PATCH] optimized urlslug input (#14669) .../Controller/Admin/Document/DocumentControllerBase.php | 5 +++++ .../Resources/public/js/pimcore/document/pages/settings.js | 6 +++++- bundles/AdminBundle/Resources/public/js/pimcore/helpers.js | 4 ++++ 3 files changed, 14 insertions(+), 1 del... | CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') |
CVE-2021-41221 | Access to invalid memory during shape inference in `Cudnn*` ops | TensorFlow is an open source platform for machine learning. In affected versions the shape inference code for the `Cudnn*` operations in TensorFlow can be tricked into accessing invalid memory, via a heap buffer overflow. This occurs because the ranks of the `input`, `input_h` and `input_c` parameters are not validated, but code assumes they have certain values. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. | [
{
"commit_message": "[PATCH] Fix access to undefined memory during shape inference of Cudnn*. PiperOrigin-RevId: 400324259 Change-Id: Ie3b7859d19ae24ee9ac2adf413bdc1e851bbc604 tensorflow/core/ops/cudnn_rnn_ops.cc | 21 +++++++++ tensorflow/core/ops/cudnn_rnn_ops_test.cc | 56 +++++++++++++++++++++++ 2 files ... | CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') |
CVE-2023-26113 | Versions of the package collection.js before 6.8.1 are vulnerable to Prototype Pollution via the extend function in Collection.js/dist/node/iterators/extend.js.
| [
{
"commit_message": "[PATCH] fix: fixed prototype pollution issue src/iterators/extend.js | 4 ++++ 1 file changed, 4 insertions(+)",
"patch_text_b64": "RnJvbSBkM2Q5Mzc2NDVmNjJmMzdkMzExNWQ2YWE5MGJiNTEwZmQ4NTZlNmEyIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBrb2Jlenp6YSA8a29iZXp6emFAZ21haWwuY29tPgpEYXRlOiBGcmks... | Prototype Pollution | |
GHSA-3j43-9v8v-cp3f | Apollo Router Query Validation Vulnerable to Excessive Resource Consumption via Named Fragment Processing | null | [
{
"commit_message": "[PATCH] Certain query patterns may cause resource exhaustion MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Corrects a set of denial-of-service (DOS) vulnerabilities that made it possible for an attacker to render router inoperable with certain sim... | null |
GHSA-w62w-xxmq-vqhx | null | [
{
"commit_message": "[PATCH] Secunia 81800#1: samsumg_load_raw Secunia 81800#2: find_green Secunia 81800#3: rollei_load_raw remove_trailing_spaces: isspace() does not works right with signed non-latin chars Secunia 81800#5/6: nikon_coolscan_load_raw Secunia 81800#4: rollei_load_raw dcraw/dcraw.c | 1... | null | |
CVE-2023-0786 | Cross-site Scripting (XSS) - Generic in thorsten/phpmyfaq | Cross-site Scripting (XSS) - Generic in GitHub repository thorsten/phpmyfaq prior to 3.1.11.
| [
{
"commit_message": "[PATCH] fix: added missing conversion to HTML entities phpmyfaq/admin/report.view.php | 11 ++++++----- phpmyfaq/src/phpMyFAQ/Report.php | 4 +--- 2 files changed, 7 insertions(+), 8 deletions(-)",
"patch_text_b64": "RnJvbSBjZTY3NmViOWU5ZDhjYjc4NjRmMzZlZTEyNGU4MzhiMWFkMTU0MTVmIE1vbiBTZ... | CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') |
CVE-2023-29514 | Code injection in template provider administration in xwiki-platform | XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any user with edit rights on any document (e.g., their own user profile) can execute code with programming rights, leading to remote code execution. This vulnerability has been patched in XWiki 13.10.11, 14.4.8, 14.10.1 and 15.0 RC1. Users are advised to upgrade. There are no known workarounds for this vulnerability. | [
{
"commit_message": "[PATCH] XWIKI-20268: Improve escaping in AdminTemplatesSheet .../test/ui/PageTemplatesIT.java | 24 +++++++++++++++++++ .../resources/XWiki/AdminTemplatesSheet.xml | 2 +- 2 files changed, 25 insertions(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSA3YmY3MDk0ZjhmZmFjMDk1ZjV... | CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') |
GHSA-36xj-qg9x-f33m | null | [
{
"commit_message": "[PATCH] CVE-2017-13725/IPv6 R.H.: Check for the existence of all fields before fetching them. Don't fetch the length field from the header until after we've checked for the existence of a field at or after that field. (Found by code inspection, not by a capture.) print-rt6.c | 2 +- 1 file c... | null | |
GHSA-4c2h-67qq-vm87 | Citizen skin vulnerable to stored XSS through multiple system messages | null | [
{
"commit_message": "[PATCH] =?UTF-8?q?feat(commandPalette):=20=E2=9C=A8=20add=20tips?= =?UTF-8?q?=20for=20command=20palette=20usage?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit i18n/en.json | 8 ++++- i18n/qqq.json ... | null |
CVE-2021-39160 | Code injection in nbgitpuller | nbgitpuller is a Jupyter server extension to sync a git repository one-way to a local path. Due to unsanitized input, visiting maliciously crafted links could result in arbitrary code execution in the user environment. This has been resolved in version 0.10.2 and all users are advised to upgrade. No work around exist for users who can not upgrade. | [
{
"commit_message": "[PATCH] make positional args explicit avoids misinterpreting positional args as flags nbgitpuller/pull.py | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-)",
"patch_text_b64": "RnJvbSBmMjVkM2YyNjg1MDM1YzExYmQ2NjhkNDhlNzFjYWY0ZmMyNDViYTY4IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9... | CWE-94: Improper Control of Generation of Code ('Code Injection') |
CVE-2025-34449 | Genymobile/scrcpy <= 3.3.3 Global Buffer Overflow | Genymobile/scrcpy versions up to and including 3.3.3, prior to commit 3e40b24, contain a buffer overflow vulnerability in the sc_device_msg_deserialize() function. A compromised device can send crafted messages that cause out-of-bounds reads, which may result in memory corruption or a denial-of-service condition. This vulnerability may allow further exploitation on the host system. | [
{
"commit_message": "[PATCH] Fix UHID_OUTPUT message parsing The bounds check was incorrect. Fixes #6415 <https://github.com/Genymobile/scrcpy/issues/6415> app/src/device_msg.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSAzZTQwYjI0NzM3NzJjZWEzYTIzZDQ5MzIwODhmZDBiYzRjYzBmN... | CWE-502 Deserialization of Untrusted Data |
CVE-2019-17091 | faces/context/PartialViewContextImpl.java in Eclipse Mojarra, as used in Mojarra for Eclipse EE4J before 2.3.10 and Mojarra JavaServer Faces before 2.2.20, allows Reflected XSS because a client window field is mishandled. | [
{
"commit_message": "[PATCH] Fixes #4556 : HIGH-LEVEL VULNERABILITY WITHIN MOJARRA JSF V2.2 .../main/java/com/sun/faces/context/PartialViewContextImpl.java | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSBhM2ZhOTU3Mzc4OWVkNWU4NjdjNDNlYTM4Mzc0ZjRkYmQ1YThmODFmIE1vbiBTZXAgMTcgMD... | n/a | |
CVE-2024-48909 | SpiceDB calls to LookupResources using LookupResources2 with caveats may return context is missing when it is not | SpiceDB is an open source database for scalably storing and querying fine-grained authorization data. Starting in version 1.35.0 and prior to version 1.37.1, clients that have enabled `LookupResources2` and have caveats in the evaluation path for their requests can return a permissionship of `CONDITIONAL` with context marked as missing, even then the context was supplied. LookupResources2 is the new default in SpiceDB 1.37.0 and has been opt-in since SpiceDB 1.35.0. The bug is patched as part of SpiceDB 1.37.1. As a workaround, disable LookupResources2 via the `--enable-experimental-lookup-resources` flag by setting it to `false`. | [
{
"commit_message": "[PATCH] Ensure caveat context is sent to all LR2 dispatches .../dispatch/graph/lookupresources2_test.go | 84 +++++++++++++++++-- internal/graph/lookupresources2.go | 1 + internal/graph/lr2streams.go | 1 + .../integrationtesting/consistency_test.go | 60 +++... | CWE-172: Encoding Error |
CVE-2025-54421 | NamelessMC allows Stored Cross Site Scripting (XSS) in SEO component | NamelessMC is a free, easy to use & powerful website software for Minecraft servers. Cross-site scripting (XSS) vulnerability in NamelessMC before 2.2.4 allows remote authenticated attackers to inject arbitrary web script or HTML via the default_keywords crafted parameter. This vulnerability is fixed in 2.2.4. | [
{
"commit_message": "[PATCH] Merge commit from fork Co-authored-by: Sam <samerton@users.noreply.github.com> modules/Core/pages/panel/seo.php | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)",
"patch_text_b64": "RnJvbSA1NmQzNWNmZjllZTk0NGMwNjE3OTFlZjQ3OGNhYmQyYmVkMDIyM2M0IE1vbiBTZXAgMTcgMDA6MDA6MDAgM... | CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') |
CVE-2024-34067 | Multiple cross site scripting (XSS) vulnerabilities in the admin area of Pterodactyl panel | Pterodactyl is a free, open-source game server management panel built with PHP, React, and Go. Importing a malicious egg or gaining access to wings instance could lead to cross site scripting (XSS) on the panel, which could be used to gain an administrator account on the panel. Specifically, the following things are impacted: Egg Docker images and Egg variables: Name, Environment variable, Default value, Description, Validation rules. Additionally, certain fields would reflect malicious input, but it would require the user knowingly entering such input to have an impact. To iterate, this would require an administrator to perform actions and can't be triggered by a normal panel user. This issue has has been addressed in version 1.11.6 and users are advised to upgrade. No workaround is available other than updating to the latest version of the panel. | [
{
"commit_message": "[PATCH] ui(admin): better handling of manual HTML rendering public/themes/pterodactyl/js/admin/new-server.js | 16 +++++++++++----- resources/views/admin/nodes/view/index.blade.php | 10 ++++++++-- .../views/admin/servers/view/startup.blade.php | 16 +++++++++++----- 3 files changed, 30 inse... | CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') |
GHSA-x4xp-29gp-7qw9 | null | [
{
"commit_message": "[PATCH] crypto: skcipher - Add missing API setkey checks The API setkey checks for key sizes and alignment went AWOL during the skcipher conversion. This patch restores them. Cc: <stable@vger.kernel.org> Fixes: 4e6c3df4d729 (\"crypto: skcipher - Add low-level skcipher...\") Reported-by: Ba... | null | |
CVE-2025-66370 | Kivitendo before 3.9.2 allows XXE injection. By uploading an electronic invoice in the ZUGFeRD format, it is possible to read and exfiltrate files from the server's filesystem. | [
{
"commit_message": "[PATCH] =?UTF-8?q?XXE=20Sicherheitsl=C3=BCcke=20beim=20ZUGFeRD=20?= =?UTF-8?q?parsen=20(XML)=20vermeiden?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit SL/XMLInvoice.pm | 2 +- SL/ZUGFeRD.pm | 2 +- doc/changelog | 2 ++ 3 files changed, 4 ins... | CWE-611 Improper Restriction of XML External Entity Reference | |
CVE-2024-53982 | Arbitrary file download in Zoo-Project Echo Example | ZOO-Project is a C-based WPS (Web Processing Service) implementation. A path traversal vulnerability was discovered in Zoo-Project Echo example. The Echo example available by default in Zoo installs implements file caching, which can be controlled by user-given parameters. No input validation is performed in this parameter, which allows an attacker to fully control the file which is returned in the response. Patch was committed in November 22nd, 2024. | [
{
"commit_message": "[PATCH] Secure the way files are accessed Fix issue when using the file:// protocol relying on allowedPaths parameters Update documentation to add the allowedPaths parameter docs/kernel/configuration.rst | 3 +++ zoo-project/zoo-kernel/caching.c | 25 +++++++++++++++++++++++... | CWE-434: Unrestricted Upload of File with Dangerous Type |
CVE-2014-9420 | The rock_continue function in fs/isofs/rock.c in the Linux kernel through 3.18.1 does not restrict the number of Rock Ridge continuation entries, which allows local users to cause a denial of service (infinite loop, and system crash or hang) via a crafted iso9660 image. | [
{
"commit_message": "[PATCH] isofs: Fix infinite looping over CE entries Rock Ridge extensions define so called Continuation Entries (CE) which define where is further space with Rock Ridge data. Corrupted isofs image can contain arbitrarily long chain of these, including a one containing loop and thus causing ... | n/a | |
CVE-2017-12997 | The LLDP parser in tcpdump before 4.9.2 could enter an infinite loop due to a bug in print-lldp.c:lldp_private_8021_print(). | [
{
"commit_message": "[PATCH] CVE-2017-12997/LLDP: Don't use an 8-bit loop counter. MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit If you have a for (i = 0; i < N; i++) loop, you'd better make sure that i is big enough to hold N - not N-1, N. The TLV length here is 9 bi... | n/a | |
GHSA-9fvj-xqr2-xwg8 | gnark affected by denial of service when computing scalar multiplication using fake-GLV algorithm | null | [
{
"commit_message": "[PATCH] fix: Eisenstein Half-GCD convergence (#680) Co-authored-by: Ivo Kubjas <ivo.kubjas@consensys.net> field/eisenstein/eisenstein.go | 71 ++++++++++++++++++++++++++--- field/eisenstein/eisenstein_test.go | 61 +++++++++++++++++++++++++ 2 files changed, 125 insertions(+), 7 deletions... | null |
CVE-2022-2079 | Cross-site Scripting (XSS) - Stored in nocodb/nocodb | Cross-site Scripting (XSS) - Stored in GitHub repository nocodb/nocodb prior to 0.91.7+. | [
{
"commit_message": "[PATCH] Fix: Sanitise comment data (#2343) * fix: sanitise row comment description Signed-off-by: Pranav C <pranavxc@gmail.com> * fix: add dom purify and sanitize content - Add DOMPurify in nuxt - On update value encode html tags to render as text in comment Signed-off-by: Pranav C <pranav... | CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') |
GHSA-p5xh-vx83-mxcj | HTTP Request Smuggling in Twisted | null | [
{
"commit_message": "[PATCH] Fix several request smuggling attacks. 1. Requests with multiple Content-Length headers were allowed (thanks to Jake Miller from Bishop Fox and ZeddYu Lu) and now fail with a 400; 2. Requests with a Content-Length header and a Transfer-Encoding header honored the first header (thank... | null |
CVE-2013-7281 | The dgram_recvmsg function in net/ieee802154/dgram.c in the Linux kernel before 3.12.4 updates a certain length value without ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel stack memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call. | [
{
"commit_message": "[PATCH] inet: prevent leakage of uninitialized memory to user in recv syscalls Only update *addr_len when we actually fill in sockaddr, otherwise we can return uninitialized memory from the stack to the caller in the recvfrom, recvmmsg and recvmsg syscalls. Drop the the (addr_len == NULL) c... | n/a | |
CVE-2023-1269 | Use of Hard-coded Credentials in alextselegidis/easyappointments | Use of Hard-coded Credentials in GitHub repository alextselegidis/easyappointments prior to 1.5.0. | [
{
"commit_message": "[PATCH] Update the seeders so that they set dynamic passwords by default application/controllers/Console.php | 4 ++-- application/controllers/Installation.php | 2 +- application/libraries/Instance.php | 17 ++++++++++++++--- 3 files changed, 17 insertions(+), 6 deletions(-)",
... | CWE-798 Use of Hard-coded Credentials |
CVE-2025-47271 | OZI-Project/ozi-publish Code Injection vulnerability | The OZI action is a GitHub Action that publishes releases to PyPI and mirror releases, signature bundles, and provenance in a tagged release. In versions 1.13.2 through 1.13.5, potentially untrusted data flows into PR creation logic. A malicious actor could construct a branch name that injects arbitrary code. This is patched in 1.13.6. As a workaround, one may downgrade to a version prior to 1.13.2. | [
{
"commit_message": "[PATCH] fix injectable inputs Signed-off-by: Eden Ross Duff, MSc, DDiv <ozi.project@outlook.com> action.yml | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSBhYmQ4NTI0ZWM2OTgwMDg5MDUyOTg0NmIzY2NmYjA5Y2U3YzEwYjVjIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tO... | CWE-94: Improper Control of Generation of Code ('Code Injection') |
GHSA-v3vf-2r98-xw8w | Exposure of Sensitive Information to an Unauthorized Actor in Apache syncope-cope | null | [
{
"commit_message": "[PATCH] Review fields usable for search and orderBy .../common/search/SearchableFields.java | 2 +- .../dao/impl/SubjectSearchDAOImpl.java | 20 +++++++++++++++++-- .../syncope/core/rest/SearchTestITCase.java | 17 ++++++++++++++++ 3 files changed, 36 insertions(+), 3 deletions... | null |
CVE-2021-32054 | Firely/Incendi Spark before 1.5.5-r4 lacks Content-Disposition headers in certain situations, which may cause crafted files to be delivered to clients such that they are rendered directly in a victim's web browser. | [
{
"commit_message": "[PATCH] refactor: Add constants for HTTP Header field names Added constants for HTTP Header field names Set Content-Disposition header to attachment for Binary requests src/Spark.Engine/Core/HttpHeaderName.cs | 15 +++++++++++++++ .../Extensions/HttpRequestFhirExtensions.cs |... | n/a | |
CVE-2025-58754 | Axios is vulnerable to DoS attack through lack of data size check | Axios is a promise based HTTP client for the browser and Node.js. When Axios prior to versions 0.30.2 and 1.12.0 runs on Node.js and is given a URL with the `data:` scheme, it does not perform HTTP. Instead, its Node http adapter decodes the entire payload into memory (`Buffer`/`Blob`) and returns a synthetic 200 response. This path ignores `maxContentLength` / `maxBodyLength` (which only protect HTTP responses), so an attacker can supply a very large `data:` URI and cause the process to allocate unbounded memory and crash (DoS), even if the caller requested `responseType: 'stream'`. Versions 0.30.2 and 1.12.0 contain a patch for the issue. | [
{
"commit_message": "[PATCH] fix(node): enforce maxContentLength for data: URLs (#7011) * fix(node): enforce maxContentLength for data: URLs (pre-decode size check)- CVE-2025-58754 * feat(utils): add estimateDataURLDecodedBytes helper and fix duplicate condition in base64 padding check * feat: add estimateDataU... | CWE-770: Allocation of Resources Without Limits or Throttling |
GHSA-f7cr-7c2c-fm8r | OpenStack Ironic Exposure of Sensitive Information to an Unauthorized Actor | null | [
{
"commit_message": "[PATCH] Mask password on agent lookup according to policy We currently mask passwords in driver_info for all API responses, except for agent lookups. This is because driver_vendor_passthru just expects a dict to return as JSON in the response, and doesn't modify it at all. Change lookup to ... | null |
GHSA-286m-rx96-29m7 | null | [
{
"commit_message": "[PATCH] USB: serial: kl5kusb105: fix line-state error handling The current implementation failed to detect short transfers when attempting to read the line state, and also, to make things worse, logged the content of the uninitialised heap transfer buffer. Fixes: abf492e7b3ae (\"USB: kl5kus... | null | |
CVE-2023-50263 | Nautobot allows unauthenticated db-file-storage views | Nautobot is a Network Source of Truth and Network Automation Platform built as a web application atop the Django Python framework with a PostgreSQL or MySQL database. In Nautobot 1.x and 2.0.x prior to 1.6.7 and 2.0.6, the URLs `/files/get/?name=...` and `/files/download/?name=...` are used to provide admin access to files that have been uploaded as part of a run request for a Job that has FileVar inputs. Under normal operation these files are ephemeral and are deleted once the Job in question runs.
In the default implementation used in Nautobot, as provided by `django-db-file-storage`, these URLs do not by default require any user authentication to access; they should instead be restricted to only users who have permissions to view Nautobot's `FileProxy` model instances.
Note that no URL mechanism is provided for listing or traversal of the available file `name` values, so in practice an unauthenticated user would have to guess names to discover arbitrary files for download, but if a user knows the file name/path value, they can access it without authenticating, so we are considering this a vulnerability.
Fixes are included in Nautobot 1.6.7 and Nautobot 2.0.6. No known workarounds are available other than applying the patches included in those versions. | [
{
"commit_message": "[PATCH] requires authentication on DB file storage views (#4959) * requires authentication on DB file storage views * Update change fragment, add object permissions enforcement Co-authored-by: Glenn Matthews <glenn.matthews@networktocode.com> changes/4959.security | 1 + nautobo... | CWE-200: Exposure of Sensitive Information to an Unauthorized Actor |
GHSA-2wc2-77r7-4pm8 | null | [
{
"commit_message": "[PATCH] ksmbd: fix memory leak in smb2_handle_negotiate The allocated memory didn't free under an error path in smb2_handle_negotiate(). Fixes: e2f34481b24d (\"cifsd: add server-side procedures for SMB3\") Cc: stable@vger.kernel.org Reported-by: zdi-disclosures@trendmicro.com # ZDI-CAN-1781... | null | |
CVE-2023-5833 | Improper Access Control in mintplex-labs/anything-llm | Improper Access Control in GitHub repository mintplex-labs/anything-llm prior to 0.1.0. | [
{
"commit_message": "[PATCH] Prevent updates of specific keys via API (#256) prevent non-admin from updating settings prevent password updates in multi-user mdoe server/endpoints/system.js | 39 ++++++++++++++++++++---- server/utils/helpers/updateENV.js | 12 +++++--- server/utils/prisma/migr... | CWE-284 Improper Access Control |
CVE-2023-25671 | TensorFlow has segmentation fault in tfg-translate | TensorFlow is an open source platform for machine learning. There is out-of-bounds access due to mismatched integer type sizes. A fix is included in TensorFlow version 2.12.0 and version 2.11.1.
| [
{
"commit_message": "[PATCH] tfg-translate needs to call InitMlir PiperOrigin-RevId: 504566500 tensorflow/core/ir/importexport/BUILD | 1 + tensorflow/core/ir/importexport/tfg-translate.cc | 2 ++ 2 files changed, 3 insertions(+)",
"patch_text_b64": "RnJvbSAyZWVkYzhmNjc2ZDJjM2I4YmU5NDkyZTU0N2IyYmM4... | CWE-787: Out-of-bounds Write |
CVE-2025-27151 | redis-check-aof may lead to stack overflow and potential RCE | Redis is an open source, in-memory database that persists on disk. In versions starting from 7.0.0 to before 8.0.2, a stack-based buffer overflow exists in redis-check-aof due to the use of memcpy with strlen(filepath) when copying a user-supplied file path into a fixed-size stack buffer. This allows an attacker to overflow the stack and potentially achieve code execution. This issue has been patched in version 8.0.2. | [
{
"commit_message": "[PATCH] Check length of AOF file name in redis-check-aof (CVE-2025-27151) Ensure that the length of the input file name does not exceed PATH_MAX src/redis-check-aof.c | 6 ++++++ 1 file changed, 6 insertions(+)",
"patch_text_b64": "RnJvbSA2NDNiNWRiMjM1Y2I4MjUwOGU3MmYxMWM3YjRiYmZjN2RjMzli... | CWE-20: Improper Input Validation |
CVE-2025-4565 | Unbounded recursion in Python Protobuf | Any project that uses Protobuf Pure-Python backend to parse untrusted Protocol Buffers data containing an arbitrary number of recursive groups, recursive messages or a series of SGROUP tags can be corrupted by exceeding the Python recursion limit. This can result in a Denial of service by crashing the application with a RecursionError. We recommend upgrading to version =>6.31.1 or beyond commit 17838beda2943d08b8a9d4df5b68f5f04f26d901 | [
{
"commit_message": "[PATCH] Add recursion depth limits to pure python PiperOrigin-RevId: 758382549 python/google/protobuf/internal/decoder.py | 31 ++++++++ .../google/protobuf/internal/decoder_test.py | 13 ++++ .../google/protobuf/internal/message_test.py | 76 ++++++++++++++----- .../protobuf/internal/sel... | CWE-674 Uncontrolled Recursion |
CVE-2024-34712 | Oceanic allows unsanitized user input to lead to path traversal in URLs | Oceanic is a NodeJS library for interfacing with Discord. Prior to version 1.10.4, input to functions such as `Client.rest.channels.removeBan` is not url-encoded, resulting in specially crafted input such as `../../../channels/{id}` being normalized into the url `/api/v10/channels/{id}`, and deleting a channel rather than removing a ban. Version 1.10.4 fixes this issue. Some workarounds are available. One may sanitize user input, ensuring strings are valid for the purpose they are being used for. One may also encode input with `encodeURIComponent` before providing it to the library. | [
{
"commit_message": "[PATCH] sanitize route parameters lib/util/Routes.ts | 250 +++++++++++++++++++++++---------------------- 1 file changed, 127 insertions(+), 123 deletions(-)",
"patch_text_b64": "RnJvbSA4YmY4ZWU4MzczYjhjNTY1ZmJkYmY3MGE2MDlhYmE0ZmJjMWExZmZlIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBEb25vd... | CWE-23: Relative Path Traversal |
GHSA-jjxq-ff2g-95vh | Twig has unguarded calls to `__isset()` and to array-accesses when the sandbox is enabled | null | [
{
"commit_message": "[PATCH] Sandbox ArrayAccess and do sandbox checks before isset() checks doc/api.rst | 9 ++++ src/Extension/CoreExtension.php | 64 +++++++++++++++++++--- src/Node/Expression/GetAttrExpression.php | 33 ++++++++++-- tests/Extension/SandboxTest.php ... | null |
GHSA-566m-3pvx-3xvx | null | [
{
"commit_message": "[PATCH] fixed #1769 (fuzz) src/media_tools/media_export.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSAwMDE5NGY1ZmU0NjIxMjNmNzBiMGJhZTc5ODczMTdiNTI4OThiODY4IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBqZWFubGYgPGplYW5sZkBncGFjLmlvPgpEYXRlOiBGcmksIDMwIEF... | null | |
CVE-2015-8852 | Varnish 3.x before 3.0.7, when used in certain stacked installations, allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a header line terminated by a \r (carriage return) character in conjunction with multiple Content-Length headers in an HTTP request. | [
{
"commit_message": "[PATCH] Check for duplicate Content-Length headers in requests If a duplicate CL header is in the request, we fail the request with a 400 (Bad Request) Fix a test case that was sending duplicate CL by misstake and would not fail because of that. bin/varnishd/cache_http.c | 19 +++++++... | n/a | |
CVE-2022-1774 | Exposure of Sensitive Information to an Unauthorized Actor in jgraph/drawio | Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository jgraph/drawio prior to 18.0.7. | [
{
"commit_message": "[PATCH] 18.0.7 release .github/workflows/build-release.yml | 3 +- ChangeLog | 6 +++ VERSION | 2 +- .../com/mxgraph/online/AbsAuthServlet.java | 16 +++----- .../java/com/mxgraph/online/ProxyServlet.java... | CWE-200 Exposure of Sensitive Information to an Unauthorized Actor |
CVE-2023-52137 | GitHub Action tj-actions/verify-changed-files is vulnerable to command injection in output filenames | The [`tj-actions/verify-changed-files`](https://github.com/tj-actions/verify-changed-files) action allows for command injection in changed filenames, allowing an attacker to execute arbitrary code and potentially leak secrets. The [`verify-changed-files`](https://github.com/tj-actions/verify-changed-files) workflow returns the list of files changed within a workflow execution. This could potentially allow filenames that contain special characters such as `;` which can be used by an attacker to take over the [GitHub Runner](https://docs.github.com/en/actions/using-github-hosted-runners/about-github-hosted-runners) if the output value is used in a raw fashion (thus being directly replaced before execution) inside a `run` block. By running custom commands, an attacker may be able to steal secrets such as `GITHUB_TOKEN` if triggered on other events than `pull_request`.
This has been patched in versions [17](https://github.com/tj-actions/verify-changed-files/releases/tag/v17) and [17.0.0](https://github.com/tj-actions/verify-changed-files/releases/tag/v17.0.0) by enabling `safe_output` by default and returning filename paths escaping special characters for bash environments. | [
{
"commit_message": "[PATCH] Merge pull request from GHSA-ghm2-rq8q-wrhc * feat: add `safe_output` input enabled by default * fix: migrate README to safe uses of interpolation * fix: also sanitize `)` * fix: remove sanitization of `'` * fix: also sanitize `|` * fix: also sanitize `&` * fix: also sanitize `;` RE... | CWE-20: Improper Input Validation |
GHSA-2q2r-xgj5-h3hm | Apache Solr Search for TYPO3 vulnerable to Cross-site Scripting | null | [
{
"commit_message": "[PATCH] Fixed an XSS issue, thanks to Marcus Krause git-svn-id: https://svn.typo3.org/TYPO3v4/Extensions/solr/trunk@24526 735d13b6-9817-0410-8766-e36946ffe9aa ChangeLog | 4 ++++ pi_results/class.tx_solr_pi_results_formcommand.php | 2 +- pi... | null |
CVE-2022-29784 | PublicCMS V4.0.202204.a and below contains an information leak via the component /views/directive/sys/SysConfigDataDirective.java. | [
{
"commit_message": "[PATCH] =?UTF-8?q?=E5=AE=89=E5=85=A8=E6=BC=8F=E6=B4=9E=E4=BF=AE?= =?UTF-8?q?=E5=A4=8D=20=E6=84=9F=E8=B0=A2=20=E5=A7=9C=E6=B4=8B-=E9=95=BF?= =?UTF-8?q?=E4=BA=AD=E7=A7=91=E6=8A=80?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit ...\\345\\206\\214_\\... | n/a | |
GHSA-c545-c4f9-rf6v | Heap OOB in TFLite | null | [
{
"commit_message": "[PATCH] Prevent an OOB read in `expand_dims.cc` The for loop that follows this check assumes that `axis` is between `0` and `input_dims.size`. If user supplied `axis` is negative, the if code before this check is supposed to bring it back to positive (similar to how in Python one can do `l[... | null |
CVE-2022-41933 | Plaintext storage of password in org.xwiki.platform:xwiki-platform-security-authentication-default | XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. When the `reset a forgotten password` feature of XWiki was used, the password was then stored in plain text in database. This only concerns XWiki 13.1RC1 and newer versions. Note that it only concerns the reset password feature available from the "Forgot your password" link in the login view: the features allowing a user to change their password, or for an admin to change a user password are not impacted. This vulnerability is particularly dangerous in combination with other vulnerabilities allowing to perform data leak of personal data from users, such as GHSA-599v-w48h-rjrm. Note that this vulnerability only concerns the users of the main wiki: in case of farms, the users registered on subwiki are not impacted thanks to a bug we discovered when investigating this. The problem has been patched in version 14.6RC1, 14.4.3 and 13.10.8. The patch involves a migration of the impacted users as well as the history of the page, to ensure no password remains in plain text in the database. This migration also involves to inform the users about the possible disclosure of their passwords: by default, two emails are automatically sent to the impacted users. A first email to inform about the possibility that their password have been leaked, and a second email using the reset password feature to ask them to set a new password. It's also possible for administrators to set some properties for the migration: it's possible to decide if the user password should be reset (default) or if the passwords should be kept but only hashed. Note that in the first option, the users won't be able to login anymore until they set a new password if they were impacted. Note that in both options, mails will be sent to users to inform them and encourage them to change their passwords. | [
{
"commit_message": "[PATCH] XWIKI-19869: Improve user property storage - Provide a new API for sending text based email - Provide a migration and a listener for informing users about it .../factory/text/TextMimeMessageFactory.java | 109 ++++++ .../main/resources/META-INF/components.txt | 1 + .../text/Tex... | CWE-312: Cleartext Storage of Sensitive Information |
GHSA-769x-rww2-6j8v | null | [
{
"commit_message": "[PATCH] Antiforgery for profile pages. .../Controllers/Account/AccountController.cs | 1 + .../Controllers/Profile/ProfileController.cs | 1 + .../Controllers/Setup/SetupController.cs | 1 + .../Views/Account/Consent.cshtml | 2 ++ .../IdentityServer/Views/Account/Lo... | null | |
GHSA-jcjp-j466-5xxg | null | [
{
"commit_message": "[PATCH] #207: Out-of-bounds write src/regcomp.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSBjYmU5ZjhiZDljZmM2YzNjODdhNjBmYmFlNThmYTFhODVkYjU5ZGYwIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiAiSy5Lb3Nha28iIDxra29zYWtvMEBnbWFpbC5jb20+CkRhdGU6IE1vbiwgMjEgU... | null | |
CVE-2020-29074 | scan.c in x11vnc 0.9.16 uses IPC_CREAT|0777 in shmget calls, which allows access by actors other than the current user. | [
{
"commit_message": "[PATCH] scan: limit access to shared memory segments to current user src/scan.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSA2OWVlYjlmN2JhYTE0Y2EwM2IxNmM5ZGU4MjFmOTg3NmRlZjdhMzZhIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiA9P1VURi04P3E/R3U9QzM9QTluYWw9M... | n/a | |
GHSA-3x96-m42v-hvh5 | Cross-site Scripting in Microweber | null | [
{
"commit_message": "[PATCH] update .../toolbar/editor_tools/module_settings/index.php | 12 +++++++++--- 1 file changed, 9 insertions(+), 3 deletions(-)",
"patch_text_b64": "RnJvbSBjNTEyODVmNzkxZTQ4ZTUzNjExMWNkNTdhOTU0NGNjYmY3ZjMzOTYxIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBQZXRlciBJdmFub3YgPHBldGVyQG1p... | null |
GHSA-8jhm-94f4-rx5j | null | [
{
"commit_message": "[PATCH] =?UTF-8?q?Add=20additional=20checks=20to=20DCM=20reader?= =?UTF-8?q?=20to=20prevent=20data-driven=20faults=20(bug=20report=20from?= =?UTF-8?q?=20Hanno=20B=C3=B6ck?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit ChangeLog | 2 ++ coders/... | null | |
GHSA-m269-wj6g-c459 | PySAML2 XML external entity attack | null | [
{
"commit_message": "[PATCH] Fix XXE in XML parsing (related to #366) This fixes XXE issues on anything where pysaml2 parses XML directly as part of issue #366. It doesn't address the xmlsec issues discussed on that ticket as they are out of reach of a direct fix and need the underlying library to fix this issu... | null |
GHSA-j7vx-8mqj-cqp9 | Exposure of Sensitive Information to an Unauthorized Actor in Doorkeeper | null | [
{
"commit_message": "[PATCH] Merge pull request from GHSA-j7vx-8mqj-cqp9 * Attempt at fixing information disclosure vulnerability. * Add `#as_json` method and attrs serialization restriction for Application model * [ci skip] Add documentation for serialization Co-authored-by: Nikita Bulai <bulaj.nikita@gmail.co... | null |
GHSA-m7hx-hw6h-mqmc | Grav File Upload Path Traversal | null | [
{
"commit_message": "[PATCH] fixed path traversal by santize checking fiilename CHANGELOG.md | 1 + system/src/Grav/Common/Utils.php | 2 ++ 2 files changed, 3 insertions(+)",
"patch_text_b64": "RnJvbSA1OTI4NDExYjg2YmFiMDVhZmNhMmIzM2RiNGU3Mzg2YTQ0ODU4ZTk5IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQp... | null |
GHSA-wwfw-m54g-gv72 | ChakraCore information disclosure vulnerability | null | [
{
"commit_message": "[PATCH] [CVE-2019-0648] Edge - ChakraCore OOB read - Individual lib/Parser/RegexParser.cpp | 31 +++++++++++-------------------- 1 file changed, 11 insertions(+), 20 deletions(-)",
"patch_text_b64": "RnJvbSAxYTc3OTBmODczYjFhNzNkMWNmZWM5NTQ4ZWIwOGEzYjlmZDc5OGYzIE1vbiBTZXAgMTcgMDA6MDA6MDAg... | null |
GHSA-j2x6-9323-fp7h | Integer bounds error in Vyper | null | [
{
"commit_message": "[PATCH] Merge pull request from GHSA-j2x6-9323-fp7h This commit addresses two issues in validating returndata, both related to the inferred type of the external call return. First, it addresses an issue with interfaces imported from JSON. The JSON_ABI encoding type was added in 0.3.0 as par... | null |
GHSA-h8xf-fhc3-mgm2 | null | [
{
"commit_message": "[PATCH] =?UTF-8?q?XSS=20=EC=B7=A8=EC=95=BD=EC=A0=90=20=EC=88=98?= =?UTF-8?q?=EC=A0=95?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit adm/boardgroup_form.php | 2 +- adm/boardgroup_form_update.php | 4 +++- adm/boardgroup_list_update.ph... | null | |
GHSA-3fvw-g6mr-w247 | ChakraCore RCE Vulnerability | null | [
{
"commit_message": "[PATCH] [CVE-2018-8130] [CVE-2018-0946] move allocators to ServerScriptContext, add missing marshalling code lib/Backend/NativeCodeGenerator.cpp | 3 +-- lib/Backend/ServerScriptContext.cpp | 16 +++++++++++- lib/Backend/ServerScriptContext.h | 3 +++ lib/Backend/Se... | null |
GHSA-jm9m-rqr3-wfmh | Kirby has insufficient permission checks in the language settings | null | [
{
"commit_message": "[PATCH] Fix language permissions #6497 i18n/translations/en.json | 3 + panel/src/components/Views/LanguagesView.vue | 24 +++- src/Cms/Language.php | 29 +++- src/Cms/Permissions.php | 3 +- tests/Cms/Languages/LanguageTest.... | null |
CVE-2023-22740 | Discourse vulnerable to Allocation of Resources Without Limits via Chat drafts | Discourse is an open source platform for community discussion. Versions prior to 3.1.0.beta1 (beta) (tests-passed) are vulnerable to Allocation of Resources Without Limits. Users can create chat drafts of an unlimited length, which can cause a denial of service by generating an excessive load on the server. Additionally, an unlimited number of drafts were loaded when loading the user. This issue has been patched in version 2.1.0.beta1 (beta) and (tests-passed). Users should upgrade to the latest version where a limit has been introduced. There are no workarounds available. | [
{
"commit_message": "[PATCH] SECURITY: Limit chat drafts length and preloaded count (#19987) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Only allow maximum of `50_000` characters for chat drafts. A hidden `max_chat_draft_length` setting can control this limit. A mig... | CWE-770: Allocation of Resources Without Limits or Throttling |
GHSA-j97g-77fj-9c4p | Answer vulnerable to account takeover because password reset links do not expire | null | [
{
"commit_message": "[PATCH] update VerifyCaptcha internal/repo/captcha/captcha.go | 8 ++++++++ internal/service/action/captcha_service.go | 7 +++++++ 2 files changed, 15 insertions(+)",
"patch_text_b64": "RnJvbSA4MTNhZDBiOTg5NDY3M2IxYmRkNDg5YTJlOWFiNjBhNDRmZTk5MGFmIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAw... | null |
CVE-2019-3561 | Insufficient boundary checks for the strrpos and strripos functions allow access to out-of-bounds memory. This affects all supported versions of HHVM (4.0.3, 3.30.4, and 3.27.7 and below). | [
{
"commit_message": "[PATCH] Prevent strrpos and strripos from visiting out-of-bounds memory. Reviewed By: alexeyt Differential Revision: D14669668 fbshipit-source-id: 16bb4674bccf83ffd737e60d1fd9fd4a0093f77c hphp/runtime/base/zend-string.cpp | 5 +++-- hphp/test/slow/ext_string/ext_string.php ... | Improper Restriction of Operations within the Bounds of a Memory Buffer (CWE-119) | |
CVE-2019-13240 | An issue was discovered in GLPI before 9.4.1. After a successful password reset by a user, it is possible to change that user's password again during the next 24 hours without any information except the associated email address. | [
{
"commit_message": "[PATCH] Password token date was not removed inc/user.class.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSA4NmE0M2FlNDdiM2RkODQ0OTQ3ZjQwYTJmZmNmMWEzNmU1M2RiYmE2IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBKb2hhbiBDd2lrbGluc2tpIDxqY3dpa2xpbnNraUB0ZWNsaW... | n/a | |
GHSA-8jhr-8vq6-2gp8 | null | [
{
"commit_message": "[PATCH] Fix: Sanitizing HTML inputs and Cors misconfiguration devika.py | 10 +-- src/apis/project.py | 17 +++- src/project.py | 29 +++++++ src/state.py | 26 +----- ui/bun.lockb ... | null | |
CVE-2017-7545 | It was discovered that the XmlUtils class in jbpmmigration 6.5 performed expansion of external parameter entities while parsing XML files. A remote attacker could use this flaw to read files accessible to the user running the application server and, potentially, perform other more advanced XML eXternal Entity (XXE) attacks. | [
{
"commit_message": "[PATCH] JBPM-6415 - Remove jPDL migration plugin and its use from jbpm-designer (#658) (#673) jbpm-designer-backend/pom.xml | 24 -- .../web/server/TransformerServlet.java | 33 +-- jbpm-designer-client/pom.xml | 1 - .../public/js/Plugins/jpdlmigrat... | CWE-611 | |
GHSA-h423-w6qv-2wj3 | parse-server crashes when receiving file download request with invalid byte range | null | [
{
"commit_message": "[PATCH] fix: server crashes when receiving file download request with invalid byte range; this fixes a security vulnerability that allows an attacker to impact the availability of the server instance; the fix improves parsing of the range parameter to properly handle invalid range requests ... | null |
CVE-2025-66565 | Fiber Utils UUIDv4 and UUID Silent Fallback to Predictable Values | Fiber Utils is a collection of common functions created for Fiber. In versions 2.0.0-rc.3 and below, when the system's cryptographic random number generator (crypto/rand) fails, both functions silently fall back to returning predictable UUID values, including the zero UUID "00000000-0000-0000-0000-000000000000". The vulnerability occurs through two related but distinct failure paths, both ultimately caused by crypto/rand.Read() failures, compromising the security of all Fiber applications using these functions for security-critical operations. This issue is fixed in version 2.0.0-rc.4. | [
{
"commit_message": "[PATCH] Security fix: Make UUID() and UUIDv4() fail-fast on crypto/rand failures Replace silent fallback behavior with explicit panics when cryptographic randomness is unavailable, preventing predictable UUID generation. Changes: - UUID(): Panic instead of returning zero UUID when rand.Read... | CWE-252: Unchecked Return Value |
GHSA-wmj9-xh24-j4gx | Cross-site Scripting in microweber | null | [
{
"commit_message": "[PATCH] xss fix on tagging module src/MicroweberPackages/Helper/HTMLClean.php | 12 ++++++++++++ userfiles/modules/tags/TaggingTagsManager.php | 4 +++- 2 files changed, 15 insertions(+), 1 deletion(-)",
"patch_text_b64": "RnJvbSAxNGExYmI5NzFiY2I4YjU0NTZjMmJmMDAyMGMzMDE4OTA3YTI3MDRkIE1... | null |
GHSA-26m7-wv2f-g2rw | null | [
{
"commit_message": "[PATCH] Staging: bcm: info leak in ioctl The DevInfo.u32Reserved[] array isn't initialized so it leaks kernel information to user space. Reported-by: Nico Golde <nico@ngolde.de> Reported-by: Fabian Yamaguchi <fabs@goesec.de> Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com> Cc: stable... | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.